22nd week of 2011 patent applcation highlights part 50 |
Patent application number | Title | Published |
20110131243 | DATA ACQUISITION APPARATUS, DATA ACQUISITION SYSTEM AND METHOD OF ACQUIRING DATA - A data acquisition apparatus includes a processing resource operably coupled to an input unit and an output unit. The processing resource is arranged to provide an execution environment for supporting a user interface. An enquiry module is provided and supported by the execution environment. In at least one embodiment, the apparatus also includes a communications unit operably coupled to the processing resource for supporting communications over a communications network. The enquiry module is arranged to generate a search query relating to a point of interest and receive search results in response thereto via the communications unit, the enquiry module also being arranged to use the search results to derive data associated with the point of interest. | 2011-06-02 |
20110131244 | EXTRACTION OF CERTAIN TYPES OF ENTITIES - Certain types of entities may be extracted from a document. In one example, the entities to be recognized are cultural entities, such as the names of movies, video games, books, etc. For each such entity, a concept graph may be built that shows the relationship between the entity itself and other entities, such as the relationship between a movie and the actor(s) who act in the movie. When a candidate entity name is detected in the document, the concept graph may be used to look for other entities that appear in the context of the candidate entity. The presence of related entities in the context of the candidate may be used to disambiguate the meaning of the candidate. For example, a common word like “up” might be recognized as the name of a movie if the names of actors or characters in that movie appear near the word “up”. | 2011-06-02 |
20110131245 | IDENTIFYING A GROUP OF PRODUCTS RELEVANT TO DATA PROVIDED BY A USER - A method for using a rule-based system implemented by at least one physical processor to identify from a set of available products a group of products relevant to data provided by a user includes creating with the rule-based system a number of rules based on the data provided by the user, for each available product in the set of available products, creating a combined ruleset including the rules based on the data provided by the user and a number of rules characterizing the available product and determining with the rule-based system whether a conflict exists in the combined ruleset, and returning to the user the available products for which no conflict was found as the group of products relevant to the data provided by the user. | 2011-06-02 |
20110131246 | System for Integrating Content from External Corpora into Primary Search Engine Results - A computer implemented method, computer-readable medium and system for deciding which external corpora, such as verticals, to integrate into primary Internet search engine results in response to a query is disclosed. Offline query-related data and user feedback data is incorporated. A probabilistic estimate is formed of the relevance of the verticals to the query. | 2011-06-02 |
20110131247 | Semantic Management Of Enterprise Resourses - Semantic management of enterprise resources including identifying a plurality of disparate enterprise resources including physical resources of the enterprise and data resources of the enterprise, wherein the disparate enterprise resources are under the direction of a plurality of different management entities of the enterprise; creating for each enterprise resource a master metadata object representing the enterprise resource; wherein the structure of the each master metadata object is consistent for all the disparate enterprise resources and all management entities; wherein the master metadata object includes a plurality of predefined perspective fields, each perspective field containing a different predetermined aspects of the resources of the enterprise; assigning each master metadata object to one or more flexible reference structures; relating a plurality of master metadata objects with one or more other master metadata objects in dependence upon assigned flexible reference structures through predefined flexible reference structure fields in the master metadata objects; querying, in response to a specific user request, the related master data objects; and filtering the results of the query according to one or more enterprise views. | 2011-06-02 |
20110131248 | ANALYSIS GROUPS FOR SEMANTIC LAYER - A system may include a database of physical data tables including stored data, and an abstraction layer associated with the stored data. The abstraction layer may include a measure object associated with a measure, a plurality of dimension objects associated with respective dimensions, a first analysis group object linked to the measure object, to a first one or more of the plurality of dimension objects, and to a first portion of the stored data associating the measure with respective dimensions of the first one or more of the plurality of dimension objects, and a second analysis group object linked to the measure object, to a second one or more of the plurality of dimension objects, and to a second portion of the stored data associating the measure with respective dimensions of the first one or more of the plurality of dimension objects and of the second one or more of the plurality of dimension objects. | 2011-06-02 |
20110131249 | AUTOMATED GENERATION OF MODELING LANGUAGE PROFILES - A database of data can be leveraged to automatically generate profiles for use in modeling. The data may be specific to one or more domains and/or general to multiple domains. A mapping scheme is established to map structure of the database to a structure of a profile. The mapping scheme is read and the database is read in accordance with the mapping scheme to automatically generate one or more profiles. | 2011-06-02 |
20110131250 | Computer Systems and Methods for the Query and Visualization of Multidimensional Databases - In response to a user request, a computer generates a graphical user interface on a computer display. A schema information region of the graphical user interface includes multiple operand names, each operand name associated with one or more fields of a multi-dimensional database. A data visualization region of the graphical user interface includes multiple shelves. Upon detecting a user selection of the operand names and a user request to associate each user-selected operand name with a respective shelf in the data visualization region, the computer generates a visual table in the data visualization region in accordance with the associations between the operand names and the corresponding shelves. The visual table includes a plurality of panes, each pane having at least one axis defined based on data for the fields associated with a respective operand name. | 2011-06-02 |
20110131251 | SMART CONTAINERS - Smart containers are disclosed. A definition is received of a logical structure configured to manage associated content. A policy or operation specified by the definition is applied to an item of content associated with an instance of the logical structure. | 2011-06-02 |
20110131252 | METHOD AND APPARATUS FOR PHYSICAL/LOGICAL RELATIONSHIP MAPPING BETWEEN RESOURCES - Disclosed is a method for dynamically mapping a physical/logical relationship between resources. The method for physical/logical relationship mapping between resources includes: abstracting heterogeneous environments of physical resources; expressing the physical resources by a resource instance of a predetermined format to generate logical resources which are grouped and managed in accordance with types of the resources; and analyzing the physical/logical relationship between the resources to generate a relation map. | 2011-06-02 |
20110131253 | System and Method of Schema Matching - In one embodiment the present invention includes computer-implemented method of performing schema matching. The method includes storing, by a computer system, a schema mapping that includes nodes. The schema mapping indicates a relationship between a first schema and a second schema. The method includes displaying, at a first node of the plurality of nodes, a graphical indication of the schema mapping at the first node. The method includes receiving, by the computer system, an evaluation of the schema mapping at the first node according to a user evaluating the graphical indication. The method includes adjusting the schema mapping as a result of the user evaluating the graphical indication. The method includes stepping, by the computer system, to a second node of the plurality of nodes. The method includes further displaying, receiving and adjusting the schema mapping as related to the second node. | 2011-06-02 |
20110131254 | STRONGLY TYPED TAGS - In one or more embodiments, a tag is provided and includes a property that associates a strongly typed variable with the tag. Strongly typed variables can include any suitable types. For example, in at least some embodiments, the strongly typed variable is a people type that allows the tag to be associated with an individual person or group of people by virtue of a unique identification that is associated with the person or group. Strongly typed tags can then serve as a foundation upon which various other types of information and services can be provided to enhance the user experience. | 2011-06-02 |
20110131255 | WIRELESS BASE STATION DEVICE AND OPERATION INFORMATION COLLECTION METHOD FOR THE SAME - A wireless base station device connected to a network and communicating with an external device includes: a control management unit to store operation information in a database and manage the operation information, and the control management unit includes an operation information read portion to read operation information from the database, supplied from the external device; a determination portion to determine whether or not the operation information is beyond a period of validity, read from the database along with the operation information that corresponds to the request; a operation information update portion to read the operation information that corresponds to the request from corresponding units when the operation information that corresponds to the request is beyond the period of validity, and updating the database; and a response transmission portion to transmit the operation information to the external device. | 2011-06-02 |
20110131256 | MEMORY CARD CHANGER, METHOD FOR READING OR WRITING DATA IN MEMORY CARD CHANGER - A memory card changer is disclosed. The memory card changer can include a connection unit, which interchanges the data with the host device, a slot unit, which attaches and detaches a plurality of memory cards and a processing unit, which controls the host device to recognize individual storage capacities of the memory cards individually or collectively, in which each of the plurality of memory cards have been inserted in the slot unit. The memory card changer of the present invention can use the plurality of memory cards having smaller storage capacities as memory of large capacity. | 2011-06-02 |
20110131257 | FILE MANAGEMENT DEVICE - An image quality correction process of an image file which is stored in a memory card is performed and the processed image is stored in the memory card. In addition, referents of the image file are changed from places storing bodies of the original files to places storing bodies of the processed files. In response to a file access instruction is received from a user PC, a cluster content (image file) of a cluster number designated by the memory card is transmitted. In this way, the image after the APF process is received only by accessing to the image which is stored in the memory card without special operations in the user PC side. | 2011-06-02 |
20110131258 | Nas-Based Multimedia File Distribution Service - A network attached storage (NAS) device | 2011-06-02 |
20110131259 | FILE LOCATION NAMING HIERARCHY - Embodiments of methods, apparatuses, devices and/or systems for a file location naming hierarchy are disclosed. | 2011-06-02 |
20110131260 | EFFICIENT DETECTION ALGORITHM SYSTEM FOR A BROAD CLASS OF SIGNALS USING HIGHER-ORDER STATISTICS IN TIME AS WELL AS FREQUENCY DOMAINS - An algorithm system to detect a broad class of signals in Gaussian noise using higher-order statistics. The algorithm system detects a number of different signal types. The signals may be in the base-band or the pass-band, single-carrier or multi-carrier, frequency hopping or non-hopping, broad-pulse or narrow-pulse etc. In a typical setting this algorithm system provides an error rate of 3/100 at a signal to noise ratio of 0 dB. This algorithm system gives the time frequency detection ratio that may be used to determine if the detected signal falls in Class Single-Carrier of Class Multi-Carrier. Additionally this algorithm system may be used for a number of different applications such as multiple signal identification, finding the basis functions of the received signal and the like. | 2011-06-02 |
20110131261 | Algebraic Device and Methods of Use Thereof - This invention provides a novel affordance to algebra. It combines the immediacy of a manipulative with the power of a computer algebra system. Operations are executed in-place on a mutable expression, by direct manipulation of its terms by the user. | 2011-06-02 |
20110131262 | FLOATING POINT DIVIDER AND INFORMATION PROCESSING APPARATUS USING THE SAME - A floating point divider includes a mantissa repetitive processing unit and an operation execution control unit. The mantissa repetitive processing unit calculates a quotient and a partial remainder by a digit-recurrence process for a mantissa of a dividend of an input operand. The operation execution control unit determines a bit value at a specified position uniquely specified based on a radix of an operation execution process with respect to the partial remainder. The mantissa repetitive processing unit reduces the number of digit-recurrence processes by calculating a quotient and a remainder based on a determining result of the operation execution control unit. The number of bits of the quotient is double of that of a quotient calculated once every the digit-recurrence process. The number of left-shift processes processed on the remainder is double of that of a remainder calculated once every the digit-recurrence process. | 2011-06-02 |
20110131263 | Random Number Generators Having Metastable Seed Signal Generators Therein - A random number generator includes a signal generator and a sampling unit. The signal generator is configured to generate an alternating sequence of metastable seed signals and oscillating signals during respective first and second half-periods of a clock signal. The oscillating signals having respective phases determined by corresponding ones of the metastable seed signals in the alternating sequence. The sampling unit is configured to detect a logic value of each consecutive oscillating signal during a portion of a respective half-period of the clock signal. The signal generator may be responsive to the clock signal and the sampling unit may be responsive to a delayed version of the clock signal. | 2011-06-02 |
20110131264 | RANDOM NUMBER GENERATOR INCORPORATING CHANNEL FILTER COEFFICIENTS - A device comprising a controller configured to retrieve at least one channel filter coefficient from a plurality of registers, and to generate a random number based at least in part on the at least one retrieved channel filter coefficient. | 2011-06-02 |
20110131265 | ELECTRONIC HARDWARE RESOURCE MANAGEMENT IN VIDEO PROCESSING - Apparatus and methods for electronic hardware resource management in video processing are provided. A hybrid filter is controllable to apply either Finite Impulse Response (FIR) filtering or Infinite Impulse Response (IIR) filtering for vertical filtering of a video image during a resizing process. A scale factor by which the video image is to be resized in the resizing process is determined, and the hybrid filter is controlled to apply FIR filtering for the vertical filtering where the determined scale factor satisfies a first condition relative to a threshold value S | 2011-06-02 |
20110131266 | Decimal Floating Point Multiplier and Design Structure - Several implementations and a design structure for decimal multiplication that uses a BCD 4221 encoding scheme, separate accumulation of partial products, accumulation of the partial products into a final product and conversion from and to a BCD 8421 coding scheme. | 2011-06-02 |
20110131267 | Methods, Apparatuses, System and Computer Program Product for Supporting Legacy P-CSCF to Indicate the S-CSCF to Skip Authentication - It is disclosed a method including transmitting, after successful registration of a terminal at a network entity, a registration message including terminal identity information and integrity indication information indicating affirmative integrity of the terminal identity information; and a method including processing, after reception of the registration message, the received registration message based on the terminal identity information and the integrity indication information such that, i) if the integrity is indicated affirmative, an authentication procedure of the terminal is skipped, or, ii) if the integrity is indicated negative, the received registration message is rejected without provisioning of key information related to registration of the terminal. | 2011-06-02 |
20110131268 | CORRELATING GROUPS OF APPLICATION SYSTEMS - Implementations of a computer-implemented method include instantiating a first computer program that is executable using one or more processors, using the first computer program, defining a first group comprising a plurality of application systems and a second group comprising a plurality of application systems, correlating the plurality of application systems within the first group to generate a correlation model, storing the correlation model in a computer-readable storage medium, and providing a target group comprising a plurality of application systems based on the correlation model. | 2011-06-02 |
20110131269 | MONITORING ASSETS - A communication system for a materials handing facility obtains operational data from the CANBUS of a vehicle and selectively stores or transmits data based on the availability of a communications link. | 2011-06-02 |
20110131270 | METHOD AND SYSTEM FOR CREATING PERVASIVE DATA FORM REPORTING - A content syndication system is disclosed where a syndicated data feed entry may include whatever information contributed to the content of that feed entry. Doing so allows business reporting and analytics tools to consume both the feed information (e.g., a summary of a report) and the underlying data (e.g., a collection of database records). A feed-reader application that does not understand the extended feed data (i.e., the information which contributed to the content of the feed entry) simply disregards the extended content. Thus, the extended feeds may be included in email messages, documents and other packaging and delivery mechanisms since no additional information is needed to consume or render formatted content. | 2011-06-02 |
20110131271 | APPARATUS AND METHOD FOR ALLOCATING AND RELEASING IMAGING DEVICE IN VIRTUALIZATION SYSTEM - The present invention relates to an apparatus and method for allocating and releasing an imaging device in a virtualization system. An image processing management module in the virtualization system, in response to an allocation command or a release command from the device management module, generates or removes an image processing module corresponding to the imaging device, and, upon generating the image processing module, transmits connection information on the image processing module to the imaging device so that image data from the virtual machine is transmitted and received between the imaging device and the image processing module. According to the present invention, it can be possible to establish a computing environment appropriate for an environment using various imaging devices in a ubiquitous environment by constituting a virtualization computing environment that allows a user to dynamically select an imaging device in a server where a plurality of imaging devices have been registered. | 2011-06-02 |
20110131272 | Technique of Providing Targeted Media Items - A first message from a client device, received at a server, can include a request to provide at least one media item matching at least one audience parameter. In response to the first message, the server can access a database storing media item information associated with multiple media items to be retrieved using servers other than the server receiving the first message. The media item information can include, a media item identifier, a media item location identifier, and description information. Media items are selected based on a comparison of the audience parameter with the description information and the server sends a reply to the first message, including a list of media items and their location identifiers. | 2011-06-02 |
20110131273 | DEVELOPMENT AND DEPLOYMENT OF MOBILE AND DESKTOP APPLICATIONS WITHIN A FLEXIBLE MARKUP-BASED DISTRIBUTED ARCHITECTURE - A computer program product embodied in a computer-readable medium is configurable to accomplish execution of an application that is specified and encoded in a markup-based descriptor language. The product includes client runtime computer code configured to cause a client computer device to process the markup-based descriptor language to deploy an application to accomplish execution of the application. The client runtime computer code is further configured to process the markup-based descriptor language to selectively configure the client computer device to deploy the application so as to accomplish execution of the application by the client computer device stand-alone or by the client computer device in cooperation with a server to which the device is connectable via a network connection. | 2011-06-02 |
20110131274 | NOTIFICATION CONTROL THROUGH BRAIN MONITORING OF END USER CONCENTRATION - Embodiments of the present invention provide a method, system and computer program product for message notification management through brain monitoring of end user concentration. In an embodiment of the invention, a method for message notification management through brain monitoring of end user concentration can include receiving neurofeedback for an end user through an interface for a brain monitoring system, comparing the neurofeedback to a threshold level of brain activity indicating a degree of concentration of the end user, and suppressing message notifications for messages in a messaging system responsive to the neurofeedback exceeding the threshold level of brain activity, but otherwise permitting message notifications for messages in the messaging system. | 2011-06-02 |
20110131275 | POLICY DIRECTED SECURITY-CENTRIC MODEL DRIVEN ARCHITECTURE TO SECURE CLIENT AND CLOUD HOSTED WEB SERVICE ENABLED PROCESSES - A policy directed, security-centric model driven architecture is described to secure internal web services, such as those implementing service-oriented architecture (SOA), and external web services such as those hosted on a cloud computing platform. A distributed data dictionary hosted across multiple dictionary engines and operating in conjunction with web security services are used to embed security profiles in web services messages and to validate messages that contain such security profiles. | 2011-06-02 |
20110131276 | Method and System for Automatically Storing a Communication Session - The invention relates to a method for recording a communication session initiated by at least one communication terminal ( | 2011-06-02 |
20110131277 | Composite Services Provision Within A Telecommunications Network - The invention refers to a method of correlating a plurality of service instances by a service composition entity, wherein the services are performed by one or a plurality of servers of a telecommunications network. Thereto, the service composition entity performs the steps of invoking a composite service instance corresponding to the service request, and generating a composite service identifier identifying this composite service instance, contacting the one or a plurality of application servers for invoking the plurality of component service instances, wherein the plurality of component service instances are associated to the composite service instance, and sending a first service report comprising an information about the composite service instance to a service supervision system, wherein this information enables the service supervision system to identify reports about the component service instances as being associated to the composite service instance. The invention further proposes a service composition entity for correlating the plurality of service instances, and a service supervision system for monitoring, supervising or controlling the composite service instance. | 2011-06-02 |
20110131278 | SYSTEMS AND METHODS FOR PEER-TO-PEER BANDWIDTH ALLOCATION - Apparatus, systems, and methods can operate to provide efficient data transfer in a peer-to-peer network. A list of peer computers can be accessed and sorted by a data exchange metric. A requester peer is selected by traversing the list from a peer computer with a smallest data exchange metric to a peer computer with a largest data exchange metric to identify a peer computer with a pending data block request, the peer computer with the pending data block request being the requester peer and having an associated data exchange metric. A data block is then transmitted to the requester peer and the data exchange metric associated with the requester peer is updated to provide an updated data exchange metric for the requester peer. The list of peer computers can then be resorted. Additional apparatus, systems, and methods are disclosed. | 2011-06-02 |
20110131279 | Managing Electronic Messages - Methods, systems, and computer program products for managing electronic messages. A method embodiment for managing electronic messages includes processing message content of an electronic message with an automated content classification module to determine a classification for the electronic message; and applying a security policy to the electronic message in dependence upon the classification. The classification module may be configured for a particular sender. The security policy may be configured for a particular receiver. The system may associate the classification with the electronic message. The system may train the classification module. The electronic message may be an email message, an instant message, a text message, or a message sent in the context of a social networking platform. The security policy may include a display policy or a filtering policy. | 2011-06-02 |
20110131280 | Method and Apparatus for Managing an Electronic Messaging System - A rating is received, from a first user of an electronic messaging system, pertaining to a use by a second user of a reply-to-all function provided by the electronic messaging system. An etiquette value associated with the second user is updated based on the rating. An access by the second user to the reply-to-all function is controlled based on the updated etiquette value associated with the second user. The electronic messaging system may comprise an email messaging system, for example. Systems and apparatus are also described. | 2011-06-02 |
20110131281 | MESSAGE RECALL - There is provided a method for recalling a message. The method comprises receiving a message from a publisher, sending the message to a durable subscriber for queuing pending consumption by a subscriber. When a message recall request identifying the message is received, the unconsumed message is deleted from the durable subscriber. | 2011-06-02 |
20110131282 | SYSTEM AND METHOD FOR AUTOMATICALLY BUILDING UP TOPIC-SPECIFIC MESSAGING IDENTITIES - A method for automating interaction with a messaging system receives a first message from the messaging system, associates the first message with a topic, assigns the first message to an identity associated with the topic, maps content to the first message, creates a second message based on the content, and sends, via the identity, the second message to the messaging system. The first message may be screened for quality and assigned a quality score, and if the quality score does not exceed a predetermined threshold, then the second message will not be sent to the messaging system. | 2011-06-02 |
20110131283 | SUGGESTING A DISCUSSION GROUP BASED ON INDEXING OF THE POSTS WITHIN THAT DISCUSSION GROUP - A system and corresponding methods for recommending a discussion group as an appropriate place to post a message are provided. In one embodiment, the system searches a plurality of existing posts to identify the posts that are similar to a subject of a user's message. The system identifies the discussion groups that contain the identified posts and selects one of the identified discussion groups to recommend as an appropriate discussion group to post the user's message. | 2011-06-02 |
20110131284 | MESSAGE RECEPTION - Apparatus for handling received messages, the apparatus comprising: a communication-interface controller operable on behalf of a processor to intercept and screen received messages on the fly portion-by-portion during reception, and to submit those messages determined to have passed such screening to the processor for processing. | 2011-06-02 |
20110131285 | TASK MANAGEMENT SYSTEM ASSOCIATING WITH CONTACT INFORMATION AND METHOD THEREOF - A task item can be stored in a collaboration database, wherein the collaboration database able to be accessed by a communication module and a task management tool, which both run on a client. The communication module can be able to access a communication server that provides a communication service to the client. The task management tool can be able to access a collaboration server that provides a collaboration service to the client. A collaboration item can be established that contains a task identifier associating with the task item and a collaboration identifier associating with contact information. The communication module running in a client can be called according to the contact information of the collaboration database. The task item can be displayed within a user interface of a communication application via the communication module. | 2011-06-02 |
20110131286 | Booking method and system - There is disclosed herein a method and system for communicating over a telecommunications network between a service provider and one or more users, wherein the service provider can have access to multiple distinct addresses in the telecommunications network and each user is identified by an address, more specifically where a first message can be sent over at least a portion of the telecommunications network to a user's address and based on a response from the user determining the message to which the response is a reply to. | 2011-06-02 |
20110131287 | CATCHING USER INFORMATION IN AN INTEGRATED COMMUNICATION SYSTEM - An integrated messaging system for performing various types of messaging across different types of networks, including integrated user interfaces and administrator interfaces. Embodiments include a communication server that couples among networks of different types, and an interface module that couples to the communication server. The interface module may be hosted on a messaging server of a network. The interface module pulls various user information from the messaging server, including information relevant to at least the network that includes the messaging server. A cache couples to the communication server and to the interface module to hold information from the communication server and/or the user information pulled from messaging server. The interface module directs a message from the messaging server and/or the cache to at least one device on the networks using the user information. | 2011-06-02 |
20110131288 | Load-Balancing In Replication Engine of Directory Server - An embodiment of this invention provides a new LDAP server control to automate load balancing for replication based directory infrastructure. This solution is applicable to both master-master and master-replica based replication topologies. If one or more of the replication servers or the master servers are available for processing, the request is assigned to them based on output of a weighted non-uniform random number generator. This LDAP server control allows gaining very high performance while doing multiple parallel heavy LDAP operations. This LDAP control prevents the exposure of the replication directory server details to the outer world and therefore proves helpful in easing the security concerns. | 2011-06-02 |
20110131289 | METHOD AND APPARATUS FOR SWITCHING COMMUNICATION CHANNEL IN SHARED MEMORY COMMUNICATION ENVIRONMENT - A method for switching a communication channel in a shared memory communication environment which sets up a TCP/IP (Transmission Control Protocol/Internet Protocol) communication channel and a shared memory communication channel from a first virtual machine to a second virtual machine, the method includes: transmitting a channel switching message to the first virtual machine when the first virtual machine moves to another physical machine; transmitting the channel switching message from the first virtual machine to the second virtual machine; and switching a channel state between the first virtual machine and the second virtual machine. | 2011-06-02 |
20110131290 | METHODS AND APPARATUS FOR SELECTION OF CONTENT DELIVERY NETWORK (CDN) BASED ON USER LOCATION - Methods and apparatus are provided for selecting a Content Delivery Network (CDN) for Internet Protocol (IP)-based services. A service request message is received from a user. The service request message includes user location information. The CDN is selected in accordance with the user location information. The service request message is transmitted to the CDN for connection of a corresponding delivery function module of the CDN to the user. | 2011-06-02 |
20110131291 | REAL-TIME VOICE RECOGNITION ON A HANDHELD DEVICE - A method and apparatus for implementation of real-time speech recognition using a handheld computing apparatus are provided. The handheld computing apparatus receives an audio signal, such as a user's voice. The handheld computing apparatus ultimately transmits the voice data to a remote or distal computing device with greater processing power and operating a speech recognition software application, the speech recognition software application processes the signal and outputs a set of instructions for implementation either by the computing device or the handheld apparatus. The instructions can include a variety of items including instructing the presentation of a textual representation of dictation, or a function or command to be executed by the handheld device (such as linking to a website, opening a file, cutting, pasting, saving, or other file menu type functionalities), or by the computing device itself. | 2011-06-02 |
20110131292 | APPARATUS, METHOD AND SYSTEM FOR A TUNNELING CLIENT ACCESS POINT - The disclosure details the implementation of a tunneling client access point (TCAP) that is a highly secure, portable, power efficient storage and data processing device. The TCAP “tunnels” data through an access terminal's (AT) input/output facilities. In one embodiment, the TCAP connects to an AT and a user employs the AT's user input peripherals for input, and views the TCAP's activities on the AT's display. This enables the user to observe data stored on the TCAP without it being resident on the AT, which can be useful to maintain higher levels of data security. Also, the TCAP may tunnel data through an AT across a communications network to access remote servers. The disclosure also teaches a plug-n-play virtual private network (VPN). | 2011-06-02 |
20110131293 | DATA DELIVERY APPARATUS AND DATA DELIVERY METHOD - A data delivery apparatus includes a first obtaining section, a second obtaining section, and a delivery section. The first obtaining section obtains a master image. The master image is a first image file generated from master data used in common for constructing different systems in the plurality of information processing apparatuses. The second obtaining section obtains a difference image. The difference image is a second image file generated from difference data specifying details of modification to the master data to construct an individual system. The delivery section delivers the master image and the difference image to the plurality of information processing apparatuses over a network. | 2011-06-02 |
20110131294 | Requesting offline profile data for online use in a privacy-sensitive manner - A method, performed using one or more servers under the control of an ISP, comprises: (a) receiving an electronic transmission from a requesting server of an IP address and a time and date; (b) automatically determining to which subscriber of the ISP the received IP address was allocated at the received time and date; and (c) automatically transmitting an electronic communication that causes delivery to the requesting server of offline data originating from an offline data provider. The delivered offline data concern the subscriber determined to have been allocated the received IP address at the received time and date. The communication does not convey to the offline data provider the subscriber's history of online activity, and the delivery does not convey to the requesting server a personal identity of the subscriber. | 2011-06-02 |
20110131295 | Provision of Troubleshooting Tools in a Network System - In an embodiment, a method is provided for providing a tool used for troubleshooting a component. This tool is included in an application server that is in communication with multiple client computing devices. Here, a request to activate the tool is received from one or more client computing devices. This request includes a diagnostic identifier that uniquely identifies the client computing device that transmitted the request. Upon receipt of the request, the tool is activated at the application server with the diagnostic identifier used as an input parameter. When activated, the tool can identify the client computing device based on the diagnostic identifier and can provide a functionality associated with the troubleshooting to the client computing device. | 2011-06-02 |
20110131296 | METHOD FOR MANAGING CONTENTS AND DISPLAY APPARATUS THEREOF - Embodiments relates to a method for managing contents and a display apparatus using the method, and the method include: displaying at least one icon representing contents provider and icons representing user contents service; receiving a selection of a first icon corresponding to a first contents provider in the displayed icons; and storing information on user's contents in contents provided from the first contents provider to correspond to the user contents service. | 2011-06-02 |
20110131297 | RELIABLE DELIVERY OF A PUSH-STATE AWARE CLIENT DEVICE - There are provided methods, systems, devices and computer program products for reliable delivery of content packages to a client device. Push delivery of content packages is combined with pull delivery when a push delivery fails. When a client device participates in a push delivery but fails to complete, a recommendation for corrective action may be notified and, following such corrective action, the client device pulls delivery. Respective content listings are maintained by server and client device for reconciliation to prompt pull delivery by the client device. | 2011-06-02 |
20110131298 | System and Methods for Efficient Media Delivery Using Cache - To improve the efficiency of media delivery over the Internet, a system and a method are provided for caching remote media files and retrieving cached media files, comprising hardware and software modules as well as steps for storing a remote media file into the cache and retrieving the cached media file based on a signature created by hashing only discrete parts of the media file. The signature is a key for finding the cached media files in the cache upon subsequent requests for the same media file, even if it is received from a different internet location. Media files may be adapted to the characteristics of different media clients, and adapted media files may be equally cached. | 2011-06-02 |
20110131299 | NETWORKED MULTIMEDIA ENVIRONMENT ALLOWING ASYNCHRONOUS ISSUE TRACKING AND COLLABORATION USING MOBILE DEVICES - Online collaboration using multimedia content may be implemented by a server communicatively coupled to mobile computing devices such as smart phones and PDAs, as well as desk top computing systems. Users may create memorandums using a variety of different types of content. The memorandums may address particular issues, for example a project, issue, or trouble tracking item. Users can create stories for the memorandums, for example narrating or otherwise explaining elements of the issue, replicating a face-to-face discussion in an asynchronous manner. | 2011-06-02 |
20110131300 | COMPUTER SYSTEM FOR MANAGING CONFIGURATION ITEM, AND METHOD AND COMPUTER PROGRAM THEREFOR - There is provided a method for managing a plurality of configuration items. The method includes holding, at a repository, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item. The method also includes detecting, at a discovery section, information on configuration items. The discovery section performs subsequent detection based on at least one of a predetermined attribute and a predetermined relationship in a new set of data created from the information detected by the discovery section. | 2011-06-02 |
20110131301 | COMMUNICATING CONFIGURATION INFORMATION IN A COMMUNICATIONS NETWORK - A method is provided of communicating configuration information to a network service that is scaled over a plurality of network nodes. The method comprises designating one of the nodes of the plurality as a master node (S | 2011-06-02 |
20110131302 | MINIMUM DISRUPTION MST RECONFIGURATION (MDMR) - In one embodiment, a first multiple spanning tree (MST) region configuration for an MST process may be maintained at a switch in a computer network, where the first configuration has a virtual local area network (VLAN)-to-instance (VI) mapping that maps each of one or more VLANs to one of one or more MST instances in the MST region. The switch may subsequently receive a second MST region configuration that has a different VI mapping than the first configuration, and may determine one or more VLANs of the second configuration that have a different VI mapping from the first configuration (“affected VLANs”). Accordingly, in response to a trigger to apply the second configuration at the switch, the affected VLANs are blocked for a delay, and the second configuration may be applied at the switch without restarting the MST process. | 2011-06-02 |
20110131303 | PROVIDING NETWORK SECURITY SERVICES FOR MULTIPLE REQUESTERS - A security initialization system receives a first initialization request from a first requester to access a first database storing security data and stores context data for the first initialization request that identifies an initialization operation associated with the first database. The security initialization system receives a second initialization request from a second requester to access a second database storing security data and updates the context data to identify an initialization operation associated with the second database. The security initialization system receives a shut down request from one of the requesters, where the shut down request includes data for identifying a corresponding initialization operation in the context data. The security initialization system updates the context data to show that the corresponding initialization operation has a shut down request and determines whether a security module is to be shut down using the context data. | 2011-06-02 |
20110131304 | SYSTEMS AND METHODS FOR MOUNTING SPECIFIED STORAGE RESOURCES FROM STORAGE AREA NETWORK IN MACHINE PROVISIONING PLATFORM - Embodiments relate to systems and methods for mounting specified storage resources from storage area network in machine provisioning platform. A provisioning platform can communicate generate and maintain a provisioning profile encoding the software, hardware, and/or other resources to be provisioned to a target physical and/or virtual machine. The provisioning profile can include a set of storage allocations for each target machine to be provisioned by the platform, indicating the high-level amounts, types, availability, so forth to be associated with each target. The provisioning profile can likewise include a set of storage specifications indicating specific disk types, manufacturers, and specific sources or pools in the set of storage resources available to the storage area network to transparently fulfill the storage allocations. The target(s) can be assigned an alias to identify them to the SAN, and the provisioning platform can mount the corresponding storage resources during the provisioning or updating process. | 2011-06-02 |
20110131305 | SYSTEM FOR THE CREATION AND CONFIGURATION OF A NETWORK OF DEVICES - The system for the creation and configuration of a network of devices includes design modules for designing the configuration of a network of devices and automatic generation modules for automatically generating the management and control code of the network of devices starting from the designed configuration. The design modules are provided with a first configuration module of the parameters and the messages of the devices of the network of devices, with a second configuration module of a management and control graphic interface of the devices of the network of devices and with a realization module of a graphic model of the network of devices. | 2011-06-02 |
20110131306 | SYSTEMS AND METHODS FOR SERVICE AGGREGATION USING GRADUATED SERVICE LEVELS IN A CLOUD NETWORK - Embodiments relate to systems and methods for service aggregation using graduated service levels in a cloud network. In embodiments, a service aggregation platform can encode a service delivery profile to manage the delivery of support services to both vendors, such as independent software vendors (ISVs), and their users in a cloud-based network or networks. Vendors may choose to host their technical support and related services in the service aggregation platform, and define a graduated set of levels of service to which their customers, subscribers, and/or other users may be registered or entitled Users of virtual machines hosted in the one or more cloud can receive technical support, help desk, updating, and/or other support directly from the service aggregation platform, or indirectly through the vendor. The aggregation platform can serve as a trusted portal for delivery of software certification, dependency testing, issue resolution, and/or other degrees or types of support. | 2011-06-02 |
20110131307 | METHOD AND NODE FOR APPLYING A POLICY TO A SESSION BASED ON A PREVIOUSLY PREDICTED SESSION STATE - A method and a policy enforcement point are provided for applying policies to a session. An eventual state of the session is predicted in a prediction engine of a policy enforcement point. The predicted state is sent to a policy controller, which returns a policy for the predicted state. If the predicted state, or a similar state, is detected, the policy enforcement point applies the policy for the predicted state to the session. | 2011-06-02 |
20110131308 | Method And Arrangement To Maintain A TCP Connection - The present invention relates to a method and an arrangement to maintain a TCP connection ( | 2011-06-02 |
20110131309 | DYNAMIC SERVICE LEVEL AGREEMENT FOR CLOUD COMPUTING SERVICES - A method for dynamically updating a service level agreement, performed by a cloud computing server, includes storing a preference for service selection, acquiring an actual usage level of a first service provided to a user during a predetermined time period in accordance with a first service level agreement, determining a second service level agreement different from the first service level agreement based on the actual usage level acquired during the predetermined time period, and selecting a second service that satisfies the second service level agreement. | 2011-06-02 |
20110131310 | MULTI-HOMED COMMUNICATION APPARATUS, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - A communication apparatus able to maintain and improve the security at the time of retransmission of stored data to a network even in a network environment where multi-home connection can be made. When receiving a job through a network, the communication apparatus identifies the network through which the job is received, adds network information representing the identified network to the job, and stores the network information into a management table when the job is stored into an image forming apparatus. When acquisition of any of data stored in the image forming apparatus is requested by a terminal apparatus, whether a transmission condition is satisfied is determined based the network information for the requested data and transmission destination network information in the management table, and the requested data is transmitted, if the transmission condition is satisfied. | 2011-06-02 |
20110131311 | Optimizing Buddy Finder Telecommunication Service - A service is provided to users of communication devices present in a geographic service area. Each device is associated with a specific user. The service comprises conditionally alerting a user, via his/her communication device, to a presence of another device of another user. The alerting occurs if the other user is registered as a buddy of the user and if a geographical distance between the user's device and the buddy's device is smaller than a pre-determined threshold. A succession of polling cycles is run. In each polling cycle, the mobile devices are sequentially polled based on location and according to a ranking determined in a preceding polling cycle that minimizes a value of a sum of terms. Each respective term indicates a respective difference between rankings of the mobile device of the respective user and of the mobile device of the buddy of the respective user. | 2011-06-02 |
20110131312 | METHOD OF OPERATING A TELECOMMUNICATIONS NETWORK - In a method of operating a data network comprising a plurality of interconnected nodes ( | 2011-06-02 |
20110131313 | METHOD FOR PROVISIONING AND INSTALLING EVENT TRIGGERS - The present invention provides a method for provisioning and installing event triggers, which is applied to an evolved packet system. The method comprises: a policy and charging rules function entity provisions event triggers to a bearer binding and event reporting function entity based on gateway control session level; after receiving the provisioned event triggers, the BBERF installs or updates the event triggers. An evolved packet system is further provided. | 2011-06-02 |
20110131314 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING AT LEAST ONE POLICY FOR FACILITATING COMMUNICATION AMONG A PLURALITY OF ENTITIES - Methods and apparatus are described for facilitating communication among a plurality of entities via an interoperability network. Each entity has policy data corresponding thereto governing interaction with the entity via the interoperability network. A message is transmitted from a first one of the entities to a second one of the entities. The first entity has first policy data corresponding thereto and the second entity has second policy data corresponding thereto. The transmitted message was handled in the network according to combined policy data representing a combination of the first and second policy data. | 2011-06-02 |
20110131315 | METHODS AND SYSTEMS FOR VERIFYING SOFTWARE LICENSE COMPLIANCE IN CLOUD COMPUTING ENVIRONMENTS - A monitoring system can monitor computing processes in clouds. The monitoring system can verify software license compliance in the computing processes instantiated in the clouds. The monitoring system can generate and maintain a software license knowledge base. The software license knowledge base can include the software license requirements for various software programs. To verify software license compliance, the monitoring system can determine the software programs utilized by the computing processes instantiated in the clouds. The monitoring system can compare the software programs utilized by the computing processes to the software license knowledge base to determine the number of software licenses required by the computing processes. The monitoring system can compare the number of software licenses required to the number of software licenses currently held by the user to determine if the user is in compliance. | 2011-06-02 |
20110131316 | METHODS AND SYSTEMS FOR DETECTING EVENTS IN CLOUD COMPUTING ENVIRONMENTS AND PERFORMING ACTIONS UPON OCCURRENCE OF THE EVENTS - A monitoring system can monitor computing processes in clouds. The monitoring system can monitor the clouds for certain events associated with the computing processes. The monitoring system can receive, from the user, a particular event and an action to perform upon the occurrence of the event. Once received, the monitoring system can compare the information collected during monitoring against the event specified by the user. Once the event occurs, the monitoring system can perform the action associated with the event. | 2011-06-02 |
20110131317 | Coverage Gap Detection In Wireless Networks - Embodiments are described herein to provide a general approach to wireless coverage gap detection. One general approach involves network equipment comparing ( | 2011-06-02 |
20110131318 | HIGH AVAILABILITY ENABLER - Embodiments of the invention provide systems and methods for interacting with a high availability session. According to one embodiment, a method of providing high availability can comprise abstracting one or more functions of a high availability infrastructure via a high availability enabler and providing access to the abstracted one or more functions via a northbound interface of the high availability enabler. For example, the one or more functions of the high availability infrastructure can comprise session control, either synchronous session control or asynchronous session control, concurrency management, data distribution, e.g., possibly including storing at least some of the data local to the high availability enabler, caching, session replication, providing fault tolerance, providing predictable latencies, etc. The high availability infrastructure can comprise, for example JGroups, Oracle Coherence, or another high availability infrastructure. The method can include decoupling application level processing from protocol level processing via the high availability enabler. | 2011-06-02 |
20110131319 | SYSTEMS AND METHODS FOR OPTIMIZING CHANNEL RESOURCES BY COORDINATING DATA TRANSFERS BASED ON DATA TYPE AND TRAFFIC - A networked computing system for optimizing network channel resources. The system includes a sender device, user equipment, a congestion sensing agent, a data transfer agent, and a data communications network facilitating data communications amongst all devices of the system. The networked computing system is configured to detect a portion of channel traffic that is associated with a first data type, detect a portion of the channel traffic that is associated with a second data type, and determine whether to modify at least one data transfer of the second data type based on a comparison of the portions of the channel traffic associated with the first data type and the second data type. The first data type may relate to either voice data communications or another high priority data type, and the second data type may relate to a media content file type. | 2011-06-02 |
20110131320 | APPARATUS AND METHOD OF DYNAMICALLY MANAGING SENSOR MODULE ON SENSOR NODE IN WIRELESS SENSOR NETWORK - Provided is an apparatus and method of dynamically managing a sensor module on a sensor node in a wireless sensor network. The apparatus includes an update unit, a request unit, and a transmission unit. If a change occurs in sensor data corresponding to each sensor node stored in a sensor information storage server, the update unit receives the sensor data from the sensor information storage server, and transmits the received sensor data to the corresponding sensor node. The request unit requests the sensor data from the sensor information storage server upon receipt of a sensor data request message from the sensor node. The transmission unit receives the requested sensor data from the sensor information storage server and transmits the received sensor data to the sensor node. | 2011-06-02 |
20110131321 | MOBILE COMPUTING DEVICE AND METHOD WITH INTELLIGENT PUSHING MANAGEMENT | 2011-06-02 |
20110131322 | METHOD AND APPARATUS FOR ACCESSING FILES STORED IN A STORAGE ACCESS NETWORK (SAN) OR NETWORK ATTACHED STORAGE (NAS) - A method and apparatus for file access in a storage access network (SAN) wherein a portion of a first file is accessed and an access rate computed based on time and amount of data accessed. If the computed access rate is less than an expected rate, a problem is identified and analysis performed. A first analysis accesses the first file through a second link to determine if the link is the problem. If the first file is accessed at an expected rate, the first link is identified as the problem and the file is accessed through an alternate link. A second analysis accesses a second file through the first link. If the second file is accessed at an expected rate, the first file is identified as the problem and the second file is accessed through the first link. | 2011-06-02 |
20110131323 | INFORMATION COLLECTION DEVICE, INFORMATION COLLECTION PROGRAM, AND METHOD - An information collection device acquires information from a plurality of devices connected through a network. The information collection device includes: a first addition unit that adds, for each of the devices, an information collection duration required to collect information of the devices to a communication duration required to communicate with the devices; a second addition unit that adds a maximum duration among the durations by addition of the first addition unit to a predetermined time to obtain a first time; a subtraction unit that subtracts the information collection duration of each of the devices from the first time; a first setting unit that sets a time obtained by the subtraction unit as a second time that is when information collection starts at each of the devices; and an acquisition unit that acquires information obtained by the information collection that starts at the second time. | 2011-06-02 |
20110131324 | MANAGING NETWORK SECURITY - Technology for network security is disclosed. In one embodiment, a method of managing network security includes receiving sampled packets. The sampled packets represent packets being sampled from network packet traffic in at least one location in a network. The sampled packets are converted into an appropriate format for analysis to form converted packets. Moreover, the converted packets are sent to a first group including at least one security device for analysis. If an event message is generated by the at least one security device as a result of analysis of the converted packets, the event message is received from the at least one security device. Network security is evaluated based on the event message and security policies and is adjusted based on that evaluation. The method may be implemented with a network manager. | 2011-06-02 |
20110131325 | System and process for limiting distribution of information on a communication network based on geographic location - A communications system includes a plurality of recipient processors located at geographically remote locations with respect to each other and connected for communication with an information provider processor, over the communications network. The provider and recipient processors may comprise respective computers coupled for communication on the Internet or WWW. The provider processor is capable of providing information from any suitable source, by communicating such information over a communication network. However, access to the information by the recipient processors is controlled, based geographic location or region of the recipient processors and time information and, for some systems, a set of rules relating to a further condition. | 2011-06-02 |
20110131326 | Arrangements and Methods for Access to Stored Data - An access server generates a handshake with storage servers resulting in more rapid access to the stored data, for example, video data, by a user. The handshake also results in load balancing effects. | 2011-06-02 |
20110131327 | AUTOMATIC NETWORK DOMAIN DIAGNOSTIC REPAIR AND MAPPING - An automatic network domain diagnostic, repair, and mapping tool facilitates access by a user to shared resources on a network. A user provides an address, such as a domain name system (DNS) address, of the shared resource and user identification information, such as a username and password. The provided address is checked and repaired if necessary to identify the network server having the shared resource. The identified server is checked, such as by pinging the server, to ensure that it is actually responding. The supplied user identification is checked, such as by querying a domain controller, to confirm whether the user identification corresponds to an existing account. When the checks are complete, and everything is found to be in order, the shared resource is mapped automatically for the user. | 2011-06-02 |
20110131328 | NETWORK BUFFER ALLOCATIONS BASED ON CONSUMPTION PATTERNS - A buffer manager allocates and logs network buffers for a non-uniform memory access (NUMA) machine is described. In one embodiment, the buffer manager receives information about an allocated network buffer. The buffer manager determines the allocation point of the buffer and logs information about the allocation point and a consumption profile information. This logged information is analyzed to determine a per-process buffer consumption profile. The NUMA machine is configured using the buffer consumption profile. | 2011-06-02 |
20110131329 | APPLICATION PROCESSING ALLOCATION IN A COMPUTING SYSTEM - A method for allocating processing of an application performed by a computing system made up of a plurality of interconnected physical computing devices includes executing an application on a first application server associated with the computing system, the application having a number of modular software components; while executing the application, measuring processing resources consumed by one of the modular software components; and in response to one of the modular software components consuming an amount of processing resources defined by a criterion, deploying the one of the modular software components to a second application server associated with the computing system. | 2011-06-02 |
20110131330 | COLLOCATING DESKTOP VIRTUAL MACHINES TO PROXIMITY OF THE USER - A plurality of master desktop images for a plurality of users are stored at a plurality of geographically diverse data centers. At a first one of the data centers, a virtual desktop is constructed for a remote client. The virtual desktop is constructed from a given one of the master desktop images at the first one of the data centers and an individualized delta image for a user associated with the remote client. When it is determined that the remote client is at a geographical location wherein the first one of the data centers is not the closest one of the data centers to the remote client, the virtual desktop for the remote client is reconstructed at a second, closest, one of the data centers. The virtual desktop is reconstructed from a given one of the master desktop images at the second one of the data centers and the individualized delta image for the user associated with the remote client. A copy of the individualized delta image is moved from the first one of the data centers to the second one of the data centers to facilitate reconstructing the virtual desktop. | 2011-06-02 |
20110131331 | ALTERNATIVE BANDWIDTH MANAGEMENT ALGORITHM - Methods, systems, and devices are provided that propose allocating bandwidth in a distributed network. According to a decentralized mode of operation, bandwidth between network devices is cooperatively shared and managed, allowing one or more call processing modules to selectively and intelligently place calls or perform activities. A single authoritative mode of operation for a given communication link is also provided, wherein one or more network devices may consult an authoritative member to determine if sufficient bandwidth is available to support an activity. Various triggering events or conditions may facilitate the transition from one mode to another. Audits or accountings are conducted, wherein devices may update or synchronize information stored in a control table related to system bandwidth. | 2011-06-02 |
20110131332 | METHOD AND APPARATUS FOR TRANSFERRING A MEDIA SESSION - Various methods for transferring a media session are provided. One example method includes triggering a media session transfer from a media receiver device, and providing a session transfer message to a network device. In this regard, the media receiver device and network device have communications connections to a network. Similar and related example methods and example apparatuses are also provided. | 2011-06-02 |
20110131333 | DEVICE, SYSTEM AND METHOD FOR REMOTE IDENTIFICATION, MANAGEMENT AND CONTROL OF SEPARATE WIRELESS DEVICES BY LINKED COMMUNICATION AWARENESS AND SERVICE LOCATION - Systems and methods are operable to limit use of a Controlled Wireless Device within a controlled environment. An exemplary embodiment establishes a first wireless communication link between a Controlled Wireless Device and a Linked Context Aware Communication and Control Device (LCACCD) Platform, detects proximity of the Controlled Wireless Device to the controlled environment, communicates a control signal from the LCACCD Platform to the Controlled Wireless Device when the Controlled Wireless Device is within the controlled environment, and controls communications of the Controlled Wireless Device based upon the communicated control signal, wherein the Controlled Wireless Device is communicating over a second wireless link established with a wireless carrier network. | 2011-06-02 |
20110131334 | ELECTRONIC APPARATUS AND COMMUNICATION CONTROL METHOD - According to one embodiment, an electronic apparatus includes a communication module, a connection request transmitter, a connection response receiver, a response time measuring module, a stability determination module, and a connection controller. The communication module executes close proximity wireless communication. The connection request transmitter transmits a connection request signal to an external device. The connection response receiver receives from the external device a connection response signal responding to the connection request signal. The response time measuring module measures a response time indicative of an elapsed time from the transmission of the connection request signal to the reception of the connection response signal. The stability determination module determines whether communication between the communication module and the external device is in a stable state based on the response time. The connection controller establishes connection between the communication module and the external device when the communication is in the stable state. | 2011-06-02 |
20110131335 | METHODS AND SYSTEMS FOR CLOUD COMPUTING MANAGEMENT - Disclosed is a management service that enables a user to establish, monitor, and control cloud computing sessions offered via third-party service providers. In some instances, the management service establishes a market space that allows a user to establish a customized cloud computing session based on computing resources offered by third-party service providers. In some instances, the management service instantiates monitoring mechanisms within the virtual servers of the cloud computing sessions to be able to monitor, assess, and provide reports and alerts pertaining to performance metrics of the various virtual servers. In some instances, the management service also allows a user to remotely transfer services from a first cloud computing session to a second cloud computing session. | 2011-06-02 |
20110131336 | METHOD AND DEVICE FOR FILE TRANSMISSION BASED ON MULTIPLE PROTOCOLS - The present invention relates to method and device for file transmission based on multiple protocols. According to an embodiment of the present invention, there is provided a method in a user node of downloading files, comprising the steps of: A. intercepting a request message from an application functional entity, for requesting a file based on a first protocol; B. downloading said file at least based on a second protocol; C. providing said file to said application functional entity. With the method, software, storage media provided in the present invention, faster download speed could be obtained when the client downloads files from the network base on the first protocol, compared with that obtained in the traditional C/S mode, therefore the user experience is improved. | 2011-06-02 |
20110131337 | MOBILE DEVICE AND CONTROL METHOD THEREOF - The mobile device includes a communication unit which performs communication through a network; and a control unit which executes an application prepared by an application programming interface (API) of the network function provided by a platform, and controls the communication unit to perform communication in accordance with a setup of a preferred network if the application includes the setup of the preferred network. | 2011-06-02 |
20110131338 | SERVICE-BASED ROUTING FOR MOBILE CORE NETWORK - System(s), method(s), and device(s) that enable establishment of data session based in part on services are presented. When establishing a data session for a communication device, the desired mobility gateway can be dynamically assigned via a specified policy mechanism or provisioned using a predefined service policy table, where particular services are linked with respective identifiers associated with respective mobility gateways. A communication device can reference the service policy table to locate a service that is to be used for the data session and can identify an identifier(s) linked to the service(s) and associated with a mobility gateway(s). The identifier(s) can be received and used to facilitate selecting one or more respective mobility gateways for the data session(s). The service policy table can be automatically pushed to the communication device or the communication device can initiate a download of the service policy table when the default data connection is established. | 2011-06-02 |
20110131339 | DATA ACCESS CONTROL METHOD AND SYSTEM - A data access control method and system. The method includes receiving by a computer processor from a requestor, a request for access to data. The computer processor extracts from the request, a requestor identification string associated with the requestor. The computer processor verifies a match for the requestor identification string, a service requestor identification string, a requestor software component operating process identification string, a requestor server identification string, a requestor hardware device network address and a requestor MAC address, and a requestor hardware device identification string against a plurality of registries. The computer processor generates an access point door associated with a specified logical storage room representation comprising the data. The computer processor enables access to the data via the access point door and the specified logical storage room representation. | 2011-06-02 |
20110131340 | Media Usage Monitoring and Measurement System and Method - Media monitoring and measurement systems and methods are disclosed. Some embodiments of the present invention provide a media measurement system and method that utilizes audience data to enhance content identifications. Some embodiments analyze media player log data to enhance content identification. Other embodiments of the present invention analyze sample sequence data to enhance content identifications. Other embodiments analyze sequence data to enhance content identification and/or to establish channel identification. Yet other embodiments provide a system and method in which sample construction and selection parameters are adjusted based upon identification results. Yet other embodiments provide a method in which play-altering activity of an audience member is deduced from content offset values of identifications corresponding to captured samples. Yet other embodiments provide a monitoring and measurement system in which a media monitoring device is adapted to receive a wireless or non-wireless audio signal from a media player, the audio signal also being received wirelessly by headphones of a user of the monitoring device. | 2011-06-02 |
20110131341 | SELECTIVE CONTENT PRE-CACHING - A selective pre-caching system reduces the amount of content cached at cache proxies by limiting the cached content to that content that a particular cache proxy is responsible for caching. This can substantially reduce the content stored on each cache proxy and reduces the amount of resources consumed for pre-caching in preparation for a particular event. The cache proxy receives a list of content items that and an indication of the topology of the cache network. The cache proxy uses the received topology to determine the content items in the received list of content items that the cache proxy is responsible for caching. The cache proxy then retrieves the determined content items so that they are available in the cache before client requests are received. | 2011-06-02 |
20110131342 | MULTI-PROTOCOL NETWORK REGISTRATION AND ADDRESS RESOLUTION - The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints. | 2011-06-02 |