29th week of 2013 patent applcation highlights part 54 |
Patent application number | Title | Published |
20130185327 | NAME SEARCH USING MULTIPLE BITMAP DISTRIBUTIONS - Provided are techniques for matching names. For a first bitmap distribution, it is determined whether a first bitmap signature of a query name and a second bitmap signature of a target name have a number of character n-grams overlapping that meet or exceed a threshold to generate a first preliminary value. For a second bitmap distribution that is different from the first bitmap distribution, it is determined whether a third bitmap signature of the query name and a fourth bitmap signature of the target name have a number of character n-grams overlapping that meet or exceed a threshold to generate a second preliminary value. The first preliminary value and the second preliminary value are combined, and, if the combination results in a value of true, it is determined that the query name and the target name are to be further processed. | 2013-07-18 |
20130185328 | APPARATUS AND METHOD FOR PROCESSING A MULTIDIMENSIONAL STRING QUERY - Provided are an apparatus and method for processing a multidimensional string query. Using the apparatus and method, a search of a multidimensional multi-attribute string may be rapidly processed on the basis of a multidimensional n-gram index. | 2013-07-18 |
20130185329 | DISTRIBUTED DATABASE - According to a first aspect of the present invention there is provided a method of operating a distributed database comprising a plurality of database nodes. The method comprises, at a first database node of the plurality of database nodes, receiving a request to manipulate data from a client (B1), determining if the data is stored or is intended to be stored at the first database node and, if the data is not stored or is not intended to be stored at the first database node, forwarding the request towards a second database node of the plurality of database nodes (B2) and, prior to receiving a final response from the second database node, sending an early response to the client indicating that the data manipulation has been successful (B3). | 2013-07-18 |
20130185330 | RULE-DRIVEN RUNTIME CUSTOMIZATION OF KEYWORD SEARCH ENGINES - Described herein are methods, systems, apparatuses and products for rule-driven runtime customization of keyword search engines. An aspect provides a method for rule-driven customization of keyword searches, including: receiving by a computer an input keyword query; determining from the input keyword query and a dataset to be queried at least one rule selected from the group consisting of: a re-write rule; a category ranking rule, and a category grouping rule; and applying the at least one rule to generate search results based on domain knowledge of the dataset. Other embodiments are disclosed. | 2013-07-18 |
20130185331 | Medical Imaging Management System - An improved system, method, and computer-readable instructions for medical image management is provided. The system includes one or more server devices adapted to receive and centrally store a plurality of medical images in a cloud environment, wherein metadata is separated from image data via the processor; the server devices adapted to provide access to the medical images via a remote log in upon authentication via the processor, wherein the access comprises access to view data authorized for the particular user and images associated therewith; and enable viewing of accessed data via a remote viewing device for the particular user that deploys a cloud-enabled application in the cloud environment rather than downloading the images to the remote device. | 2013-07-18 |
20130185332 | SECURE SEARCH PERFORMANCE IMPROVEMENT - A flexible and extensible architecture allows for secure searching across an enterprise. Such an architecture can provide a simple Internet-like search experience to users searching secure content inside (and outside) the enterprise. The architecture allows for the crawling and searching of a variety or of sources across an enterprise, regardless of whether any of these sources conform to a conventional user role model. The architecture further allows for security attributes to be submitted at query time, for example, in order to provide real-time secure access to enterprise resources. The user query also can be transformed to provide for dynamic querying that provides for a more current result list than can be obtained for static queries. | 2013-07-18 |
20130185333 | System and Method for Secure Reciprocal Exchange of Data - A system for transmission of data between a first device operated by a first user and a second device operated by a second user comprises a database that is in network communication with the first device and the second device. The database receives a first set of data input by the first user and a second set of data input by the second user. Additionally, the database allows the second user to access a first portion of the first set of data only after the second user authorizes the first user via the database to access a first portion of the second set of data. The database can be configured so that the first user is authorized by the second user once the first user inputs a user-specific identifier of the second user into the database. | 2013-07-18 |
20130185334 | OBJECT BASED CONTENT MANAGEMENT SYSTEM AND METHOD - A method and system disclosed herein can be used to determine relationships between objects, determining which of those relationships are significant for a specific action, and determining physical dependencies between the objects. The method and system can be used to perform actions consistent with integrity constraints, and therefore, performs the actions in the correct order with a reduced likelihood of errors. The method and system are highly beneficial in that they can significantly enhance content management and can be implemented without having to write new or edit existing applications. Also, existing content data and applications may be used without any changes. Accordingly, the method and system can be advantageously useful in deploying or otherwise pushing out new content to existing content systems. | 2013-07-18 |
20130185335 | METHOD AND APPARATUS FOR IMPLEMENTING A LEARNING MODEL FOR FACILITATING ANSWERING A QUERY ON A DATABASE - A method and apparatus for implementing a learning model for facilitating answering a query on a database. Example embodiments include processing logic to: receive access to a database having a plurality of rows; determine for each row in the plurality of rows which of a plurality of child nodes to associate with a row based on the row and current parameters, where the current parameters correspond to parameters of a probability distribution for the plurality of child nodes; determine new parameters for the plurality of child nodes based on associated rows of the plurality of rows; determine whether or not to return a result which indicates the new parameters based on the current parameters, the new parameters, and the plurality of rows; and return a result which indicates the new parameters. | 2013-07-18 |
20130185336 | SYSTEM AND METHOD FOR SUPPORTING NATURAL LANGUAGE QUERIES AND REQUESTS AGAINST A USER'S PERSONAL DATA CLOUD - A machine-implemented method for supporting a natural language user request against a user's personal data cloud can include a machine receiving the natural language user request from the user, determining a semantic interpretation of the natural language user request, querying a semantically-indexed, integrated knowledge store based on the semantic interpretation, and responding to the natural language user request by displaying results of the querying, wherein the results correspond to an item within the user's personal data cloud. | 2013-07-18 |
20130185337 | MEMORY ALLOCATION BUFFER FOR REDUCTION OF HEAP FRAGMENTATION - Systems and methods of a memory allocation buffer to reduce heap fragmentation. In one embodiment, the memory allocation buffer structures a memory arena dedicated to a target region that is one of a plurality of regions in a server in a database cluster such as an HBase cluster. The memory area has a chunk size (e.g., 2 MB) and an offset pointer. Data objects in write requests targeted to the region are received and inserted to the memory arena at a location specified by the offset pointer. When the memory arena is filled, a new one is allocated. When a MemStore of the target region is flushed, the entire memory arenas for the target region are freed up. This reduces heap fragmentation that is responsible for long and/or frequent garbage collection pauses. | 2013-07-18 |
20130185338 | EFFICIENT GARBAGE COLLECTION IN A COMPRESSED JOURNAL FILE - A map corresponding to data blocks with overwritten compressed journal entries is configured. Weighted conditions for each of the overwritten compressed journal entries are calculated. The weighted conditions are arranged in the map from lowest to highest. One of the weighted conditions includes a biasing variable towards selecting data blocks having free space at an end of at least one associated record. | 2013-07-18 |
20130185339 | CALCULATION OF PROPERTIES OF OBJECTS/SHAPES ACROSS VERSIONS OF APPLICATIONS - Systems and methods are disclosed in which a self-describing file is generated and utilized to provide applications with the ability to properly preserve unknown file content. A self-describing file may contain, or be associated with, an extension section that provides information that an application can use to properly calculate unknown file content. The extension section may include functions of formulas that the application can use to calculate values for data that the application would not otherwise support. This allows for the content of the self-describing file to be modified by an application that does not support all of the capabilities of the file while maintaining the integrity of the file and user experience when the file is subsequently accessed by a full featured application. | 2013-07-18 |
20130185340 | METHOD AND APPARATUS TO INSERT A SCANNED DOCUMENT - A method of inserting a scanned document includes inputting a user command to select a position in a first document file where to insert a second document file, generating a file corresponding to the second document file, to have same format as the first document file, and generating a third document file in which the second document file is inserted in the first document file, at the selected position. | 2013-07-18 |
20130185341 | USE OF DELETE NOTIFICATIONS BY FILE SYSTEMS AND APPLICATIONS TO RELEASE STORAGE SPACE - In accordance with one or more aspects, one or more portions of at least one file that have been freed are determined. One or more delete notifications are generated that identify the one or more portions of the at least one file. Each portion is identified as a range of data on a storage device, and each delete notification includes one or more ranges of data on the storage device. A determination is made as to when to send the generated delete notifications based on one or more threshold-based criteria. These generated delete notifications are then sent to a storage stack. | 2013-07-18 |
20130185342 | MANAGING GLOBAL CACHE COHERENCY AND ACCESS PERMISSIONS - Systems. Methods, and Computer Program Products are provided managing a global cache coherency and reducing messaging traffic for coordination of access permissions in a distributed shared caching for a clustered file systems (CFS). The CFS manages access permissions to an entire space of the data segments by using the DSM module. In response to processing a request message from a remote DSM module to access one of the data segments, including in a response message permission to access the one of the data segments, and deciding if one of a transfer of ownership, and most recent contents of the one of the data segments should be included in the response message for the permission to access the one of the data segments. The last two components of the response message depend upon availability of the one of the data segments that is requested in a local external cache. | 2013-07-18 |
20130185343 | SPACE EFFICIENT COUNTERS IN NETWORK DEVICES - A network device includes a memory and a counter update logic module. The memory is configured to store a plurality of bits. The counter update logic module is configured to estimate a count of quanta within a plurality of data units in a data flow based on statistical sampling of the plurality of data units, and to store the estimated count of quanta in the memory as m mantissa bits and e exponent bits. Them mantissa bits represent a mantissa value M and the e exponent bits represent an exponent value E. | 2013-07-18 |
20130185344 | MODIFIED GABOR TRANSFORM WITH GAUSSIAN COMPRESSION AND BI-ORTHOGONAL DIRICHLET GAUSSIAN DECOMPRESSION - A signal processor for compressing signal data, including a function shapes generator for receiving as input time and frequency scale parameters, and for generating as output a plurality of shape parameters for a corresponding plurality of localized functions, wherein the shape parameters govern the centers and spreads of the localized functions, a matrix generator for receiving as input the plurality of shape parameters and a sequence of sampling times, and for generating as output a matrix whose elements are the values of the localized functions at the sampling times, a signal transformer for receiving as input an original signal and the matrix generated by the matrix generator, and for generating as output a transformed signal by applying the matrix to the original signal, and a signal compressor for receiving as input the transformed signal, and for generating as output a compressed representation of the transformed signal. | 2013-07-18 |
20130185345 | ALGEBRAIC PROCESSOR - An algebraic processor as part of a wireless telecommunication system, including pre-computed Look Up Tables (LUT), used for computing a number of different functions using linear interpolation. Preferably, the step of computing is implemented in a multiplier-accumulator having a SIMD structure. | 2013-07-18 |
20130185346 | PROOFING ELECTRONIC PUBLICATIONS ON PORTABLE DEVICES - A user can proof (e.g., view, review) an electronic publication on a portable device. When the user finds errors in the electronic publication on the portable device, the user can edit the electronic publication on the editing device. The changes can be automatically synchronized with the portable device and displayed so that the user can review the changes and continue proofing the electronic publication on the portable device. In some implementations, an editing device can monitor files associated with an electronic publication for changes to the files and, when changes are detected, the files can be automatically synchronized to a portable device coupled to the editing device. | 2013-07-18 |
20130185347 | PROVIDING CONTEXTUAL INFORMATION ASSOCIATED WITH A COMMUNICATION PARTICIPANT - Contextual information associated with a party in a communication instance is provided to a user upon request. The communication instance can comprise a voice call, email, or video conference. If there is more than one party associated with the communication instance, the user may select the participating party from among several participating parties. The user may indicate the type of contextual information to be searched. The types of contextual information may include documents, spreadsheets, presentations, call records, emails, or other information associated with the selected participant. Contextual information search results comprising a list of file names of the selected file type are provided to the user. The user may further select a specific file name and, in response, view a thumbnail image of the file. A list of potential contextual information sources may be defined for each user. | 2013-07-18 |
20130185348 | CLIENT APPLICATION INTEGRATION FOR WORKFLOWS - A method for providing client application integration for workflow management includes receiving a verification file, accessing a file through a client application, determining, based on the verification file, whether the accessed file includes a reference to a workflow component of a workflow stored on a server, retrieving the workflow component from the server, and displaying the workflow component referenced by the accessed file via an in-line user interface of the client application, further including displaying at least one selectable workflow management option for managing the workflow component using the client application. | 2013-07-18 |
20130185349 | METHOD AND APPARATUS FOR A MULTIPLEXED ACTIVE DATA WINDOW IN A NEAR REAL-TIME BUSINESS INTELLIGENCE SYSTEM - Optimizing a set of graphical display elements on a client device. A first set of graphical display elements may be transmitted from a first server to a client device. A second set of graphical display elements may be generated on a second server. The second set of graphical display elements may be transmitted from the second server to the client device. A third set of graphical display elements may be created in a first window including the first set of graphical display elements and the second set of graphical display elements. | 2013-07-18 |
20130185350 | Instructing web clients to ignore scripts in specified portions of web pages - A web client is controlled to actively ignore scripts in certain portions of a web document using control instructions in the form of a special pair of markup language “tags.” A tag pair of this type is defined by a first tag, and a second tag paired with the first tag to form the tag pair. Each of the first and second tags includes a same identifier, and the tag pair is adapted to be recognized by a browser interpreter to instruct the web client to ignore given information located with the tag pair. Thus, when a web document is received by a web client, it is parsed (by the interpreter) in the usual manner. Upon determining that the tag pair is present, the browser bypasses (ignores) given information (typically, a script) located with the tag pair. Bypassing the script reduces the possibility that the script can be used for malicious purposes, such as an XSS attack. | 2013-07-18 |
20130185351 | SYSTEM AND METHOD FOR REMOTELY OPERATING A WIRELESS DEVICE USING A SERVER AND CLIENT ARCHITECTURE - The present disclosure relates to a system and method for remotely operating one or more peripheral devices of a wireless device using a server and client architecture. In one aspect, the system may comprise a wireless device that includes a processor, a memory, a peripheral device, and a server adapted to communicate with the peripheral device; and a removable media device that includes a memory, a processor, and a client adapted to communicate with the server of the wireless device. In another aspect, the method may comprise the steps of emulating a hardware interface on a removable media device; mapping a peripheral device of a wireless device to the interface; mapping a processor of the media device to the peripheral device; wrapping and sending hardware commands from a client of the media device to a server of the wireless device; and executing the commands on the peripheral device. | 2013-07-18 |
20130185352 | SYSTEMS, COMPUTER PROGRAM PRODUCTS, AND METHODS FOR GENERATING CUSTOM WEB PAGES FOR MOBILE DEVICE - A system generating a web page portal customized for a particular requesting mobile device is disclosed. The system includes an information store having multiple groups, each associated with device qualifications, web-design characteristics, and device identifications. The system also includes a custom web page development database (CWDD) including a plurality of web page component modules storing forms of web page components, and a custom web page development server (CWDS). The CWDS (i) receives an incoming request for a web page from the particular requesting mobile device, (ii) identifies a device type, and (iv) determines an applicable group. The CWDS also (v) obtains web-design characteristics from the applicable group, (vi) accesses the CWDD and obtains applicable web page components based on the web-design characteristics obtained from the applicable group of the information store, and (vii) generates the custom web page portal using the applicable web page components obtained from the CWDD. | 2013-07-18 |
20130185353 | METHOD, SERVER AND TERMINAL FOR GENERATING A COMPOSITE VIEW FROM MULTIPLE CONTENT ITEMS - A method for generating a composite view ( | 2013-07-18 |
20130185354 | Social Networking Data Augmented Gaming Kiosk - In particular embodiments, a gaming kiosk may be granted federated access to social networking information of a user, initiated upon activation of a physical access token. A user may initiate a workflow, by activating a physical token, that establishes a federated access session between a gaming kiosk and a social networking system to allow the gaming kiosk to augment the user's experience with social networking information and to publish gaming information to the social networking system. | 2013-07-18 |
20130185355 | Recommendations Based On Geolocation - In one embodiment, a method includes accessing data indicating the geolocation of the mobile computing device of a user of a social-networking system, identifying one or more nodes of the social graph associated with a location within a pre-determined threshold distance of the user's location, determining one or more recommendations for the user based at least in part on the nodes, and providing the recommendations to the mobile computing device of the user. | 2013-07-18 |
20130185356 | CONFERENCE SUPPORTING SYSTEM - According to one embodiment, a conference supporting system includes: a material-data managing section configured to manage conference material data; a material-data distributing section configured to distribute material data of the material-data managing section according to a distribution request; information terminal sections configured to receive the material data through communication with the material-data distributing section and transmit rendering data generated by participants; and an additional-data managing section configured to manage, as additional data, the rendering data transmitted from the information terminal sections, distribute, to another information terminal section, rendering data transmitted from a specific information terminal section, and determine the distribution of the rendering data according to an instruction to continuously display or not to continuously display the rendering data. | 2013-07-18 |
20130185357 | Method for Advertising and Marketing Goods and Services Using an Online Lifestyle Shopping Center - A social networking system electronically assimilates a database of social networking system (SNS) member profiles and associated brand websites on a server connected by a data communications network to a plurality of remote computers. The system utilizes a respective psychographic profile to establish a lifestyle center website on the social networking system server, and the lifestyle center website includes a first set of digital content data related to the psychographic profile. The lifestyle center website displays an anchor tenant website hosted on the SNS server and having a second set of digital content data related to the psychographic profile. The system further identifies social networking system member profiles that match the identified psychographic profile for the lifestyle center website. The system allows SNS members and brand owners to connect within the social networking system for a more efficient online shopping experience. | 2013-07-18 |
20130185358 | PROMOTING INTEROPERABILITY OF PRESENCE-BASED SYSTEMS THROUGH THE USE OF UBIQUITOUS ONLINE IDENTITIES - A client system is configured to submit a request to a first instant messaging system for access to the first instant messaging service The request includes an online identity that is currently being used to access a second instant messaging service associated with the second instant messaging system. The second instant messaging system is configured to send a message to the first instant messaging system that indicates the online identity is currently being used to access a second instant messaging service associated with the second instant messaging system. The first instant messaging system maintains a profile that is updated to indicate that the online identity is currently being used to access the first instant messaging service and, in response to the message, the profile is also updated to indicate that the online identity is currently begin used to access the second instant messaging service. | 2013-07-18 |
20130185359 | METHOD AND APPARATUS FOR CONTEXT-BASED GROUPING - An approach is provided for determining context-based groups based on context information. An input from a device specifying one or more criteria to determine a context-based group from among a plurality of other devices is received. The context information associated with the plurality of other devices is determined. The context-based group is determined based, at least in part, on the context information and the criteria. | 2013-07-18 |
20130185360 | SYSTEM AND METHOD FOR REVIEWING ATTACHMENT CONTENT ON A MOBILE DEVICE - Messages with an associated attachment document are first delivered to a mobile device without the attachment document. If the mobile device user wishes to review attachment data related to the attachment document, the user submits an attachment processing request to an attachment server that handles the attachment processing requests to provide the attachment data in one of several possible formats to the user. | 2013-07-18 |
20130185361 | TRANSMITTAL OF BLOCKED MESSAGE NOTIFICATION - A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system. | 2013-07-18 |
20130185362 | Installation and Management of Client Extensions - Application extension management may be provided. Upon logging into a user device by a user, a list of a plurality of extensions associated with the user may be retrieved from a central repository. Access to each of the plurality of extensions associated with the user on the user device may then be provided to the user device. | 2013-07-18 |
20130185363 | Selective Display of Past Instant Messages - A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant. | 2013-07-18 |
20130185364 | EMAIL APPLICATIONS - A machine-readable storage device contains machine-readable instructions that, when executed by a processor, cause the processor to perform various actions including, for example, receiving an email message destined for an email printer, selecting an ad based on a parameter contained in the email message, inserting the selected ad into the email message, and transmit the email message for printing. Other embodiments are directed to executing a particular application based on an email address, while yet other embodiments are directed to rerouting an email message. | 2013-07-18 |
20130185365 | METHODS AND SYSTEMS FOR PROVIDING AN ELECTRONIC ACCOUNT TO A CUSTOMER - An electronic account is provided to a customer to enable the customer to access electronic services, such as e-mail and electronic transactions. The electronic account links an electronic address of the customer to a physical address of the customer. Using the electronic account, electronic services can be provided to the customer at either the electronic or physical address, or both. The services can be both secure and non-secure and can be provided by any service provider, such as an online merchant, a government agency, or a bank. | 2013-07-18 |
20130185366 | SYSTEM AND METHOD FOR MANAGING USER GENERATED CONTENT - A system and method for publishing and managing user generated content is provided. The system includes an authoring module, a subscription management module, and a publishing module. The authoring module may be configured to receive request from content publishers and generate online magazines in response to those requests. The interface for creating the magazine articles may provide real time previews of the input content across various reading platforms, providing the content creator with an efficient mechanism for ensuring that the magazine can be viewed across various platforms without errors and distortions. | 2013-07-18 |
20130185367 | Method and System of Creating a Graylist for Message Transmission - Techniques for text message transmission are described herein. These techniques may include collecting multiple user IDs for electronic commerce. Using the user IDs, a server transmits a text message to multiple clients, and obtains activities of particular clients of the multiple clients in response to the text message to determine particular user IDs associated with the particular clients. Based on the obtained activities, the server generates and/or updates a graylist that includes one or more user IDs of the multiple user IDs different from the particular user IDs. | 2013-07-18 |
20130185368 | SYSTEMS AND METHODS FOR ESTABLISHING COMMUNICATIONS BETWEEN MOBILE DEVICE USERS - Provided are systems and methods for establishing a communication between mobile device users that register with a collaboration system. The collaboration system determines a match between profile data of the first registered mobile device and profile data of the second registered mobile device. Displayed at the first registered mobile device is a first list of user identifications, which includes an identification of a user of the second registered mobile device and an identification of a user of at least one other mobile device. Displayed at the second registered mobile device is a second list of user identifications. The second list includes an identification of a user of the first registered mobile device and an identification of at least one other mobile device user. | 2013-07-18 |
20130185369 | COMMUNICATION AND NOTIFICATION SYSTEM AND METHOD THEREOF - The invention generally relates to a communication and notification system and method thereof, and more particularly to a method and system for providing, tracking, sending reminders, and receiving communications/notifications in response to end-users in a variety of commercial market segments, e.g., medical, governmental compliance and criminal. | 2013-07-18 |
20130185370 | EFFICIENT PEER-TO-PEER COMMUNICATION SUPPORT IN SOC FABRICS - Methods and apparatus for efficient peer-to-peer communication support in interconnect fabrics. Network interfaces associated with agents are implemented to facilitate peer-to-peer transactions between agents in a manner that ensures data accesses correspond to the most recent update for each agent. This is implemented, in part, via use of non-posted “dummy writes” that are sent from an agent when the destination between write transactions originating from the agent changes. The dummy writes ensure that data corresponding to previous writes reach their destination prior to subsequent write and read transactions, thus ordering the peer-to-peer transactions without requiring the use of a centralized transaction ordering entity. | 2013-07-18 |
20130185371 | MESSAGE TRANSMISSION SYSTEM AND METHOD USING LOCATION BASED SERVICE - A location-based message transmission and reception system and method comprises a terminal configured to transmit location information of a specified area and a message made by a user to a server; a mobile terminal configured to include a message receiving application to receive a message transmitted to a specified area and to transmit its location information to the server in response to executing the message receiving application and output a message received from the server on a display; and the server configured to store the message and location information of the specified area received from the terminal, to confirm, based on the location information received from the mobile terminal, whether the mobile terminal is located within a radius from a location in an area specified by the location information received from the terminal, and to transmit the message received from the terminal to the mobile terminal. | 2013-07-18 |
20130185372 | MANAGEMENT OF USER EQUIPMENT SECURITY STATUS FOR PUBLIC WARNING SYSTEM - Techniques are disclosed for making one or more computing devices in a communication network aware of a public warning system security policy of at least one entity. In one example, a method comprises the following steps. An indicator of a public warning system security policy of at least one entity is associated with a control plane message. The control plane message, with the indicator of the public warning system security policy of the at least one entity, is generated by a first computing device of a communication network. The first computing device transmits the control plane message, with the indicator of the public warning system security policy of the at least one entity, to a second computing device of the communication network. The second computing device is made aware of the public warning system security policy of the at least one entity. | 2013-07-18 |
20130185373 | GROUP FORMATION WITHIN A SYNCHRONIZED HIERARCHY OF PEER-TO-PEER DEVICES - A system, apparatus and method for organizing devices in a peer-to-peer communication environment. A number of devices synchronize among themselves and select masters (or synchronization stations) to organize the devices into a hierarchy. Master devices have associated preference values reflecting their preference or suitability to be a master device, and broadcast synchronization frames to keep devices synchronized. When multiple devices in one or more hierarchies execute a common application or service, they form a private group to exchange or share data (e.g., play a game, transfer a file). All devices in the hierarchy maintain and advertise a public or default identifier of the hierarchy, and all devices in the private group maintain and advertise a private identifier specific to the group. Members of the group synchronize under a top group master (or root sync station), which synchronizes with a master that is part of the hierarchy. | 2013-07-18 |
20130185374 | TIME SYNCHRONIZATION SYSTEM - A time synchronization system includes: a master including: a main processor to which a first IP address is assigned; and a time synchronization processor to which a second IP address is assigned; a plurality of slaves configured to send a first packet whose destination is the first IP address and a second packet whose destination is the second IP address to the master; and a relay configured to send the first packet to the main processor and to send the second packet to the time synchronization processor. The main processor receives the first packet from the relay and performs a certain process on the first packet. The time synchronization processor receives the second packet from the relay and performs a time synchronization process between the master and said one of the slaves based on the second packet. | 2013-07-18 |
20130185375 | CONFIGURING COMPUTE NODES IN A PARALLEL COMPUTER USING REMOTE DIRECT MEMORY ACCESS ('RDMA') - Configuring compute nodes in a parallel computer using remote direct memory access (‘RDMA’), the parallel computer comprising a plurality of compute nodes coupled for data communications via one or more data communications networks, including: initiating, by a source compute node of the parallel computer, an RDMA broadcast operation to broadcast binary configuration information to one or more target compute nodes in the parallel computer; preparing, by each target compute node, the target compute node for receipt of the binary configuration information from the source compute node; transmitting, by each target compute node, a ready message to the target compute node, the ready message indicating that the target compute node is ready to receive the binary configuration information from the source compute node; and performing, by the source compute node, an RDMA broadcast operation to write the binary configuration information into memory of each target compute node. | 2013-07-18 |
20130185376 | EFFICIENT STATE TRACKING FOR CLUSTERS - Exemplary system and computer program product embodiments for efficient state tracking for clusters are provided. In one embodiment, by way of example only, in a distributed shared memory architecture, an asynchronous calculation of deltas and the views is performed while concurrently receiving client requests and concurrently tracking the client requests times. The results of the asynchronous calculation may be applied to each of the client requests that are competing for data of the same concurrency during a certain period with currently executing client requests. Additional system and computer program product embodiments are disclosed and provide related advantages. | 2013-07-18 |
20130185377 | PIPELINE SYSTEMS AND METHOD FOR TRANSFERRING DATA IN A NETWORK ENVIRONMENT - A communications system having a data transfer pipeline apparatus for transferring data in a sequence of N stages from an origination device to a destination device. The apparatus comprises dedicated memory having buffers dedicated for carrying data and a master control for registering and controlling processes associated with the apparatus for participation in the N stage data transfer sequence. The processes include a first stage process for initiating the data transfer and a last Nth stage process for completing data transfer. The first stage process allocates a buffer from a predetermined number of buffers available within the memory for collection, processing, and sending of the data from the origination device to a next stage process. The Nth stage process receives a buffer allocated to the first stage process from the (N−1)th stage and to free the buffer upon processing completion to permit reallocation of the buffer. | 2013-07-18 |
20130185378 | CACHED HASH TABLE FOR NETWORKING - Systems, methods, and devices are provided for managing hash table lookups. In certain network devices, a hash table having multiple buckets may be allocated for network socket lookups. Network socket information for multiple open network socket connections may be distributed among the buckets of the hash table. For each of the buckets of the hash table, at least a subset of the network socket information that is most likely to be used may be identified, and the identified subset of most likely to be used network socket information may be promoted at each bucket to a position having a faster lookup time than a remaining subset of the network socket information at that bucket. | 2013-07-18 |
20130185379 | EFFICIENT STATE TRACKING FOR CLUSTERS - Exemplary method, system, and computer program product embodiments for efficient state tracking for clusters are provided. In one embodiment, by way of example only, in a distributed shared memory architecture, an asynchronous calculation of deltas and the views is performed while concurrently receiving client requests and concurrently tracking the client requests times. The results of the asynchronous calculation may be applied to each of the client requests that are competing for data of the same concurrency during a certain period with currently executing client requests. Additional system and computer program product embodiments are disclosed and provide related advantages. | 2013-07-18 |
20130185380 | System and Method for Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 2013-07-18 |
20130185381 | Configuring Compute Nodes In A Parallel Computer Using Remote Direct Memory Access ('RDMA') - Configuring compute nodes in a parallel computer using remote direct memory access (‘RDMA’), the parallel computer comprising a plurality of compute nodes coupled for data communications via one or more data communications networks, including: initiating, by a source compute node of the parallel computer, an RDMA broadcast operation to broadcast binary configuration information to one or more target compute nodes in the parallel computer; preparing, by each target compute node, the target compute node for receipt of the binary configuration information from the source compute node; transmitting, by each target compute node, a ready message to the target compute node, the ready message indicating that the target compute node is ready to receive the binary configuration information from the source compute node; and performing, by the source compute node, an RDMA broadcast operation to write the binary configuration information into memory of each target compute node. | 2013-07-18 |
20130185382 | APPARATUS, SYSTEMS AND METHODS FOR PROVIDING EDGE CACHED MEDIA CONTENT TO MEDIA DEVICES BASED ON USER HISTORY - Systems and methods provide media content events to media devices. An exemplary system receives a request for a media content event from a first media device; communicates the media content event to an edge server communicatively coupled to the first media device based on an identifier of the requesting media device; identifies a second media device based on preferred media content event characteristics associated with the second media device, wherein at least one media content event characteristic of the requested media content event corresponds to at least one of the preferred media content event characteristics of the second media device, and wherein the second media device is able to communicatively couple to the edge server; and in response to identifying the second media device, communicates an identifier of the second media device to the edge server, wherein the requested media content event is communicated to the second media device. | 2013-07-18 |
20130185383 | Transferring Applications and Session State to a Secondary Device - A first device transfers a running application to a second device. A first device sends a request to transfer a running application to a second device. The second device determines whether the application is presently installed on the second device. The second device determines whether the application is an application designed to run on a platform of the second device. The second device then receives state information for the application from the first device. In response to receiving the state information, the second device executes a counterpart application utilizing the state information received from the first device. | 2013-07-18 |
20130185384 | Unified Virtual Cloud - Method and apparatus to unify all of a persons' data from all his devices and services including without limitation computers, smartphones, online cloud storage services, and offline pluggable hard drives and also including all data that has been shared with said person by others into a virtual cloud for that person which can be accessed, searched, browsed, managed, replicated, backed up from anywhere and any portion of which can be shared with others with fine grain access control lists that control what all the sharee can do. This method and apparatus also including mechanisms to deal with portions of the cloud that may be offline or behind slow links with smart caching and mechanisms to access data on this virtual cloud using the fastest, cheapest, or most reliable means. This virtual cloud also including all services that the person has access to. | 2013-07-18 |
20130185385 | DYNAMICALLY MULTIPLEXING USER SESSIONS AMONG MULTIPLE TERMINAL DEVICES - Methods, systems, and devices are described for dynamically multiplexing user sessions among multiple terminal devices. A switch device establishes a session with a host device on behalf of a user logged in to a first terminal device communicatively coupled with the switch device. The switch device forwards packets received from the host device to the first terminal device, the packets associated with the session. The switch device may receive a selection of a second terminal for association with the session while maintaining the session with the host device on behalf of the user. The switch device forwards at least a portion of the packets associated with the session from the host device to the second terminal device responsive to receiving the selection of the second terminal device. | 2013-07-18 |
20130185386 | INFORMATION-PROCESSING DEVICE, INFORMATION-PROCESSING METHOD, AND PROGRAM - In an information-providing system according to an embodiment of the present invention, when a communication terminal transmits request information for requesting a setting input screen, an information-processing device recognizes character information contained in the request information, and, by referring to history information, identifies location information corresponding to character information similar to the recognized character information. The location information identified by the information-processing device is received by the communication terminal, and this information is reflected on a setting input screen displayed on the communication terminal. As a result, when setting of a location where acquisition of notification information is desired is made using the communication terminal, a location in accordance with past history is displayed on the setting input screen, and thus, the user does not have to perform input for specifying a location, such input tending to be cumbersome, and effort and time can be reduced. | 2013-07-18 |
20130185387 | Host/path-based data differencing in an overlay network using a compression and differencing engine - A data differencing technique enables a response from a server to the request of a client to be composed of data differences from previous versions of the requested resource. To this end, data differencing-aware processes are positioned, one at or near the origin server (on the sending side) and the other at the edge closest to the end user (on the receiving side), and these processes maintain object dictionaries. The data differencing-aware processes each execute a compression and differencing engine. Whenever requested objects flow through the sending end, the engine replaces the object data with pointers into the object dictionary. On the receiving end of the connection, when the data arrives, the engine reassembles the data using the same object dictionary. The approach is used for version changes within a same host/path, using the data differencing-aware processes to compress data being sent from the sending peer to the receiving peer. | 2013-07-18 |
20130185388 | APPROACH FOR DOWNLOADING DATA OVER NETWORKS USING AUTOMATIC BANDWIDTH DETECTION - An approach is provided for downloading data over a network that uses automatic bandwidth detection. According to the approach, a first version of data to be requested is selected from a plurality of available versions of the data. The first version may be selected based upon a default selection or based upon prior determined connection speeds. A client requests the first version of the data from a server and the client begins receiving the first version of the data. A determination of at least an approximate connection speed is made based upon at least a portion of the first version of the data received at the client. A determination is then made, based upon the determined connection speed, whether a different version of the data should be requested. If so, then the client requests a different version of the data from the server. | 2013-07-18 |
20130185389 | In-Vehicle Gateway Apparatus, Communication System For Vehicle And Program Product For Transmitting Vehicle Related Data Set - An in-vehicle gateway apparatus includes a first communication section and a second communication section. The first communication section receives a vehicle related data set including multiple data elements from a data transmit apparatus. The second communication section transmits a processed data set processed based on the vehicle related data set to an in-vehicle LAN group including a first in-vehicle LAN and a second in-vehicle LAN. The second in-vehicle LAN has a communication speed lower than a communication speed of the first in-vehicle LAN. The second communication section transmits a first processed data set processed based on the vehicle related data set to the first in-vehicle LAN, and transmits a second processed data set processed based on the vehicle related data set and having less data elements than the first processed data set to the second in-vehicle LAN. | 2013-07-18 |
20130185390 | USING DNS FOR SECURITY SYSTEM EVENT REPORTING - A method of transmitting a message from a security system to a central station receiver includes receiving at the security system an IP address associated with the central station receiver. An attempt is made to transmit the message from the security system to the central station receiver by use of the IP address. In response to a failure to receive at the security system an acknowledgement from the central station receiver that the message was received, the security system is used to query a Domain Name Server for a current IP address associated with the central station receiver. The query is dependent upon a domain name of the central station receiver. The current IP address associated with the central station receiver is received and used to re-attempt the transmitting of the message from the security system to the central station receiver. | 2013-07-18 |
20130185391 | TRANSMISSION APPARATUS AND TRANSMISSION METHOD - A transmission apparatus for transmitting content data to a receiving apparatus includes an establishing unit configured to establish a state where the content data can be transmitted to the receiving apparatus, a reception unit configured to receive a transmission request of the content data from the receiving apparatus in the established state where the content data can be transmitted, and a control unit configured to perform control such that, while a number of transmissions of the content data is equal to or greater than a predetermined number, the control unit does not transmit the content data to the receiving apparatus having issued the transmission request but keeps the state where the content data can be transmitted to the receiving apparatus and, when the number of transmissions of the content data becomes less than the predetermined number, the control unit permits the content data to be transmitted to the receiving apparatus. | 2013-07-18 |
20130185392 | APPARATUS AND METHOD OF TERMINAL FOR MANAGING SERVICE PROVIDED FROM SERVER - An apparatus of a terminal performs an operation method of the terminal using a cloud system. The method includes sending a request for information of a server providing a specific service, to at least one broker. The method also includes receiving the information of the server from the broker, and sending a request for the specific service to the server, using the information of the server. | 2013-07-18 |
20130185393 | DYNAMICALLY MULTIPLEXING USER SESSIONS AMONG MULTIPLE TERMINAL DEVICES - Methods, systems, and devices are described for dynamically multiplexing user sessions among multiple terminal devices. A switch device establishes a session with a host device on behalf of a user logged in to a first terminal device communicatively coupled with the switch device. The switch device forwards packets received from the host device to the first terminal device, the packets associated with the session. The switch device may receive a selection of a second terminal for association with the session while maintaining the session with the host device on behalf of the user. The switch device forwards at least a portion of the packets associated with the session from the host device to the second terminal device responsive to receiving the selection of the second terminal device. | 2013-07-18 |
20130185394 | Providing Information to a Computing Device Based on Known Location and User Information - A method includes receiving a beacon from a mobile device at an access point associated with a transportation station. The beacon includes identification information that identifies the mobile device. The method includes receiving, at the access point via a network, information from at least one service provider based on a location of the access point and the identification information. The method also includes sending the information to the mobile device. | 2013-07-18 |
20130185395 | SYSTEM AND METHOD FOR SHARING UNSUPPORTED DOCUMENT TYPES BETWEEN COMMUNICATION DEVICES - An improved system and method are disclosed for sharing a document between two communication devices that do not have an application that can display the document. In one example, the document is sent by the communication device that is sharing the document to a document server for processing into pages of one or more different document types, and both communication devices retrieve the stored pages as needed for display. The sharing communication device updates the other communication device when a new page is to be retrieved from the document server. | 2013-07-18 |
20130185396 | DYNAMIC COMMUNICATION STACK - A method of facilitating communication between a resource and a computer is described. The computer employs a software application that allows the computer to communicate with the resource. The resource may comprise a medical device such as a blood glucose meter or an insulin pump. In order to facilitate communication between the computer and the resource, the software constructs a communication protocol particular to the type of resource connected to the computer. The stack comprising the communication protocol allows the computer to communicate with the resource. Once the resource and computer cease communication, the stack may be removed from the memory of the computer. | 2013-07-18 |
20130185397 | Secure personal content server - A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in communication for connecting the LCS via a network to at least one Secure Electronic Content Distributor (SECD), which SECD is capable of storing a plurality of data sets, is capable of receiving a request to transfer at least one content data set, and is capable of transmitting the at least one content data set in a secured transmission; a rewritable storage medium whereby content received from outside the LCS may be stored and retrieved; a domain processor that imposes rules and procedures for content being transferred between the LCS and devices outside the LCS; and a programmable address module which can be programmed with an identification code uniquely associated with the LCS. The LCS is provided with rules and procedures for accepting and transmitting content data. | 2013-07-18 |
20130185398 | APPARATUS AND METHOD FOR PROVIDING STREAMING CONTENT - A method and apparatus for an adaptive Hypertext Transfer Protocol (HTTP) streaming service using metadata of media content are provided. The media content may include a sequence of one or more periods. The metadata may include a start time attribute and/or a duration attribute of each of the periods. The metadata may determine a start time of each of the periods, and a start time of each of segments included in each of the periods. A terminal may access segments included in each of the periods, may decode and render data of media content included in the segments, and may play back the media content. | 2013-07-18 |
20130185399 | CONTENT DELIVERY - A method for providing equitable media streaming between an HTTP server and a number of receivers via shared network. The streaming data is processed to split the data across a number of sub-streams. Each sub-stream contains non-contiguous data. A receiver requesting the streaming media establishes a number of TCP sessions, one for each sub-stream and the received sub-stream data is reassembled at the receiver so that the streaming media can be presented. | 2013-07-18 |
20130185400 | SYSTEMS, DEVICES AND METHODS FOR PROVISIONING, PAIRING AND ACTIVATING A NEWLY MANUFACTURED DEVICE FOR AUTOMATIC JOINING OF CUSTOMER'S NETWORK - The invention provides systems and methods for providing a unified single-scan user interface for accessing and managing a remotely located device throughout its life cycle, including cellular network provisioning, cloud data provider registration, initialization and activation, as well as providing end users with easy access to the device and its data. The end user simply powers the device on and the device automatically connects with the communication network and the cloud data provider. The device comes to the end user already provisioned and paired and activated with the cloud data provider and the communication network provider. Further, the user account, or accounts, for the use of the device is both active and recorded for billing by the various service providers supporting the device use, i.e., the communication network provider(s). | 2013-07-18 |
20130185401 | CONFIGURATION MANAGEMENT DEVICE, CONFIGURATION MANAGEMENT METHOD, AND CONFIGURATION MANAGEMENT PROGRAM - [Problem] To provide a configuration management device which derives a combination of a plurality of types of devices having two indices where the total of a first index (P1) is equal to or greater than a specified value and the total of a second index (P2) becomes the minimum. | 2013-07-18 |
20130185402 | METHOD AND APPARATUS FOR DEVELOPING SERVICE PROCESSOR SOLUTIONS - A computer-implementable method. In one embodiment, the method includes the step of initializing operation of a physical service processor to communicatively couple to a remote file system over a communications link. The remote file system has a computer-executable development module for modifying at least one network configuration setting for the physical service processor. The method also includes the step of causing the development module to modify at least one network configuration setting on a virtual service processor that is operative to emulate operation of the physical service processor, and the step of initializing operation of the virtual service processor with the at least one modified network configuration setting. The method further includes the step of verifying that the virtual service processor, when initialized with the at least one modified network configuration setting, operates without error. | 2013-07-18 |
20130185403 | VIRTUAL NETWORK SERVICES - Methods, systems, and devices are described for managing virtual network services provided to a network by a self-contained network services system. A controller application may receive a request for a change in network services provided by the self-contained network services system to the network. A new software configuration for a number of network services modules of the self-contained networks services system may be determined based on the received request, and the network services modules may be dynamically configured according to the determined new software configuration. The network and a router associated with the network services system may also be reconfigured to distribute traffic among the network services modules in accordance with the requested change in network services. | 2013-07-18 |
20130185404 | EFFICIENT PORT MANAGEMENT FOR A DISTRIBUTED NETWORK ADDRESS TRANSLATION - A central NAT manager efficiently allocates ports to endpoints of a tenant application in a hosting environment for NAT purposes. In some instances, the central NAT manager may pre-allocate ports to endpoints as part of the initial configuration of the tenant application. The pre-allocation process may include persisting pre-allocated port state information in storage and configuring endpoints and a NAT device with the pre-allocated port state information. Additional ports may be dynamically allocated to endpoints during runtime using dynamically determined port allocation sizes. In other instances, the central NAT manager may reserve ports for endpoints during the initial configuration of the tenant application by assigning ports to endpoints and persisting port assignment information to storage. During runtime, endpoints may issue port allocation requests to the central NAT manager, which may allocate ports to the endpoints from the range of ports initially reserved for each endpoint. | 2013-07-18 |
20130185405 | USE OF A SYSTEMS MANAGEMENT TOOL TO MANAGE AN INTEGRATED SOLUTION APPLIANCE - An embodiment of the invention comprises a method for use with an integrated solution appliance under control of a management tool, the appliance having at least a console and a plurality of servers. The method includes providing the management tool with a CAM configured to participate in managing the appliance when used to implement a deployed solution. The CAM is furnished with a CTM for use in acquiring appliance level information, which includes specified metadata pertaining to each server. The CAM is also furnished with a COM, wherein the COM is operable to interact with components of the management tool, and is further operable to use information acquired by the CTM to selectively modify one or more commands issued by the management tool, which respectively affect operation of the appliance. | 2013-07-18 |
20130185406 | COMMUNICATION METHOD OF TARGET NODE TO PREFETCH SEGMENTS OF CONTENT IN CONTENT-CENTRIC NETWORK (CCN) AND TARGET NODE - A target node and a communication method of using a target node that is configured to prefetch a segment of content in a Content-Centric Network (CCN) are provided. A communication method involving a target node configured to prefetch a segment of content in a Content-Centric Network (CCN) involves: receiving, from a previous node, a predetermined content-request packet requesting a predetermined segment of a content; determining a prefetching window size based on a number of segments in response to the predetermined content-request packet, the segments being prefetched based on a name of the content; generating a content-request packet that requests each of the segments based on the prefetching window size; and transmitting the generated content-request packet to a next node. | 2013-07-18 |
20130185407 | AUTONOMIC ASSISTANCE FOR POLICY GENERATION - A system, method and apparatus for autonomically assisting in the creation of an administrative policy. The method can include detecting a stimuli in a system under study and monitoring a response by a systems administrator to the stimuli. The stimuli and the response can be forwarded to a policy maker suited to analyze the stimuli and the response. Also, the policy maker can be queried for a preferred response to the stimuli. Based upon the preferred response to the stimuli, a policy for responding to the stimuli can be formulated. As such, the policy can be enforced in managing the system under study. Moreover, the policy can be forwarded for future consideration to the systems administrator. | 2013-07-18 |
20130185408 | Systems and Methods for Server Cluster Application Virtualization - Application instances can be virtualized and operate in a fault tolerant and load-balanced means across a cluster of servers while still maintaining access to a common pool of data. Each application instance is instantiated so to operate on top on top of a virtual host that possesses a distinct virtual Internet protocol address. Each node within a server cluster environment can possess one or more virtual hosts wherein upon server failover the virtual host and its associated virtual Internet protocol address can be relocated to another server without disturbing the instantiation of the application on the virtual host. | 2013-07-18 |
20130185409 | METHOD AND SYSTEM FOR DETERMINING IP BEARER OPTIMIZATION BASED ON VIRTUAL MEDIA GATEWAY - The present invention discloses a method and a system for determining IP bearer optimization based on virtual media gateway. The method includes the following steps: when establishing an IP bearer for a first terminal, a first virtual media gateway determines that the first terminal and a second terminal are located at the same physical media gateway according to bearer information of the second terminal at an opposite end; the first virtual media gateway interacts with a second virtual media gateway to which the second terminal belongs, and a master virtual media gateway determines that both the first terminal and the second terminal can perform IP bearer optimization, wherein the master virtual media gateway is one of the first virtual media gateway and the second virtual media gateway. The present invention can avoid the waste of network resources, reduce the network delay, and improve the voice quality. | 2013-07-18 |
20130185410 | LOAD BALANCING AMONG NETWORK SERVERS - Apparatus for performing load balancing among network servers connected to an internal IPv6 network. The apparatus comprises a first interface coupled to an external IPv4 or IPv6 network for receiving packets sent across the external network and an IP packet creator coupled to said first interface. This IP packet creator is configured, for each received packet at that interface, to select a network server to be allocated to the packet or identify an already allocated network server. The IP packet creator is further configured to create a corresponding IPv6 packet for transmission over said internal network to the selected or identified network server. The apparatus further comprises a second interface coupled to said internal IPv6 network for transmitting created IPv6 packets across the internal network towards respective selected or identified network servers. | 2013-07-18 |
20130185411 | SYSTEM AND METHOD FOR IMPLEMENTING HISTOGRAM CONTROLLED MOBILE DEVICES - A communication network and software for its implementation that controls a mobile device based on historical user activity is provided. The mobile device communicates with a server and includes a function that is dependent on the user activity. The server senses the user activity over time and produces a histogram of that activity. The rate at which the server attempts to sense the user activity depends on the histogram. An application might change the function depending on the result of detecting the user activity and the rate at which it does so. | 2013-07-18 |
20130185412 | CROSS-PROPERTY IDENTITY MANAGEMENT - Embodiments are directed to creating a persona from observed characteristics of content and to sharing a network persona derived from observed characteristics of content. In one scenario, a computer system observes one set of properties for a first portion of content on a network. The first portion of content is from a first account. The computer system also observes a different set of properties for a second portion of content on the network, where the second portion of content is from a second account. The computer system then correlates an association between the first account and the second account as part of a network persona that is based on the first properties and one or more corresponding properties from the second portion of content. | 2013-07-18 |
20130185413 | Integrated Metering of Service Usage for Hybrid Clouds - An embodiment is directed to a hybrid cloud environment wherein a user of cloud computing services is disposed to consume cloud provided services delivered by each of a plurality of cloud computing service providers. Specified event data is received at an MCS component, wherein the event data pertains to metering events related to consumed services delivered by one or more cloud service providers. Event data includes event data furnished by one or more entities that actively monitor metering events at one or more local or remote cloud service provider locations. Event data is sent from the MCS component to a metering system, and the metering system generates reports from the event data that contains usage information on services provided by one or more cloud service providers, wherein information for a provider specifies amounts and quality of each type of service delivered to users by the provider. | 2013-07-18 |
20130185414 | Method And Apparatus For Network And Storage-Aware Virtual Machine Placement - Various embodiments provide a method and apparatus of providing a network and storage-aware virtual machine (VM) placement that optimizes placement based on network layer metrics, performance characteristics of the storage arrays and application constraints. Advantageously, since storage is often necessary in servicing application requests, basing VM placement on performance characteristics of the storage arrays as well as network layer metrics can lead to a significant improvement in VM performance. | 2013-07-18 |
20130185415 | Managing Workload Distribution Among A Plurality Of Compute Nodes - Methods, apparatuses, and computer program products for managing workload distribution among a plurality of compute nodes are provided. Embodiments include monitoring, by the distribution controller, consumption of workload assignments by each compute node of the plurality of compute nodes; and distributing, by the distribution controller, unconsumed workload assignments to one or more compute nodes of the plurality of compute nodes based on the consumption of the workload assignments of each compute node of the plurality of compute nodes. | 2013-07-18 |
20130185416 | Controlling an Apparatus - An apparatus in a LAN has first and second hardware interfaces to connect to the LAN. First and second monitoring request messages are transmitted to one or more devices in a first VLAN and one or more devices in a second VLAN respectively, via both the first and second hardware interfaces. The monitoring request messages use the Address Resolution Protocol (ARP) or the Neighbor Discovery Protocol (NDP). First and second monitoring response messages are received via the first and/or second hardware interfaces in response to the first and second monitoring request messages respectively. A selection is made between the first and second hardware interfaces for performing data communication, based on the first and second monitoring response messages. The selection is performed independently for data communication via the first and second VLANs based on at least one characteristic of the first and second monitoring response messages respectively. | 2013-07-18 |
20130185417 | REMOTE MONITORING SYSTEM, NETWORK INTERCONNECTION DEVICE AND COMMUNICATION CONTROL METHOD - Even though a network with communication rate large fluctuations is applied to a remote monitoring system, data communication delay time is kept smaller for which a shorter communication delay time is demanded and a high throughput is implemented. A sensor equipped terminal sends measurement data to a network interconnection device. A priority level determining unit of the device sorts the data into first data necessary to be delivered to a monitoring center within requested communication delay time and second data not necessarily to be delivered to the center within requested communication delay time. A transmission buffer unit is a buffer storing the first and second data accumulated in first and second data accumulating units in sending the data to a wide area network by FIFO. A transmission control unit dynamically controls a rate in causing the data to come in the transmission buffer unit based on a network communication rate. | 2013-07-18 |
20130185418 | EFFICIENTLY RELATING ADJACENT MANAGEMENT APPLICATIONS MANAGING A SHARED INFRASTRUCTURE - A linkage controller analyzes, for a first management application managing at least one common resource with a second management application adjacent to the first management application within a computing environment comprising multiple resources and relationships, a resource and relationship model known by the first management application of a selection of resources and relationships managed by the first management application from among the plurality of resources and relationships in the computing environment. The linkage controller identifies, for the first management application, only a minimal set of resources and relationships within the resource and relationship model providing at least one optimal linkage point between the first management application and the second management application as to the at least one common resource. The linkage controller outputs the minimal set of resources and relationships to the second management application for relating to the first management application. | 2013-07-18 |
20130185419 | OFSense: Light-Weight Networking Sensing With OpenFlow - A method for determining the state of an entire network, including state of applications and infrastructure includes receiving network control messages in an OpenFlow network, passing normal network control messages through OFSense, a control plane middleware, and constructing from the network control messages an application level connectivity graph to infer network delay between any two communicating server in the network and estimating an application response time of a given server in the network; and providing state of the network for enabling intelligent detection and diagnosis of infrastructure and application performance. | 2013-07-18 |
20130185420 | METHOD FOR CONTROLLING VIRTUAL MACHINE - A first computer starts to copy data of a virtual machine running on the first computer from the first computer to a second computer. The first computer monitors an index value related to conditions of running the virtual machine on the second computer. The first computer causes, based on the index value, the second computer to start operation of the virtual machine based on the data copied from the first computer to the second computer and terminating operation of the virtual machine running on the first computer. | 2013-07-18 |
20130185421 | Method, Terminal, and Server for Obtaining Heartbeat Period - The present invention provides a method, a terminal, and a server for obtaining a heartbeat period. According to the present invention, the terminal sends a first heartbeat message that includes location information of the terminal to the server and obtains a heartbeat period which corresponds to the foregoing location information directly from the server. This avoids each terminal needing to perform multiple heartbeat message interactions with the server when determining a heartbeat period that best matches a current network, thereby reducing power consumption of the terminal and signaling loads of a device at the network side. | 2013-07-18 |
20130185422 | MEDIA TOOLBAR AND AGGREGATED/DISTRIBUTED MEDIA ECOSYSTEM - A method and network architecture through which user-specific media profile data can be made available to third parties. A browser is optionally enhanced to facilitate playback and control of one or more media players, thereby allowing the user to play content via the browser. As the user plays content in the browser or any of the media players, information is collected about the content and stored in a database. By monitoring all media-related interactions made by the user within the browser, the collected content information can encompass information from a wide range of sources. User-specific profile data is then determined based on the collected data and such user-specific profile data is made available to third parties. The user-specific profile data can be used, for example, for social networking purposes, and may also be used to drive advertisements or other content to the user. | 2013-07-18 |
20130185423 | DYNAMIC DISTRIBUTION OF NODES ON A MULTI-NODE COMPUTER SYSTEM - I/O nodes are dynamically distributed on a multi-node computing system. An I/O configuration mechanism located in the service node of a multi-node computer system controls the distribution of the I/O nodes. The I/O configuration mechanism uses job information located in a job record to initially configure the I/O node distribution. The I/O configuration mechanism further monitors the I/O performance of the executing job to then dynamically adjusts the I/O node distribution based on the I/O performance of the executing job. | 2013-07-18 |
20130185424 | APPARATUS, METHOD AND SYSTEM FOR MANAGING EVENT INFORMATION - An apparatus, method, and system for managing event information are provided. The apparatus for managing event information includes an event management module which receives event information on an event generated in an event generator located in the same network in a multicast manner, and manages the received event information, a storage module which stores the received event information, and a control module which controls the event generator. The event management module provides the received event information to an event-management-requesting device which requests storage of event information. | 2013-07-18 |
20130185425 | Method for Optimizing Network Performance After A Temporary Loss of Connection - A communication apparatus includes a computer supported telecommunications application (“CSTA”) session established between a computing function and switching function that includes a time period where monitors and registrations are preserved by the switching function if the computing function is able to restart the session within that time period after a temporary connection failure. The switching function tracks call and non-call related device activity that occurs from the time a session failure is detected until the computing function is able to restart the application session in a first list. If the computing function restarts that application within the time period, the switching function sends the computing function a list of devices whose activity was detected during the outage. The computing function uses the list of devices to query the status of those devices to reduce the amount of time needed to perform a recovery and less system performance impacts. | 2013-07-18 |
20130185426 | Network Resource Access Using Social Networks - A network controller is enabled to control a network that is administered by a network administrator. The network controller provides the network administrator with an option to register an association with a social network from a plurality of available social networks. The network controller identifies a social network selected by the network administrator. The network controller receives, from the social network, a user identification associated with an account the network administrator in the first social network. The network controller receives from the network administrator configuration parameters for resources in the network. Based on the configuration parameters received from the network administrator, the network controller configures access to resources in the network. | 2013-07-18 |