Patent application number | Description | Published |
20080279097 | Methods, Systems, and Computer Program Products for Network Device Congestion Relief - A method, system, and computer program product for network device congestion relief are provided. The method includes receiving a level of congestion for a network device, receiving a data packet including a codec list, and determining a filter policy based on the level of congestion. The method further includes applying the filter policy to the data packet to remove at least one codec from the codec list when a filter policy condition is met, resulting in a filtered data packet, and outputting the filtered data packet. | 11-13-2008 |
20080291935 | Methods, Systems, and Computer Program Products for Selectively Discarding Packets - A method, system, and computer program product are provided for selectively discarding packets in a network device. The method includes receiving an upstream bandwidth saturation indicator for a queue in the network device, and identifying one or more codecs employed in packets in the queue when the upstream bandwidth saturation indicator indicates saturation. The method further includes determining a packet discarding policy based on the one or more codecs, and discarding packets in accordance with the packet discarding policy. | 11-27-2008 |
20080298343 | VOIP PHONE NUMBER DISCOVERY ON PSTNS USING TWO WAY FXO COMMUNICATION - A method for placing a telephone call using a Voice over Internet Protocol (VoIP), the method including using a foreign exchange office (FXO) of a first VoIP system, making a public switching telephone network (PSTN) connection with an FXO of a second VoIP system; exchanging at least an Internet telephone address between the FXOs; terminating the PSTN connection; and placing the telephone call from the first VoIP system to the second VolP system over the Internet using the Internet telephone address. | 12-04-2008 |
20090299698 | Co-Resident Software Performance Tracking - A method for determining the operating status of a proposed application configuration on a first client including receiving updates from a plurality of clients, each update including a client identification, a previous state indication, a current state indication, and an indication of the operating status of the current state. The method also includes storing the updates in a database, the updates being stored such that the performance of a current state may be identified at two different times; receiving a proposed state change from the first client, the proposed state change including a current state of the first client and a proposed application to be added to the first client; querying the database to identify instances of the proposed state change; determining risks associated with adding the proposed application based on the results of querying the database; and transmitting to the first client a description of the risks associated with adding the proposed application. | 12-03-2009 |
20090300602 | DETERMINING APPLICATION DISTRIBUTION BASED ON APPLICATION STATE TRACKING INFORMATION - A method of distributing applications between a plurality of machines forming a client system. The method includes determining that applications should be distributed to maximize hardware utilization of each or the plurality of machines; determining a plurality of possible configurations of applications among the plurality of machines; creating a list of all possible configurations; comparing the list of all possible configurations to a database of state information; removing configurations from the list if the configuration is the same as a state previously determined to be non-functional to create a pruned list; generating a score for each configuration on the pruned list by comparing each configuration with states information in the database; selecting the configurations with the highest score, the number of configurations equaling the number of machines; and deploying the selected configurations on the plurality of machines. | 12-03-2009 |
20090316932 | Volume Adjustment for Multiple Voice Over Internet Protocal Streams - Systems and methods for managing the volume of multiple VoIP streams are disclosed. The system includes a VoIP server configured to receive an input audio stream from a first VoIP handset, create separate output audio streams from the input audio stream for transmission to second and third VoIP handsets, and to connect to a communications network. The system also includes a volume control table coupled to the VoIP server, the volume control table including records of volume adjustments made during prior conversations between the two or more VoIP handsets. The VoIP server is further configured create the separate output audio streams such that one or more of the output streams has a volume that is different than input audio stream based on the records. | 12-24-2009 |
20100014646 | TTY Translation for VoIP - A device for transmitting TTY communications includes an input for receiving analog tones from a TTY device, a first output for connecting to a public telephone switch network (PSTN) and a second output for connecting to digital communications network. The device is configured to operate in a first mode and a second mode. In the first mode the device receives the analog tones at the input and transmits the analog tones over the PSTN through the first output. In the second mode, the device receives the analog tones at the input, converts the analog tones into transmission control protocol (TCP) packets and transmits the TCP packets over a digital communications network through the second output. | 01-21-2010 |
20100318986 | USING SOFTWARE STATE TRACKING INFORMATION TO ENACT GRANULAR UPDATE ROLLBACK - Embodiments of the invention provide the ability to determine whether a particular application may be safely added to a client computing device. Further, embodiments of the invention also allow for performing a rollback operation on clients experiencing a decrease of performance due to an addition of new software. For example, after a client updates to a new piece of software, a server may monitor the performance of the first client by analyzing a plurality of updates received from the first client. Each update may include a performance indicator. Using the updates, the server may detect a decrease in the performance of the first client. Upon detecting the decrease in the performance, the server may initiate a rollback to a previous state on the first client. | 12-16-2010 |
20110211572 | CALLER ID CALLBACK AUTHENTICATIONI FOR VOICE OVER INTERNET PROTOCOL ("VOIP") DEPLOYMENTS - Systems and methods are disclosed for authenticating caller identification in VoIP communication. A VoIP device receives an incoming call from an originating calling device; wherein the incoming call includes (1) a caller identification and (2) a unique identifier associated with the originating calling device. The VoIP device verifies that the caller identification in the received incoming call matches an entry in a trusted directory, wherein the trusted directory includes one or more entries of previously verified caller identifications. Upon verifying that the caller identification in the received incoming call matches a caller identification entry in the trusted directory, the VoIP device sends an inquiry to a unique locator associated with the matching caller identification in the trusted directory. | 09-01-2011 |
20120023222 | MOVING DEPLOYMENT OF IMAGES BETWEEN COMPUTERS - In an embodiment, a unit workload comprises an average processor speed and an average memory amount required by execution of images. If an integer multiple of the average processor speed required minus a free processor speed at a source computer is greater than a first threshold amount, an integer multiple of the average memory amount required minus a free memory amount at the source computer is greater than a second threshold amount, the integer multiple of the average processor speed required minus a processor speed requirement of a source image at the source computer is less than a third threshold amount, and the integer multiple of the average memory required minus a memory requirement of the source image at the source computer is less than a fourth threshold amount, then deployment of the source image is moved from the source computer to a destination computer. | 01-26-2012 |
20120185843 | RECONFIGURATION OF COMPUTER SYSTEM TO ALLOW APPLICATION INSTALLATION - A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system. | 07-19-2012 |
20120324070 | DISTRIBUTED CLOUD PLACEMENT SOFTWARE - Techniques are described for distributed placement of a request on one of a plurality of deployment nodes. Embodiments receive a request specifying resource requirements for instantiating the request, and transmit at least an indication of the resource requirements to the plurality of deployment nodes. An indication of suitability is then received from at least two of the plurality of deployment nodes, the indication of suitability describing a suitability of the respective deployment node for instantiating the request. Embodiments select one of the at least two deployment nodes based on the indications of suitability, and transmit the request to the selected deployment node for instantiation. | 12-20-2012 |
20130174142 | RECONFIGURATION OF COMPUTER SYSTEM TO ALLOW APPLICATION INSTALLATION - A method and apparatus for installing an application on a computer are disclosed. Following receipt of a request to install an application, a software state, comprising the new application and several of the applications installed on the computer, is derived. Then, the method determines whether the software state can be implemented on the computer. If the software state cannot be implemented on the computer, then the method derives another software state. This is repeated until the derived software state can be implemented on the computer system, or until determining that no software state exists which can be implemented on the computer system. | 07-04-2013 |
20130262644 | DEPLOYMENT OF MOBILE WORKLOADS BASED ON PROXIMITY - A mobile workload deployment mechanism in a cloud computing environment determines when mobile devices are in proximity of a resource needed to process a mobile workload, and deploys the mobile workload to the mobile devices in proximity of the needed resource. Various methods performed by the mobile workload deployment mechanism account for the mobile nature of mobile devices, and how that mobility may affect the relocation, suspension, and other processing of the mobile workload. | 10-03-2013 |
20140007085 | ADJUSTING ADMINSTRATIVE ACCESS BASED ON WORKLOAD MIGRATION | 01-02-2014 |
20140007095 | ADJUSTING ADMINSTRATIVE ACCESS BASED ON WORKLOAD MIGRATION | 01-02-2014 |