14th week of 2013 patent applcation highlights part 51 |
Patent application number | Title | Published |
20130086199 | SYSTEM AND METHOD FOR MANAGING MESSAGE QUEUES FOR MULTINODE APPLICATIONS IN A TRANSACTIONAL MIDDLEWARE MACHINE ENVIRONMENT - A middleware machine environment can manage message queues for multimode applications. The middleware machine environment includes a shared memory on a message receiver, wherein the shared memory maintains one or more message queues for the middleware machine environment. The middleware machine environment further includes a daemon process that is capable of creating at least one message queue in the shared memory, when a client requests that the at least one message queue be set up to support sending and receiving messages. Additionally, different processes on a client operate to use at least one proxy to communicate with the message server. Furthermore, the middleware machine environment can protect message queues for multimode applications using a security token created by the daemon process. | 2013-04-04 |
20130086200 | Live Logical Partition Migration with Stateful Offload Connections Using Context Extraction and Insertion - An approach is provided in which a migration agent receives a message to migrate a virtual machine from a first system to a second system. The first system extracts hardware state data stored in a native format from a memory area located on first system's network adapter. The hardware state data is utilized by the first system's network adapter to process data packets generated by the virtual machine. Next, the virtual machine is migrated to the second system, which includes copying the extracted hardware state data from the first system to the second system. In turn, the second system configures a corresponding second network adapter by writing the copied hardware state data to a memory located on the second network adapter. | 2013-04-04 |
20130086201 | Mobile Patient Information System - In some embodiments, a mobile device comprises a network interface, a memory, and a processor. The network interface is operable to transmit communications between the mobile device and a patient data repository, the patient data repository storing information associated with a plurality of patients. The memory is operable to receive, from the patient data repository through the network interface, and store information associated with one or more patients. The processor is configured to receive a selection of a patient from a user; identify information associated with the selected patient stored in the memory; and provide, to an application local to the mobile device, the information associated with the selected patient from the memory. | 2013-04-04 |
20130086202 | Multiple Virtual Machines in a Mobile Virtualization Platform - Systems and methods are described for embodiments of a mobile virtualization platform (MVP) where in some aspects a wireless mobile device including multiple virtual machines (VMs) may receive data from a remote content provider and process/execute the data using an appropriate virtual machine. In some examples, the MVP may facilitate communication between and coordination among different virtual machines in the MVP, such as to facilitate optimization of data processing/execution. | 2013-04-04 |
20130086203 | MULTI-LEVEL MONITORING FRAMEWORK FOR CLOUD BASED SERVICE - A multi-level monitoring system is provided for monitoring multiple performance aspects of a cloud service concurrently in order to generate a full and reliable performance analysis of the cloud service. The multi-level monitoring system may include a set of components for carrying out the performance analysis of the cloud service which may be deployed together to operate externally, internally, or concurrently with the cloud service. The component framework of the multi-level monitoring system may include a main component, a plug-in associated with the main component, a definition database, a log database, and an output database. The main components of an example multi-level monitoring framework may include a probe runner component for probing the cloud service, a monitor component for generating alerts based on probe results, and a responder component for processing the alerts and taking appropriate actions to improve the cloud service performance. | 2013-04-04 |
20130086204 | SIMPLIFYING PROVISIONING OF ASYNCHRONOUS INTERACTION WITH ENTERPRISE SUITES HAVING SYNCHRONOUS INTEGRATION POINTS - An aspect of the present invention simplifies provisioning of asynchronous interaction with enterprise suites having synchronous integration points. In one embodiment, a digital processing system receives, from a user, data indicating that asynchronous interaction is required for a synchronous integration point of an enterprise suite, and in response, auto-generates a set of service oriented architecture (SOA) artifacts designed to synchronously invoke the synchronous integration point and provide asynchronous interaction with external systems. The auto-generated SOA artifacts are then deployed in SOA server, whereby external systems can interact asynchronously to access a functionality provided by the synchronous integration point. According to another aspect, the system, also receives from the user, a second data indicating a set of policies to be applied, and in response, auto-generates the set of SOA artifacts to implement the set of policies during asynchronous interaction with external systems. | 2013-04-04 |
20130086205 | DATA GATHERING USING A MOBILE COMPUTING DEVICE - Systems and methods for field data gathering and which provide flexible configuration options for a central office. The system, run from, mobile computing devices, provides a free-flowing data gathering experience while only requiring what the central office needs from the field. The central office can configure the system to accept different types of data by way of different data input means available to the mobile computing device. Only the data needed by the central office need be collected by the mobile device operator. The data format is defined by the central office and is uploaded to each of the relevant mobile computing devices for use by the operators. Once each data set has been collected by an operator, the data package with the data set is scheduled for transmission to the central office once a connection with the central office can be made. | 2013-04-04 |
20130086206 | System and Method for a Wireless Display Low Power Managed Adapter - A method for managing wireless data communication links includes establishing first and second wireless data communication links between a host system and a wireless display adapter. The first wireless data communication link is associated with a high data rate of data traffic between the host system and the wireless display adapter, and the second wireless data communication link is associated with a low data rate of data traffic. The method further includes determining that information is to be transmitted between the host system and the wireless display adapter using the low data rate, turning off a first data radio associated with the first wireless data communication link, and transmitting the information over the second wireless data communication link. | 2013-04-04 |
20130086207 | PUSH CLIENT OF MOBILE TERMINAL AND METHOD OF CHANGING PROVIDER USING THE SAME - Disclosed herein are a push client of a mobile terminal and a method of changing a provider using the push client. The push client is connected to a push server via one or more providers. At least one application is installed in the push client. The push client includes a monitoring unit and a control unit. The monitoring unit monitors network status of a mobile communication network, and provides data related to the determination of a possibility of receiving push messages provided by the push server. When the possibility of reception is weak, the control unit actively selects an activated provider from among the providers based on importance of the application, thereby enabling the push messages to be received. | 2013-04-04 |
20130086208 | Distributed Monitoring And Control System - A distributed computer system in which a central maintenance system communicates with a plurality of communication devices associated with remotely distributed equipment. The operator of each piece of remotely distributed equipment uses a communication device to communicate any problems related to the equipment, or other requirements such as the need for supplies. The communication devices can be notebook computers, tablet computers, smart phones, or any other suitable device. They communicate in real time with the central maintenance system. The information may include damage description, component descriptions, supply orders, as well as information regarding probable scheduling changes. The central maintenance system also has the capability to communicate instructions or requests for information to selected communication devices. | 2013-04-04 |
20130086209 | MEETING SYSTEM THAT INTERCONNECTS GROUP AND PERSONAL DEVICES ACROSS A NETWORK - Systems and methods are provided for hosting collaboration between multiple clients. The system includes a network interface able to communicate with clients, and a control unit. The control unit is able to receive a screen capture that represents visual content at a display of a client, to identify multiple clients for receiving the screen capture, and to transmit the screen capture to the multiple clients for presentation at displays of the multiple clients. The control unit is further able to receive instructions in parallel from the multiple clients representing marks made upon the screen capture, and to transmit the instructions in parallel to the multiple clients to apply the marks onto the screen capture as presented at the displays of the multiple clients. | 2013-04-04 |
20130086210 | MOBILE APPLICATION, IDENTITY RELATIONSHIP MANAGEMENT - Techniques for managing identities are provided. In some examples, identity management, authentication, authorization, and token exchange frameworks may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more identity management operations associated with an account of a service provider. Based at least in part on the requested operation and/or the particular service provider, an application programming interface (API) may be utilized to generate and/or perform one or more instructions and/or method calls for managing identity information of the service provider. | 2013-04-04 |
20130086211 | MOBILE APPLICATION, RESOURCE MANAGEMENT ADVICE - Techniques for a resource management advice service are provided. In some examples, resource management advice and/or instructions may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more resource management operations associated with a service provider. Based at least in part on the requested operation and/or the particular service provider, advice and/or instructions for managing the resource may be provided. | 2013-04-04 |
20130086212 | SYSTEMS AND METHODS FOR THE DEMAND-DRIVEN DEPLOYMENT OF LOCATION-NEUTRAL SOFTWARE - Techniques for providing and consuming web services, including a service library configured to store one or more web services and a host directory connected to service hosts, configured to store data related to the service hosts. The service hosts are a network and adapted to receive and fulfill deployment requests for the web services stored in the service library by instantiating one or more endpoints of one of the web services. A manager is configured to query the host directory and the service library, generate a deployment plan, and transmit deployment requests to the one or more service hosts. | 2013-04-04 |
20130086213 | METHOD AND APPARATUS FOR TRANSMITTING AND RECEIVING CONTENT - A method and apparatus for transmitting and receiving content is provided. A method for transmitting content in a transmitter includes generating a file with one or more packages including at least one asset, and transmitting the generated file to a terminal. | 2013-04-04 |
20130086214 | APPARATUS AND METHOD FOR SYNCHRONIZING APPLICATION DATA - An apparatus and a method for synchronizing application data are provided. The method includes generating an application list for a first apparatus and transmitting an application list request message for requesting an application list of a second apparatus from the first apparatus to the second apparatus; receiving an application list response message from the second apparatus; and performing synchronization for an identical application between the first apparatus and the second apparatus. | 2013-04-04 |
20130086215 | MANAGING LARGE DATASETS OBTAINED THROUGH A SURVEY-DATA-ACQUISITION PROCESS - The invention generally relates to enabling the management of survey data. One embodiment includes providing an upload description that describes characteristics of survey data to be uploaded, assigning a thread to process a group of files that store aspects of the survey data, dividing the file into data chunks, deriving from a given data chunk a corresponding data-integrity value and respectively associating the same with the given data chunk, communicating the data chunks to a remote storage device, utilizing the corresponding data-integrity values to ensure successful communication of the data chunk, and spatially storing the survey data such that it is retrievable upon a request that describes a geographic area of interest. | 2013-04-04 |
20130086216 | METHOD AND SYSTEM FOR INDIVIDUALIZED LISTING PLACEMENTS IN WEB PAGES - Systems and methods serve to provide individualized content to users, via their computers, linked to a network, such as the Internet, which these users may not be aware of The content includes, for example, articles and advertisements, in electronic format. The content is accessible by activating activatable links to the content, the activatable links underlying text or images in web pages that have been rendered to the browsing application of a computer associated with a user. | 2013-04-04 |
20130086217 | SYSTEM AND METHOD FOR COMMUNICATING DATA VIA A WIRELESS HIGH SPEED LINK BETWEEN MOBILE COMPUTERS AND ARCHIVAL STORAGE DEVICES - Desktop and portable computers to backup their data can backup their storage device over a wireless link where the storage device and the computer are always communicating whenever the link is established. Unlike existing technologies that provide wireless access between computers and storage devices the present invention does not require the storage device to be aware of operating systems or file system. All intelligence for file system access and how the data is archived resides with the desktop or portable computer. | 2013-04-04 |
20130086218 | Proxy Server For Home Network Access - A manner of extending a home network to a mobile device. A proxy server receives a request from a signaling gateway to transfer a communication session established between a home agent and a foreign agent. This may be done, for example, to accommodate an anticipated high-bandwidth transaction. If the proxy server has adequate resources available, it can accept the session. The agents provided with the address of the proxy server and independently send connection requests. The proxy server ensures that both agents are authenticated, and establishes secure communication tunnels. Traffic is then forwarded between the tunnels, in some cases after manipulation within the proxy server. Status messages may be multicast to inform signaling gateways or other entities of the resources available at the proxy server for this purpose. | 2013-04-04 |
20130086219 | COMMUNICATION WITH DISTRIBUTED DEVICES HANDLING ELECTRIC ENERGY VIA THE INTERNET - A method of communication of distributed devices handling electric energy with communication partners via the Internet includes programming rules in a server. The rules determine between which device and which communication partner a communication connection is to be mediated based on generic properties of the devices, generic properties of the communication partners and an initializing time-variable datum. The communication connection is a point to point, point to multi point or multi point to multi point connection via the internet. Data are transmitted from each device and each communication partner to the server via the Internet. These data include both a communication address and attributes indicative of the generic properties of the device or the communication partner, respectively. The communication connection is mediated between the device and the communication partner determined by the rules in response to a value of the initializing time-variable datum also defined by the rules. | 2013-04-04 |
20130086220 | Method for a Device to Communicate with Another Device - One embodiment of the present invention provides a method for communicating with another device using a first device having a converged personal network service (CPNS) enabled entity. The communication method comprises: a step for determining whether the mode of the CPNS enabled entity needs to be changed from gateway mode to coupling mode; and a step for changing the mode of the CPNS enabled entity from the gateway mode to the coupling mode, according to the results from the step for determining When changed to the coupling mode, the CPNS enabled entity operates in personal network entity (PNE) mode to receive from the second device data for service of a second network, and the gateway mode to transmit the received service data to at least one of the entities that belong to a first network managed by the CPNS enabled entity. The communication method can include a step for controlling the synchronism of the CPNS enabled entity operating in the gateway mode and at least one of the entities, considering the synchronism of the CPNS enabled entity operating in the PNE mode and the second device. | 2013-04-04 |
20130086221 | IMAGE SHARING STORAGE DEVICE AND ITS EXECUTIVE METHOD - The present invention provides an image sharing storage device and its executive method for image shared by local storage devices or remote servers and comprises at least an integrated circuit module and an application program. Any image could be recorded by one user who uses an image recording module of the application program and an image capture device of one computer when the integrated circuit module is electrically connected to the computer; the recorded image could be conveniently replayed by switching operational modes of the integrated circuit module via software or hardware. | 2013-04-04 |
20130086222 | CONTENT PROCESSING SYSTEM, SERVER DEVICE, AND CONTENT REPRODUCING DEVICE - According to one embodiment, a content processing system includes: a server device configured to distribute content data via a network; and a content reproducing device configured to reproduce content based on the content data distributed via the network. The server device comprises an acquisition destination allocating module to allocate one acquisition destination of the content data to be distributed to one content reproducing device; and a distribution data switching module to switch the content data to be distributed based on a switching command received. The content reproducing device comprises a content acquisition module to request the content data from the allocated acquisition destination of the content data to acquire the content data; and a switching command transmitter to generate the switching command in switching the content data to be acquired from the acquisition destination of the content data to transmit the switching command to the server device. | 2013-04-04 |
20130086223 | TELECOMMUNICATIONS SYSTEM - A telecommunications system includes at least one telecommunications device and a server that is able to communicate with the telecommunications device over a network. The telecommunications device includes: a storage section in which stored is property information that identifies the device itself uniquely; and a communications section which sends the property information to the server when communicating with the server for the first time. The server includes: a storage device; a server communications section which receives the property information; and a controller which secures a storage space associated with that property information in the storage device on receiving the property information. The controller generates account information which allows a user to have access to the storage space secured and which is associated with the property information gotten. The server communications section sends the account information to the telecommunications device that has transmitted the property information. | 2013-04-04 |
20130086224 | METHOD, APPARATUS, AND PROGRAM FOR SUPPORTING CREATION AND MANAGEMENT OF METADATA FOR CORRECTING PROBLEM IN DYNAMIC WEB APPLICATION - An apparatus to support creation and management of metadata for correcting a problem in a dynamic web application. The support apparatus includes a metadata creation section, a block extraction section, a similar-block search section, and a metadata generalizing section. In response to correction of a problem by a corrector, the support apparatus creates metadata including the details of the correction and application conditions, that is, a global variable group and cookie information that identify the state of the web application in which the problem has occurred, extracts another block to which the created metadata is applicable from an operation log by using a semantic block including the location of the problem as a clue, and generalizes the application conditions of the created metadata by converting them to a key-value pair structure by using the other block and by extracting a common portion therefrom. | 2013-04-04 |
20130086225 | MECHANISM FOR THE CONTEXTUAL OBSCURING OF DIGITAL DATA - A method and apparatus are disclosed for providing an attribute of a user profile to a requesting electronic device through a personal data server, the user profile being stored on a first electronic device of the user, the attribute pertaining to a data type characterized by a plurality of accuracy levels. The method includes for the personal data server receiving a request from the requesting electronic device for an attribute of the user profile, collecting the requested attribute from the first electronic device, comparing the user profile and a profile of the requesting electronic device, changing the accuracy level of the collected attribute based on the comparison to define an updated attribute, and providing the updated attribute to the requesting electronic device in response to the request. | 2013-04-04 |
20130086226 | MODELING RECURRING EVENTS IN A DATA STORE - Time-related properties may be modeled independent of a base object. Rather than storing time properties with the object, they may be stored independently. A given object may be stored once, even if it has a recurrent time property. The description of a “meeting,” for example, may be stored once. Each occurrence of that object over time may be stored in a “timeslot” (object occurs at time ‘t’ on day ‘d’). If it is a recurring property, recurrence information may be stored independently. “Exception” information may be stored independently as well. | 2013-04-04 |
20130086227 | RELAY DEVICE, RELAY SYSTEM, AND RELAY METHOD - A relay system for distributing load on a data sending device in data communications among a plurality of devices includes a plurality of devices and a relay device to relay data communications among the devices. The devices each include a transmission unit that sends data, and a reception unit that receives data. The relay device includes a storage unit that stores information identifying relayed data with information identifying the recipient of the data, and a determination unit that, in response to a data acquisition request for predetermined data issued by a predetermined device, determines a device to send the determined data based on information in the storage unit. | 2013-04-04 |
20130086228 | HTTP-BASED CLIENT-SERVER COMMUNICATION SYSTEM AND METHOD - Systems and methods for robust, efficient, and secure client-server communication are provided. For example, one method of such client-server communication may involve receiving in the server a long polling HTTP request and a client status message, such as a file offer, via HTTP from the client. Such a file offer may indicate, for example, one or more files that are available for transfer from the client. Thereafter, the server may issue a command, such as a file request, as a response to the long polling HTTP request. Such a file request may request at least one of the one or more files that are available for transfer. There-after, the server may receive the at least one of the one or more files from the client via FTP. | 2013-04-04 |
20130086229 | METHOD FOR DATA INTERCHANGE IN A COMPUTER NETWORK (VARIANTS) - A method including the steps of sending from, users computer devices, a request to a remote server for transfer and movement of an object from a starting point to a destination point, stating the locations of the points; limiting the range and transfer time for the position of the object. The remote server selects from a database, data relating to the locations of the computer users performing the transfer. The remote server transmits, over the Internet, a record of the locations of the computer user's performing the transfer and located within said limitation of the range for the position of object, the status, the type of vehicle and data relating to means for communicating with the computer user's performing the transfer. | 2013-04-04 |
20130086230 | TRANSPARENT CONFIGURATION OF VIRTUAL HOSTS SUPPORTING MULTIPLE TIME ZONES IN AN ENTERPRISE PLATFORM - A method, system, and computer program product for transparent configuration of virtual hosts to support timestamping of documents that are processed in multiple time zones within an enterprise platform. Embodiments use network address translation and virtual host initialization techniques to configure a port listener such that the port listener receives IP packets from the network interface and uses the subnet's network address IP address to map to a time zone correspondence. When the identified time zone corresponds to a first time zone, then the port listener forwards the IP packet to a first virtual host process that has been initialized with a first time zone virtual time clock used for timestamping. When the identified time zone corresponds to a second time zone, the port listener forwards the IP packet to a second virtual host process that has been initialized with a second time zone virtual time clock used for timestamping. | 2013-04-04 |
20130086231 | UPGRADE SYSTEM AND METHOD HAVING ADAPTIVE CHANGEABLE UPGRADE PROCESS - An upgrade system, an upgrade type of which may be adaptively changed, and an upgrade method includes a server, an upgrade type of which may be adaptively changed, a client, an upgrade type of which may be adaptively changed, and a ticket controlling apparatus. The server includes: a server interface unit receiving information relating to an upgrade from a ticket controlling apparatus comprising a ticket; a pushing unit in which at least one client to be upgraded is registered; and a pushing scheduling unit connecting to the ticket controlling apparatus, receiving the information relating to the upgrade from the server interface unit, and scheduling an upgrade of the at least one client by using the pushing unit based on the received information relating to the upgrade. The ticket comprises information about a distribution strategy, information about the upgrade type, and information about a module to be distributed. | 2013-04-04 |
20130086232 | METHODS AND APPARATUS FOR REGISTERING A DEVICE TO SERVER - A method for registering a device in a server is provided. The method includes connecting a first device positioned in a certain area to a server; and registering a second device by transmitting identification information of the second device positioned in the certain area to the server by the first device, and storing the identification information of the second device in the server. | 2013-04-04 |
20130086233 | DYNAMIC MODIFICATION OF A SUBSCRIBER CONNECTION - In one embodiment, a method comprises receiving a request to modify a subscriber connection to a network element. The method also includes modifying attributes of the subscriber connection, within a memory of the network element, without disconnecting the subscriber connection from the network element. | 2013-04-04 |
20130086234 | CLOUD MANAGEMENT SYSTEM AND METHOD - An information technology system having a cloud resource management unit including attributes of the information technology system. At least one cloud connected to the cloud resource management unit, each of the at least one clouds including attributes for controlling a service provided by the corresponding cloud and an interface for modifying the attributes. The corresponding cloud provides the service to a user of the information technology system. The cloud resource management unit further including a attribute conversion unit to convert a received request to modify or retrieve the attributes of the information technology system to requests to modify or retrieve the attributes of one or more of the corresponding clouds. | 2013-04-04 |
20130086235 | SYSTEMS AND METHODS FOR GENERATING CLOUD DEPLOYMENT TARGETS BASED ON PREDICTIVE WORKLOAD ESTIMATION - Embodiments relate to systems and methods for generating cloud deployment targets based on predictive workload estimation. In aspects, a set of usage histories can store records for user workloads in a host cloud-based network recording the consumption of processor, memory, storage, operating system, application, or other resources subscribed to by the user. The operator of the cloud management system hosting the workloads of one or more users can track, identify, and manage the predictive marginal resource capacities of the set of host clouds, based on those historical usage patterns. The collective usage history can indicate, for instance, that a number of operating workloads tend to display a small under-utilization of processor or memory resources during certain overnight periods on a regular basis. The operator can then harvest those predictive marginal capacities, and offer a new user or workload a potential hosting subscription based on those expected resource availabilities. | 2013-04-04 |
20130086236 | USING MPLS FOR VIRTUAL PRIVATE CLOUD NETWORK ISOLATION IN OPENFLOW-ENABLED CLOUD COMPUTING - Embodiments of the invention include a method performed by a cloud network manager flow entries in a cloud network. The CNM is coupled to virtualized servers for hosting virtual machines (“VM”) that each comprise a virtual switch coupled to a top of rack switch (“TORS”). The CNM receives notification messages that indicate virtual machines have been scheduled for activation on virtualized servers. The CNM determines a VM media access control (“MAC”) address associated with the VM and a virtual switch MAC address associated with that virtualized server's virtual switch. The CNM records an association between the VM MAC address and the virtual switch MAC address. The CNM further determines a label that associates the TORS with the virtual switch. The CNM sends a modifies flow entries in the virtual switch to indicate data packets matching the MPLS label and the VM MAC address should be forwarded to the VM. | 2013-04-04 |
20130086237 | RULES ENGINE EVALUATION FOR POLICY DECISIONS - Various exemplary embodiments relate to a method performed by a network policy node. The method may include: translating a policy into a plurality of rule objects, the policy including an applicability condition and one or more action rules; generating a selection rule table based on the applicability condition of one or more policies; generating an action rule table from the one or more action rules of an applicable policy, an action rule including an action condition and an action path; determining a set of applicable policies by evaluating the selection rule table using a rules engine; and selecting an action path by evaluating the action rule table using the rules engine. Various exemplary embodiments relate to a network policy node including a scanner that generates rules objects and rule tables based on one or more policies, a context information storage, and a rules engine that evaluates rule tables. | 2013-04-04 |
20130086238 | SYSTEM AND METHOD FOR SUPPORTING ACCURATE LOAD BALANCING IN A TRANSACTIONAL MIDDLEWARE MACHINE ENVIRONMENT - A system and method can support accurate load balancing in a transactional middleware machine environment with a plurality of transactional middleware machines. A service response time table can be maintained on each transactional middleware machine in the transactional middleware machine environment, wherein said service response time table is adaptive to be used by a client on the transactional middleware machine to make routing decisions for a service request. The transactional middleware machine environment can further includes a plurality of synchronization servers, with each said synchronization server associated with a transactional middleware machine in the transactional middleware machine environment. The plurality of synchronization servers operates to periodically synchronize the service response time table on each said transactional middleware machine in the transactional middleware machine environment. | 2013-04-04 |
20130086239 | Network application based intranet - A network application based intranet with enhanced network response and reduced hardware is disclosed. By incorporating traditional network address assignment, domain name resolution, web server and routing jobs into a single host computing device such as a laptop or a backend server device, network response can be improved while also reducing the number of network devices needed and their corresponding cost. The traditional routing functionality of the router device can be eliminated, with the router device now functioning as a wireless communication point whereby devices are connected to it, but data sent to it is immediately forwarded to the host computing device via a dedicated port on the host computing device. | 2013-04-04 |
20130086240 | PRIORITY ASSIGNMENTS FOR POLICY ATTACHMENTS - Techniques for resolving conflicts between web service policies that are attached (via LPA and/or GPA metadata) to a policy subject (e.g., a WS client/service endpoint). In one set of embodiments, a priority value can be assigned to each policy attached to a policy subject via the policy's corresponding policy attachment metadata file. These priority values can be taken into account when determining whether one policy should be given precedence over another, conflicting policy attached to the same policy subject. In certain embodiments, as part of this determination, the priority value of a policy can be given greater weight than the scope at which the policy is attached. | 2013-04-04 |
20130086241 | VALIDATION OF CONDITIONAL POLICY ATTACHMENTS - Framework for conditionally attaching web service policies to a policy subject (e.g., a web service client or service endpoint) at subject runtime. In one set of embodiments, a validation process can be performed at a policy subject during an initialization phase to ensure that there are no validation errors with respect to the web service policies that may be conditionally attached to the subject. This validation process can include grouping the policies that have been associated with the policy subject (via policy attachment metadata) by their corresponding constraint expressions, and determining which groups can potentially overlap (i.e., be simultaneously attached to the policy subject) at runtime. Each set of overlapping groups can then be validated using a predefined set of validation rules to identify potential errors pertaining to the policies in the set. | 2013-04-04 |
20130086242 | ADVERTISEMENT OF CONDITIONAL POLICY ATTACHMENTS - Framework for conditionally attaching web service policies to a policy subject (e.g., a web service client or service endpoint) at subject runtime. In one set of embodiments, a constraint expression can be defined that specifies one or more runtime conditions under which a policy should be attached to a policy subject. The constraint expression can be associated with the policy and the policy subject via policy attachment metadata. The constraint expression can then be evaluated at runtime of the policy subject to determine whether attachment of the policy to the policy subject should occur. If the evaluation indicates that the policy should be attached, the attached policy can be processed at the policy subject (e.g., enforced or advertised) as appropriate. Using these techniques, the policy subject can be configured to dynamically exhibit different behaviors based on its runtime context. | 2013-04-04 |
20130086243 | APPARATUS AND METHOD FOR INTEGRALLY MANAGING MAINTENANCE OF ELECTRONIC DEVICES - An apparatus and a method for integrally managing maintenance of a plurality of electronic devices are provided, where the device management system includes a server that stores maintenance packages; a plurality of electronic devices that execute maintenance; and a device management apparatus that acquires a plurality of maintenance packages with respect to the plurality of electronic devices from the server, generates a general maintenance schedule including at least one maintenance execution time with reference to the plurality of maintenance packages, and executes maintenance of an electronic device from among the plurality of electronic devices corresponding to the at least one maintenance execution time, when the at least one maintenance execution time arrives. | 2013-04-04 |
20130086244 | Computer-Implemented Method for Checking a Communication Input of a Programmable Logic Controller of an Automation Component of a Plant - In order to determine for a programmable logic controller whether or not a communication input is blocked, a nominal/actual comparison between the communication input and predefined rules of a nominal communication is performed, a reaction matrix being used for case differentiation. | 2013-04-04 |
20130086245 | DATA SERVER SYSTEM AND METHOD - A data server system/method allowing cloud data server functionality in a coordinated/concerted fashion within network configurations that are local to and/or spanning network gateway routers is disclosed. The system may utilize a smart gateway power controller (SGPC) augmented with storage media and/or expansion slots to interact within a home automation network (HAN) to permit the local HAN to operate as a distinct network and allow access to locally stored data from remote networks such as the Internet. The system permits inter-networking of HAN devices (including SGPCs) and integration of data management within home automation networks while still providing access to HAN data via external remote networks such as the Internet. The system/method allows remote network access to HAN device data from local/remote access devices including mobile phones, tablet computers, laptops, desktop computers, and the like. | 2013-04-04 |
20130086246 | Method and Communication Device for Communicating with Other Devices - An embodiment of the present invention relates to a method in which a communication device having a converged personal network service (CPNS) enabled entity communicates with other devices. The communication method comprises a step in which the CPNS enabled entity of the communication device, which is set to a gateway mode receives, from a first device, a discovery response message including first information which indicates that mode of the first device is set to a personal network entity (PNE) and second information which indicates whether to hide the first device in an additional discovery procedure. Here, the CPNS enabled entity manages a first network, and one or more personal network entities (PNEs) which can receive a first service through the CPNS enabled entity set to the gateway mode existing in the first network. The communication method further comprises: a step of receiving, from a second device, a discovery request message including third information which indicates the mode of the second device, in the event the communication device has moved into the coverage of the second network managed by the second device; and a step of determining whether to change mode of the CPNS enabled entity of the communication device based on at least one of the following: the presence of an available PNE among said one or more PNEs, the mode of the second device and the second information. | 2013-04-04 |
20130086247 | WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser. | 2013-04-04 |
20130086248 | Managing Stability Of A Link Coupling An Adapter Of A Computing System To A Port Of A Networking Device For In-Band Data Communications - Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications, the adapter and the network device coupled for out-of-band data communications to a management module, where link stability is managed by: monitoring link health including retrieving adapter link statistics from the adapter and networking device link statistics from the networking device; determining, in dependence upon the adapter and networking device link statistics, whether the link health meets predefined health acceptability criteria; and if the link health does not meet predefined health acceptability criteria, instructing the adapter to execute one or more predefined corrective actions. | 2013-04-04 |
20130086249 | SERVICE NETWORK DISCOVERY - An automated service discovery and monitoring utility employs automatically generated policies (rules) for monitoring network health of a service based on network discovery using flow data derived from transmissions sent over segments between computing components defining the service. An interactive discovery application employs flow data based on transmissions associated with a service. Analysis of the flow data identifies associated components from inspection of the transmissions. Iterative component selection allows network traversal of components based on flow data of the segments used for providing the service. The interactive service discovery therefore identifies associated components (servers) and segments based on flow data, rather than topology, rendering the flow data to allow a user to make an informed selection of segments and components for inclusion in a service, and generates a set of policies (rules) based on the discovered service dependencies for monitoring various metrics for the components providing the monitored service. | 2013-04-04 |
20130086250 | METHOD AND APPARATUS FOR ROUND TRIP DELAY KPI MONITORING IN LIVE NETWORK USING USER PLANE PROBE SESSION - A method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session is disclosed for measuring round trip delays in a manner that allows latency to be apportioned to network elements. The method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session includes transmitting a loopback packet containing a probe session indicator and capturing timestamps of arrival and departure times at each network element traversed by the loopback packet, and then transmitting the timestamps to a Network Management System. | 2013-04-04 |
20130086251 | METHODS AND APPARATUS FOR CLIENT-SIDE CONTEXT MANAGERS - Methods and apparatus for client-side context managers are disclosed. An example context manager implemented on a client machine includes a file system watcher to monitor a location of a file system implemented on the client machine for creation of a new item, wherein a virtual application implemented on a server is provided access to the file system; and a connection establisher to establish a connection between the context manager and the virtual application in response to the creation of the new item in the location of the file system by the virtual application. | 2013-04-04 |
20130086252 | FLEXIBLE RULE BASED USAGE METERING POLICIES - Various exemplary embodiments relate to a method of managing usage of a service. The method may include: defining a plurality of metering policies associated with the service; assigning an applicability condition to each of the plurality of metering policies; assigning a quota to each of the plurality of metering policies; selecting an applicable first metering policy for a subscriber session based on the applicability condition; measuring usage of the service according to the first metering policy; comparing the usage against the quota of the first metering policy; and selecting an applicable second metering policy for the subscriber session based on the applicability condition assigned to the second metering policy if the usage exceeds the quota of the first metering policy. Various exemplary embodiments relate to a network node for managing subscriber usage. The network node may include: a metering policy storage; a limit selector; an interface; and a processor. | 2013-04-04 |
20130086253 | HIERARCHICAL METERING POLICY ATTRIBUTES - Various exemplary embodiments relate to a method performed by a policy and charging rules node for managing usage of a subscriber. The method may include: defining a primary metering policy having a first applicability condition and a first quota; defining a secondary metering policy having attributes including a second applicability condition and at least one inherited attribute that references an attribute of the primary metering policy; determining that the second metering policy is applicable when the first applicability condition and the second applicability condition are true; selecting the secondary metering policy as an active metering policy; and managing subscriber usage according to the attributes of the secondary metering policy. In various alternative embodiments, the step of managing subscriber usage includes: measuring subscriber usage according to a rating factor of the secondary metering policy; and charging the measured subscriber usage to both the primary metering policy and the secondary metering policy. | 2013-04-04 |
20130086254 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 2013-04-04 |
20130086255 | WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser. | 2013-04-04 |
20130086256 | Forming Configuration Information about Components of Systems which Include Components for which Acquisition of Configuration Information is Restricted - [Problem to be Solved] | 2013-04-04 |
20130086257 | METHOD AND APPARATUS FOR FINDING WEB HITS FOR PATENTS - Various embodiments of the present disclosure include methods and apparatus for finding web hits for a patent of interest. In an example method embodiment, data identifying a patent of interest is received, and at least one forward or reverse citation of the patent of interest is identified. An inventor or an owner of the at least one forward or reverse citation is identified, and a website associated with the identified inventor or owner is monitored. A watch notice is generated in response to a detection of the addition of new material to the monitored website. | 2013-04-04 |
20130086258 | MONITORING AND LIMITING REQUESTS TO ACCESS SYSTEM RESOURCES - Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing operations being performed by the system. The invention is directed to preventing the number of calls made by a merchant's applications through an application programming interface (API) for access to the lower priority services of a merchant service provider from having a negative impact on the ability of the service provider to perform the processing necessary to support higher priority services. The invention provides a user interface that may be used by a merchant or the service provider to configure the operation of a “throttle” that is designed to generate an alert when the number of calls by a merchant application for access to a specific service provider function or application exceeds a value or limit, where exceeding the value or limit may indicate a malfunction of the merchant's application or an attack by a malicious agent. | 2013-04-04 |
20130086259 | METHOD FOR ACQUIRING AN IP ADDRESS AND NETWORK ACCESS DEVICE - Embodiments of the present invention relate to a method for acquiring an IP address and a network access device. The method includes: after receiving a first IP address acquiring message from a first network, assigning a first IP address to the first network by using a process and associating an identifier of the first network with a first session, so that the network access device is capable of mapping the first IP address to a first private network IP address and sending the same to the first network, thereby avoiding the problem of complex implementation in the prior art resulted from a process where a gateway configured for a family network or an enterprise network needs to initiate an IPoE dial-up process. In this way, the gateway configured for the family network or the enterprise network is simplified, operation and maintenance costs are reduced, and flat networks are further implemented. | 2013-04-04 |
20130086260 | Automatic Generation of User Account Policies Based on Configuration Management Database Information - Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template. | 2013-04-04 |
20130086261 | Detecting Behavioral Patterns and Anomalies Using Activity Profiles - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile. | 2013-04-04 |
20130086262 | System and Method of Emulating a Network Controller within an Information Handling System - A system and method of emulating a network controller within an information handling system is disclosed. In one form, an information handling system can include a host chipset operably coupled to a network interface controller of a first main circuit board, and a management controller operably coupled to the host chipset. The information handling system can also include an emulated network interface controller operable to be activated by the management controller. The information handling system can further include a communication bus coupled to the host chipset and the management controller. In one form, the communication bus is operable to activate a communication link between the host chipset and the emulated network interface controller. | 2013-04-04 |
20130086263 | Systems and Method to Discover Clients Associated with Local Domain Name Server Using Sampling - A system includes an analyzer module, a content request data collection module, and a domain name server. The content request data collection module is configured to receive a content request sent to a tracking address, collect content request information about the content request, and provide the content request information to the analyzer module. The domain name server is configured to receive an address request from a local domain name server for a cache server address, provide a tracking address to the local domain name server, collect address request information about the address request, and provide the address request information to the analyzer module. The analyzer module is configured to receive the address request information and the content request information, and determine properties of clients served by the local domain name server based on the address request information and the content request information. | 2013-04-04 |
20130086264 | Optimized Prefetching of Compound Data - Access to compound data over a wide-area network is optimized by analyzing metadata within compound data to identify internal and external data streams to be prefetched. Upon receiving or intercepting a network packet including an access request for a data resource, metadata in this data resource is analyzed to identify associated data streams and their storage locations within and/or outside of the data resource. Data streams may be proactively or reactively prefetched. Proactive prefetching identifies and retrieves data streams or portions thereof likely to be accessed by a client based on attributes associated with the data resource. Reactive prefetching identifies portions of data streams associated with received access requests and retrieves additional portions of these data streams. Prefetched data streams or portions thereof are stored in a data storage on the same local network or near to the local network including the client. | 2013-04-04 |
20130086265 | NETWORK USAGE THROTTLING SYSTEMS AND METHODS - Systems and methods for throttling network usage are disclosed. An exemplary method includes an access device maintaining throttling command interpretation data, receiving a throttling command broadcast over a wide area network, interpreting the throttling command based on the throttling command interpretation data, and conforming at least one operation of the access device to a network usage throttling level in accordance with the interpretation of the throttling command. Corresponding systems and methods are also disclosed. | 2013-04-04 |
20130086266 | APPARATUS AND METHOD FOR APPLYING NETWORK POLICY AT A NETWORK DEVICE - This document discusses, among other things, applying network policy at a network device. In an example embodiment fibre channel hard zoning information may be received that indicates whether a fibre channel frame is permitted to be communicated between two fibre channel ports. Some example embodiments include identifying a media access control addresses associated with the fibre channel ports. An example embodiment may include generating one or more access control entries based on the fibre channel identifications of the fibre channel ports and the zoning information. The access control entries may be distributes to an Ethernet port to be inserted into an existing access control list and used to enforce a zoning policy upon fibre channel over Ethernet frames. | 2013-04-04 |
20130086267 | ADMISSION CONTROL IN A SELF AWARE NETWORK - A method of admission control in a Self Aware Network carrying at least one existing user specifying at least one Quality of Service metric. The method includes receiving a user request for admission of a connection from a source node to a destination node in the network specifying at least one Quality of Service metric. The source node then finds paths; creates link Quality of Service matrices; sends probe traffic over the network; and uses the traffic to obtain a Quality of Service matrix. The source node computes estimated link Quality of Service matrices and computes path Quality of Service matrices for the Quality of Service metrics, based on the estimated link Quality of Service matrices. The user request is rejected or accepted based on the path Quality of Service matrix. | 2013-04-04 |
20130086268 | AUTOMATED HIGH RESILIENCY SYSTEM POOL - A method, apparatus, and program product build a high resiliency system pool in a computing system by analyzing hardware resources configured on a plurality of computing nodes in the computing system. The plurality of computing nodes in the computing system are analyzed to determine whether redundant hardware resources are configured thereon, an identifier associated with the computing node is adjusted in response to the determined redundant hardware resources configured thereon, and the computing nodes are added to a high resiliency virtual system pool for use by the system in assigning tasks to perform, in monitoring system health, in monitoring hardware resource events. | 2013-04-04 |
20130086269 | COLLABORATIVE MANAGEMENT OF SHARED RESOURCES - Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action. | 2013-04-04 |
20130086270 | MULTI-CLIENT STORAGE SYSTEM AND STORAGE SYSTEM MANAGEMENT METHOD - An aspect of the invention is a multi-client storage system comprising a management computer including a processor and a memory, for allocating resources of a plurality of storage apparatus to a plurality of clients, the management computer comprising: a receiving unit for receiving conditions for a client to which a new resource is to be allocated; a determining unit for determining whether the new resource is securable under the received conditions without changing resources allocated to existing clients and conditions for the volumes for each of the existing clients; and an allocation unit for securing, when it is determined that the new resource is securable under the received conditions, the new resource under the received conditions for the client in the plurality of storage apparatus and allocating the new resource to the client. | 2013-04-04 |
20130086271 | SYSTEM AND METHOD FOR SUPPORTING A DYNAMIC RESOURCE BROKER IN A TRANSACTIONAL MIDDLEWARE MACHINE ENVIRONMENT - A system and method can support dynamically scaling up/down transactional resources in a transactional middleware machine environment. Transactional resources, such as groups and machines, can be by added or removed using a dynamic resource broker according to resource usage changes. The transactional middleware machine environment can comprise a deployment center in the transactional middleware machine environment, wherein the deployment center maintains one or more deployment policies for the transactional middleware machine environment and one or more deployment agents. Each of the one or more deployment agents is associated with a transactional middleware machine of a plurality of transactional middleware machines in a transactional domain in the transactional middleware machine environment. The deployment center operates to receive machine usage information from the one or more deployment agents, and dynamically scale up/down resources used in the transactional domain based on the resource usage information collected by the one or more deployment agents. | 2013-04-04 |
20130086272 | NETWORK-AWARE COORDINATION OF VIRTUAL MACHINE MIGRATIONS IN ENTERPRISE DATA CENTERS AND CLOUDS - Systems and methods are disclosed to schedule virtual machine (VM) migrations by analyzing VM migration behavior; building a simulation tool to predict time for multiple migrations under different links conditions and VM characteristics; determining a predetermined bandwidth sharing policy for each network link; applying a bin-packing technique to organize bandwidth resources from all network links, and allocating the links to different migration tasks. | 2013-04-04 |
20130086273 | PREDICTIVE TWO-DIMENSIONAL AUTOSCALING - Embodiments may enable cloud based computing infrastructure to automatically scale in response to changing service demands. Auto-scaling may be enabled by automatically provisioning computing resources as they may be needed by hosted computing services. Historical utilization patterns may be tracked enabling the generation of models that may be employed to predict future computing resource requirements. The automatic scaling system may comprise one or more models that may be trainable using business rules that may be applied to determine to if and how computing resources are scaled. Further, business rules may be arranged to determine provisioning and scaling of computing resources based in part on the historical usage patterns of the computing services. | 2013-04-04 |
20130086274 | Timing Management for Implementing Smarter Decisions in Time-Constrained Complex Distribution Systems - A timing management node that assigns and adjusts timeout values for a time-constrained complex distributed system based on the nature of a system request, preferences of a customer furnishing a system request, and/or a current state of a complex distributed system. A timing management node evaluates information regarding a system request and information regarding a current state of a complex distributed system to generate timing requirements for the system request. Timing requirements are compiled in a timing policy messager and passed amongst nodes of a complex distributed system with process flow. Timing requirements may be revised during request processing to reflect events that have occurred within the distributed system. A timing policy message contains a timeout value and a total time elapsed parameter for a system request, to permit a complex distributed system to make smarter processing decisions based on a known time remaining to process the given system request. | 2013-04-04 |
20130086275 | ADAPTIVE BITRATE MANAGEMENT FOR STREAMING MEDIA OVER PACKET NETWORKS - A method including providing pseudo-streaming media data to a terminal; receiving a transport control protocol (TCP) acknowledgement from the terminal; estimating one or more network conditions of a network based at least in part on the TCP acknowledgement; determining an optimal session bitrate based on the estimated one or more network conditions; and providing pseudo-streaming media data to the terminal based on the optimal session bitrate. | 2013-04-04 |
20130086276 | SYSTEM AND METHOD FOR THE BROADCAST DISSEMINATION OF TIME-ORDERED DATA - A stream of time-ordered data, such as a movie, is divided into multiple fragments of equal length, which are repetitively transmitted at different respective repetition rates. The fragments are reordered for transmission so that those which occur near the beginning of the original data stream are transmitted more frequently than those which occur later in the data stream. When a user enters a request to utilize the data, the individual fragments are stored upon receipt at the user's premises, and reassembled into a contiguous stream. The ordering of the fragments is such that the wait time required before utilization of the data can begin is limited to a predetermined maximum, and at least one copy of every fragment becomes available by the time it is needed. | 2013-04-04 |
20130086277 | SYSTEM, METHOD, AND COMPUTER READABLE MEDIUM FOR CREATING A VIDEO CLIP - The present invention provides a system, method, and computer readable medium for creating a video clip. In one embodiment, a method, comprising creating a copy of a still image by a first module, the copy of the still image comprising reduced dimensions of the still image, creating a new still image from a selected area of the still image, automatically ordering the new still image and the copy of the still image, creating an audio file by at least one of a second module and a third module, creating a timeline, by the first module, related to the ordered images and the created audio file, and rendering the timeline into a video clip by a fourth module, wherein the timeline includes a length of the audio file, a length of the video clip, the ordered images, a display time of each of the ordered images, transition identifiers, transition lengths. | 2013-04-04 |
20130086278 | PEER-TO-PEER SYSTEM - The present invention relates to methods and apparatus for providing an improved peer-to-peer system, in particular, to providing live streams. A tracker may receive a report from one or more first peers wherein the report includes one or more quality of service measurements relating to a first live stream of a broadcast. The tracker may receive a request from a second peer for the broadcast and the tracker determines a source of a second live stream for the broadcast based on the received quality of service measurements. The tracker may then inform the second peer of the determined source. | 2013-04-04 |
20130086279 | SYSTEMS AND METHODS FOR MEDIA SERVICE DELIVERY - Methods and systems for delivering multimedia content in various telecommunications networks while optimizing quality of experience (QoE). The described methods and systems implement a fast processing path and a slow processing path. In the fast processing path, minimal packet processing is performed to reduce latency. In the slow processing path, increased packet processing is performed to identify media sessions and to perform further data processing. The slow processing path can be used in an online or offline mode, depending on a current flow state. | 2013-04-04 |
20130086280 | SYSTEMS, METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR SUPPORTING REMOTE HOSTING WITHOUT USING NETWORK ADDRESS TRANSLATION - Methods, apparatuses, and computer program products are provided for supporting remote hosting without using network address translation. A method may include supporting, at a hub, a plurality of redundant tunnel end points for each of a plurality of spokes using a technology based at least in part on multipoint generic routing encapsulation protocol. The method may further include using policy based routing to determine a destination spoke for outgoing data traffic. The method may additionally include using service level agreement tracking to select a tunnel end point from the plurality of redundant tunnel end points for the determined destination spoke. The method may also include causing the outgoing data traffic to be routed to the determined destination spoke via the selected tunnel end point. Corresponding systems, apparatuses and computer program products are also provided. | 2013-04-04 |
20130086281 | Management Device for Causing Specific Device to Update Programs and Computer Readable Media - A management device may be connected with a specific device via a network, and cause the specific device to update a plurality of programs. The management device may transmit a first program of the plurality of programs by using an IP address as a transmission destination. The management device may confirm whether the IP address of the specific device has changed since transmitting the first program by utilizing identification information for identifying the specific device. The management device may transmit a second program of the plurality of programs to the specific device by using the IP address when confirming that the IP address has not changed, or by using a changed IP address when confirming that the IP address has changed. | 2013-04-04 |
20130086282 | METHODS AND PHYSICAL COMPUTER-READABLE STORAGE MEDIA FOR INTIATING RE-ENUMERATION OF USB 3.0 COMPATIBLE DEVICES - Methods, physical computer-readable media, and devices are provided that allow re-enumeration to be initiated on a USB 3.0-compatible device. The method includes establishing a connection with a host, transmitting an indicator from the device to the host to cause a Link Training and Status State Machine (LTSSM) of the host to move from active state (U0) to one of SS.Inactive and RX.Detect, synchronizing the device with the host, and presenting a new configuration of the device to the host. | 2013-04-04 |
20130086283 | INTERFACE SYSTEM AND METHOD WITH BACKWARD COMPATIBILITY - An interface including first and second transport protocol circuitry, a memory and a mode controller. The interface includes first and second physical interface types which are both selectively enabled to interface a set of pads. The first transport protocol circuitry is operative with the first type physical interface in a first mode and the second transport protocol circuitry is operative with the second type physical interface in a second mode. The memory stores a mode value indicative of the operating mode. The mode controller enables one of the physical interface types and a corresponding transport protocol based on the mode value. The first mode is the default mode, and the mode controller enables dynamic transition to the second mode. An escape indication may be enabled during the second mode for dynamic transition back to the first mode. Programmable timing values may be used to facilitate mode transitions. | 2013-04-04 |
20130086284 | NETWORK INTERFACE BASED ON DETECTION OF INPUT COMBINATION INTERFACE - A computing device includes an input combination interface and a network interface. The network interface is enabled and/or disabled based on the usage of the input combination interface. | 2013-04-04 |
20130086285 | SHARING IOMMU MAPPINGS ACROSS DEVICES IN A DMA GROUP - A method that includes creating a DMA group, adding a first I/O device to the DMA group, and adding a second I/O device to the DMA group. The method further includes instructing an I/O MMU to create a shared virtual DMA address, mapping a memory location to the shared virtual DMA address in the DMA group translation table, and providing the shared virtual DMA address to the device drivers. The method further includes determining that the first I/O device has received DMA group data, instructing a first DMA controller to transfer the DMA group data from the first I/O device to the shared virtual DMA address, determining that the shared virtual DMA address has received the DMA group data, and instructing a second DMA controller to transfer the DMA group data from the memory location corresponding to the shared virtual DMA address to the second I/O device. | 2013-04-04 |
20130086286 | INTER-PROCESSOR COMMUNICATION APPARATUS AND METHOD - Inter-processor communication (IPC) apparatus and a method for providing communication between two processors having a shared memory, the IPC apparatus including an arbitrated bus coupling the processors to one another and to the memory, a buffer in the shared memory associated with each processor, and at least one pair of First In First Out hardware units (FIFOs) coupled to each processor, the FIFOs holding pointers to addresses in the buffer associated with that processor, wherein a first of the pair of FIFOs (an empty buffer FIFO) is configured to hold pointers to empty portions of the buffer while the second of the pair of FIFOs (a message FIFO) is configured to hold pointers to portions of the buffer having data therein. | 2013-04-04 |
20130086287 | Protocol Neutral Fabric - An embodiment integrates non-PCI compliant devices with PCI compliant operating systems. A fabric system mimics the behavior of PCI. When non-PCI compliant devices do not know how to respond to PCI enumeration, embodiments provide a PCI enumeration reply and thus emulate a reply that would typically come from a PCI compliant device during emulation. Embodiments allow system designers to incorporate non-standard fabric structures with the benefit of still using robust and mature PCI infrastructure found in modem PCI compliant operating systems. More generally, embodiments allow an operating system compliant with a first standard (but not a second standard) to discover and communicate with a device that is non-compliant with the first standard (but possibly is compliant with the second standard). Other embodiments are described herein. | 2013-04-04 |
20130086288 | Supporting Multiple Channels Of A Single Interface - In one embodiment, the present invention includes a method for receiving a request for a transaction from a first agent in a fabric and obtaining an address, a requester identifier, a tag, and a traffic class of the transaction, and determining a channel of a target agent to receive the transaction based on at least two of the address, the requester identifier, the tag, and the traffic class. Based on this channel determination, the transaction can be sent to the channel of the target agent. Other embodiments are described and claimed. | 2013-04-04 |
20130086289 | INTERRUPTION FACILITY FOR ADJUNCT PROCESSOR QUEUES - Interruption facility for adjunct processor queues. In response to a queue transitioning from a no replies pending state to a reply pending state, an interruption is initiated. This interruption signals to a processor that a reply to a request is waiting on the queue. In order for the queue to take advantage of the interruption capability, it is enabled for interruptions. | 2013-04-04 |
20130086290 | Low Latency Two-Level Interrupt Controller Interface to Multi-Threaded Processor - Systems and method for reducing interrupt latency time in a multi-threaded processor. A first interrupt controller is coupled to the multi-threaded processor. A second interrupt controller is configured to communicate a first interrupt and a first vector identifier to the first interrupt controller, wherein the first interrupt controller is configured to process the first interrupt and the first vector identifier and send the processed interrupt to a thread in the multi-threaded processor. Logic is configured to determine when the multi-threaded processor is ready to receive a second interrupt. A dedicated line is used to communicate an indication to the second interrupt controller that the multi-threaded processor is ready to receive the second interrupt. | 2013-04-04 |
20130086291 | SWITCHING LOGIC MODULE - The innovation applies to a switch logic module ( | 2013-04-04 |
20130086292 | Systems and Methods for Hot-Plug Detection Recovery - One embodiment is a method for establishing a link between a source device and a sink device. The method comprises enabling a hot plug detect (HPD) handler in the source device, utilizing the HPD handler to receive an HPD interrupt upon the sink device being coupled to the source device, applying one or more predetermined parameters corresponding to the HPD interrupt to establish the link between the source device and the sink device, and adjusting the one or more predetermined parameters if the link between the source device and the sink device is not established. | 2013-04-04 |
20130086293 | SYSTEMS AND METHODS FOR DOCKING PORTABLE ELECTRONIC DEVICES - Systems and methods for docking portable electronic devices. A master device may be docked to a slave device to control the operation of the slave device. The slave device may have a form factor different than that of the master device. For example, the slave device may be a tablet and the master device may be a handheld device such as a smart phone. The slave device may include a retention mechanism to retain the master device in a docked position with respect to the slave device. When in the docked position, the master device may be in operative communication with one or more hardware components of the slave device to control the operation thereof. The slave device may lack the ability to exploit the full functionality of the one or more hardware components of the slave device without communication with the master device. | 2013-04-04 |
20130086294 | Serial Peripheral Interface and Method for Data Transmission - A serial peripheral interface of an integrated circuit including multiple pins and a clock pin is provided. The pins are coupled to the integrated circuit for transmitting an instruction, an address or a read out data. The clock pin is coupled to the integrated circuit for inputting multiple timing pulses. The plurality of pins transmit the instruction, the address or the read out data at rising edges, falling edges or both edges of the timing pulses. | 2013-04-04 |
20130086295 | COMMUNICATION CONTROL SYSTEM, SWITCHING NODE, COMMUNICATION CONTROL METHOD AND COMMUNICATION CONTROL PROGRAM - In a switching node, high-speed and advanced service protocol processing function is achieved by utilizing an external control server without affecting performance of conventional service protocol processing. Specifically, a forwarding engine has PCI express and an LAN interface. Depending on a type of an input packet, destination of the packet is switched to the PCI express side for conventional network service and to the LAN interface side for extended network service that cooperates with the external control server. A CPU having the PCI express and the LAN interface is provided ahead of the LAN interface. The CPU performs communication of service inquiry with the external control server at high speed via the LAN interface. After response from the control server is obtained, setting of the forwarding engine is performed through the PCI express. | 2013-04-04 |
20130086296 | Providing Multiple Decode Options For A System-On-Chip (SoC) Fabric - In one embodiment, a system-on-chip (SoC) can be configured to receive a request from a master agent in a fabric coupled to the master agent, send a show command grant to the master agent responsive to selection of the request by the fabric, receive a command portion of a transaction corresponding to the request in the fabric and determine a target agent to receive the transaction based on the command portion, and thereafter send a transaction grant to the master agent for the transaction. Other embodiments are described and claimed. | 2013-04-04 |
20130086297 | UNIVERSAL SERIAL BUS (USB) TO DIGITAL VIDEO - This document discusses, among other things, a system and method for serializing a video signal and providing non-packet-based serialized video information to a physical Universal Serial Bus (USB) interface and, in certain examples, receiving the non-packet-based serialized video information from the physical USB interface, deserializing the received non-packet-based serialized video information, and providing a high definition output signal to a video port (e.g., an HD video port, such as HDMI, DisplayPort, etc.) using the deserialized video information. | 2013-04-04 |
20130086298 | Live Logical Partition Migration with Stateful Offload Connections Using Context Extraction and Insertion - An approach is provided in which a migration agent receives a message to migrate a virtual machine from a first system to a second system. The first system extracts hardware state data stored in a native format from a memory area located on first system's network adapter. The hardware state data is utilized by the first system's network adapter to process data packets generated by the virtual machine. Next, the virtual machine is migrated to the second system, which includes copying the extracted hardware state data from the first system to the second system. In turn, the second system configures a corresponding second network adapter by writing the copied hardware state data to a memory located on the second network adapter. | 2013-04-04 |