37th week of 2014 patent applcation highlights part 80 |
Patent application number | Title | Published |
20140258474 | CONTROLLING DATA COLLECTION INTERVAL OF M2M DEVICE - Described embodiments relate to a machine to machine (M2M) server for controlling a data collection interval of a M2M device. The M2M server may be configured to determine data dependency between a first M2M device and a second M2M device based on sensing data collected from the first M2M device and the second M2M device and to control a data collection interval of at least one of the first M2M device and the second M2M device based on sensing data variation of one of the first M2M device and the second M2M device. | 2014-09-11 |
20140258475 | SYSTEM AND METHOD FOR CACHING DATA - A method of obtaining radio content from a remote electronic device for a user electronic device includes transmitting a request for radio media content to a first remote electronic device via a network. Radio media content that includes a plurality of media data files is received via the network. The received plurality of media data files are stored in a storage device of the user electronic device. A radio playlist that defines a rendering sequence for the plurality of media data files is requested. In response to the request for the radio playlist, the radio playlist is received. The radio playlist is processed in the user electronic device to enable the stored plurality of media data files to be rendered on the user electronic device in accordance with the radio playlist. | 2014-09-11 |
20140258476 | FILE TRANSMISSION TO COMMUNICATION-DISABLED TERMINAL - An apparatus for transmitting a file to a terminal device in a communication-disabled state includes a transceiver unit includes: a transceiver unit to transmit and receive data; a storage unit to store therein file information on a file uploaded to a content server by a transmitting terminal device using a first protocol; and a control unit to receive the file information from the transmitting terminal device through the transceiver unit using a second protocol, deliver the received file information to a receiving terminal device using the second protocol, store the file information in the storage unit when a predetermined time elapses without a response from the receiving terminal device, and transmit the stored file information to the receiving terminal device through the transceiver unit when the receiving terminal device enters into a communication-enabled state. | 2014-09-11 |
20140258477 | SYSTEM AND METHOD FOR CACHING DATA - A method of obtaining radio content from a remote electronic device for a user electronic device includes transmitting a request for radio media content to a first remote electronic device via a network. Radio media content that includes a plurality of media data files is received via the network. The received plurality of media data files are stored in a storage device of the user electronic device. A radio playlist that defines a rendering sequence for the plurality of media data files is requested. In response to the request for the radio playlist, the radio playlist is received. The radio playlist is processed in the user electronic device to enable the stored plurality of media data files to be rendered on the user electronic device in accordance with the radio playlist. | 2014-09-11 |
20140258478 | Distributed Functionality Across Multiple Network Devices - According to one embodiment, a method comprises an operation of identifying a plurality of network devices, and detecting a presence of firewall processing functionality in a subset of the network devices. At least one of the network devices not in the firewall subset is configured to forward packets to a network device of the subset for firewall processing. | 2014-09-11 |
20140258479 | MANAGING CONFIGURATION UPDATES - Approaches are described for managing configuration information updates, or other information in a data center, shared resource environment, or other such electronic environment. A management component is provided that can manage distribution of configuration information, operating system (OS) images, authentication data, or other such information for host machines, servers, or other such devices in a network environment. The management component can further perform a number of actions when deploying configuration information updates, such as performing one or more checks to verify the health of a target switch, deactivating the target switch, shifting traffic to and from the target switch, updating a current configuration of the target switch, verifying the target switch's health after the configuration changes, bringing the target switch back in service, among others. | 2014-09-11 |
20140258480 | APPARATUS AND METHOD FOR CONTROLLING NETWORK ACCESS FOR APPLICATIONS ON MOBILE TERMINALS - An apparatus and method for configuring a firewall application for controlling network access of applications included on a mobile terminal are provided. The method includes executing the firewall application displaying a list of at least one application stored on the mobile terminal, selecting at least one of the applications from the displayed list, selecting at least one parameter type corresponding to the at least one selected application, and configuring at least one parameter setting corresponding to the at least one selected parameter type, wherein the firewall application is executed according to the configured at least one parameter setting. | 2014-09-11 |
20140258481 | SYSTEMS AND METHODS FOR AUTO-CONFIGURING A USER EQUIPMENT DEVICE WITH CONTENT CONSUMPTION MATERIAL - Methods and systems are provided for auto-configuring a newly purchased user equipment (UE) device with content consumption material that is associated with a user. These methods and systems are provided by way of receiving, in response to the user having purchased the UE device, purchase information (e.g., a credit card number) and a UE device identifier (e.g., a serial number of a purchased UE device). After receipt of this information, a database is searched to identify a user account that is associated with the purchase information. The user account identifies content consumption material that has been processed by other UE devices to enable the user to consume content. A communication is then transmitted to the UE device that causes the UE device to be configured with the identified content consumption material. | 2014-09-11 |
20140258482 | UNIVERSAL PLUG AND PLAY BASED NETWORK SYSTEM AND METHOD OF CONTROLLING THE SAME - A universal plug and play (UPnP)-based network system and a method of controlling the same. A UPnP device can operate according to a description of each control point (CP) when performing a command, by including the description, which is inherent information of each CP, in a command message transmitted from each CP to the UPnP device and allowing the UPnP device to analyze the command message to obtain the description of the CP. The UPnP-based network system includes a plurality of CPs, each of which stores a CP description, which is inherent characteristic information of each CP, and generates and transmits a command message including the CP description, and a UPnP device which is connected to the plurality of CPs over a network, analyzes the command message received from each CP to perform an operation according to the command message, and analyzes the CP description included in the command message to recognize each CP which transmits the command message. | 2014-09-11 |
20140258483 | METHOD AND SYSTEM FOR DISTRIBUTING RESOURCE-AVAILABILITY INFORMATION WITHIN A DISTRUBITED COMPUTER SYSTEM - Methods and systems disclosed in the current application are directed to efficient distribution of resource-availability information with respect to individual computer systems within a distributed computer system in order to facilitate various types of computational tasks, including configuration and management tasks and facilities. Certain of these implementations are based on highly efficient, lockless, message-based information-distribution methods and subsystems that transmission of messages at a frequency computed from a computed level of resource availability. | 2014-09-11 |
20140258484 | TRANSPARENT MESSAGE MODIFICATION FOR DIAGNOSTICS OR TESTING - The modification of a network message so that a supplemental action is performed in transit at a designated intermediary node. The modification is performed in a manner that is transparent to the source computing entity that caused the network message to be generated. Upon acquiring the network message, a message modification component modifies the network message so that the network message is routed through an intermediary node, and further so that the intermediary node performs supplemental action(s). For instance, the modification might cause routing components to route the network message to the intermediary node, and the modification might also include instructions that the intermediary node interprets as being an instruction to perform the supplemental action. | 2014-09-11 |
20140258485 | EFFICIENT HANDLING OF MULTI-DESTINATION TRAFFIC IN AN INTERNET PROTOCOL FABRIC DATA CENTER - A method is provided in one example embodiment and includes establishing at least one fixed topology distribution tree in a network, where the fixed topology distribution tree comprises one root node and a plurality of leaf nodes connected to the root node; maintaining at the root node an indication of multicast group interests advertised by the leaf nodes; and pruning traffic at the root node based on the advertised multicast group interests of the leaf nodes. In one embodiment, the root node is a spine switch and each of the leaf nodes is a leaf switch and each of the leaf nodes is connected to the root node by a single hop. | 2014-09-11 |
20140258486 | Server-Layer Shared Link Risk Group Analysis to Identify Potential Client-Layer Network Connectivity Loss - In one embodiment, a particular device within a client-layer network maintains client-layer topology information including server-layer Shared Risk Link Group (SRLG) information of server-layer devices and links in a server-layer network associated with client-layer links and client-layer nodes in the client-layer network. A determination is made to discover if there is an alternative client-layer path to an established client-layer path between a first packet switching device and a second packet switching device if all server-layer resources of any particular server-layer SRLG of a plurality of total server-layer SRLGs associated with the established client-layer path become unavailable. In one embodiment, the plurality of total server-layer SRLGs includes: an SRLG of a same optical node, an SRLG of a same optical fiber, an SRLG of co-located plurality of optical nodes, and/or an SRLG of co-located plurality of optical fibers. | 2014-09-11 |
20140258487 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 2014-09-11 |
20140258488 | MANAGING MOBILE DEVICES WITH A GENERAL PURPOSE MESSAGING TRANSPORT PROTOCOL - A system uses a general purpose messaging transport protocol to manage, control, and monitor a mobile communication device and/or a plurality of mobile communication devices. | 2014-09-11 |
20140258489 | COLLABORATIVE APPLICATION CLASSIFICATION - Herein described is a collection of traffic classifiers communicatively coupled to a classification aggregator. Traffic classifiers may use conventional techniques to classify network traffic by application name, and thereafter may construct mappings that are used to more efficiently classify future network traffic. Mappings may associate one or more characteristics of a communication flow with an application name. In a collaborative approach, these mappings are shared among the traffic classifiers by means of the classification aggregator so that one traffic classifier can leverage the intelligence (e.g., mappings) formulated by another traffic classifier. | 2014-09-11 |
20140258490 | COMMUNICATION METHOD OF ADMINISTRATION NODE, REQUESTING NODE, AND NORMAL NODE FOR DELETING INVALID CONTENT USING CONTENT REVOCATION LIST IN CONTENT CENTRIC NETWORK - Provided is a communication method for an administration node in a content centric network (CCN). The communication method includes receiving a packet requesting deletion of an invalid content from a requesting node that detects the invalid content, generating a content revocation list including a name of the invalid content and a period of time over which the deletion is to be performed, and flooding a data packet including the content revocation list to the requesting node and a normal node included in the CCN. Also provided are related communications methods for a receiving node and a normal node, as well as the nodes themselves. | 2014-09-11 |
20140258491 | METHODS AND APPARATUS FOR HOSTNAME SELECTIVE ROUTING IN DUAL-STACK HOSTS - The present invention is directed to a method of making Internet network trafficking easier and more secure while resolving a DNS inquiry in systems having both IPv4 and IPv6 elements in the new world situation of two competing DNS systems. The method utilizes a computing system DNS transfer policy to inquire and then provide a response to DNS inquiries that can include differing Internet Protocols. By including the policy inquiry and allowing the system to encode IPv4 addresses within IPv6 addresses, a more secure and quick response is provided allowing business, government and individual users to safely use the Internet in association with any number of Internet capable devices. | 2014-09-11 |
20140258492 | AGGREGATING COMPLETION MESSAGES IN A SIDEBAND INTERFACE - In one embodiment, the present invention includes a method for receiving a request in a router from a first endpoint coupled to the router, where the request is for an aggregated completion. In turn, the router can forward the request to multiple target agents, receive a response from each of the target agents, and consolidate the responses into an aggregated completion. Then, the router can send the aggregated completion to the first endpoint. Other embodiments are described and claimed. | 2014-09-11 |
20140258493 | DETERMINING THE GRAPHIC LOAD OF A VIRTUAL DESKTOP - The graphics load of a virtual desktop is estimated to determine the capacity of a virtual desktop system. In one embodiment, the graphics load of a physical desktop is measured by a remoting agent installed on the physical desktop. The graphics load can be used as an estimate of the load that would be created by a deployed virtual desktop. The remoting agent on the physical desktop mimics host operations that are necessary to direct graphics data to a remote site. The remoting agent also measures the graphics load incurred by the host operations to determine a capacity of a virtual desktop system prior to deployment of the virtual desktop system. | 2014-09-11 |
20140258494 | METHOD, APPARATUS AND SYSTEM FOR PROCESSING COMPOSITE SERVICE AND REPLACING SERVICE AND INVOKING SERVICE - The present invention relates to a method for handling and replacing a service. The method for handling a composite service may include obtaining a concrete service corresponding to a service invocation segment description in a composite service logic, wherein the service invocation segment is an abstract service invocation segment or a service template invocation segment; triggering a service replacement, requesting to replace the service invocation segment with a concrete service invocation segment of the obtained concrete service; or, triggering a service invocation, requesting to generate a service invocation based on the concrete service. Accordingly, a concrete service can be dynamically selected when the composite service logic is being executed. | 2014-09-11 |
20140258495 | STORAGE AREA NETWORK MULTI-PATHING - Provided are a method, computer program product and system for network multi-pathing. Paths to a storage system are through a first network type and a second network type. The first network type has a higher Input/Output (I/O) per second performance characteristic than the second network type. A length is determined from a received I/O request. The I/O request is sent on one of the paths to the storage system through the first network type in response to determining that the length of the I/O request is below a threshold length. The I/O request is sent on one of the paths to the storage system through the second network type in response to determining that the length of the I/O request is above the threshold length. | 2014-09-11 |
20140258496 | DATA CENTRE SYSTEM AND METHOD FOR A DATA CENTRE TO PROVIDE SERVICE - A data center system and a method for a data center to provide service are provided. The data center system comprises at least one first load balancing device, a plurality of second load balancing devices, and a plurality of servers. The first load balancing device is configured to transmit the first type network request to one of the plurality of second load balancing devices with a first scheduling strategy. The second load balancing device is configured to convert the first type network request to a second type network request, and to transmit the second type network request after the source address and destination address translation to one of the plurality of servers with a second scheduling strategy. The server is configured to generate a second type network response according to the second type network request and to return the second type network response to a corresponding second load balancing device. | 2014-09-11 |
20140258497 | MANAGEMENT SYSTEM FOR AUTOMATIC DOOR APPARATUS - Provided are a management system and management method for an automatic door apparatus, with which it is possible to easily recognize the working circumstances of an automatic door apparatus and also possible to easily ensure security without incurring management costs for a selling company or a maintenance company. A management system for automatic door apparatuses comprises: the automatic door apparatuses with which communication is possible; a management server disposed within a narrow-area network of the customer-side management system identical to the automatic door apparatuses and capable of checking the working circumstances of the automatic doors by communicating with the automatic door apparatuses; and a management PC disposed within a wide-area network outside the narrow-area network and capable of communicating with the management server by remote desktop technology; wherein the management PC acquires the working circumstances of the automatic door apparatuses via the management server. | 2014-09-11 |
20140258498 | Implementing an Energy Proportional Network Architecture from Desired Network Criteria - Systems, methods, and computer-readable executable instructions are provided for implementing an energy proportional network architecture. Implementing an energy proportional network architecture can include determining a number of desired network criteria and a desired number of access ports. A number of switches for the energy proportional network architecture can be calculated from the desired number of access ports and the number of desired network criteria. Implementing an energy proportional network architecture can also include using the number of calculated switches to form the energy proportional network. | 2014-09-11 |
20140258499 | LOAD BALANCING WHEN REPLICATING ACCOUNT DATA - Embodiments of the present invention relate to invoking and managing load-balancing operation(s) applied to partitions within a distributed computing environment, where each partition represents a key range of data for a storage account. The partitions affected by the load-balancing operation(s) are source partitions hosted on a primary storage stamp and/or destination partitions hosted on a secondary storage stamp, where the primary and secondary storage stamps are located in geographically distinct areas and are equipped to replicate the storage account's data therebetween. The load-balancing operation(s) include splitting partitions into child partitions upon detecting an increased workload as a result of active replication, merging partitions to form parent partitions upon detecting a reduction in workload as a result of decreased processing-related resource consumption, or offloading partitions based on resource consumption. A service within a partition layer of the storage stamps is responsible for determining when to invoke these load-balancing operation(s). | 2014-09-11 |
20140258500 | DELEGATE ACCESS IN A DISTRIBUTED SCAN SYSTEM - Approaches are provided for processing scan data based on a scan process definition (SPD) that defines a set of instructions for acquiring image data based on one or more printed documents. An SPD may include extension data that is used to store additional data in association with the scan data. An SPD may include rights management data that is used to provide security to the scan data that is generated based on the SPD. An SPD may be used as a print process definition for dictating how print operations are to be performed. An SPD may be associated with data that identifies one or more scan devices that are prohibited from using the SPD. An SPD may be associated with access delegation data that indicates one or more users who have been delegated access to the SPD. | 2014-09-11 |
20140258501 | SYSTEM AND METHOD FOR AUTOMATED DISTRIBUTION OF SUPERVISORY FUNCTIONS IN A CONTACT CENTER - A system for automated distribution of supervisory functions in an enterprise is provided. The system includes a monitor module configured to monitor performance of resources in the enterprise. The system further includes a skill finder module configured to find at least one skilled resource for at least one type of work request. The system further includes an assignment module configured to assign the at least one skilled resource a subset of supervisory role for the at least one type of work request. | 2014-09-11 |
20140258502 | TRACKING CONTACTS ACROSS MULTIPLE COMMUNICATIONS SERVICES - A method for tracking at least recent contacts and favorite contacts across multiple communications services may include collecting, by a processor, information associated with a plurality of contact interactions of a user from each of a set of different communications services utilized by the user. The method may also include storing, by a storage device, the information associated with each of the plurality of contact interactions. The method may additionally include analyzing the information associated with each of the plurality of contact interactions. The method may further include determining at least one of a list of most recent contacts and a list of favorite contacts from analyzing the information associated with each of the plurality of contact interactions. | 2014-09-11 |
20140258503 | System and Method for Recommending Communication Groups and Modes of Communication - In one embodiments, a system includes an interface operable to monitor a first plurality of communications between a first user and a second user on a network. The system further includes one or more processors configured to determine one or more first particulars of the first plurality of communications, determine a recommended communication group composition and a recommended mode of communication based on the one or more first particulars and a set of rules, and generate a first alert to the first user indicating the recommended communication group composition and the recommended mode of communication. | 2014-09-11 |
20140258504 | SYSTEMS AND METHODS FOR NETWORK TESTING - A apparatus for network testing includes a network port adapted to receive data from the test network and one or more network interfaces of a wireless access point in operative communication with the network port. The one or more network interfaces generates a wireless local area network (WLAN) that communicates diagnostic information of the test network to a client device and causes the client device to display the diagnostic information. | 2014-09-11 |
20140258505 | NETWORK CONDITION PREDICTIONS FOR MULTIMEDIA STREAMING - Network condition prediction and multimedia streaming consumption prediction are provided. The prediction may be based on a device's prior location, behavior, and statistics thereof. By gathering location data from users anonymously and securely, a virtual location network with millions of nodes are provided. Each virtual location, at a given time, is stored with associated network metrics gathered from various devices in a database. The database may comprise a probabilistic model and a behavioral model tracking device metrics. | 2014-09-11 |
20140258506 | TRACKING APPLICATION USAGE IN A COMPUTING ENVIRONMENT - Disclosed are various embodiments for reporting as well as tracking usage and/or installation of an application in a machine instance in a computing environment. A machine instance can execute an application and can be associated with a storage volume on which the application is installed. The application, or an installer utility associated with the application, can report installation and/or usage of the application to an application usage service. | 2014-09-11 |
20140258507 | SYSTEM AND METHODS FOR REMOTE ACCESS TO IMS DATABASES - Systems and methods are provided that allow client programs using IMS database access interfaces to access IMS database data available from IMS systems on remote logical partitions and remote zSeries mainframes rather than from a local IMS system. For example, a method may include intercepting an IMS request having a documented IMS request format from a client program executing on a source mainframe system. The method may also include selecting a destination mainframe system and sending a buffer including information from the request from the source mainframe system to the destination mainframe system and establishing, at the destination mainframe system, an IMS DRA connection with the IMS system from the request. The method may further include receiving a response from the IMS system, sending a buffer having information from the response from the destination mainframe system to the source mainframe system, and providing the information to the client program. | 2014-09-11 |
20140258508 | TRACKING CONTACTS ACROSS MULTIPLE COMMUNICATIONS SERVICES - A method for tracking at least recent contacts and favorite contacts across multiple communications services may include collecting, by a processor, information associated with a plurality of contact interactions of a user from each of a set of different communications services utilized by the user. The method may also include storing, by a storage device, the information associated with each of the plurality of contact interactions. The method may additionally include analyzing the information associated with each of the plurality of contact interactions. The method may further include determining at least one of a list of most recent contacts and a list of favorite contacts from analyzing the information associated with each of the plurality of contact interactions. | 2014-09-11 |
20140258509 | SYSTEMS AND METHODS FOR CONTEXT-BASED NETWORK DATA ANALYSIS AND MONITORING - Particular network usage information representing network activity of a particular device on a network is received. The particular network usage information is associated with a network context, the network context representing circumstances of the network activity of the particular device. The network context is associated with a particular network perspective, the network particular perspective representing a network activity of a group of devices on the network. The particular network perspective is rendered into an object, the object being configured to present the particular network perspective in a graphical user interface. | 2014-09-11 |
20140258510 | CLOUD DEVICE AND METHOD FOR NETWORK DEVICE DISCOVERING - A network device discovery method receives registration information from the network devices which are registered to the cloud device, and generates a management list for recording the registration information and a management status of each of the registered network devices. When a request of searching for specified network devices of a specified network manager from a specified client device is received, the discovery method retrieves specified network devices managed by the specified network manager from the management list. The discovery method further searches for target network devices which have the same public Internet Protocol (IP) addresses with the specified network devices, and presents one or more target network devices which have not been managed by any network manager to the specified client device for the specified network manager. | 2014-09-11 |
20140258511 | Methods and Apparatus for Reestablishing Secure Network Communications - A computer-implemented, method for monitoring and establishing a secure communication session to a client computing system by a secure communication server system programmed to perform the method including monitoring in the secure communication server system, a network traffic level between the client computing system and the secure communication server system, determining in the secure communication server system, whether the network traffic level drops below a set network traffic level, and wherein when the network traffic level is determined by the secure communication server system to drop below the set network traffic level, the method includes sending with the secure communication server system, a management communication to the client computing system to reestablish a secure communication session with the secure communication server system. A subsequent secure communication session between the client computing system and the secure communication server system may or may not be established. | 2014-09-11 |
20140258512 | SCHEDULE AND LOCATION RESPONSIVE AGREEMENT COMPLIANCE CONTROLLED INFORMATION THROTTLE - Controls electronic devices and/or throttles electronic devices and/or information for electronic devices based on agreements or events and/or based on schedule, location, time, or any combination thereof. An agreement includes condition(s) to satisfy the agreement, such as task(s) or activities to be performed by an agreement performer, for example based on a schedule and/or location, at a particular time, or time period, or, or events that may be detected, and actions performed to enforce or assert the agreement. Actions may include controlling the electronic device and/or at least partially enabling/disabling or otherwise limiting, reducing or increasing the amount or type of information allowed with respect to any or all electronic devices associated with the agreement performer. Embodiments may reduce or block information from particular sources during a scheduled school class to limit web surfing for information related to that class based on a schedule and/or location of the electronic device. | 2014-09-11 |
20140258513 | Monitoring Federation for Cloud Based Services and Applications - Technologies are described herein for cloud monitoring federations that can include cloud monitoring services (CMS) that collect monitoring information from point of presence (POP) agents. The cloud monitoring POPs may be located in the cloud, on client machines, embedded within cloud applications, or wherever they can obtain visibility into managed entities associated with the cloud. Management systems, acting as cloud monitoring clients (CMC), may interface with the CMS to obtain a complete view of services and application used by their enterprise including those that operate outside of the enterprise premises as part of a cloud or outside network. The publishing by POPs and consumption by CMCs of management information across components within the enterprise and out in the cloud may be supported by managing roles, responsibilities, scopes, security boundaries, authenticity of information, service level agreements, and other aspects of cloud monitoring operations. | 2014-09-11 |
20140258514 | MEDIA DELIVERY SYSTEM AND METHOD FOR TRANSPORTING MEDIA TO DESIRED TARGET DEVICES - A media delivery system and technique are described to enable a media stream to be received at one end on a user's computer, and then re-streamed to a target device in a form that is suitable for that target. As an example of an implementation of such an embodiment, a streaming video and/or audio feed may be received on a user's media center, then re-streamed to a user's designated target device. The target device may correspond to, for example, another computer, a cell phone, or some other media output device. | 2014-09-11 |
20140258515 | DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, AND DEVICE MANAGEMENT METHOD - A device management apparatus connected to a plurality of devices via a network includes a collecting unit that receives usage data indicating a status of use of each of the devices from each of the devices and that stores the received usage data in a storage device, and a common data acquiring unit that acquires common data that is common to the devices from the usage data of each of the devices stored in the storage device. | 2014-09-11 |
20140258516 | WEB PAGE PERFORMANCE SCORING - A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors. | 2014-09-11 |
20140258517 | Network User Usage Profiling - Methods, systems, devices, and software are disclosed for generating a network usage profile. Certain embodiments of the network usage profile include a devices-by-node profile, indicating the set of customer devices available for use in communicating with a customer-side network node located at a customer side of an access network over a period of time, where some of the customer devices are not in operative communication with the customer-side network node during a portion of that time. Other embodiments associate the network usage profile with customer information to generate device-by-customer profiles. Still other embodiments associate the network usage profile with network traffic information to generate traffic-by-device profiles. Even other embodiments associate the multiple sources and types of information to generate traffic-by-customer profiles and/or traffic-by-device-by-customer profiles. Any of the profiles may then be accessed by one or more parties for use in affecting various network services, including targeting content delivery. | 2014-09-11 |
20140258518 | METHOD AND APPARATUS FOR APPLYING UNIFORM HASHING TO WIRELESS TRAFFIC - A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server. | 2014-09-11 |
20140258519 | Methods For Measuring Physical Cpu Utilization In A Cloud Computing Infrastructure - Novel techniques are provided to determine concurrent hardware resource usage as expressed in activity performed by hardware processors. A cloud computing consumer can verify the level of the quality of service provided by the physical infrastructure of a cloud, thereby allowing the consumer the ability to request a transfer of the hosting physical infrastructure to a less burdened physical machine. | 2014-09-11 |
20140258520 | SYSTEMS AND METHODS FOR CATEGORIZING NETWORK TRAFFIC CONTENT - A method for categorizing network traffic content includes determining a first characterization of the network traffic content determining a first probability of accuracy associated with the first characterization, and categorizing the network traffic content based at least in part on the first characterization and the first probability of accuracy. A method for use in a process to categorize network traffic content includes obtaining a plurality of data, each of the plurality of data representing a probability of accuracy of a characterization of network traffic content, and associating each of the plurality of data with a technique for characterizing network traffic content. A method for categorizing network traffic content includes determining a characterization of the network traffic content, determining a weight value associated with the characterization, and categorizing network traffic content based at least in part on the characterization of the network traffic content and the weight value. | 2014-09-11 |
20140258521 | Load Balancing Web Service by Rejecting Connections - A load balancer allocates requests to a pool of web servers configured to have low queue capacities. If the queue capacity of a web server is reached, the web server responds to an additional request with a rejection notification to the load balancer, which enables the load balancer to quickly send the rejected request to another web server. Each web server self-monitors its rejection rate. If the rejection rate exceeds a threshold, the number of processes concurrently running on the web server is increased. If the rejection rate falls below a threshold, the number of processes concurrently running on the web server is decreased. | 2014-09-11 |
20140258522 | Methods and Systems for Monitoring Computer Systems Using Wireless Devices - Methods and systems for providing information regarding monitored computer systems to wireless devices are provided. Information may be requested by a wireless device and displayed on the wireless device in a browser. The web server application may detect the wireless device, and may also then specially format the response, including the requested information formatted for optimized delivery and/or display on a wireless device. The web server application may also send a message to a wireless device about events associated with the monitored computer systems. | 2014-09-11 |
20140258523 | End-to-End Monitoring and Optimization of a Content Delivery Network using Anycast Routing - Some embodiments implement systems and methods to monitor CDN performance from the end user's perspective. To achieve full end-to-end monitoring, the systems and methods monitor the performance of Anycast routing for routing an end user to the optimal PoP of the CDN and monitor the performance of different routes that deliver content from the optimally selected PoP back to the end user. Systems and methods are also provided to leverage the monitored performance in order to automatically optimize the performance of the CDN by optimizing or modifying Anycast routing and by performing route grooming as needed to ensure that the optimal route is selected to deliver content to different sets of end users that request content from a particular PoP. | 2014-09-11 |
20140258524 | Detection of Load Balancing Across Network Paths in a Communication Network - The present disclosure relates to methods, a system and an apparatus for detection of load balancing in a packet-switched communication network ( | 2014-09-11 |
20140258525 | Computer Network Management Tools - A network device for computer network operation includes a processor and a memory. A set of object identifiers (OID) and a set of device management identifiers are stored in the memory, wherein each object identifier is mapped to a corresponding device management parameter to facilitate management of the network device. The set of device management identifiers collective represents the set of object identifiers. The network device is to make available the device management identifiers and values corresponding to the device management parameters to facilitate network management. | 2014-09-11 |
20140258526 | SYSTEMS AND METHODS OF REMOTE COMMUNICATION - According to at least one embodiment, a system for monitoring cloud-enabled automatic control devices is provided. The system includes at least one automatic control device. The at least one cloud-enabled automatic control device includes an output configured to provide control information to controlled equipment, a data storage, a network interface, and a controller coupled to the output, the data storage and the network interface. The controller is configured to provide, according to a one-way communication protocol, transmitted information to a cloud service via the network interface, the transmitted information including an identifier of the at least one automatic control device and being descriptive of performance of the at least one automatic control device. | 2014-09-11 |
20140258527 | NETWORK SYSTEM, NODE DEVICE GROUP, COMPUTER APPARATUS, AND METHOD FOR TRANSMITTING AND RECEIVING SENSOR DATA - A computer apparatus makes an information acquisition request to any of multiple node devices. Each node device has a sensor data search section for searching a sensor data storage sections of the multiple node devices for a sensor data according to the information acquisition request and acquiring the sensor data and an information transmission section for transmitting the sensor data acquired by the sensor data search section or calculation result data acquired on the basis of the sensor data to the computer apparatus. | 2014-09-11 |
20140258528 | SYSTEM AND METHOD FOR MANAGING ATTEMPTED ACCESS OF OBJECTIONABLE CONTENT AND/OR TAMPERING WITH A CONTENT FILTERING DEVICE - An apparatus and method for managing a user's ability to access content on the Internet involves a reporting and control server, an Internet Access Control (IAC) device, the IAC device including at least one light to indicate when at least one disallowed event has occurred, and a reset component which, for the at least one light to be reset, must be coupled to the IAC device. The method involves receiving a web address, determining whether a requested Domain Name System (DNS) server is an acceptable DNS server, determining whether an IP address provided by the acceptable DNS server is a redirect IP address and, if so, indicating an objectionable content event has occurred by changing a state of at least one light on the IAC device, sending information so that a reporting and control server can transmit a reset, receiving the reset, and resetting the at least one light. | 2014-09-11 |
20140258529 | DEVICE-SPECIFIC RESTRICTIVE CONTENT DELIVERY - A content control server implements a service similar to the National Do-Not-Call Registry for on-line content in which a user of a device can request that advertising content received from an ad server be restricted to one or more types of acceptable content. The types of content that are to be allowed and/or denied delivery to the device are associated with an identifier of the device. The identifier can be a digital fingerprint of the device. The types of content that can be controlled in the manner described herein are organized in a hierarchy. | 2014-09-11 |
20140258530 | METHOD FOR ACQUIRING ACCESS RIGHTS TO A PRODUCT OR A SERVICE - A method of acquiring access rights to a product or a service. The method comprises receiving an access right to a service and/or a product by a multimedia unit, said right being sent by a right provider; transmitting said access right from said multimedia unit to a mobile terminal, said transmission using a near field communication; and storing said right in a memory of the mobile terminal. | 2014-09-11 |
20140258531 | METHOD FOR ACQUIRING ACCESS RIGHTS TO CONDITIONAL ACCESS CONTENT - A method of acquiring access rights to conditional access content. The method comprises receiving an access right on a first terminal through a first communication channel; storing said access right in said first terminal; sending a request for said conditional access content to a content provider, said request containing at least an identifier of an account to which said first terminal is associated, an identifier of the requested content and a piece of information concerning said access right; verifying, by said content provider, the authenticity of said access right using said piece of information concerning the access right; and when there has been a successful verification, marking said access right as used, and sending said conditional access content to at least one terminal linked to said account. The first terminal using near field communication technology (NFC) during at least one transfer of said access rights. | 2014-09-11 |
20140258532 | KEEP-ALIVE HIATUS DECLARATION - In an embodiment, a method is performed by one or more processors and comprises obtaining a hiatus declaration that indicates that a network device will be incommunicable; suspending communication with the network device until expiration of a hiatus time period during which the network device is expected to be incommunicable; resuming communication with the network device in response to any of: determining that the hiatus time period has expired; obtaining a keep-alive message from the network device; or obtaining other indication that the network device can communicate. | 2014-09-11 |
20140258533 | Method and System for Providing a Roaming Remote Desktop - Techniques are disclosed for migrating a linked clone virtual machine (VM) based on a location of a client device. In one embodiment, a client device transmits its location to a VM management center, and a migration application running thereon determines whether the client device and a linked clone VM to which the client device is attempting to connect are at the same location. If the client device and the linked clone VM are not at the same location, the migration application identifies a VM hosting site proximate to the client device, and instructs a hypervisor to “cold” migrate the linked clone VM and its associated redo log to a VM host and a storage device, respectively, at the identified VM hosting site. The link clone VM may then be “actively” linked to a base VM at the VM hosting site, while maintaining “passive” links to base VM(s) at other locations. | 2014-09-11 |
20140258534 | SERVICE-BASED LOAD-BALANCING MANAGEMENT OF PROCESSES ON REMOTE HOSTS - A session manager is used to manage selection of a remote host for a session in response to a request that is associated with a user. The session manager uses resource information obtained from remote hosts in advance of the request to determine which remote host to associate with a session for a client. Each remote host performs a resource calculation (configurable) to determine how many processes/sessions it can further accommodate. The remote host sends the results of the resource calculation and other determined resource information to the session manager. The session manager provides the determined remote host to a client device. The client device then directly connects to the determined remote host. A process may be automatically started on the remote host for the client as the user. The session manager may also store and receive information for active and historical processes, remote host status, and remote host configuration. | 2014-09-11 |
20140258535 | NETWORK BANDWIDTH ALLOCATION IN MULTI-TENANCY CLOUD COMPUTING NETWORKS - A computing device determines an optimal allocation of network bandwidth on a plurality of communications links for a plurality of virtual machines (VMs) in a multi-tenant cloud network based upon a set of bandwidth requirements for the plurality of VMs. The computing device generates a plurality of spanning tree data structures (TDSs). Edges in the TDSs include computed bandwidth values indicating an amount of bandwidth to be reserved over a communications link represented by that edge for the plurality of VMs. The computing device generates a weighted distance value for each TDS of the plurality of TDSs, and selects a TDS of the plurality of TDSs having a smallest weighted distance value as the TDS having computed bandwidth values representing the optimal allocation of network bandwidth. | 2014-09-11 |
20140258536 | APPLICATION DELIVERY CONTROLLER AND GLOBAL SERVER LOAD BALANCER - Application Delivery Controller (ADC), Global Server Load Balancer (GSLB), and methods for their operation in data networks are disclosed. The methods for load balancing may include receiving a query concerning a host name from a client, determining that there are two or more host servers associated with the host name, measuring various metrics associated with each of the two or more host servers and a local Domain Name Server (DNS), and based at least in part on the measurement, selecting a host server among the two or more host servers. The load balancing may also be based on a measured round trip time. | 2014-09-11 |
20140258537 | Storage Management of a Storage System - A method for storage management in a storage system, such as a storage area network (SAN). A selection of a first target level of storage service quality (e.g., bronze, silver, gold, platinum) for a storage repository to be created in the SAN is received. The first target level of storage service quality represents a level of storage service quality for the storage repository along a first dimension (e.g. performance, availability) of storage service quality. A first set of storage configuration properties associated with the first level of desired storage service quality is determined. One or more storage components of the SAN are allocated to the storage repository based on at least one storage configuration property in the first set of storage configuration properties. | 2014-09-11 |
20140258538 | Collective Operation Management In A Parallel Computer - Methods, apparatuses, and computer program products for collective operation management in a parallel computer are provided. Embodiments include a parallel computer having a first compute node operatively coupled for data communications over a tree data communications network with a plurality of child compute nodes. Embodiments also include each child compute node performing a first collective operation. The first compute rode, for each child compute node, receives from the child compute node, a result of the first collective operation performed by the child compute node. For each result received from a child compute node, the first compute node stores a timestamp indicating a time that the child compute node completed the first collective operation. The first compute node also manages, based on the stored timestamps, execution of a second collective operation over the tree data communications network. | 2014-09-11 |
20140258539 | MINIMIZING WORKLOAD MIGRATIONS DURING CLOUD MAINTENANCE OPERATIONS - A method, system and computer program product for minimizing workload migrations during cloud maintenance operations. Upon receiving an indication that a scheduled maintenance operation is to be performed, a cloud controller uploads the maintenance binaries associated with the scheduled maintenance operation and analyzes the maintenance binaries so as to evaluate the requirements of the maintenance packages and dependencies associated with the scheduled maintenance operation. A matrix is then generated by the cloud controller to identify the classes of hardware that will be disrupted by the scheduled maintenance operation based on the analysis. The workloads running on the classes of hardware identified in the matrix will then be consolidated prior to the scheduled maintenance operation. By consolidating the workloads onto a fewer number of hardware components, a fewer number of workload migrations will need to be performed during the cloud maintenance operation. | 2014-09-11 |
20140258540 | MANAGEMENT SYSTEM AND METHOD - A management system includes an information processing apparatus; a management apparatus; and a load balancing apparatus. And the management apparatus specifies a first processing entity that relates to a first application program whose performance is not guaranteed, upon detecting that a value related to a load of a second processing entity that relates to a second application program whose performance is guaranteed is equal to or greater than a first predetermined threshold, and requests the information processing apparatus to stop the first processing entity, and the information processing apparatus requests the load balancing apparatus to stop allocating processing to the first processing entity, stops the first processing entity upon detecting that a value related to a load of the first processing entity is equal to or less than a second predetermined threshold, and causes a third processing entity to start processing for the second application program. | 2014-09-11 |
20140258541 | DISTRIBUTED VIRTUAL APPLIANCE - A distributed virtual appliance is disclosed, including: determining a classification type associated with the first flow; and determining an allocation of the first flow to the first data plane compute unit of the distributed virtual appliance based at least in part on the determined classification type and at least a subset of information of a first flow identifier, wherein the distributed virtual appliance includes a plurality of compute units, including the first data plane compute. | 2014-09-11 |
20140258542 | SYSTEM AND METHOD FOR FACILITATING DISTRIBUTION OF LIMITED RESOURCES - A method is provided for distributing limited resources. The method comprising the following steps. A plurality of limited resources about to expire on a given day is determined. The plurality of limited resources is made available simultaneously. Resource requests from a plurality of clients for a registration period are allowed starting at a predetermined time. The resource requests are processed after the registration period by correlating the limited resources with the received resource requests. | 2014-09-11 |
20140258543 | System and Method for Implementing Network Service Level Agreements (SLAs) - Some implementations provide a method including: storing, at a Network Credit Server (NCS), a service level agreement of a customer; maintaining a database of topology information of the network; receiving a request from a network device where a first plurality of packets associated with the customer have been received en-route to a destination and when the number of the first plurality of packets surpasses a pre-configured threshold number; generating, by the NCS, a reply based on the service level agreement of the customer and the topology information of the network; and sending the reply to the network device for the network device to process a second plurality of packets associated with the customer, the second plurality of packets being received at the network device subsequent to the first plurality of packets and en-route to the destination. | 2014-09-11 |
20140258544 | PRIORITIZED REPORTING OF METERING DATA - A utility company may schedule when and how endpoints report resource consumption data based on relative priorities of endpoints or the customers associated therewith. By associating endpoints with one of multiple different quality of service (QoS) levels, and sending each endpoint a reporting schedule based on its respective QoS level, the utility company may configure prioritized reporting of resource consumption data by endpoints of an advanced metering infrastructure (AMI) with automatic meter reading (AMR). | 2014-09-11 |
20140258545 | SYSTEM AND METHOD FOR MANAGING SERVICE CHARACTERISTICS - The present invention provides a system and a method for managing an expanded service characteristic packet, which solve the problem that the WAB of a Web layer lacks the capabilities of modularization. The method comprises: obtaining a basic characteristic packet identifier and a resource request path according to a Web resource request, wherein, the resource request path is the path of a resource required to be obtained in a service characteristic packet; obtaining existing basic characteristic packets and service characteristic packets, and screening out the service characteristic packet having a mounting identifier identical to the basic characteristic packet identifier obtained from the Web resource request; storing the mounting identifier in the service characteristic packet for designating a basic characteristic packet to be mounted; and loading the screened service characteristic packet according to the resource request path, and returning the obtained resource. | 2014-09-11 |
20140258546 | METHOD AND APPARATUS FOR DYNAMICALLY ASSIGNING RESOURCES OF A DISTRIBUTED SERVER INFRASTRUCTURE - A method for dynamically assigning resources of a distributed server infrastructure, the method comprising the steps of comparing an observed relative load of an assigned portion of said distributed server infrastructure with a desired relative load; if said observed relative load exceeds said desired relative load assigning additional resources, and redistributing tasks from said assigned portion to said additional resources; and if said desired relative load exceeds said desired relative load: selecting removable resources, redistributing tasks from said removable resources to other resources in said assigned portion, and removing said removable resources from said assigned portion; wherein said redistributing of tasks is performed in such a way that state information related to said tasks is preserved. | 2014-09-11 |
20140258547 | SINGLE SIGN-ON PROCESSING FOR ASSOCIATED MOBILE APPLICATIONS - Systems, methods and computer-readable media are disclosed for performing single sign-on processing between associated mobile applications. The single sign-on processing may include processing to generate an interaction session between a user and a back-end server associated with a mobile application based at least in part on one or more existing interaction sessions between the user and one or more back-end servers associated with one or more other mobile applications. In order to establish an interaction session with an associated back-end server, a mobile application may leverage existing interaction sessions that have already been established in connection with the launching of other associated mobile applications. | 2014-09-11 |
20140258548 | PLAYBACK CONTROL DEVICE, PLAYBACK CONTROL SYSTEM, AND STORAGE MEDIUM - A playback control device includes an identification part configured to identify one of communication terminals based on identification data associated with a request to play session data including at least one of image data and sound data; a first acquisition part configured to acquire session data which has been communicated in a session in which the communication terminals have joined; a second acquisition part configured to acquire, in response to the identification data, time data representing at least a time period in which the identified communication terminal had joined the session; and a control part configured to, in response to the time data, allow playing of the session data for the time period in which the identified communication terminal had joined the session and disallow playing of the session data for the time period in which the identified communication terminal had not joined the session. | 2014-09-11 |
20140258549 | TECHNIQUES FOR PROVIDING CONNECTIONS TO SERVICES IN A NETWORK ENVIRONMENT - Methods and apparatus for mediating user access to services over a network are described. Access is provided by a service network host to a plurality of connectors providing access to a plurality of services over the network. The services are provided by entities independent from the service network host. The connectors including a first connector are configured to communicate with a first service using a first format to retrieve or modify data associated with the first service. The first connector is further configured to identify one or more methods or data fields of the first service. The service network host is further configured to provide, to a computer associated with a user over the network, one or more directions for using the first connector to display and/or modify data from the first service over the network. | 2014-09-11 |
20140258550 | AUTOMATIC AD-HOC NETWORK CREATION AND COALESCING USING WPS - A device previously configured as a registrar and that has established an independent ad-hoc network is automatically discovered by another device also previously configured as a registrar. To form an ad-hoc wireless network between these two devices, each device periodically enters a scanning mode to scan for and intercept beacons transmitted by the other device. Upon such interception, one of the devices becomes an enrollee in accordance with a predefined condition and in response to a user selected option. Subsequently, the enrollee modifies its beacons to include an attribute, such as the MAC address, associated with the other device. After intercepting the modified beacon, the remaining registrar prompts it user to decide whether to allow the enrollee to join the registrar's network. If the user responds affirmatively, a handshake is performed between the two devices and a subsequent attempt is made by the enrollee to join the registrar's network. | 2014-09-11 |
20140258551 | Method for Implementing Session Border Controller Pool, and Session Border Controller - A method for implementing a session border controller (SBC) pool and a SBC device are provided. In the present invention, an SBC pool is formed by at least two SBCs, the at least two SBCs are mutually backed up for disaster recovery and use a same Internet Protocol (IP) address for a terminal device, and whether the terminal device is registered in the SBC pool is determined; and if the terminal device has been registered in the SBC pool, a service message is forwarded to an SBC with which the terminal device is registered. In this way, it is avoided that SBC device disaster recovery places a special requirement for the terminal device, and the terminal device does not need to be configured with two IP addresses. Furthermore, all devices in the SBC pool can process the service message of the terminal device, thereby increasing a resource utilization rate. | 2014-09-11 |
20140258552 | VIDEO ADAPTATION FOR CONTENT-AWARE WIRELESS STREAMING - Described herein are techniques related to wirelessly streaming content to a remote display device. Parameters are selected for the streaming based on content information received via an application programming interface (API) associated with a media player. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 2014-09-11 |
20140258553 | MULTI-MEDIA MANAGEMENT AND STREAMING TECHNIQUES IMPLEMENTED OVER A COMPUTER NETWORK - Various aspects described or referenced herein are directed to different methods, systems, and computer program products relating to multi-media management and streaming techniques implemented over a computer network. In one embodiment, a Multi-Media Management and Streaming (MMMS) System may be configured or designed to provide online users with “location based” streaming radio functionality. Users from different geographic locations may access a variety of MMMS System GUIs to access information relating to one or more artists/bands, songs, venues, and/or events such as live music performances. Users may also access a variety of MMMS System GUIs to search for, create, and/or share customized streaming radio stations which may be configured to identify, present information relating to, and/or play/stream music associated with one or more artists/bands, songs, venues, and/or events. | 2014-09-11 |
20140258554 | SWITCHING MEDIA STREAMS IN A CLIENT SYSTEM BASED ON ENVIRONMENTAL CHANGES - A method and system for switching media streams of a video in a client system. A first media stream of the video is played in a SHOW mode in the client system as the first media stream is received from a content providing system. During playing the first media stream, an environmental change is detected within or adjacent to the client system and in response, a switch is made from playing the first media stream to playing a second media stream of the video in the SHOW mode as the second media stream is being received from the content providing system. After playing first media stream is paused, the switching may occur upon matching timecodes distributed in the first and second media streams, by transitioning playing the second media stream in a HIDE mode to playing the second media stream in the SHOW mode. | 2014-09-11 |
20140258555 | MOBILE DEVICE APPLICATION FOR AUTOMATIC FILTERING OF TRANSMITTED DATA CONTENT - A communications device is provided. This includes a processor adapted to receive one or more identified data sources from at least one network database. An applications component is configured to determine one or more network applications that communicate with the processor based in part on the one or more identified data sources. A filter can be configured to at least partially disable data exchanges to the one or more identified data sources during communications with at least one of the one or more network applications. | 2014-09-11 |
20140258556 | INTELLIGENT SERVER ROUTING - The present application relates to methods and systems for intelligently routing requests to one of a plurality of redundant servers. The methods and systems route the requests to a most highly ranked redundant server. The redundant servers are dynamically rank according to ranking information, wherein the ranking information may include server performance information, server response information, next step performance information, next step response information, historic information and other like information. Next step response information and next step performance information corresponds to information pertaining to servers the plurality of redundant servers depend upon. The methods and systems may further randomly re-rank the plurality of redundant servers. The methods and systems may further re-route unprocessed requests meeting non-performance criteria. | 2014-09-11 |
20140258557 | POSITIONPARAMETERIZED RECURSIVE NETWORK ARCHITECTURE WITH TOPOLOGICAL ADDRESSING - A digital data communications network that supports efficient, scalable routing of data and use of network resources by combining a recursive division of the network into hierarchical sub-networks with repeating parameterized general purpose link communication protocols and an addressing methodology that reflects the physical structure of the underlying network hardware. The sub-division of the network enhances security by reducing the amount of the network visible to an attack and by insulating the network hardware itself from attack. The fixed bandwidth range at each sub-network level allows quality of service to be assured and controlled. The routing of data is aided by a topological addressing scheme that allows data packets to be forwarded towards their destination based on only local knowledge of the network structure, with automatic support for mobility and multicasting. The repeating structures in the network greatly simplify network management and reduce the effort to engineer new network capabilities. | 2014-09-11 |
20140258558 | TRANSCODING ON VIRTUAL MACHINES USING MEMORY CARDS - The present embodiments disclose techniques for transcoding media data using a virtualized network environment. This virtual environment may be hosted on one or more memory cards which each contain one or more memory chips. For example, the memory cards may include plurality of interconnected memory elements mounted on a PCB. The virtual environment may include virtual machines that execute applications that transcode the media data from one format to a different format. Because each virtual machine acts like an independent physical machine, a plurality of transcode operations may be performed in parallel on respective virtual machines. By virtualizing the transcode process, the hardware required for transcoding can be reduced relative to using a dedicated data center for transcoding the media data. | 2014-09-11 |
20140258559 | Persistent Format Conversions - Methods, systems, and apparatus, including computer programs encoded on a computer-readable storage medium for persistent format conversions. One of the methods includes receiving an original communication to be routed from a first user to a second user, wherein the original communication is received in a first format; converting, based a format conversion rule, the original communication into a second, different format; routing the original communication to the recipient in the second format; receiving a response communication related to the original communication and to be routed from the second user to the first user; and based on determining that the response communication is responsive to the original communication, converting the response communication into the first format prior to routing the communication to the first user. | 2014-09-11 |
20140258560 | LOCK FREE DATA TRANSFER - A system receives a request to transfer an object, and transfers the object without placing a lock on the object such that the object can still be processed by a service or a function during the transfer. Upon completion of the transfer of the object, the system determines if the object was modified by the processing during the transfer, and the system re-transfers the object when the object was modified by the processing during the transfer. | 2014-09-11 |
20140258561 | FACILITATING PROCESSING OF OUT-OF-ORDER DATA TRANSFERS - Processing of out-of-order data transfers is facilitated in computing environments that enable data to be directly transferred between a host bus adapter (or other adapter) and a system without first staging the data in hardware disposed between the host bus adapter and the system. An address to be used in the data transfer is determined, in real-time, by efficiently locating an entry in an address data structure that includes the address to be used in the data transfer. | 2014-09-11 |
20140258562 | COMMUNICATION BETWEEN A MOBILE COMPUTING DEVICE AND AN ACCESSORY DEVICE USING A RECONFIGURABLE ACCESSORY COMMUNICATION PROTOCOL - In a method of controlling an accessory device by a mobile computing device, upon being communicatively coupled with the accessory device, the mobile computing device communicates with the accessory device using an accessory communication protocol to receive accessory information, and protocol configuration data associated with a specific application executable on the accessory device. The mobile computing device reconfigures the accessory communication protocol based on the protocol configuration data to obtain a reconfigured accessory communication protocol, and then communicates with the accessory device using the reconfigured accessory communication protocol to control execution of basic functionality and the specific application on the accessory device. | 2014-09-11 |
20140258563 | MEMORY CARD CONTROLLER AND HOST DEVICE INCLUDING THE SAME - An interface selection unit physically determines whether or not a memory card is compatible with a first transfer mode, based on the result of signal exchange with the memory card via a first interface unit, to select a first interface unit or a second interface unit. If the second interface unit is selected, a memory card control unit performs an initialization process to cause the memory card to be accessible via the second interface unit, and thereafter, logically determines whether or not the memory card is compatible with the first transfer mode, based on information read from the memory card. | 2014-09-11 |
20140258564 | Methodology for Detecting Problematic Connections with Peripheral Devices - Implementations of the present disclosure provide methods and systems for identifying peripheral devices with which problematic connections have been established. According to one embodiment, a method for detecting a model of peripheral device for which problematic connections with a computerized unit are common is disclosed. The method involves receiving values of each of one or more features of a particular connection between a computerized unit and a peripheral device, using the received values to determine a score for each of the features of the particular connection, calculating an overall connection score from the scores for each of the features, and generating a problematic peripheral device report including the model of the peripheral device if the overall connection score is indicative of a problematic connection. | 2014-09-11 |
20140258565 | SMART DISCOVERY MODEL IN A SERIAL ATTACHED SMALL COMPUTER SYSTEM TOPOLOGY - Methods, systems and processor-readable media are disclosed for implementing a “smart” discovery process in a data transfer regime having one or more expanders and one or more initiators. Data traffic associated with such a discovery process can be reduced and one or more of the initiators can be prevented from blocking input/output to particular components in communication with the data transfer regime, thereby improving and completing the discovery process in an optimal time frame while enhancing the performance of the initiator(s). | 2014-09-11 |
20140258566 | Dynamic Pause Period Calculation for Serial Data Transmission - A serial transmission peripheral device for transmitting serial transmission data with a variable data length includes a pulse forming unit; and a register programmable to set a desired transmission length. The peripheral device is operable to determine an actual transmission length and calculate a length of a pause pulse and to add the pause pulse at the end of a transmission to generate a transmission having a constant length. | 2014-09-11 |
20140258567 | DATA TRANSMISSION CIRCUIT AND DATA TRANSMISSION METHOD USING CONFIGURABLE THRESHOLD AND RELATED UNIVERSAL SERIAL BUS SYSTEM - A data transmission circuit applied to a universal serial bus (USB) system includes a memory, a direct memory access (DMA) engine and a USB controller. The memory is arranged for receiving and storing external data. The DMA engine is coupled to the memory, and arranged for controlling data retrieved from the memory. The USB controller is coupled to the DMA engine, and arranged for receiving data from the DMA engine and for transmitting the received data to a host. When the memory the stored data volume reaches a first threshold, the DMA engine starts continuously fetching data from the memory and transmitting it to the USB controller, until the data volume fetched by the DMA engine reaches a second threshold, or there is no data left in the memory. The second threshold is greater than the first threshold. | 2014-09-11 |
20140258568 | METHOD AND APPARATUS FOR MINIMIZING WITHIN-DIE VARIATIONS IN PERFORMANCE PARAMETERS OF A PROCESSOR - Described herein are a method and an apparatus for minimizing within-die variations in performance parameters of a processor. The apparatus comprising: a reference generator to generate an adjustable compensated reference signal; a bias generator to generate a bias signal based on the adjustable compensated reference signal; a transmitter coupled with the bias generator to transmit an output signal; and a feedback mechanism to sample the output signal from the transmitter and to provide the sampled output signal to the bias generator. | 2014-09-11 |
20140258569 | SIGNAL PROCESSING SYSTEM AND ASSOCIATED METHOD - The present invention provides a signal processing system and associated method. The signal processing system includes converter(s) for conversion between digital and analog, each converter includes multiple serially coupled units forming multiple frequency interfaces respectively associating with different frequencies, and each converter is partitioned, at a selected frequency interface, to a first portion and a second portion respectively formed in the first chip and the second chip. The partitioning frequency interface is selected to reduce implement cost. | 2014-09-11 |
20140258570 | IMPLEMENTING CONFIGURATION PRESERVING RELOCATION OF SRIOV ADAPTER - A method, system and computer program product are provided for implementing configuration preserving relocation of a Single Root Input/Output Virtualization (SRIOV) adapter in a computer system. At system power on an SRIOV adapter having been relocated to a different slot while the system was powered off is automatically detected, and the configuration data associated with the adapter automatically updated so that it remains associated with the adapter in the adapter's new location. | 2014-09-11 |
20140258571 | Method and Device for Serial Data Transmission Having a Flexible Message Size and a Variable bit Length - A method for serial data transfer in a bus system having at least two bus subscribers that exchange messages via the bus, the transmitted messages having a logical structure according to CAN standard ISO 11898-1, the logical structure encompassing a start of frame bit, arbitration field, control field, data field, CRC field, acknowledge field, and end of frame sequence, the control field encompassing a data length code that contains an information item regarding the length of the data field. The method is characterized in that when a first marker (EDL) is present, the control field of the messages, divergently from ISO 11898-1, encompasses more than six bits; the first marker (EDL) being implemented by way of a recessive bit in the control field, and when the first marker is present, the recessive bit of the first marker (EDL) being followed, in all data messages, by at least one dominant bit. | 2014-09-11 |
20140258572 | PREEMPTIVE CONNECTION SWITCHING FOR SERIAL ATTACHED SMALL COMPUTER SYSTEM INTERFACE SYSTEMS - Methods and structure for preemptively terminating Serial Attached Small Computer System Interface connections are provided. One exemplary embodiment includes an expander comprising multiple physical links, switching circuitry able to establish connections between end devices coupled with the expander through the physical links, and a connection manager. The connection manager is able to process an Open Address Frame from an end device, and to determine that the Open Address Frame requests a connection through a physical link that is already servicing an established connection. The connection manager is further able to determine that the Open Address Frame requests a higher priority connection than the established connection, and to direct one of the end devices utilizing the established connection to terminate the established connection based on the higher priority. | 2014-09-11 |
20140258573 | SYSTEMS AND METHODS FOR MASTER ARBITRATION - A power system is provided. The power system includes a communications bus and a plurality of modules communicatively coupled to the communications bus. Each of the plurality of modules is configured to continuously monitor the communications bus, transmit a modulated signal at a predetermined frequency when the module detects an incoherent signal on the communications bus, become a master module when the module detects a coherent signal at the predetermined frequency on the communications bus, and cease transmitting the modulated signal when the coherent signal is not detected after a period of time. | 2014-09-11 |