Patent application number | Description | Published |
20090187983 | METHOD AND SYSTEM FOR DISTRIBUTED, LOCALIZED AUTHENTICATION IN THE FRAMEWORK OF 802.11 - A method for controlling Internet access of a mobile device by using a communication system having a number of access points includes the steps of performing a certificate-based authentication between an authentication access point and a mobile device seeking access to the Internet; transmitting a certificate from the mobile device to the authentication access point; verifying the certificate by the authentication access point; determining whether the authenticating mobile device's certificate has been revoked prior to the expiration of its lifetime; and granting the authenticating mobile device access to the Internet, if the certificate has been verified successfully and not revoked prior to the expiration of its lifetime. | 07-23-2009 |
20100332906 | Quality of Service Management of End User Devices in an End User Network - Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain. | 12-30-2010 |
20120011254 | NETWORK-AWARE VIRTUAL MACHINE MIGRATION IN DATACENTERS - A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor. | 01-12-2012 |
20120246638 | FORECASTING BASED SERVICE ASSIGNMENT IN CLOUD COMPUTING - A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment. | 09-27-2012 |
20120278476 | PREDICTIVE PLACEMENT OF CONTENT THROUGH NETWORK ANALYSIS - Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed. | 11-01-2012 |
20130078961 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130078965 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20140080457 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 03-20-2014 |
20140105174 | STATE MIGRATION OF EDGE-OF-NETWORK APPLICATIONS - A system and method that externalizes mobile device state migration (i.e., checkpointing) without being dependent upon any particular Edge Application (EdgeApp) proxy server or cellular network base station. In this manner, the Edge Application (EdgeApp) proxy server does not have to be aware of a migration process, yet will enable state information to be provided to other EdgeApp proxy/server nodes at the edge of the network (cell tower). | 04-17-2014 |
20140250489 | Techniques for Policy Aware Service Composition - Techniques for policy-aware service composition are provided. In one aspect, a method for creating a policy-compliant service composition is provided. The method includes the following steps. One or more policy rules related to services in the service composition are created. A service composition graph is created that represents the service composition, wherein vertices of the service composition graph represent the services and directional edges of the service composition graph represent potential flows of data between the vertices. During creation of the service composition graph, it is determined whether one or more candidate services comply with the policy rules. Only those of the candidate services that comply with the policy rules are included in the service composition graph, wherein the services included in the service composition graph comprise policy-compliant services, such that the service composition graph comprises only the policy-compliant services. | 09-04-2014 |
20140364096 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURE - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 12-11-2014 |