Abstract: A mechanism is disclosed for determining, based on a deterministic mechanism and a session's key value, a backup server for the session. In one embodiment, each session has a different key value, and each key value can be processed through the deterministic mechanism to give rise to a separate ordering of a result value set. Each server of a plurality of servers is associated with a different one of the set's values. A request pertaining to a particular session is received. The request indicates the particular session's key value. The deterministic mechanism can generate result values, in a particular order to which the session's key value gives rise, until a result value associated with a currently operational server is generated. The request is sent to that server if the request's primary server is not currently operational. A pseudo-random number generator seeded with the key value may generate the result values.
Abstract: A self-healing grid mechanism using peer-to-peer platform protocols. In one embodiment, two or more nodes on a grid may be configured as master nodes. One of the configured master nodes may serve as the actual master node, and one may be backup or “shadow” master node, not actively serving as a master node. If the active master node goes down, the peer-to-peer protocols may be used to detect that the master node is not active and the backup master node may take over the master node operations for the grid. The backup master node may “shadow” the master node, keeping updated information about the grid configuration and operations via the peer-to-peer platform protocols, so that it can assume grid management operations seamlessly.
Abstract: A digital rights management (DRM) “bureau” server can be used in many different ways. In one example, a system distributes the storage of rights and/or the rights management decision making process between a DRM client and a DRM server, in order to overcome the shortcomings inherent in exclusively client-side or exclusively server-side DRM systems. In another example, a system manages rights to content on behalf of plural publishers.
Abstract: An electronic mail (email) communication system includes a mobile office platform. A direct access proxy accesses an electronic mailbox of the user and pushes email from the electronic mailbox of the user to a wireless communications device. A web client engine is operative with the mobile office platform and includes a port agent module that communicates with the wireless communications device over a port agent connection. It is operative to receive a message from a wireless communications device as a request corresponding to a job to be completed. A worker module receives the message from the port agent module and completes the job. The web client engine attempts to process jobs within a specified delay time, and if successful, transmits an acknowledgment (ACK) to indicate the job has been completed without saving the message to a jobstore database. If the job has not been completed within a specified delay time, the message can be saved to the database.
Abstract: A system and method are described for managing a shared object in a distributed collaboration environment. The distributed collaboration environment is composed of at least one edge server in communication with a central server. When a client desires to modify the shared object, it issues an object modification request to the edge server it is connected to. The edge server compares the version identifier of the client shared object against the version identifier of the edge shared object. If the versions do not match, the edge server rejects the modification. Otherwise, it will forward the modification request to the central server for further consideration.
Abstract: Systems and methods are described for controlling congestion, such as within the transport control protocol (TCP) based on bandwidth estimation techniques which provide explicit indications of back-to-back packet traffic. In response to registered back-to-back traffic, receiver-side bandwidth estimation techniques are exploited to enhance the congestion control behavior of TCP based networks. By way of example, a sender marks packets in the header or by changing segment size within a packet to indicate whether the packet is being sent back-to-back. A receiver utilizes the explicit back-to-back information, optionally in conjunction with other back-to-back packet estimation techniques, when estimating available bandwidth and setting congestion parameters. In addition a mechanism for controlling the length of packet trains is described which is based on modulating the transmission of delayed acknowledgements, such as sending acknowledgements upon receipt of a selected number of packets.
Type:
Grant
Filed:
April 7, 2004
Date of Patent:
April 12, 2011
Assignees:
Sony Corporation, Sony Electronics, Inc.
Abstract: A method and system for calculating the importance of persons based on interpersonal relationships and prioritizing communications based on importance of participants in the communications is provided. A prioritization system identifies relationships between persons and identifies the importance of a person to other persons based on these relationships. After the prioritization system identifies the importance of persons, the prioritization system can prioritize communications based on the importance of the senders or recipients.
Type:
Grant
Filed:
July 30, 2004
Date of Patent:
March 29, 2011
Assignee:
Microsoft Corporation
Inventors:
Hua-Jun Zeng, Zheng Chen, Benyu Zhang, Wei-Ying Ma
Abstract: Methods, apparati, and computer-readable media for associating computer network identifications with network policies. A plurality of network detectors (3) are coupled to a client computer (1). A network probe (4), coupled to the network detectors (3), associates each network identification revealed by a network detector (3) with a netspec. A netspec database (6), coupled to the network probe (4), associates netspecs with locations. A policy guide (8), coupled to the network probe (4), associates network identifications with locations. A network interface module (9), coupled to the policy guide (8), implements network policies based upon locations.
Abstract: Systems and methods are disclosed for managing information technology resources. Management capabilities available for a particular IT resource are defined via at least one management interface. The management interface includes port types that specify attributes and operations available in a Web service to manage the IT resource. The port types are mapped to descriptors in a ModelMBeanInfo interface than can be used with an MBean that corresponds to the Web service.
Type:
Grant
Filed:
July 30, 2004
Date of Patent:
January 11, 2011
Assignee:
Hewlett-Packard Development Company, L.P.
Inventors:
John J. Mazzitelli, Salvatore J. Campana, Jr., Ian P. Springer, Elzbieta M. Dziembowski
Abstract: A system and corresponding methods for recommending a discussion group as an appropriate place to post a message are provided. In one embodiment, the system searches a plurality of existing posts to identify the posts that are similar to a subject of a user's message. The system identifies the discussion groups that contain the identified posts and selects one of the identified discussion groups to recommend as an appropriate discussion group to post the user's message.
Type:
Grant
Filed:
July 30, 2004
Date of Patent:
November 30, 2010
Assignee:
Microsoft Corporation
Inventors:
Benjamin Canning, Sabrina Kikkert, Stephen N. Anderson