Abstract: Log-Based Rollback Recovery for system failures. The system includes a storage medium, and a component configured to transition through a series of states. The component is further configured to record in the storage medium the state of the component every time the component communicates with another component in the system, the system being configured to recover the most recent state recorded in the storage medium following a failure of the component.
Abstract: A method and system for automating application of software patches to a server system having a virtualization layer. A plurality of software patches are downloaded to a computer system having a first operating system. The software patches to apply to a server console operating system are then determined. The software patches are automatically copied to the server system by executing a first script file. The copied software patches are automatically decompressed by executing a second script file. The decompressed software patches are installed in a specified order by executing the second script file. The console operating system is rebooted only after all software patches are installed.
Abstract: An apparatus, method, and a computer program are provided in order to allow for secure downloading of data to a host operating system. The host operating system transmits a request to a virtual machine in order download the data from the Internet. In response, the virtual machine downloads the data and scans the data for malicious programs. If the result of the scan is negative, then the host operating system is configured to download the data from the virtual machine.
Abstract: Managing large amounts of third party client data may require sorting through files for patterns and extracting data to create a customized user interface for the third party client. One example method of operation may include examining file names for data files stored in a database, parsing specified names and specified dates from the file names, categorizing the data files according to the specified names and specified dates, tagging the data files, and transforming content of the data files into a customized data table format associated with known client requirements.
Abstract: Mobile agents can be deployed to mobile devices within specific regions of interest to achieve specific goals in respect of events occurring in the region of interest. In order to ensure that the agent can persist within the region of interest until the agent goals are achieved, the agent is configured to locate other devices within the region of interest and to propagate itself, by moving or copying itself, to those other devices. The region of interest may be a mobile and/or dynamic region of interest defined by, for example, a proximity to one or more mobile wireless access points or by an overlapping peer-to-peer communication range of a plurality of mobile devices that are configured to support the agent.
Abstract: Disclosed are an apparatus and method of performing a data file migration to a cloud source. One example method of operation may include establishing via a transmitter an application programming interface (API) connection to an enterprise network, identifying via a processor one or more present allocation parameters being utilized by one or more virtual machines operating on the enterprise network. The method may also provide requesting via the transmitter a directory file structure and identifying via the processor at least one data file for data migration to a remote cloud storage server based on predetermined criteria.
Abstract: Information reduction in data processing environments includes at least one of: one or more Error Correcting Codes that decode n-vectors into k-vectors and utilize said decoding to information-reduce data from a higher dimensional space into a lower dimensional space. The information reduction further provides for a hierarchy of information reduction allowing a variety of information reductions. Transformations are provided to utilize available data space, and data may be transformed using several techniques including windowing functions, filters in the time and frequency domains, or any numeric processing on the data.
Abstract: The present application describes performing a user initiated search query comprising receiving user input comprising description details of at least one desired object, retrieving a plurality of objects from a database sharing one or more of the description details of the user input, retrieving an image of the at least one desired object based on one or more of the plurality of objects, generating a contour of the image and comparing the generated contour with other related contours of other images stored in the database, displaying all of the available contours of all of the images that match the generated contour, receiving a selection of one of the available contours from the user and performing the search query based on the user selected contour.
Abstract: Identifying user input data on a mobile user device may provide a way to predict the types of questions and actions a user will take and offer information contemporaneously with such actions. One example method of operation includes identifying an active application programming interface (API) of a presently operating application executing on the user device, and identifying input data populating the application. Then, storing and processing the input data to identify a topic of interest and retrieving relevant content that is associated with the topic of interest, and creating a recommendation message based on the relevant content.
Abstract: Navigation applications may utilize various input data to determine various navigation routes. One example method of operating may include providing at least one navigation instruction to a navigation device via a navigation application, detecting the at least one instruction via a detection application, obtaining an image of a physical object, performing a holo-acoustic object manipulation of the physical object, and providing a visual display of the holo-acoustic manipulation as an additional navigation instruction.
Abstract: The disclosed embodiments provide a system that provides a virtual private network (VPN). The system includes a routing apparatus on a public network. The routing apparatus accepts a first connection with a client on the VPN and a second connection with a gateway in a private network extended by the VPN. Next, the routing apparatus receives a first set of packets from the client over the first connection, wherein the first set of packets is encrypted. The routing apparatus then routes the first set of packets to the gateway. The system also includes the gateway, which establishes the second connection with the routing apparatus. Next, the gateway decrypts the first set of packets and routes the decrypted first set of packets to a host in the private network.
Abstract: Disclosed is an apparatus and method of communicating with a user of a wireless device and processing message delivery. One example method of operation may include identifying a group of participants to receive a broadcast message transmitted from a wireless device, transmitting at least one broadcast message from the wireless device to a plurality of computing devices corresponding to the group of participants, receiving a plurality of response messages responsive to the at least one transmitted broadcast message, examining the plurality of response messages and extracting content of the plurality of response messages, generating a summary message based on the extracted content of the plurality of response messages, the summary message comprising portions from all of the plurality of response messages and also comprising information unique to each of the plurality of response messages, and displaying the summary message on a display interface of the wireless device.
Abstract: Co-browsing may offer support and other features to consumers of various websites and other online tools and applications. One example embodiment may include receiving a browsing session notification from a user device, identifying a request message destined for another user device, intercepting the request message, identifying the request message as requesting a multi-user session, forwarding the request message to the another user device, identifying a group to assign to the user device and the another user device based on activity performed by the user device, and assigning the user device and the another user device to the group and creating the multi-user session.
Abstract: A system, method, and computer readable medium for consistent and transparent replication of multi process multi threaded applications. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. Replica consistency between primary application and its replicas is provided by imposing the execution ordering of the primary on all its replicas. The execution ordering on a primary is captured by intercepting calls to the operating system and libraries, sending replication messages to its replicas, and using interception on the replicas to enforce said captured primary execution order. Replication consistency is provided without requiring modifications to the application, operating system or libraries.
Abstract: An apparatus and method for dynamically providing web-based multimedia to a mobile phone are described. According to one embodiment, an RSS feed is received that references multimedia files meeting one or more criteria. A playlist is generated dynamically from the multimedia files. The playlist is a single virtual multimedia file. An updated RSS feed is received that references one or more additional multimedia files meeting the one or more criteria. A second playlist is generated dynamically from the multimedia files and the one or more additional multimedia files.
Type:
Grant
Filed:
August 28, 2018
Date of Patent:
May 4, 2021
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Scirocco Michelle Six, Sterling Mace, Rajeev Raman, Stephen Mui, Jason Fisher
Abstract: A method, system and program product for remote scheduling of at least one job to run on a plurality of computers in a computer network. The job scheduler enables selection of a domain that includes at least a subset of the computers on which the job is to run. A list of computers in the selected domain is automatically generated. The computers on which the job is to run can be selected from the generated list of computers. A configuration file is created for storing an identification of the selected domain and the job to be run on the selected computers in the domain.
Abstract: To enable continuous execution of an application, a system and method for transferring an application state is provided. A gesture corresponding to a transfer act is detected by a gesture detection module in a first device executing the application. The first device communicates with a registration and relay server to determine eligible transfer recipients based on criteria such as location and/or devices that are currently executing the application. A transfer recipient is selected and platform independent application state Data Transfer Objects are generated that describe the state of execution on the first device. The application state DTOs are transferred via the server to the recipient device which enacts the application state DTOs to continue the execution of the application on the recipient device. Because the application state DTOs are platform independent, the application state can be transferred to almost any device that is able to execute the application.
Type:
Grant
Filed:
May 19, 2020
Date of Patent:
May 4, 2021
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Robert R. Hauser, Robert DeAnna, Paul Lipari
Abstract: A system includes a multi-process application that runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.
Abstract: Systems, methods and devices relating to coordinated network communication (e.g. transport-layer communication) of client requests and client request responses between a client and a distributed network service system, the network service nodes of the distributed network service system comprising a storage resource, a network interface, and a computer processor module for sending a coordinated network communication of data request responses to the client upon receipt of (1) network communication of client requests from clients; or (2) communication data channel information from another network service node.
Type:
Grant
Filed:
October 15, 2014
Date of Patent:
April 20, 2021
Assignee:
OPEN INVENTION NETWORK LLC
Inventors:
Andrew Warfield, Geoffrey Lefebvre, Brendan Anthony Cully, Daniel Stodden