Patent application number | Description | Published |
20080225726 | System and Method for Selfish Child Clustering - A system and method for selfish child clustering are disclosed. In one embodiment, the system comprises a selfish node; and a plurality of servicing nodes each connected to the selfish node, wherein the selfish node selects a first one of the servicing nodes to service requests therefrom; and wherein the selfish node evaluates a responsiveness of the first one of the servicing nodes and, responsive to a determination that the responsiveness of the first one of the servicing nodes is unacceptable, the selfish node selects a second one of the servicing nodes to service requests therefrom. | 09-18-2008 |
20080225837 | System and Method for Multi-Layer Distributed Switching - A system and method for multi-layer distributed switching is disclosed. In one embodiment, the distributed switching system comprises an external network connection connected to a plurality of computing nodes such that data signals can be sent to and from the computing nodes. An incoming director module is associated with a first computing node and associates a data signal with a second computing node. There is a request distribution network for distributing data signals among the nodes, a response generator module, and an outgoing director module associated with the second computing node. | 09-18-2008 |
20080313567 | System and Method for Providing Dynamic Prioritization and Importance Filtering of Computer Desktop Icons and Program Menu Items - System and method for displaying an item on a display of a computer, wherein the item represents a file installed on the computer, are described. In one embodiment, the method comprises, responsive to a determination that a usage rate of the file exceeds a predetermined minimum rate, displaying the item representative of the file on the computer display; determining whether the usage rate of the file has changed; and responsive to a determination that the usage rate of the file has changed, updating at least one visual attribute of the item representative of the file to indicate the usage rate change. | 12-18-2008 |
20090003368 | SYSTEM AND METHOD FOR GRAPHICALLY REPRESENTING AND MANAGING COMPUTER NETWORK CONNECTIONS - System and method for graphically representing and managing computer network connections are described. One embodiment is a method for providing an overlay filter in a computer capable of at least one secure network connection for use by at least one user application of the computer. The method comprises establishing a first secure network connection; launching a first application via the first secure network connection; and presenting on a display of the computer a visual representation, the visual representation illustrating that the first application is using the first secure network connection and comprising a first overlay area corresponding to the first secure network connection, wherein a first icon representing the first application is displayed within the first overlay area. | 01-01-2009 |
20090037920 | SYSTEM AND METHOD FOR INDICATING USAGE OF SYSTEM RESOURCES USING TASKBAR GRAPHICS - System and method for a method for indicating relative usage of a computer system resource by a plurality of applications each running in an active window, wherein each active window is represented on a taskbar element by a taskbar button, are described. In one embodiment, the method comprises, for each of the active windows, determining a resource usage rate for the application running in the active window, the resource usage rate comprising a percentage of a total system resource usage for which the application accounts; subsequent to the determining, ranking the applications in order of the determined resource usage rates thereof; and redisplaying the taskbar buttons to indicate, via at least one display characteristic, the relative system resource usage rates of the applications. | 02-05-2009 |
20090055531 | IDENTITY BASED NETWORK MAPPING - Techniques for identity-based network mapping are provided. A principal is associated with a resource identifier via a mapping. Conditions of a network are dynamically evaluated in response to policy and actions taken against a resource associated with the resource identifier of the mapping. | 02-26-2009 |
20090300495 | SYSTEM AND METHOD FOR AN ADAPTIVE WIZARD UTILITY FOR GRAPHICAL USER INTERFACES - System and method for implementing an adaptive wizard utility for a graphical user interface (“GUI”) are described. In one embodiment, the method comprises, responsive to presentation of a page of the wizard utility to a user, monitoring user activity in connection with the page; analyzing the user activity to determine a current performance designation of the user; and modifying at least one page of the wizard utility based on the current performance designation of the user. | 12-03-2009 |
20100008584 | SYSTEM AND METHOD FOR DEVICE MAPPING BASED ON IMAGES AND REFERENCE POINTS - System and method for mapping a location of each of a plurality of devices in a data center. In one embodiment, the method comprises receiving image data comprising an image of at least a portion of the data center from a source; processing the image data to locate visual identifiers displayed in the image, wherein each of the visual identifiers is associated with one of the devices or with a spatial reference point; extracting the located visual identifiers and determining spatial coordinates for each of the identified visual identifiers from the image; and determining the spatial reference points from the image. The method further comprises developing groups based on extracted visual identifiers and spatial coordinates thereof and the spatial reference points, wherein allowances are made for an angle of the image, wherein each group comprises a subset of related ones of the devices; for each group, comparing each of the visual identifiers of the group with a key to determine information regarding the associated device to obtain processing results; and combining processing results corresponding to multiple images to remove redundant information and produce final results. | 01-14-2010 |
20100023996 | TECHNIQUES FOR IDENTITY AUTHENTICATION OF VIRTUALIZED MACHINES - Techniques for identity authentication of Virtual Machines (VM's) are provided. A VM is authenticated and once authenticated, each device interfaced to or accessible to the VM is also authenticated. When both the VM and each device are authenticated, the VM is granted access to a machine for installation thereon. | 01-28-2010 |
20100131641 | SYSTEM AND METHOD FOR IMPLEMENTING A WIRELESS QUERY AND DISPLAY INTERFACE - System and method for implementing a wireless query and display interface are disclosed. In one embodiment, the system includes a machine to be monitored and an end-point associated with the machine and comprising an interface, the end-point for connecting to the machine to be monitored via the interface. The system further includes a consolidator comprising an identity service and a Global Device Identity Listing (“GDIL”), the GDIL for maintaining a list of machines to be monitored using the system and a wireless device for viewing the list maintained by the GDIL and for issuing commands and queries related to one or more of the machines on the list. The end-point, the consolidator, and the wireless device are capable of wirelessly communicating with one another. | 05-27-2010 |
20100154037 | TECHNIQUES FOR NETWORK PROCESS IDENTITY ENABLEMENT - Techniques for network process identity enablement are provided. Inter-server communications within a network are intercepted so that unique identity-based information is gathered and recorded before a sending process is permitted to release a communication over the network to a receiving process. Moreover, the receiving process cannot process the communication being sent until identifying information is gathered again and independently validated against the prior recorded information. | 06-17-2010 |
20100161281 | TECHNIQUES FOR DISTRIBUTED TESTING - Techniques for distributed testing are provided. Resources are identified for performing tests over a network. The tests and policies are sent to the resources and a proxy. The proxy delivers data for the tests to the resources and enforces the policies during the tests. The proxy also gathers statistics and results from the resources, which are executing the tests, and the proxy reports the statistics and results to one or more third-party services for subsequent manipulation and analysis. | 06-24-2010 |
20110029500 | SYSTEM AND METHOD FOR FLOATING INDEX NAVIGATION - System and method for implementing a floating index navigation tool are described. In one embodiment, the method includes, in response to a user's updating a search term, building first and second search queries; issuing the first and second search queries to at least one database comprising a searchable index of content; and responsive to receipt of search results from the first and second search queries, displaying the first query search results in a first manner and displaying the second query search results in a second manner different than the first manner. | 02-03-2011 |
20110313982 | FILE MAPPING AND CONVERTING FOR DYNAMIC DISK PERSONALIZATION FOR MULTIPLE PLATFORMS - File mapping and converting for dynamic disk personalization for multiple platforms are provided. A volatile file operation is detected in a first platform. The file supported by the first platform. A determination is made that the file is sharable with a second platform. The volatile operation is performed on the file in the first platform and the modified file is converted to a second file supported by the second platform. The modified file and second file are stored in a personalized disk for a user. The personalized disk is used to modify base images for VMs of the user when the user accesses the first platform or second platform. The modified file is available within the first platform and the second file is available within the second platform. | 12-22-2011 |
20120084844 | FEDERATION CREDENTIAL RESET - Techniques for federated credential reset are presented. A principal requests a credential reset with a first service. The first service provides a link to a third party service previously selected by the principal. The principal separately authenticates to the third party service and cause the third party service to send a federated token to the first service. When the federated token is received by the first service, the first service permits the principal to reset an original credential to a new credential for purposes of accessing the first service. | 04-05-2012 |
20120110329 | TECHNIQUES FOR MOBILE DEVICE AUTHENTICATION - A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD. | 05-03-2012 |
20120151066 | TECHNIQUES FOR DISTRIBUTED TESTING - Techniques for distributed testing are provided. Resources are identified for performing tests over a network. The tests and policies are sent to the resources and a proxy. The proxy delivers data for the tests to the resources and enforces the policies during the tests. The proxy also gathers statistics and results from the resources, which are executing the tests, and the proxy reports the statistics and results to one or more third-party services for subsequent manipulation and analysis. | 06-14-2012 |
20120222041 | TECHNIQUES FOR CLOUD BURSTING - Techniques for automated and controlled cloud migration or bursting are provided. A schema for a first cloud in a first cloud processing environment is used to evaluate metrics against thresholds defined in the schema. When a threshold is reached other metrics for other clouds in second cloud processing environments are evaluated and a second cloud processing environment is selected. Next, a second cloud is cloned in the selected second cloud processing environment for the first cloud and traffic associated with the first cloud is automatically migrated to the cloned second cloud. | 08-30-2012 |
20120233625 | TECHNIQUES FOR WORKLOAD COORDINATION - Techniques for workload coordination are provided. An automated discovery service identifies resources with hardware and software specific dependencies for a workload. The dependencies are made generic and the workload and its configuration with the generic dependencies are packaged. At a target location, the packaged workload is presented and the generic dependencies automatically resolved with new hardware and software dependencies of the target location. The workload is then automatically populated in the target location. | 09-13-2012 |
20120271936 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 10-25-2012 |
20120311344 | TECHNIQUES FOR SECURITY AUDITING OF CLOUD RESOURCES - Techniques for security auditing of cloud resources are provided. A virtual machine (VM) is captured and isolated when a session indicates that a session with the VM has terminated. Security checks are executed against the VM in the isolated environment. Results from the security checks are then reported. | 12-06-2012 |
20120324527 | TECHNIQUES FOR WORKLOAD SPAWNING - Techniques for spawning workloads are provided. A single repository is read once to obtain an image for a workload or files and resources for the image. The read operation spawns multiple, and in some cases, concurrent write operations, to instantiate the workload over a network as multiple occurrences or instances of the workload in multiple processing environments. | 12-20-2012 |
20130007840 | TECHNIQUES FOR PREVENT INFORMATION DISCLOSURE VIA DYNAMIC SECURE CLOUD RESOURCES - Techniques for preventing information disclosure via dynamic secure cloud resources are provided. Data (information) remotely housed on a particular cloud resource of a particular cloud is periodically, randomly, and dynamically changed to a different cloud resource within the same cloud or to a different cloud resource within an entirely different cloud. A requesting principal for the data is dynamically authenticated and a current location for the data is dynamically resolved and the principal is securely and dynamically connected to the current cloud resource and current cloud hosting the data for access. | 01-03-2013 |
20130055265 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 02-28-2013 |
20130111208 | TECHNIQUES FOR AUTHENTICATION VIA A MOBILE DEVICE | 05-02-2013 |
20130111543 | TECHNIQUES FOR CONTROLLING AUTHENTICATION | 05-02-2013 |
20130263213 | TECHNIQUES FOR IDENTITY AND POLICY BASED ROUTING - Techniques for identity and policy based routing are presented. A resource is initiated on a device with a resource identity and role assignments along with policies are obtained for the resource. A customized network is created for the resource using a device address for the device, the resource identity, the role assignments, and the policies. | 10-03-2013 |
20130326063 | TECHNIQUES FOR WORKLOAD DISCOVERY AND ORGANIZATION - Techniques for workload discovery and organization are presented. A workload when initiated on a network self-inspects the network for other workloads processing as a collection over the network. Shared communication information is used by the workload to dynamically join the collection. A network address for the initiated workload is then added to a shared Domain Name System (DNS) database being maintained for the network and the collection. | 12-05-2013 |