Abstract: A system includes reception of a first query from a client device at a first database node of a database instance, determination of routing information associated with the first query, compilation of the first query at the first database node to generate first compiled code, transmission of the first compiled code and the routing information to the client device, reception of the compiled code from the client device at a second database node, determination, at the second database node, that data associated with the compiled query is associated with a third database node, transmission of the compiled code from the second database node to the third database node, reception of query results at the second database node from the third database node, and transmission of the query results and an indication to update the routing information from the second database node to the client device.
Type:
Grant
Filed:
April 17, 2012
Date of Patent:
May 19, 2015
Assignee:
SAP SE
Inventors:
Juchang Lee, Jaeyun Noh, Chulwon Lee, Michael Muehle, Alexander Schroeder, Marco Paskamp, Sang Kyun Cha
Abstract: Systems and methods described herein provide for communication between a base component and a slate component of a hybrid computing system. The hybrid computing system is in a connected state when the base component and slate component are connected. Embodiments provide that the base component may control the slate component when the hybrid computing system is in a connected state. In addition, embodiments provide that a server module running on the display component and a client module running on the base component facilitate communication between the hybrid computing system components. Furthermore, systems and methods described herein provide that the base component may control hardware devices, peripheral devices, or software applications of the display component through communications between the server module and client module.
Type:
Grant
Filed:
December 24, 2010
Date of Patent:
April 7, 2015
Assignee:
Lenovo (Singapore) Pte. Ltd.
Inventors:
Matthew Roper, Steven R. Perrin, Scott E. Kelso, Mark C. Davis, Li Bin, Wang Sheng
Abstract: A network having a plurality of electronic equipments and a plurality of network nodes is disclosed. The nodes are connected and form a reference ring, according to which ring the nodes are ordered by successive ranks. Each node is connected by a direct receiving connection to an upstream node and via a direct transmission connection to a downstream node. The network is adapted to tolerate a number of network node breakdowns, n being greater than 1. Each node is connected by a direct receiving connection to all of the other nodes placed, in the reference ring, up to: 2 ranks downstream and 1 rank upstream or 1 rank downstream and 2 ranks upstream if n is 2; n?1 ranks downstream and n?1 ranks upstream, if n is odd; or n?1 ranks downstream and n?2 ranks upstream, or n?2 ranks downstream and n?1 ranks upstream, if n is even and greater than 2.
Abstract: Apparatus, systems, and methods may operate to receive a public key associated with a public/private key pair at a key distribution handler, after a new workload and an associated key agent are created within a network of nodes. The associated key agent may be used to generate the key pair. Additional activity may include distributing, by the key distribution handler, the public key to other key agents associated with permitted workloads operating in the network. The public key may be used to overwrite or delete prior public keys for an authenticated workload identity associated with the new workload. Additional apparatus, systems, and methods are disclosed.
Type:
Grant
Filed:
May 27, 2011
Date of Patent:
February 3, 2015
Assignee:
Novell, Inc.
Inventors:
Jason Allen Sabin, Michael John Jorgensen
Abstract: Automatic recovery from loss of a security token on an embedded device is achieved by having a service provider (SP) server send to a device server a backup copy of the security token in conjunction with sending to an embedded device a primary copy of the security token, and retrieving from the device server and sending to the embedded device the backup copy of the security token upon detecting that the primary copy of the security token has been lost. The method and system obviate the need for a user to have to re-input on the embedded device a credential that is represented by the security token in the event the primary copy of the security token is erased from the embedded device or otherwise becomes inaccessible to the embedded device.
Abstract: A system and a digital token for user identity verification comprise a control device for communicating over a network. The control device executes program applications and displays outputs to a user. A server communicates over the network to the control device and to other devices. The server comprises a personal identity model, a personal identity engine and a personal identity controller. The personal identity model collects and stores user information comprising personal information, personality, and biometric information. The personal identity engine processes the stored user information to produce the digital token. The personal identity controller manages exchange of the digital token in a user identity verification process. A claim point exchanges the digital token with the server in the user identity verification process in which upon verification the user's identity, the claim point provides a service to the user.
Abstract: Normalization of a network performance index is achieved. Data is stored that groups devices in a network into groups or families according to their estimated life cycles. Data is stored representing a group-specific time window based on the estimated life cycle for devices in that group. Data is stored representing a count of the number of devices in the network within each group during a given unit of time, dynamic sliding windows over successive units of time. A sliding window group count is generated that represents the number of devices within each group in the network as of a current unit of time and prior units of time within the group-specific time window. A total group count is generated by adding the dynamic sliding window group counts for each of the groups. A normalized network performance index is generated by dividing a network performance index by the total group count.
Type:
Grant
Filed:
December 15, 2011
Date of Patent:
September 9, 2014
Assignee:
Cisco Technology, Inc.
Inventors:
William Eugene Gunnther Hamilton, Brandon Todd Virgin, Jiabin Zhao
Abstract: A system for authenticating the user of a computing device comprises an authorized user directory. Each record is uniquely associated with an authorized user and includes at least a computing device ID value that is a globally unique value assigned to the authorized user's computing device, a group of unique depictions such as photographs, an identification of a key depiction. Portions of each image form fiducials recognizable by the user. The record further includes trace pattern verification data representing continuous trace strokes between pairs of the fiducials within the key depiction. To authenticate, the group of images are displayed to the user. The user must first select the key image and secondly trace continuous trace strokes between the pairs of fiducials to match the trace pattern verification data.
Type:
Grant
Filed:
July 7, 2011
Date of Patent:
July 8, 2014
Assignee:
Bottomline Technologies (DE), Inc.
Inventors:
Brian Smith McLaughlin, Leonardo B Gil, Marshall Joseph Tracy, Erik Vaughn Mitchell, Jeffrey Todd Dixon
Abstract: A method and a manager physical machine (PM) for virtual machine (VM) consolidation are provided. The method is performed by the manager PM. A network connects the manager PM and a plurality of server PMs. A plurality of VMs is running on the server PMs. The method includes the following steps. The manager PM classifies the server PMs into redundant PMs and surviving PMs. The manager PM determines migration paths of the VMs running on the redundant PMs to the surviving PMs. The manager PM determines a parallel migration sequence of the VMs running on the redundant PMs based on the migration paths. The manager PM migrates the VMs running on the redundant PMs to the surviving PMs in parallel according to the parallel migration sequence.
Type:
Grant
Filed:
December 23, 2010
Date of Patent:
June 3, 2014
Assignee:
Industrial Technology Research Institute