Abstract: Load balancing and overload control techniques are disclosed for use in a SIP-based network or other type of network comprising a plurality of servers. In a load balancing technique, a first server receives feedback information from at least first and second downstream servers associated with respective first and second paths between the first server and a target server, the feedback information comprising congestion measures for the respective downstream servers. The first server dynamically adjusts a message routing process based on the received feedback information to compensate for imbalance among the congestion measures of the downstream servers. In an overload control technique, the first server utilizes feedback information received from at least one downstream server to generate a blocking message for delivery to a user agent.
Abstract: A method, apparatus and/or system related to automatic detection of a similar application stored on a networked media device through a multicast capability of an operating system of a mobile device. In one embodiment, a method of a mobile device includes accessing a multicast capability of an operating system through an application of the mobile device, determining if there is a similar application locally stored on a networked media device to the application on the mobile device when a multicast message is broadcast to the networked media device communicatively coupled to the mobile device through a local area network, and automatically launching the similar application on the networked media device based on a communication of the multicast message from the mobile device to the networked media device.
Abstract: A system, method and device for providing connection resiliency. The method including maintaining, by a first proxy, a TCP connection with a TCP client and a TCP connection with a TCP server through one or more TCP networks; maintaining information of both TCP connections by a forwarding component between the TCP networks and the first proxy; establishing, by the forwarding component, a new TCP connection with a second proxy for each of the TCP connections maintained by the first proxy; and forwarding data, to and from both the client and the server, to and from the second proxy without disconnection of the TCP connections of the TCP client and TCP server.
Abstract: An embodiment of the invention provides a method for communication within a system, wherein an instant messaging conversation is initiated between a first user and a second user. An indicator and a text entry are received from the first user during the instant messaging conversation. The status of the first user is changed, including automatically setting the text entry as the status of the first user, and automatically including the name of the second user in the status of the first user if preferences of the first user indicate that the name of the second user is to be included in the status of the first user. Further, the text entry is automatically sent to the second user if the preferences of the first user indicate that a text entry following the indicator is to be automatically sent to the second user.
Type:
Grant
Filed:
May 30, 2012
Date of Patent:
April 28, 2015
Assignee:
International Business Machines Corporation
Abstract: Embodiments of the present invention provide methods, systems, and apparatuses for a fault resilient collaborative media serving array comprising a plurality of nodes. In one embodiment, the present invention provides a method for creating a fault resilient collaborative media serving array where the array nodes do not share memory, the serving of a content file is accomplished by the collaborative efforts of many nodes in the array, and where there is no fixed allocation of sessions to nodes.
Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
Type:
Grant
Filed:
June 26, 2008
Date of Patent:
January 13, 2015
Assignee:
Microsoft Corporation
Inventors:
Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman