38th week of 2014 patent applcation highlights part 216 |
Patent application number | Title | Published |
20140280805 | Two-Sided Declarative Configuration for Cloud Deployment - An example system for managing an application deployment in a cloud computing environment includes a configuration engine to receive an architectural declarative description of an application, a set of environments in which to deploy an instance of the application, and a user input that is specific to the instance. The architectural declarative description includes a declarative multi-node description for an application deployment. The configuration engine determines a desired state of the application deployment in accordance with the architectural declarative description. The example system includes a plurality of target deployment engines and a target selection engine to select a set of target deployment engines based on an environment. The set of target deployment engines communicates with one or more service providers to determine the available resources in the environment. The configuration engine determines whether the environment has sufficient resources to support the desired state based on available resources in the environment. | 2014-09-18 |
20140280806 | SYSTEM AND METHOD FOR A SELF SERVICE PORTAL AND AUTOMATION FOR INTERNALLY HOSTED VIRTUAL SERVER RESOURCES - A method and apparatus may provision a new computer code file as an update or a new application for end nodes of a cloud computing system. The method and apparatus may receive a computer code file at a repository server via a portal interface to an automation service. The computer code file may include a discrete file or package of files corresponding to a complete application or an update for an application for execution on cloud computing system nodes. The method and apparatus may also receive provisioning conditions at the automation service via the portal interface, send the computer code file to the cloud computing system end nodes based on the received provisioning conditions, and cause the sent computer code file to be installed on each of the plurality of cloud computing system end nodes. | 2014-09-18 |
20140280807 | SYSTEM FOR AND METHOD OF AUTOMATICALLY DISCOVERING AND CONFIGURING NIDS - A system for and method of automatic discovery and configuration of network interface devices is presented. A network interface device (NID) may be included a pre-configured maintenance entity end point (MEP), whereby upon use, the NID may begin sending at least one discovery message to a provider edge device, each discovery message including an organizationally unique identifier. The provider edge device may strip the discovery message(s) to determine the message content, which may then be forwarded to a NIS management system. The NID management system may then identify an identification number of the NID, determine where the NID is installed and send any configuration data to the NID via the provider edge device to configure the NID. | 2014-09-18 |
20140280808 | DYNAMIC ROUTING FRAMEWORK - A system to enable dynamic routing for one or more businesses, comprising: one or more servers to create one or more platforms corresponding to the one or more businesses, wherein each of the one or more platforms is associated with one or more routing configurations, and said associated one or more routing configurations based on one or more characteristics of said corresponding business. | 2014-09-18 |
20140280809 | REMOTE MANAGEMENT SYSTEM FOR CONFIGURING AND/OR CONTROLLING A COMPUTER NETWORK SWITCH - Methods and systems for remotely managing a switching device are provided. According to one embodiment the existence of a firewall security device within a network is automatically determined by a discovery module of a switching device. Upon determining the existence of the firewall security device, a command channel is established with the firewall security device by a communication module of the switching device. The switching device may then receive commands issued by the firewall security device through the command channel relating to configuration of one or more Virtual Local Area Networks (VLANs). | 2014-09-18 |
20140280810 | PROVIDING PRIVATE ACCESS TO NETWORK-ACCESSIBLE SERVICES - Techniques are described for managing communications for a managed virtual computer network overlaid on a distinct substrate computer network. The techniques may be used in situations in which a configurable network service provides managed virtual computer networks for clients and also provides one or more network-accessible services that are available to the managed virtual computer networks, with particular managed virtual computer networks being configured to provide local private access to at least one of the provided network-accessible services, despite those provided network-accessible services being located externally to the particular managed virtual computer networks. In some situations, a Lightweight Directory Access Protocol (“LDAP”) network-accessible service is provided, and a logical endpoint for the LDAP service is created within a managed virtual computer network to enable the multiple computing nodes of the managed virtual computer network to communicate with one or more LDAP computer servers from the LDAP service. | 2014-09-18 |
20140280811 | Enhanced Remote Presence - A mechanism is provided for enhancing remote presence capabilities. An update event for a main management module that manages a set of remote presence sessions for remote media established by a plurality of client systems is identified. A determination is made as to whether the main management module is currently maintaining a remote presence session for a remote media established by one of the plurality of client systems. Responsive to the main management module maintaining a remote presence session for the remote media, a handoff of the remote presence session for the remote media is initiated to an auxiliary management module. An update associated with the update event is then permitted to be performed on the main management module while maintaining the remote presence session for the remote media via the auxiliary management module. | 2014-09-18 |
20140280812 | Enhanced Remote Presence - A mechanism is provided for enhancing remote presence capabilities. An update event for a main management module that manages a set of remote presence sessions for remote media established by a plurality of client systems is identified. A determination is made as to whether the main management module is currently maintaining a remote presence session for a remote media established by one of the plurality of client systems. Responsive to the main management module maintaining a remote presence session for the remote media, a handoff of the remote presence session for the remote media is initiated to an auxiliary management module. An update associated with the update event is then permitted to be performed on the main management module while maintaining the remote presence session for the remote media via the auxiliary management module. | 2014-09-18 |
20140280813 | OPTIMIZING APPLICATION PERFORMANCE IN A NETWORK ENVIRONMENT - An example method for optimizing application performance in a network environment is provided and includes retrieving an L7 session identifier (ID) from a packet, generating a hash from at least the L7 session ID, and inserting the hash into a header of the packet. The L7 session ID identifies a particular application layer session between a client and a server in a network environment. The server includes a plurality of processors configured to process the packet, and the hash indicates a specific processor in the plurality of processors. | 2014-09-18 |
20140280814 | METHOD AND APPARATUS FOR IPMI-BRIDGE-SERVER FOR NON-IPMI DEVICES - Certain aspects of the present disclosure are directed to an IPMI bridge server configured to expand the management functions of an IPMI control system to a plurality of non-IPMI protocol specific managed devices. The IPMI bridge server includes: a processor, a network interface controller assigned with a network address; and a memory containing a firmware. When the firmware is executed at the processor, it is configured to be in communication with a group of first protocol specific managed devices through a first protocol control point and a first communication link, and a group of second protocol specific managed devices through a second protocol control point and a second communication link, and to receive management requests each for performing a protocol specific management function at one of the group of first protocol specific managed devices or the group of second protocol specific managed devices. | 2014-09-18 |
20140280815 | SYSTEMS FOR SELECTIVELY ENABLING AND DISABLING HARDWARE FEATURES - In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor. The logic is adapted to: define a hardware feature policy for one or more hardware components of a system; and enable and/or disable one or more hardware features of one or more of the hardware components based on the hardware feature policy, wherein the hardware feature policy comprises instructions to enable and/or disable access to the one or most hardware features based on one or more criteria selected from a group consisting of: a feature access schedule, a volume feature access group; a job feature access group; and an user feature access group. | 2014-09-18 |
20140280816 | BROWSER COOKIE ANALYSIS AND TARGETED CONTENT DELIVERY - Techniques are disclosed for collecting, analyzing and compiling information stored in browser cookies, and using such information to deliver web content targeted to a particular user or audience. A browser cookie is a data structure that is stored on a user's computer and that can contain information regarding that user's previous web browsing activity. In one embodiment, information collected from browser cookies is analyzed and compiled so as to allow such information to be selectively correlated with web content stored in a targeted content repository. For example, browser cookie data indicating that a user has visited websites that sell airline tickets may be correlated with a banner advertisement for travel insurance. Once such a correlation is established, the targeted content—for example, the aforementioned travel insurance advertisement—can subsequently be delivered to future website visitors whose computers store browser cookies containing data identified as being correlated with such targeted content. | 2014-09-18 |
20140280817 | SYSTEMS AND METHODS FOR MANAGING CONNECTIONS IN AN ORCHESTRATED NETWORK - An information handling system is provided. The information handling system includes a network infrastructure, the network infrastructure comprising a plurality of network switches in communication with a network controller and a first network server with a network orchestrator running thereon and generating network infrastructure requirements. The information handling system further includes a second network server that has a connection manager running thereon. The connection manager is configured to receive the network infrastructure requirements from the network orchestrator and to convert the specified network infrastructure requirements to instructions suited to the network controller. An associated method for facilitating communication between one or more network orchestrators and network infrastructure is also provided. The information handling system and associated method decouple the network orchestrator from the management of the network infrastructure. | 2014-09-18 |
20140280818 | DISTRIBUTED DATA CENTER TECHNOLOGY - A regional data center system corresponding to a particular region of the world. The data center system includes multiple data centers, each configured such that region-specific requests for services may be satisfied by any of the data centers. One or more of the data centers may also perform load balancing on received region-specific request. In order to perform load balancing, the receiving data center may itself process the requests, but in some cases may determine that the request is to be processed by another data center within the regional data center system. | 2014-09-18 |
20140280819 | THROTTLING GROUP IN ORACLE SERVICE BUS - A computer-controlled method can include creating a throttling group corresponding to a backend server configured to provide business services to multiple electronic devices over a service bus, defining a throttling group parameter for the throttling group, and routing messages based on the throttling group parameter. | 2014-09-18 |
20140280820 | Collective Operation Management In A Parallel Computer - Methods, apparatuses, and computer program products for collective operation management in a parallel computer are provided. Embodiments include a parallel computer having a plurality of compute nodes coupled for data communications over a data communications network. Embodiments include a first compute node entering a collective operation. Each compute node of the plurality of compute nodes is associated with the collective operation. In response to entering the collective operation, the first compute node decreases power consumption of the first compute node. | 2014-09-18 |
20140280821 | Method And Apparatus For Providing Tenant Redundancy - Various embodiments provide a method and apparatus for providing a tenant redundancy architecture that does not require reserving a complete set of duplicate resources, pushing complexity into the application domain or require the application to communicate simultaneously with two active tenant instances. In particular, a shadow tenant is created that has the functionality of the service tenant but is hidden from the rest of the network until activated. | 2014-09-18 |
20140280822 | SERVICE DIRECTORY FOR QUICK AND SIMPLIFIED APPLICATION IDENTIFICATION - Techniques for classifying a network flow using a service directory. Embodiments receive a request to establish a network flow with a remote service. The request specifies a network address associated with the remote service. A classification of the remote service is determined by querying a service directory using the network address and the port identifier. Embodiments also determine a network management policy to apply to the network flow, based on the determined classification. | 2014-09-18 |
20140280823 | WIRE-SPEED PENDING INTEREST TABLE - Various embodiments relate to a method performed by a router. The method may include: receiving, at a first line card of the router, a request for content having a content identifier; determining a second line card that is responsible for the content identifier; switching the request for content to the second line card; and updating a pending interest table at the second line card based on the request for content. Various embodiments relate to a router for content based routing that receives a plurality of requests for contents including a content identifier. The router may include: a fabric switch; and a plurality of line cards interconnected by the fabric switch, each line card includes a network processor and a pending interest table configured to store entries for a subset of the requests defined by the content identifier. | 2014-09-18 |
20140280824 | EFFICIENT CENTRALIZED STREAM INITIATION AND RETRY CONTROL - For efficient centralized stream initiation and retry control in a computing environment, using a centralized data streams management module for both managing when data streams should be opened and sent from a source location to a destination and for determining when to reattempt opening data streams sent from the source location to the destination after an nth number of consecutive failed attempts using an incrementing time calculation. The incrementing time calculation computes a dynamically calculated time period. | 2014-09-18 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 2014-09-18 |
20140280826 | PORT MEMBERSHIP TABLE PARTITIONING - A firmware model is provided for a shared port membership table that is partitioned for different needs of a distributed network switch, such as broadcast groups, multicast groups, ACL rules, and other port membership groupings. The shared port membership table enables a control point to set the size of each of the types of port membership information based on their usage or expected usage. By shrinking one partition, the control point is able to use the port group entries for a different partition of port group information. | 2014-09-18 |
20140280827 | SCALABLE DISTRIBUTED CONTROL PLANE FOR NETWORK SWITCHING SYSTEMS - In one embodiment, a networking system includes a physical switch and a scalable and distributed virtual control plane. The switch is adapted to receive a first packet, classify the first packet to produce a packet classification, generate a second packet based on the first packet, and forward the second packet. The scalable and distributed virtual control plane has a physical host server adapted to host a plurality of virtual machines (VMs), each VM providing a control plane for a particular protocol, and a network connecting the switch to the server. In addition, the plurality of VMs are adapted to receive the second packet, retrieve information about the first packet, handle processing of the first packet using the information to obtain forwarding information, encapsulate the first packet into a third packet including the forwarding information, and forward the third packet according to the forwarding information. | 2014-09-18 |
20140280828 | FEATURE LICENSE-RELATED REPAIR/REPLACEMENT PROCESSES AND CREDIT HANDLING - A system and method for issuing a license for a device through a license server is provided. A server receives identification information for a device that communicates to the server if a first license binding identity and/or a first display identity has changed. A previous license for the device is revoked and a previous license credit is returned to a user's credit pool if the first license binding identity and/or the first display identity has changed. A license request is received, which includes a second license binding identity identifying the device. If the second license binding identity is the same as the first license binding identity, the previous license for the device is issued. If the second license binding identity is not the same as the first license binding identity, a new license for the device is issued and a new license credit is deducted from the user's credit pool. | 2014-09-18 |
20140280829 | DEVICE AND RELATED METHOD FOR DYNAMIC TRAFFIC MIRRORING - A function is provided in a network system for the dynamic mirroring of network traffic for a variety of purposes including the identification of characteristics of the traffic. Multiple criteria are established for when, what and where to mirror the traffic. The criteria include what frames of traffic to mirror, what portions of the selected frames to mirror, one or more portals through which to mirror the selected frames, a destination for the mirroring and the establishment of a mirror in a device to carry out the mirroring. The criteria may also include when to stop the mirroring. The mirroring instructions can be changed based on the detection of a triggering event, such as authentication, device type or status, ownership of an attached function attached to the device, flow status, but not limited to that. The function may be established in one or more devices of the network. | 2014-09-18 |
20140280830 | ORCHESTRATING MOBILE DATA NETWORKS IN A NETWORK ENVIRONMENT - A method is provided in one example and includes receiving a request for a service from a requestor, an determining at least a first network element and at least a second network element required to satisfy the request from among a plurality of network elements. The method further includes triggering a coordinating of a work flow between the first network element and the second network element responsive to the request. The method still further includes translating communication messages exchanged between the first network element and the second network element from a first communication protocol format and a second communication protocol format. | 2014-09-18 |
20140280831 | SAMPLE DRIVEN VISUAL PROGRAMMING SYSTEM FOR NETWORK MANAGEMENT - Methods and system for sample-driven visual programming system. A Parser Utility and a Trigger Utility are provided. The Parser is defined based on a sample output from a device in real time, and data are parsed into a set of variables. The Trigger Utility visually displays the set of variables and automatically encodes a set of logic loops to analyze the data. A network engineer is therefore liberated from writing scripts for network data analysis. A system is provided to run in debugging mode for visually debugging the automatically generated programs. | 2014-09-18 |
20140280832 | System and Method of Updating Modules for Application or Content Identification - Expertise, for performing classification of a type of network traffic, can be encapsulated in a module. A set of modules, as currently available to a traffic controller, can be referred to as a collection. An improved process, for updating a collection of modules, is presented. A traffic controller can have two or more locations, each storing a module collection. While an old collection remains active, a new collection can be loaded. Once the new collection is loaded, transitioning can be undertaken, on a session-by-session basis that keeps a traffic controller active, from the old collection to the new collection. | 2014-09-18 |
20140280833 | SYSTEM AND METHOD FOR EFFICIENTLY MANAGING NETWORK CHANGES - Methods and system for managing network changes. A network change cycle is divided into a multi-stage cascade of events. User interfaces are provided to define and manage each stage of events. Before a change is executed, a network state is benchmarked. Change results are saved into various data folders for comparison. Rollback utilities are provided to rollback the change to a particular event in a timeline. | 2014-09-18 |
20140280834 | PROGRAMMABLE MANAGEMENT ENGINE FOR NETWORKS - A network node may contain a virtual software-defined networking (SDN) switch and a local a management engine (e.g., a software application) for generating performance metrics based on received management plane traffic. Specifically, the virtual SDN switch may identify and forward received management plane traffic to the local management engine. In turn, the management engine evaluates the management plane traffic to generate performance metrics without forwarding the management plane packets to the remote SDN controller. The management engine may compare the metrics to one or more thresholds to determine the current state or health of the data paths in a network. If a threshold is exceeded, the management engine may transmit an alert to the virtual SDN switch to perform a corrective action—e.g., using a backup data path after the primary data path fails. | 2014-09-18 |
20140280835 | EXTENDING ROUTING RULES FROM EXTERNAL SERVICES - Techniques are disclosed to extend routing rules from external services. A request is received to modify a specified rule in a network element of a network. The specified rule governs disposition of a network flow specific to an application. The request is received via a communications channel configured to expose an application programming interface (API) to the application. The request is interpreted at a network abstraction layer of the network element. The request is converted into a command at a service implementation layer of the network element. The command is executed to modify the specified rule in the network element, responsive to the request. | 2014-09-18 |
20140280836 | WORKLOAD BASED SERVICE CHAIN INSERTION IN A NETWORK ENVIRONMENT - An example method for workload based service chain insertion in a network environment is provided and includes partitioning a service-path into fragments at a service controller, where the service-path comprises an ordered sequence of services to be provided to a packet associated with a workload in a network. The method also includes determining a location of service nodes providing the services; and provisioning the fragments at interfaces at a distributed virtual switch. The method could further include generating a plurality of service insertion points corresponding to the fragments at a service dispatcher. The service dispatcher can include a plurality of data plane components, and the service insertion points are generated at the data plane components. | 2014-09-18 |
20140280837 | DYNAMIC SCALABLE BASEBOARD MANAGEMENT CONTROLLER STACKS ON SINGLE HARDWARE STRUCTURE - Certain aspects of the present disclosure are directed to a baseboard management controller (BMC) managing a computer system including N computer nodes and N is an integer greater than 1. The BMC has: (a) a processor, (b) a first communication interface controller, (c) a memory. The memory stores a firmware, and the firmware is executed by a processor of the BMC. The firmware, when executed by the processor, is configured to (a) dynamically obtain the value of N, and (b) initiate N virtual BMC stacks each managing at least one health or performance related aspect of a respective one of the N computer nodes. The first and second virtual BMC stacks of the N virtual BMC stacks communicate, through the first communication interface controller, with the first and second computer nodes of the N computer nodes, respectively. | 2014-09-18 |
20140280838 | APPLICATION HINTS FOR NETWORK ACTION - A user application may provide a hint which may be used by a compute device to select a tag to be inserted into the packets generated by the user application. Upon some event, the application transmits a hint associated with a network flow generated by the user application to a stack associated with the computing device. One of the layers of the stack—e.g., the operating system in the computing device—may include a hint database that contains rules for selecting tags using a received hint as input. The layer may then insert the tag into one or more packets of the network flow. When processing the packet, network devices in the SDN enabled network recognize the tag and perform an action corresponding to the tag. | 2014-09-18 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 2014-09-18 |
20140280840 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A UNIVERSAL PERSISTENCE CLOUD SERVICE - Methods, systems, and computer program products that relate to managing persistence information of client devices for services registered with a persistence cloud service. A method from the perspective of a computing device associated with a registered service may include receiving, from a client device, a device identifier that identifies the client device to the registered service. The method further may include requesting, from a persistence cloud server associated with the persistence cloud service, persistence information associated with the device identifier. The method may also include receiving the persistence information, determining a level of service to provide to the client device based on the persistence information, and providing the level of service to the client device. The computing device may, for example, be a server associated with the registered service, or may, for example, be a router. | 2014-09-18 |
20140280841 | SCALABLE DISTRIBUTED CONTROL PLANE FOR NETWORK SWITCHING SYSTEMS - Various aspects relate to processing a first networking packet within a networking system. In one embodiment, a first networking packet is received and classified to produce a packet classification. A second networking packet is generated based on the first networking packet, and forwarded. The second networking packet is received using a physical host server, where the physical host server is adapted to host a plurality of virtual machines (VMs), each VM being configured to provide a control plane for a particular protocol. The second networking packet is received and decapsulated using a VM hosted by the physical host server to retrieve information about the first networking packet. Using the VM, the first networking packet is processed using the information about the first networking packet to obtain forwarding information. Using the VM, the first networking packet is encapsulated into a third networking packet comprising the forwarding information; and forwarded. | 2014-09-18 |
20140280842 | METHODS FOR SELECTIVELY ENABLING AND DISABLING HARDWARE FEATURES - In one embodiment, a method includes defining a hardware feature policy for one or more hardware components of a system; and enabling and/or disabling one or more hardware features of one or more of the hardware components based on the hardware feature policy, where the hardware feature policy comprises instructions to enable and/or disable access to the one or more hardware features based on one or more criteria selected from the group consisting of: a feature access schedule; a volume feature access group; a job feature access group; and an user feature access group. | 2014-09-18 |
20140280843 | PUSH SIGNALING TO RUN JOBS ON AVAILABLE SERVERS - Embodiments are directed towards push signaling to run jobs on available servers. Users may provide jobs or job instructions to a job control node. Job control node may determine one or more available job target nodes from among a plurality of managed nodes associated with the job control node. The job target nodes may be determined based on information included in the provided job instructions. If there are available job target nodes, the job control node may provide the job instructions to each available job target node. Further, the job control node may receive communications from one or more available job target nodes that indicates that the job target node is prepared and ready to execute the received job instructions. Next, the job control node may issue a job start command that triggers the prepared job target nodes to begin executing the provided job instructions. | 2014-09-18 |
20140280844 | FAST VIRTUAL MEDIA KVM SYSTEM - A keyboard-mouse-video (KVM) system. The system includes a KVM switch having a first controller; a ROC unit having a second controller; and a cable which connects the ROC unit to the KVM switch, the cable having four pairs of wires. The first controller is configured to transmit and the second controller is configured to receive an Ethernet signal using a first pair of wires. The second controller is configured to transmit and the first controller is configured to receive a serial signal using a second pair of wires. | 2014-09-18 |
20140280845 | METHOD AND SYSTEM FOR REGISTERING SOFTWARE SYSTEMS IN DATA-SHARING SESSIONS - A method for registering software systems in data-sharing sessions is provided. A set of data-sharing session definitions are stored in storage of a computer system, each of said data-sharing session definitions identifying a set of software system types permitted to participate in data-sharing sessions governed by the data-sharing session definition. A participant registration request is received from a first software system. A priority value is determined, via the computer system for the participant registration request, for each of a first subset of the data-sharing session definitions. The first software system is registered in one of the data-sharing sessions governed by one of the data-sharing session definitions selected at least partially based on the priority values. | 2014-09-18 |
20140280846 | SYSTEM AND METHOD FOR ABSTRACTING NETWORK POLICY FROM PHYSICAL INTERFACES AND CREATING PORTABLE NETWORK POLICY - A method and apparatus of a device that determines a network policy for an attached device based on one or more characteristics of the attached device is described. In one example, a network element detects a device on a port coupled to a link connecting the network element and the device. In response to the detecting of the device on the port, the network element further determines a device configuration signature from the device, where the device configuration signature based on a configuration of the device. The network element additionally determines a port-based network policy based on the device configuration signature. The network element applies the port-based network policy to the port, wherein the network element applies the port-based network policy to process network data communicated through the port. | 2014-09-18 |
20140280847 | BANDWIDTH MANAGEMENT BASED ON PROFILES - Bandwidth management based on profiles is provided. A requesting user using a user device may submit a request concerning access to an application or media file hosted or provided by a content provider. A profile associated with the requested application or media file may be accessed. Such a profile provides information regarding consumption of bandwidth throughout a time period of usage associated with the requested application or media file. Bandwidth requirements associated with the request may be determined based on the profile information, and bandwidth consumption by the user device may be managed based on the bandwidth requirements determined for the requested application or media file and available network bandwidth. | 2014-09-18 |
20140280848 | CLOUD SERVICE BUS AND CLOUD SERVICES BROKERAGE PLATFORM COMPRISING SAME - A cloud service integration structure of a cloud services brokering platform comprises a workflow engine and plurality of provisioning adapters. The workflow engine is configured to support workflow definitions for cloud services of various types and for cloud service providers each offering one or more of the cloud services. The plurality of provisioning adapters are each configured for integrating with one or more of the cloud service providers to enable tasks required for provisioning of the cloud services to be performed therewith. | 2014-09-18 |
20140280849 | SYSTEMS AND METHODS FOR MULTI-TENANT GENERIC TOP LEVEL DOMAIN DEPLOYMENT - A computer implemented method of providing registry services is disclosed. The method includes identifying one or more top level domains to be serviced; creating, by a processor, a TLD group for the one or more top level domains, wherein top level domains in the TLD group share at least one characteristic; provisioning the one or more top level domains; and registering the one or more top level domains with the TLD group. | 2014-09-18 |
20140280850 | Collaborative State Machine Management - An engine within a system capable of instantiating a state machine used to monitor an associated legacy device. The engine can instantiate state machine variables related to desired characteristics and derive values for the variables based on an analog signal received from the legacy device. In order to cause the state machine to transition to a new state, the engine must obtain information from a different engine to complete the necessary transition criteria. | 2014-09-18 |
20140280851 | COMPLEX SYSTEM FUNCTION STATUS DIAGNOSIS AND PRESENTATION - Status of complex system functions is diagnosed and reported by analyzing traffic on a data network of the complex system. The network traffic may be placed on the data network by systems that perform functions for the complex system. A user may make a view selection via a remote user interface. The view selection identifies rules for determining a status of a selected subset of the functions or a status of selected ones of the functions for a selected state of operation, such as during initial power-up. The status of the functions may be determined from the network traffic using the rules and presented to the user via the user interface. The user may interact with the presentation to make different view selections. Multiple different view selections made via multiple different user interfaces may be supported simultaneously. | 2014-09-18 |
20140280852 | EVENT QUEUING AND DISTRIBUTION SYSTEM - A REST-based event distribution system is described, with particular applicability to the distribution of distributed filesystem notifications over a high-latency best-effort network such as the Internet. In one embodiment, event channels are mapped to URL spaces and created and distributed through the use of HTTP POST and GET requests. The system is optimized for short polling by clients; an event history is maintained to buffer messages and maintain the idempotence of requests. In another embodiment, the events are registered as a SIP event pack allowing for the distribution of filesystem events. | 2014-09-18 |
20140280853 | Mobile Broadband Device and Method for Processing Mobile Broadband Service of the Mobile Broadband Device - A mobile broadband device and a method for processing a mobile broadband service of the mobile broadband device. The mobile broadband device includes a Web application module and a Web server module. The Web application module is configured to provide a management interface of the mobile broadband device, receive a command input by a user, and generate a device management request message complying with a Web management interface. The Web server module is configured to parse the device management request message, and make a response. With this architecture, the mobile broadband device can adapt to the requirement of a user better and faster. | 2014-09-18 |
20140280854 | System for Managing Service Interactions - A system is described for managing service interactions in a combined service. The system comprises a first service delivery means for providing a first service, a second service delivery means for providing a second service, a combined service delivery means for providing a combined service capable of associating the first service to one of the second service. The combined service is implemented using a combined state model, which comprises a predetermined number of combined states formed on the basis of the states of the first and the second service and armed detection points for detecting predetermined transitions between the combined states. The combined service delivery means further comprises a combined state manager adapted to transmit a control signal to the first and/or the second service delivery means for inducing a predetermined state transition in the respective first and/or the second service in response to the activation of an armed detection point. | 2014-09-18 |
20140280855 | GENERIC SNMP INFORMATION COLLECTION - The present invention provides a technique to define objects and object instances in a dynamically modifiable table within the confines of a management information base definition. With the invention, new objects and object instances may be added to the table without changing the management information base definition at a managed device or network management system. The managed device can change the table, yet allow the network management system to access the table using an associated object identifier. The network management system can systematically step through the various objects or object instances, which may correspond to rows and columns of the table, to detect additions or modifications to the table. The various objects and object instances in the table may be individually accessed, once identified, using a unique object identifier. | 2014-09-18 |
20140280856 | ENFORCING CONTEXT MODEL BASED SERVICE-ORIENTED ARCHITECTURE POLICIES AND POLICY ENGINE - Instance documents related to policy enforcement are gathered according to a business requirement. The instance documents are instantiated from corresponding schema documents. An instantiated context model, including references to the gathered instance documents, is generated from a context model definition. A policy set to be enforced using the instantiated context model is generated according to the gathered instance documents. An enforcement sequence of policies in the policy set is determined. The policies are applied to the instantiated context model according to the enforcement sequence. | 2014-09-18 |
20140280857 | Method, Network Adapter, Host System, and Network Device for Implementing Network Adapter Offload Function - A method, a network adapter, a host system, and a network device for implementing a network adapter offload function. If a data packet received by the network adapter or the host system is a data packet unknown to the network adapter, the data packet unknown to the network adapter is parsed, a new policy entry is generated, and the new policy entry is updated into the host policy table and the network adapter policy table. Therefore, for a packet that includes a new proprietary or standard protocol header Tag, only a functional module that parses the packet needs to be updated, so that the functional module is capable of processing such a packet and delivering a new policy entry to the host policy table and the network adapter policy table and the network adapter does not need to be changed. | 2014-09-18 |
20140280858 | METHOD FOR ADDRESSING MANAGEMENT OBJECT IN MANAGEMENT TREE AND ASSOCIATED DEVICE MANAGEMENT SYSTEM - A method for addressing a management object in a management tree of a device management (DM) client and an associated DM system are disclosed to solve the issues encountered in the relative universal resource identifier (URI) addressing of the OMA DM protocol. The method comprises receiving a relative URI including a first part from a DM server, and identifying a root node of the management object according to the first part. The first part comprises a URI parameter for specifying a root node of a sub-tree of the management tree for finding the management object, a management object identifier, and a plurality of attribute conditions for specifying values of a plurality of leaf nodes directly under the root node of the management object. | 2014-09-18 |
20140280859 | SHARING CONTROL SYSTEM AND METHOD FOR NETWORK RESOURCES DOWNLOAD INFORMATION - A system and method to control sharing network resources download information may include a microblog sharing interface server, a sharing resources database, and a transfer server. A network resource may be received and a corresponding unique identifier may be obtained by the microblog sharing interface server. A download link entry address may be generated and posted to a microblog. The unique identifier of the network resource may be stored in the sharing resources database. The transfer server allow downloading the network resource based on corresponding download control conditions obtained from the sharing resources database using the unique identifier in the download link entry address. The source download link address of the network resource may be obtained based on the unique identifier if downloading is allowed and the source download link address sent to the client. Thus risks associated with transmission of the network resource download information may be effectively controlled. | 2014-09-18 |
20140280860 | METHOD AND SYSTEM FOR SIGNAL CATEGORIZATION FOR MONITORING AND DETECTING HEALTH CHANGES IN A DATABASE SYSTEM - A method for generating instructions for a monitoring facility. The method includes obtaining a signal from a data server, where the data server is monitored by the monitoring facility using a task, identifying a signal characteristic of the signal, and determining a first category for the signal based on the signal characteristic. The method further includes identifying a first signal processing tool for the signal based on the task and the first category and instructing the monitoring facility to perform the task by applying the first signal processing tool to the signal. | 2014-09-18 |
20140280861 | DYNAMICALLY LAUNCHING INTER-DEPENDENT APPLICATIONS BASED ON USER BEHAVIOR - A computer system identifies a pattern of usage of the computer system by a first user, wherein the identified pattern of usage comprises of a first and a second step. The computer system determines the number of times that the first user performs the steps of the identified pattern of usage surpasses a first threshold value. The computer system creates an automation so that each time the first user performs the first step of the identified pattern of usage, the computer system performs the second step of the identified pattern of usage. | 2014-09-18 |
20140280862 | LONG TERM METRICS APPLIED TO MULTIVARIATE TESTING - Embodiments provide techniques for testing a plurality of variations of a user experience on a subscription-based online site, where each of the plurality of variations is distinct from other variations in the plurality of variations. Each of a plurality of users is assigned to one of the plurality of variations. For each of a plurality of user requests received during a predetermined window of time, embodiments determine one of the plurality of variations for use in processing the user request, based on a user associated with the user request, and process the respective user request using the determined variation. Long-term user metric information relating to subscription services for the subscription-based online site is determined, with respect to the plurality of users. Embodiments then rate at least one of the plurality of variations, based on the determined long-term user metric information. | 2014-09-18 |
20140280863 | Consumer Device Intelligent Connect - A method and system provides a Consumer Device Intelligent Connect (CDIC) to create awareness of presence of multiple devices with the user under-one-roof or on-the-move is disclosed. The method disclosed enables the user to pre-register the devices on a user database of a CDIC server. The CDIC server identifies active devices in the communication network along with their geographical locations, from the list of pre-registered devices. The CDIC server then intelligently processes the stored information and provides this information to the media server. The information provided by CDIC server enables media servers to develop user interactivity, deploy monetization services such as advertizing, user feedback and so on using the ubiquitous multiple devices of the user. | 2014-09-18 |
20140280864 | Methods of Representing Software Defined Networking-Based Multiple Layer Network Topology Views - A method for network control, comprising receiving a request for a network view from an application at a Software Defined Network (SDN) controller, creating a network view from a network map, wherein the network map comprises a representation of a plurality of network devices and network paths in a SDN-based multiple layer network, and wherein the network view comprises at least a portion of the devices or paths in the network map, and sharing the network view with the application. | 2014-09-18 |
20140280865 | NETWORK-PROXIMITY-BASED EVENTING - In one embodiment, a network device detects a proximity state change of a mobile device in relation to the detecting network device, and compares the state change and mobile device to a set of configured policies. Based on one or more particular policies matching the state change and the mobile device, the network device may then perform one or more configured actions. | 2014-09-18 |
20140280866 | SCALABLE LOAD BALANCING - Various exemplary embodiments relate to a method and related network node including one or more of the following: receiving, by a load balancer, a plurality of metric values from a plurality of servers; calculating an average metric value based on the plurality of metric values; calculating a first error value based on the average metric value and a first metric value of the plurality of metric values; generating a first integral value by incorporating the first error value into a first previous integral value; and generating a first preference value for a first server of the plurality of servers based on the first integral value. | 2014-09-18 |
20140280867 | ANALYTIC INJECTION - Techniques for inserting analytic logic into network requests are presented. In an embodiment, instructions are dynamically inserted into web pages as the pages are requested. The instructions enable analytics to be captured and/or tracked when the web pages are processed. In another embodiment, web requests are intercepted and processed to include analytic instructions. | 2014-09-18 |
20140280868 | RATE REDUCTION FOR AN APPLICATION CONTROLLER - Rate reduction for an application controller is provided. Computing resources used by an application controller receiving an amount of traffic from a network device can be determined. A determination whether the computing resources used by the application controller are approaching a computing capacity of the application controller can be made. A message can be sent to the network device to reduce the amount of traffic sent to the application controller in response to a determination that the application controller is approaching the computing capacity. A reduced amount of traffic can be received from the network device. Incrementally increasing amounts of traffic can be received from the network device after receiving the reduced amount of traffic from the network device. | 2014-09-18 |
20140280869 | Management of Delivery of Multimedia Components - Systems, methods, apparatuses, and computer readable media may be configured for establishing at least one session for delivery of multimedia. In an aspect, a first transmission of data fragments of a first component and a second transmission of data fragments of a second component may be transmitted and synchronized for presentation. If an inactivity event is detected the session may be maintained while reducing bandwidth consumption. | 2014-09-18 |
20140280870 | PROTECTION OF SENSITIVE DATA OF A USER FROM BEING UTILIZED BY WEB SERVICES - Systems and methods for preventing web services from using sensitive data in customizing web pages for a user. In one embodiment, a protection system is implemented between the user and the web service. The protection system identifies past interactions of the user with the web service, identifies text in the past interactions between the user and the web service, and identifies subjects discussed in the text. The protection system then communicates with the user to determine which of the subjects are sensitive to the user, and deletes a history stored by the web service for the user that relates to the sensitive subjects. | 2014-09-18 |
20140280871 | CORRELATION OF ACTIVITIES ACROSS A DISTRIBUTED SYSTEM - A method and system for tracking activities relating to a common transaction executed across multiple services of a distributed computing environment. An aggregator receives intra-service activity information from collectors associated with a first service and a second service of the distributed computing environment. The aggregator identifies a first inter-service communication correlation linking the intra-service activity information of the first service to a first inter-service message. The aggregator further identifies a second inter-service communication correlation linking the intra-service activity information of the second service to the second inter-service message. The aggregator identifies an inter-service communication correlation linking the first inter-service message with the second inter-service message and associates the intra-service activity of the first service with the intra-service activity of the second service using the inter-service communication correlation. | 2014-09-18 |
20140280872 | INVENTORY SERVICE FOR DISTRIBUTED INFRASTRUCTURE - Disclosed are various embodiments for an inventory application. Machine instances execute a monitoring service to determine the process names of applications executed in the machine instance. An inventory application identifies the applications executed on the machine instances as a function of data obtained from the monitoring services. Analytics reports can be generated from data embodying the identified applications. | 2014-09-18 |
20140280873 | INFERRING APPLICATION INVENTORY - Disclosed are various embodiments for an application inventory application. Computing resource usage data and configuration data is obtained for machine instances executed in a cloud computing architecture. The usage data and configuration data are used as factors to identify applications executed in the machine instance. Reports embodying the application identifications are generated. | 2014-09-18 |
20140280874 | METHODS AND APPARATUS TO MONITOR MEDIA PRESENTATIONS - Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes collecting demographic information from a user. The demographic information is transmitted to a central facility. A panelist identifier identifying the user is generated. The panelist identifier is stored in a shared memory of the media device, the panelist identifier to be retrieved by a monitoring enabled application, the monitoring enabled application to collect monitoring information if the panelist identifier is in the shared memory and to disable collection of the media monitoring information if the panelist identifier is not in the shared memory. | 2014-09-18 |
20140280875 | SYSTEM AND METHOD FOR NETWORK ELEMENT MANAGEMENT - A system and method for network element management includes a management window, a scroll buffer configured to store commands and responses, a console pane displayed in the management window and displaying a portion of the scroll buffer, and data structures. The system connects to a network element associated with network objects using a network, accept commands in the console pane, parse the commands, send the commands to the network element, receive and parse responses from the network element, update the data structures based on the commands and responses, create hot spots in the scroll buffer based on the commands and responses, spawn a GUI dialog based on a first network object associated with a first hot spot when the first hot spot is activated, and provide copies of first data structures selected from the data structures to the GUI dialog. The first data structures are associated with the first network object. | 2014-09-18 |
20140280876 | Custom Content Insertion For User Groups - Methods and systems for providing content to communication session participants are disclosed. In exemplary methods, at least one source can be monitored. Content relevant to a communication session having one or more participants can be identified from the at least one source. Additionally, the content can be provided as a part of the communication session in a format compatible with the communication session. | 2014-09-18 |
20140280877 | Providing Actionable Content to a Computing Device Based on User Actions - Methods and apparatus related to identifying content accessed on a computing device that is likely actionable on another computing device. Some implementations are directed to methods and apparatus for identifying a computing device of a user, identifying content accessed on another computing device by the user, determining content that is actionable on the computing device, determining a confidence level that the actionable content is of interest to the user, and providing the actionable content for use on the computing device if the confidence level satisfies a threshold. The confidence level may be based on an indication of time passage between the user accessing the content on the other computing device and the identified use of the computing device. | 2014-09-18 |
20140280878 | APPARATUS AND METHODS FOR MANAGING SERVICE DELIVERY TELEMETRY - Apparatus and methods for managing service delivery quality levels and telemetry. In one embodiment, an entity (such as a Session Resource Manager or SRM) receives network layout data from the network. The SRM uses the layout data to generate a mapping of the network. The SRM also receives performance data related to the interconnections of the network. The performance data is then applied to the mapping such that, in one variant, an visual overlay showing network flow and/or performance analytics is created. Based on this mapping showing layout and corresponding performance, the SRM generates rules for delivery of services. The rules may detail preferred routes and service level information. The rules are the distributed to nodes along the delivery route and delivery is executed in compliance with the rules. | 2014-09-18 |
20140280879 | Detecting User Interest in Presented Media Items by Observing Volume Change Events - In accordance with some implementations, a method for estimating user interest in media content is disclosed. The method is performed on a server system having one or more processors and memory storing one or more programs for execution by the one or more processors. The server system receives a volume change event from a client system. The server system determines identification of a presented media content item currently being presented at the client system. The server system analyzes the received volume change event to determine a level of user interest in the determined media content item. | 2014-09-18 |
20140280880 | Fast OLAP for Real User Measurement of Website Performance - A method for real-time capture and analysis of website performance metrics includes receiving, in each of a plurality of result servers, data values transmitted from a plurality of client devices, each data value representing a measurement of a performance metric associated with an experience of a user on a web page or using a web application, the measurement being made and the data value produced being transmitted in real-time while the user is on the web page or using the web application. For each data value received, a count in one of a set of N data buckets defined in a memory is incremented. All of the counts in each of the corresponding data buckets is aggregated to produce a histogram of the performance metric is rendered on an analytic dashboard. | 2014-09-18 |
20140280881 | USING LATENCY AND ROUTE INFORMATION TO ESTIMATE LOCATION - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining geographical locations of devices. One of the methods includes obtaining a first network address of a first device; obtaining first route information associated with at least one data transmission between the first source network address and a first network address; obtaining a second network address associated with a second device; obtaining second route information associated with at least one data transmission between a second source network address and the second network address; obtaining an estimate for geographical location of the second device; determining a first latency distance between the first network address and the second network address based on the first and second route information; and estimating a geographical location of the first device based on the estimate for geographical location of the second device and the first latency distance. | 2014-09-18 |
20140280882 | SYNCHRONIZATION AND ROUTING OF COMPONENTS AND DATA - A change associated with a component or entry in a data store is identified. A subscription registry is polled to determine which of a plurality of entities have subscriptions associated with the identified change. Using connection information, a synchronization operation at each of the determined entities is initiated to reflect the identified change. The change may include one or more of: a change to a server connected to a network, a change to a medical device connected to a network, a change to a software component residing on one or more medical devices, and/or a change to a data store subscribed to by at least one of one or more servers and one or more medical devices. The plurality of entities may include one or more of an infusion pump, a vital signs monitor, and a ventilator. Related apparatus, systems, techniques, articles, and computer readable media are also described. | 2014-09-18 |
20140280883 | Secure URL update for HTTP redirects - A technique to update URLs is provided in an HTTP-based client upon receipt of an HTTP redirect in response to a request-URI. One or more references to the request-URI are saved in or in association with the client. Upon receipt of an HTTP 301 (permanent) redirect, the client automatically re-links the one or more stored references to the request-URI to one or more new references returned by the server (as identified in the HTTP redirect) when the redirect can be verified to originate from the application to which the client is attempting to connect. Preferably, the automatic re-linking is accomplished using a link editing capability for permanent (e.g., HTTP 301) redirects. | 2014-09-18 |
20140280884 | NETWORK TRAFFIC MAPPING AND PERFORMANCE ANALYSIS - An overlay network analysis method obtains data including but not limited to client packet traffic data on an overlay network, and performs one or more analyses based on the obtained data to generate and output topological and/or performance information for the overlay network and/or the network substrate on which the overlay network is implemented. Client traffic data collected for specific client resource instances may be analyzed to generate performance metrics for the overlay network between the instances. Aggregated client traffic data for specific clients may also be analyzed to generate mappings of the clients' private network implementations on the overlay network, as well as performance metrics for the clients' private networks on the overlay network. In addition, client traffic data from multiple clients may be aggregated and analyzed to generate mappings and performance metrics for the overlay network as a whole. | 2014-09-18 |
20140280885 | FLOW CONTROL TRANSMISSION - An example of flow control transmission can comprise receiving a transmission instruction at a transmitter. Data can be sent from the transmitter at a rate of transmission based on the transmission instruction. A rate of transmission can be monitored over a time interval to determine a difference between a minimum rate of transmission and the monitored rate of transmission over the time interval. The transmission instruction can be overridden and data released to maintain the minimum rate of transmission based on the monitored difference. | 2014-09-18 |
20140280886 | CONSOLIDATED PERFORMANCE METRIC ANALYSIS - Performance metrics may be received from multiple data processing elements associated with a performance metric domain and a consolidated performance metric may be determined. Grouping the performance metrics into performance metric groups may be performed based on their respective associations with different aspects of the data processing elements. | 2014-09-18 |
20140280887 | A DEVICE AND RELATED METHOD FOR DYNAMIC TRAFFIC MIRRORING POLICY - A function is provided in a network system for policy-based dynamic mirroring for network traffic. The function monitors events, topology and status of the network and installs, enables, selects or changes traffic mirrors associated with the operation of one or more devices of the network. The mirror policies are established based on network polices and/or rules. The mirror policies and the enablement, installation, selection or changing of them are based on multiple criteria. The function provides for the selection of traffic to mirror, how much of it to mirror, where to mirror it and when to stop the mirroring. The function may be established in network entry devices as well as core switching devices of the network. The function can select portals for the mirroring activity and can secure the mirroring. | 2014-09-18 |
20140280888 | Methods, Apparatus and Articles of Manufacture to Monitor Media Devices - Methods, apparatus, systems and articles of manufacture to monitor media devices are disclosed. An example method includes causing a removable storage device to store an identifier associated with a panelist, the removable storage device having a part to be removably coupled to a data port of a media device; providing the removable storage device to the panelist; and providing an application to be executed by the media device with a first instruction to, in response to the application detecting an event associated with the application, retrieve the identifier from the data port of the media device executing the application. | 2014-09-18 |
20140280889 | SYSTEM AND RELATED METHOD FOR NETWORK MONITORING AND CONTROL BASED ON APPLICATIONS - A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control. | 2014-09-18 |
20140280890 | METHOD AND SYSTEM FOR MEASURING USER ENGAGEMENT USING SCROLL DWELL TIME - Method, system, and programs for measuring user engagement. In one example, a type of user activities with respect to a plurality pieces of content is detected. Information associated with the type of user activities is recorded. A time measure associated with at least one of the plurality pieces of content is obtained based on the recorded information. A user engagement score with respect to the at least one piece of content is calculated based on the time measure. | 2014-09-18 |
20140280891 | DETERMINING AUDIENCE REACH FOR INTERNET MEDIA - A disclosed example involves accessing an initial average unique web browser reach corresponding to a first duration, an initial average internet media impressions-per-user frequency corresponding to the first duration, an initial average unique web browser reach corresponding to a second duration, and an initial average internet media impressions-per-user frequency corresponding to the second duration. A probability model is used to determine an adjusted internet media audience reach corresponding to the first duration based on the initial average unique web browser reach corresponding to the first duration, the initial average internet media impressions-per-user frequency corresponding to the first duration, the initial average unique web browser reach corresponding to the second duration, and the initial average impressions-per-user frequency corresponding to the second duration. The adjusted internet media audience reach corresponding to the first duration has less audience duplication than the initial average unique web browser reach corresponding to the first duration. | 2014-09-18 |
20140280892 | Methods and Computer Program Products for Transaction Analysis of Network Traffic in a Network Device - Provided are methods and computer program products for analyzing and tracing the contents of network traffic in a network device and to help identify network performance issues. Methods for analyzing traffic include identifying thread identifiers associated with transactions, determining related events, and associating similar transactions and events into an aggregated list of transactions. Methods of tracing transactions include identifying thread identifiers associated with transactions and related events and serializing events into a serialized list of events to facilitate tracing single transactions. | 2014-09-18 |
20140280893 | SUPPORTING PROGRAMMABILITY FOR ARBITRARY EVENTS IN A SOFTWARE DEFINED NETWORKING ENVIRONMNET - Techniques are disclosed for using arbitrary criteria to define events occurring within a network infrastructure, as well and techniques for detecting and responding to the occurrence of such custom events. Doing so allows a collection of networking elements (switches, routers, etc.) to perform a variety of distributed functions from within the network itself to respond to custom events. Further, because custom events are published across the network, multiple network elements can communicate and respond to the same event. Thus, unlike currently available event management systems, custom events (and responding applications) can be used to create and coordinate software defined networking within a common network infrastructure. | 2014-09-18 |
20140280894 | Methods and Computer Program Products for Transaction Relationships Between Application Servers - Provided are methods and computer program products for analyzing transactions across a network and to help identify network performance issues. Methods for analyzing traffic include identifying an outbound transaction and a related transaction type, and identifying candidate inbound transactions that have the same transaction type as the transaction type of the outbound transaction. One or more transaction data parameters may be selected that correspond to the outbound or inbound transactions. Candidate transactions may be determined to be related to the outbound transaction based on one or more transaction data parameters. | 2014-09-18 |
20140280895 | EVALUATING A STREAM-BASED COMPUTING APPLICATION - A method for evaluating a stream-based computing application includes specifying a simulation condition. In addition, a stream of test tuples may be input to the stream-based computing application. The stream-based computing application may operate on one or more compute nodes. Each compute node may have one or more computer processors and a memory to store one or more processing elements. The method may also include simulating processing of the stream of test tuples by the processing elements using the simulation condition. Further, the method may include monitoring to determine one or more performance metrics for an inter-stream operator communication path. | 2014-09-18 |
20140280896 | METHODS AND APPARATUS TO CREDIT USAGE OF MOBILE DEVICES - Methods, apparatus, systems and articles of manufacture to monitor mobile internet usage are disclosed. An example method includes identifying a first application associated with a first request, determining that the first application is operating in a background mode, and crediting the first application as a background application based on determining that the first application is operating in the background mode. | 2014-09-18 |
20140280897 | SESSION-BASED SERVER TRANSACTION STORM CONTROLS - A transaction storm detection engine is configured to receive a series of transactions in a data stream for an authenticated network session. The detection engine determines whether the transactions form a transaction storm. In response to determining that the transactions are a transaction storm, metrics associated with the transaction storm are presented. One or more actions may be specified to be applied in a subsequently detected transaction storm. | 2014-09-18 |
20140280898 | ALLOCATING COMPUTING RESOURCES BASED UPON GEOGRAPHIC MOVEMENT - Embodiments described herein use APIs on network devices in a SDN enabled network to monitor the network traffic flowing through the network devices and determine an identity of the client initiating the network traffic. Specifically, the APIs provide a user application with user credentials, IP addresses, MAC addresses, and other identifying information mined from the network flows. Once the identity is found, the application may identify the client's current geographic location. The network devices may continue to monitor the network devices to identify any movement events associated with the client. In response to a movement event, the application may reallocate resources proximate to the new geographic location of the client. | 2014-09-18 |
20140280899 | METHODS AND APPARATUS FOR SCORING THE CONDITION OF NODES IN A COMMUNICATION NETWORK AND TAKING ACTION BASED ON NODE HEALTH SCORES - Methods and apparatus for monitoring a network and generating overall health scores for communications nodes in the network are described. A monitoring system receives information from a variety of system elements and/or devices which provide information relating to communications service. The information received by the network monitoring system includes information indicating the number of outstanding work orders issued in regard to a trouble report, signal power level variance information, signal alarm information, uncorrectable error information, correctable error information, offline device information, etc. A set of scores for a node are generated based on the different types of received information. The scores are combined using a weighted sum to generate an overall node health score. Nodes are ranked based on overall node health scores and maintenance personal can view the scores as well as the underlying information corresponding to a node to facilitate identification of possible faults. | 2014-09-18 |
20140280900 | REPRESENTING SOFTWARE DEFINED NETWORKS USING A PROGRAMMABLE GRAPH MODEL - System, method, and computer program product to represent a network using a programmable graph model, by generating a directed graph to represent a topology of the network, wherein each of a plurality of network elements in the network are represented, in the directed graph, by one of the plurality of nodes, identifying, through the directed graph, a subset of network elements, of the plurality of network elements, upon which to apply a requested operation, and applying the requested operation to the subset of network elements in a distributed manner through the directed graph. | 2014-09-18 |
20140280901 | AUTOMATICALLY DIAGNOSING AND RESOLVING WIRELESS NETWORK CONNECTIVITY ISSUES IN ELECTRONIC DEVICES - The disclosed embodiments relate to approaches for diagnosing and resolving wireless network connectivity issues on an electronic device. The system includes a tool for automatically diagnosing and resolving wireless network connectivity issues on the electronic device. The tool may monitor and manage the wireless network connection on the electronic device. If a lack of wireless network connectivity is detected on the electronic device, the tool may run a series of test cases associated with wireless network connectivity issues on the electronic device. The tool may then notify the user of the results of the test cases, provide recommendations associated with the results to the user, and/or log data associated with the test cases. | 2014-09-18 |
20140280902 | IP Allocation Pools - Systems, methods, and computer program products involve identifying a first IP block having a first set of IP addresses and a second IP block having a second set of IP addresses, the first set of IP addresses different from the second set of IP addresses. A first expected number of IP reassignments for the first IP block can be determined. A first number of IP reassignments between the first IP block and the second IP block can be identified. The first number of IP reassignments can be compared against the first expected number of IP reassignments. The first IP block and the second IP block can be merged into an IP allocation pool based, at least in part, on the comparison. | 2014-09-18 |
20140280903 | EVALUATION OF PATHS THROUGH GRAPH-BASED DATA REPRESENTATION - Embodiments of the invention generally provide a method, a computing system, and a computer-readable medium configured to respond to requests for payload data and provide unique cache keys for caching the payload data. The computer-implemented method includes accepting a first request for translation that specifies a first path configured to identify first payload data associated with a graph object. The computer-implemented method further includes determining that the graph object includes a first translation node associated with a first portion of the first path. The computer-implemented method also includes obtaining, from the graph object, a second path that is associated with the first translation node. The computer-implemented method further includes replacing the first portion of the first path with the second path to generate a first translated path. The computer-implemented method also includes obtaining, from the graph object, the first payload data, based on the first translated path. | 2014-09-18 |
20140280904 | SESSION INITIATION PROTOCOL TESTING CONTROL - A system and method for performing session initiation protocol testing. A trigger is received to initiate a test between an initiating measurement agent and a target measurement agent. A determination is made whether the initiating measurement agent is configured to perform the test. A determination is made whether the target measurement agent is configured to perform the test. The testing is performed between the initiating measurement agent and the target measurement agent in response to determining the initiating measurement agent and the target measurement agent are configured to perform the test. | 2014-09-18 |