Class / Patent application number | Description | Number of patent applications / Date published |
707782000 | Alternative access and redirection | 22 |
20100082675 | METHOD AND APPARATUS FOR ENABLING WIDE AREA GLOBAL NAME SPACE - Described are methods and apparatus for establishing a wide area GNS. The key points for implementing the wide area GNS are GNS information sharing among sites and maintaining cache consistency. In a system having the wide area GNS functionality, NFS clients may need to gain access to remote file systems, which may result in prolonged delays. Even worse, network file system protocol may not be able to penetrate firewalls. To solve these problems a cache technology is applied. Once cache mechanism is deployed, cache consistency control is implemented. More specifically, the situation when the NFS client opens a cached file at a remote site, and NFS client would like to write data to an original file. | 04-01-2010 |
20100082676 | METHOD AND APPARATUS TO DEFINE AND JUSTIFY POLICY REQUIREMENTS USING A LEGAL REFERENCE LIBRARY - A computer-implemented system and method for defining and justifying policy requirements includes: a hierarchical regional mapping (HRM) module provides a common language and a hierarchical model for geography and for jurisdictions; a legal references library (LRL) module contains applicable legal references; a legal references policy mapping (LRPM) module maps legal references to policies; and a requirements cross-checking (RCC) module cross-checks information in the legal references policy mapping module. | 04-01-2010 |
20100114962 | METHOD AND TOOLS FOR IDENTIFYING IMPACT OF DATABASE CHANGES ON AN APPLICATION - A technique is disclosed for identifying impact of database changes on an application. Given a proposed database change, affected source code is identified that is affected by the proposed database change. References to the affected source code are created and organized into a hierarchy. A user can ascertain the extent of the impact by viewing the hierarchy and by using the hierarchy to access and view the affected source code in a visually distinct manner. | 05-06-2010 |
20100228779 | METHOD OF ENABLING ACCESS TO DATA PROTECTED BY FIREWALL - Methods of enabling access to data using a portable electronic device within a private network protected by firewall are disclosed. The data may be transmitted in packets to the portable electronic device and may be consumed either instantly or subsequently. The methods may utilise either at least one web storage or an agent server. | 09-09-2010 |
20100235394 | METHOD AND APPARATUS FOR ACCESSING CONTENT BASED ON USER GEOLOCATION - An approach is provided for mapping content, such as audio files, to associated metadata about the content. The approach includes initiating a search for local metadata associated with particular content. It is determined whether the local metadata is insufficient. A request for metadata associated with the particular content is generated, if the local metadata is insufficient. The request is sent to a metadata service to obtain result data including metadata for the particular content. A search of the result data from the metadata service is initiated based on a description of the particular content to obtain most relevant metadata of the result data. | 09-16-2010 |
20100250604 | Method for Processing Data Access in an Information Management System and Related Information Management System - A method for processing data access in an information management system is disclosed. The information management system includes a plurality of servers and a database. According to the method, a user device connects to a first server. When an access command received from the user device cannot be processed by the first server, the first server writes a user data and an identification data of the user device into the database, and transmits a re-guide address including an address of a second server which can process the access command and the identification data to the user device. The second server retrieves the user data from the database according to the identification data included in the re-guide address, and replies a result of the access command to the user device according to the user data. | 09-30-2010 |
20100268739 | SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING AND REMOVING REDIRECTED UNIFORM RESOURCE LOCATORS - The present invention is directed towards systems and methods for managing shortened URLs. The method according to one embodiment of the present invention comprises receiving a request for a shortened URL from a submitting user, said request comprising a first URL. The method then generates a unique shortened URL for said first URL and provides said shortened URL to the submitting user. After a period of time, the method receives a request for the shortened URL from a requesting user. The method then deletes the shortened URL and redirects the requesting user to the first URL. | 10-21-2010 |
20110029564 | SYSTEMS AND METHODS FOR THE ORGANIZED DISTRIBUTION OF RELATED DATA - Embodiments relate to methods and systems for building representations of related subjects. The representations may include a plurality of nodes, each being associated with a subject. Users may be able to access records and/or source documents related to a plurality of subjects and add or modify node characteristics based thereon. Users may be able to perform an interaction and/or modification related to a record page. Other users (e.g., users connected to the record page) may be notified of such interaction and/or modification. | 02-03-2011 |
20120059854 | RELOCATION OF METADATA SERVER WITH OUTSTANDING DMAPI REQUESTS - A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem and operating system implementing DMAPI. Threads executing on a metadata client know when a DMAPI event is required, and generate the DMAPI event on their own initiative when necessary. A metadata server maintains DMAPI queues. If the metadata server relocates to another host, the DMAPI events in the DMAPI queues are moved transparently to users. | 03-08-2012 |
20120173582 | Location based access to financial information systems and methods - Systems, methods, and software for identifying location based rules related to a network connected device are described. A network connected device may transmit a set of data identifying the location of the device and an identifier unique to the device to a server. The server may also receive an action request, wherein the action request is associated with the identifier. The server may select a rule in a database to address the action request, the rule applicable to the identifier and location of the device. Various embodiments related to financial card transactions, access to financial information, emergency services contact, and electronic message filtering are also addressed. | 07-05-2012 |
20120271852 | System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching - Upon receipt of a document request, a client assistant examines its cache for the document. If not successful, a server searches for the requested document in its cache. If the server copy is still not fresh or not found, the server seeks the document from its host. If the host cannot provide the copy, the server seeks it from a document repository. Certain documents are identified from the document repository as being fresh or stable. Information about each of these identified documents is transmitted to the server which inserts entries into an index if the index does not already contain an entry for the document. If and when this particular document is requested, the document will not be present in the server, however the server will contain an entry directing the server to obtain the document from the document repository rather than the document's web host. | 10-25-2012 |
20120284309 | Importing Pre-Existing Data of a Prior Storage Solution into a Storage Pool for Use with a New Storage Solution - Mechanisms are provided for importing pre-existing data into a storage system utilizing a current storage management system that is different from an original storage management system used to create the pre-existing data. One or more data storage devices are integrated into the storage system in-place without modification of the pre-existing data stored on the one or more data storage devices. Metadata for the pre-existing data is created based on a linear progression of data in the pre-existing data. Read access requests targeting the pre-existing data are executed using the created metadata. Write access requests targeting the pre-existing data are executed by redirecting the write access requests to a copy of the pre-existing data created in another storage location. | 11-08-2012 |
20130110875 | UNIFIED USER IDENTIFICATION WITH AUTOMATIC MAPPING AND DATABASE ABSENCE HANDLING | 05-02-2013 |
20130159349 | UNIFIED USER IDENTIFICATION WITH AUTOMATIC MAPPING AND DATABASE ABSENCE HANDLING - An identification system that may be used in heterogeneous computing environments provides a fail-free path to providing identifiers from a single canonical namespace. Objects or gateways requiring an identifier for access are accessed using an identifier for the canonical namespace. If an entity requests access using an identifier from another namespace, an external database is consulted to determine if a mapping exists for the identifier to another identifier the canonical namespace. If no mapping exists, or the external database is unavailable, then an identifier is automatically generated in the canonical namespace and is used for the access. An internal database is updated with the automatically generated identifier, providing a mechanism to add mappings without administrative intervention. To access resources requiring an identifier from another particular namespace, a canonical namespace identifier may be mapped to another identifier in the particular namespace, or a generic identifier may be used. | 06-20-2013 |
20130246469 | SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT - A computer implemented method of developing computer applications, the method comprising providing to multiple users access, over a network, to information on a data center, with a subgroup of the users having access to a sub-portion of the information that is different from the sub-portion accessible by the remaining tenants of the subgroup; and communicating with the data center over the network employing a computer system associated with a user of the sub-group to establish application functionality with the sub-portion that may be accessed, over the network, by additional parties authorized by the user. Also disclosed is a machine-readable medium and a data center, both of which facilitate carrying-out the steps of the method. | 09-19-2013 |
20130339390 | INTELLIGENT DATA SOURCING IN A NETWORKED STORAGE SYSTEM - A storage system according to certain embodiments includes a repository of client-side data block signature information representative of a set of data blocks stored in a primary storage subsystem. In some cases, the system sources data blocks for secondary copy and restore operations from the primary storage subsystem instead of the secondary storage subsystem. Where multiple primary storage components (e.g., multiple client computing devices) contain copies of a data blocks involved in a secondary copy or restore operation, the system can decide which client to source the data block from based on sourcing criteria. | 12-19-2013 |
20140258335 | IMS DL/I Application Accelerator - A method includes providing an application accelerator to an IMS region controller, which is coupled to an IMS data language interpreter (DL/I) interface. The IMS DL/I interface provides standard data access paths to a user application launched in an IMS environment. The application accelerator is configured to make alternate data access paths available to the user application in addition to the standard data access paths provided by the IMS environment. The method further includes intercepting an IMS DL/I call made by the user application and determining whether the intercepted call should be processed by the IMS DL/I interface or by an I/O engine of the application accelerator. | 09-11-2014 |
20140289276 | METHOD AND SYSTEM FOR NAVIGATING WITHIN A BODY OF DATA USING ONE OF A NUMBER OF ALTERNATIVE BROWSE GRAPHS - A facility for navigating within a body of data using one of a number of distinct browse graphs is described. Initially, a navigation request is received. Based upon information contained in the received navigation request, the facility selects one of the plurality of browse graphs. In response to user input, the facility browses the body of data using the selected browse graph. The browse graphs may each correspond to a collection of the body of data, such as a website. | 09-25-2014 |
20150026214 | System and Method for Facilitating Access to Open Public Records - Systems and methods for facilitating access to open public records are provided. The system for facilitating access to open public records comprising an open public records computer system for electronically receiving a request for a public record from a requestor computer system of a requestor, and a database in electronic communication with the open public records computer system, the database storing an updatable index of custodians of records thereon, wherein the open public records computer system automatically identifies a custodian appropriate for the request from the index, and transmits the request anonymously on behalf of the requestor to a custodian computer system of the custodian identified thereby preserving an identity of the requestor. | 01-22-2015 |
20150127682 | DATA CONNECTORS IN LARGE SCALE PROCESSING CLUSTERS - Systems, methods, and software described herein facilitate interfacing between processing nodes and a plurality of data repositories. In one example, a method of interfacing between a processing node and a plurality of data repositories includes identifying, for the processing node, a data access request using a first data access format, wherein the data access request includes a data connector identifier. The method further includes translating the access request to a second data access format based on the data connector identifier, and identifying a data repository in the plurality of data repositories to service the data access request based on the data connector identifier. The method also provides accessing data for the data access request in the data repository via the second data access format. | 05-07-2015 |
20150347775 | Seamless Upgrade for Network System - In one embodiment, a network system may be upgraded without losing access to write privileges to a network file | 12-03-2015 |
20150370816 | LOAD-BALANCING TECHNIQUES FOR AUDITING FILE ACCESSES IN A STORAGE SYSTEM - Load-balancing techniques for auditing file accesses in a storage system are described. In one embodiment, for example, an apparatus may a processor circuit and a storage medium comprising instructions for execution by the processor circuit to receive a file access request notification identifying a stored file in a storage system, determine a destination volume for a file access record corresponding to an access of the stored file, the destination volume selected from among a plurality of candidate staging volumes of the storage system, and direct the file access record to the destination volume. Other embodiments are described and claimed. | 12-24-2015 |