Network Resource Allocating Patents (Class 709/226)
-
Publication number: 20130111031Abstract: A system and method are described herein that prioritize users into waiting queues based on the previously measured end user response time for each user or a user's expectancy for a shorter response time. A user profile may be generated for each user based on the user's expectancy, performance needs, or attributes about the user. The system and method may provide access to a server for each user based on their placement and prioritization in each queue, creating distinct server and/or end user response times for distinct users.Type: ApplicationFiled: October 26, 2011Publication date: May 2, 2013Applicant: SAP AGInventor: Martin Hoffmann
-
Publication number: 20130111034Abstract: Disclosed is a method and system for automatic end-to-end storage provisioning by an application aware appliance of a software application served by a computing cloud based on a user request for a cloud served software application. Embodiments may automatically select and configure both the server computing resources and the storage volume/array to implement a cloud based software application. A user request may identify characteristics of requested server computing resources, but need only specify the desired software application, and the embodiments will automatically select/create a storage volume/array and copy the requested software application onto the selected/created storage volume/array.Type: ApplicationFiled: November 1, 2011Publication date: May 2, 2013Inventor: Pavan Belur Gopalakrishna Upadhya
-
Publication number: 20130111257Abstract: An automated method for provisioning a grid used to run a load test on a target website includes sending one or more requests in a multi-threaded manner to at least one cloud provider, the one or more requests for an allocation of N load server instances and M result server instances which comprise the grid. Requests received back from the cloud provider are also handled in a multi-threaded manner; any errors occurring during the allocation being corrected automatically. The N load server instances and the M result server instances are then verified to be operational and correctly running software deployed to provide defined test services. Errors identified during the verification are automatically corrected either by attempting to restart a failed instance or allocating a different instance.Type: ApplicationFiled: December 18, 2012Publication date: May 2, 2013Applicant: SOASTA, INC.Inventor: SOASTA, Inc.
-
Publication number: 20130111032Abstract: A method, system, and computer program product for cloud optimization using workload analysis are provided in the illustrative embodiments. An architecture of a workload received for execution in a cloud computing environment is identified. The cloud computing environment includes a set of cloud computing resources. A section of the workload is identified and marked for static analysis. Static analysis is performed on the section to determine a characteristic of the workload. A subset of the set of cloud computing resources is selected such that a cloud competing resource in the subset is available for allocating to the workload and has a characteristic that matches the characteristic of the workload as determined from the static analysis. The subset of cloud computing resources is suggested to a job scheduler for scheduling the workload for execution.Type: ApplicationFiled: October 28, 2011Publication date: May 2, 2013Applicant: International Business Machines CorporationInventors: Sangram Alapati, Prathiba Kumar, Gowri Shankar Palani, Rajan Ravindran, Satish Kumar Sadasivam
-
Patent number: 8433903Abstract: An Asynchronous Enhanced Shared Secret Provisioning Protocol (ESSPP) provides a novel method and system for adding devices to a network in a secure manner. A registration process is launched by at least one of two network devices together. These two devices then automatically register with each other. When two devices running Asynchronous ESSPP detect each other, they exchange identities and establish a key that can later be used by the devices to mutually authenticate each other and generate session encryption keys. An out-of-band examination of registration signatures generated at the two devices can be performed to help ensure that there was not a man-in-the-middle attacker involved in the key exchange.Type: GrantFiled: October 6, 2008Date of Patent: April 30, 2013Assignee: Microsoft CorporationInventor: Donald A. Zick
-
Patent number: 8433803Abstract: A method, data processing system, and computer program product for managing resources. A request for resources in the network data processing system is received. The request comprises requested values for a plurality of attributes for the resources in the network data processing system. In response to receiving the request, potential resources in the network data processing system are identified. The request is evaluated using a function configured to generate identified values for the plurality of attributes from the requested values in the request based on proximity scores for the plurality of attributes in the potential resources relative to an ideal allocation of the potential resources and resource weights for the plurality of attributes in the potential resources.Type: GrantFiled: March 20, 2012Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Hari Haranath Madduri, Sudhee Nagabhushan Subrahmanya
-
Patent number: 8433802Abstract: A system and method for allocating resources in a cloud environment includes determining permitted usage of virtual machines and partitioning resources between network servers in accordance with a virtual hypervisor generated in accordance with an abstraction layer configured as an interface between a solution manager and an interface to a cloud network. Resource usage limits are determined for each virtual machine associated with the virtual hypervisor, and the servers are analyzed through the virtual hypervisors to determine if the virtual machines need to be migrated. If reallocation is needed, virtual machine migration requests are issued to migrate virtual machines into a new configuration at the virtual hypervisor abstraction level. The servers are reanalyzed to determine if migration of the new configuration is needed. Shares are computed to enforce balance requirements, and virtual machine shares and limits are adjusted for resources according to the computed shares.Type: GrantFiled: January 26, 2010Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Michael R. Head, Andrzej Kochut, Charles O. Schulz, Hidayatullah H. Shaikh
-
Patent number: 8433596Abstract: Embodiments of the invention are generally directed to a system and method for service parts planning in a network having one or more service parts. For at least a subset of the one or more service parts, a calculation is performed to determine a location within the network at which allocating the service part provides the greatest gain in system availability per item cost. In an embodiment, the calculations are based, at least in part on machine-specific information. In one embodiment, inventory position is determined based, at least in part, on a unique identifier associated with a service part.Type: GrantFiled: February 22, 2005Date of Patent: April 30, 2013Assignee: SAP AktiengesellschaftInventors: Hans Karsten Schierholt, Priti Prabhoo, Uwe Sodan
-
Patent number: 8433801Abstract: Methods, systems, and apparatus, including computer program products, for managing resources in virtualization systems, including multi-cloud systems. The use of supply chain economics alone and in combination with other techniques offers a unified platform to integrate, optimize or improve, and automate resource management in a virtualization system. These techniques may be used to monitor and control the delivery of service level agreements and software licenses. They may also be used to monitor and control contention of computing resources in a virtualization system, and to suspend or terminate computing resources.Type: GrantFiled: August 12, 2009Date of Patent: April 30, 2013Assignee: VMTurbo, Inc.Inventors: Yechiam Yemini, Shmuel Kliger, Danilo Florissi, Shai Benjamin, Yuri Rabover
-
Patent number: 8434081Abstract: A storage manager connects containers of virtual machine (VM) images and virtual storage device data within hosts. The storage management provides a set of northbound application programming interfaces (APIs) that allow configuration of images associated with VM images and virtual storage devices provided to the operating systems and applications within virtual machine images. The northbound APIs, include methods for creating a virtual storage container that contains storage for the VM instance and also at least one virtual storage device to be provided to an operating system executed by the VM, a method for causing an attach of the virtual storage container to the host and a method for causing a deployment of the virtual storage device within the host. A set of southbound APIs are provided by the host, including at least a method that creates virtual storage devices and a method that attaches virtual storage devices to the host.Type: GrantFiled: July 2, 2010Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Ezequiel Cervantes, David Joseph Gimpl, Elfred Pagan, Sudhir Gurunandan Rao, Murali Krishna Somarouthu
-
Patent number: 8433749Abstract: A novel web server farm architecture is provided that combines various cloud components and innovatively maximizes their strengths to achieve a scalable, adaptable, load balanced computing architecture. In one embodiment, this architecture includes a storage host for static content hosting, a cluster of virtual machines (operating as web servers) for dynamic content hosting, and a dedicated application engine for monitoring the load of the virtual machines. A browser or end-application user of a web application is first routed to a static anchor page hosted on the storage host. The browser is subsequently presented with a list of virtual machines and data corresponding to their respective current loads. To access dynamic content, the browser is able to select from the virtual machines based in large part on the reported current loads of the virtual machines. Once a virtual machine is selected, the browser may communicate directly with the selected web server.Type: GrantFiled: February 1, 2010Date of Patent: April 30, 2013Assignee: Accenture Global Services LimitedInventors: Sewook Wee, Huan Liu
-
Patent number: 8433797Abstract: Described herein are systems and methods for providing a message UI engine for accessing messages on a message system. The message system may comprise a message storage system (that store messages of varying types and formats, such as fax, text, voice/audio, video, and picture messages) and a message access system. The message UI engine is configured by a Flash media UI file for accessing messages and associated message information by interacting with the message access system. The Flash media UI file does not comprise any markup language and comprises only Flash® instructions. The Flash media UI file also comprises a plurality of embedded applications for presenting the plurality of different message types, each embedded application comprising only Flash instructions. The associated message information may be stored and transmitted in a non-markup language format, such as comma-delimited format. The messages and message information may be transmitted using a non-HTTP protocol.Type: GrantFiled: September 20, 2012Date of Patent: April 30, 2013Assignee: RingCentral, Inc.Inventors: Vlad Vendrow, Vladimir Shmunis
-
Patent number: 8434145Abstract: An information processing system uses an input apparatus to input user information. After authentication of the user information, the input apparatus-transmits control information to an information processing apparatus, indicating which functions of the information processing apparatus the user may use. The control information is independent of the particular method by which authentication is performed. Use of the information processing apparatus can accordingly be controlled by a variety of methods without requiring any user authentication capability to be provided in the information processing apparatus itself, and new authentication methods can be implemented without modification or replacement of existing information processing apparatus.Type: GrantFiled: August 28, 2009Date of Patent: April 30, 2013Assignee: Oki Data CorporationInventor: Koji Urasawa
-
Patent number: 8433758Abstract: A method and apparatus for user information processing in a network environment. The method performs an orthogonal transform on first and second vectors representing information related to first and second users respectively to obtain first and second transformed vectors. Then, the method splits the first and second transformed vectors into two parts respectively, such that first and second vectors cannot be derived from the first or second parts. The first and second user devices exchange the first part of the first transformed vector and the second part of the second transformed vector. The first and second user devices calculate the inner product of the first parts and the second parts respectively. Finally, the two inner products of the parts are summed to get an inner product of the first and second vectors. Also provided are a method and system for resource recommendation in a network environment.Type: GrantFiled: February 24, 2010Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Rong Yao Fu, Wei Gao, Tao Wang, Quan Yuan, Xia Tian Zhang, Shiwan Zhao
-
Patent number: 8434087Abstract: A method for managing distributed computer data stream acceleration devices is provided that utilizes distributed acceleration devices on nodes within the computing system to process inquiries by programs executing on the computing system. The available nodes and available acceleration devices in the computing system are identified. In addition, a plurality of virtual acceleration device definitions is created. Each virtual acceleration device definition includes attributes used to configure at least one of the plurality of identified acceleration devices. When an inquiry containing an identification of computing system resources to be used in processing the inquiry is received, at least one virtual acceleration device definition that is capable of configuring an acceleration device in accordance with the computing system resources identified by the inquiry is identified.Type: GrantFiled: August 29, 2008Date of Patent: April 30, 2013Assignee: International Business Machines CorporationInventors: Louis R. Degenaro, James R. Giles, Gabriela Jacques Da Silva
-
Patent number: 8434086Abstract: A system is set forth comprising a processor and memory storage units storing software code. The software code comprises code for a scheduling system and for generating a plurality of adaptive partitions that are each associated with one or more software threads and that each have a corresponding processor budget. The code also is executable to generate at least one sending thread and at least one receiving thread which responds to communications from the sending thread to execute one or more tasks corresponding to the communications. In operation, the scheduling system selectively allocates the processor to each sending and receiving thread based on the processor budget of the adaptive partition associated with the respective thread. The scheduling system bills the processor budget of the adaptive partition associated with the sending thread for processor allocation used by the receiving thread to respond to communications sent by the sending thread.Type: GrantFiled: December 22, 2005Date of Patent: April 30, 2013Assignee: QNX Software Systems LimitedInventors: Dan Dodge, Attilla Danko, Sebastien Marineau-Mes, Peter Van Der Veen, Colin Burgess, Thomas Fletcher, Brian Stecher
-
Publication number: 20130103839Abstract: A method and a system for providing data from a resource weak device to a computer client connected to the resource weak device, allowing the computer client to receive and send information from and to the resource weak device, and a data stream between the resource weak device and the computer client is mapped from a low level data format to a high level data format by a mapping function in the computer client, the mapping function comprises static data relating to the resource weak device and the high level data format link to the static data, the second high level data format is used for displaying the data from the resource weak device at the computer client.Type: ApplicationFiled: March 21, 2011Publication date: April 25, 2013Inventors: Peter Grimstrup, Ulrik Gammelby
-
Publication number: 20130103837Abstract: Platforms, systems, software, and methods for deploying and maintaining distributed computing, networking and storage comprising a configuration of dedicated service meshes. The invention further comprising a module for dynamically managing physical nodes; a module for dynamically managing nodes on physical nodes; a module for dynamically managing services/workers on nodes; a module for governing communication within the system and with the system; a plurality of communication endpoints; a plurality of services, wherein each service is associated with one or more endpoints, wherein services communicate by message exchange via their endpoints; a module for grouping nodes into clusters; a module for grouping endpoints into meshes such that all member services of a mesh can be addressed as a whole or as pertinent subsets thereof; and a module for dynamically effecting topology changes.Type: ApplicationFiled: October 25, 2011Publication date: April 25, 2013Applicant: LonoCloud, Inc.Inventor: Ingolf Heiko Krueger
-
Publication number: 20130103838Abstract: A method for transferring one or more guest operating system (OS) using a remote server. The remote server periodically obtains a central processing unit (CPU) utilization ratio of each guest OS installed in each cloud server of the data center. The remote server counts the number of times of obtaining the CPU utilization ratio, and calculates a predicted average of the CPU utilization ratio for each cloud server if the counted number of the times is equal to a predetermined number. The remote server transfers one or more guest OS from the cloud server to other cloud servers before a predetermined time, in response to a determination that the predicted average of the CPU utilization ratio of the cloud server is greater than a predetermined average.Type: ApplicationFiled: September 29, 2012Publication date: April 25, 2013Inventors: Guang-Jian Wang, Wen-Wu Wu, Meng-Zhou Liu, Xiao-Jun Fu
-
Publication number: 20130103556Abstract: Crowd based content delivery is disclosed. In some embodiments, managing content delivery includes receiving a specification from a resource provider of an availability of a content delivery service at the resource provider, selecting the resource provider to service requests for a content item, facilitating caching of the content item at the resource provider, and redirecting a request for the content item to the resource provider for servicing.Type: ApplicationFiled: January 7, 2010Publication date: April 25, 2013Inventor: Barrett Gibson Lyon
-
Publication number: 20130103836Abstract: The present disclosure discloses a network device and/or method for centralized configuration with dynamic distributed address management. The disclosed network device receives, at a first network node, a range of sub network addresses and a specified size for a sub network. The disclosed network device then divides the range of sub network addresses into a plurality of sub-ranges of sub network addresses based on the specified size. Further, the network device allocates the plurality of sub-ranges of sub network addresses to a plurality of sub networks, and transmits an allocated sub-range of sub network addresses to a corresponding sub network at a second network node through an established secure communication channel. Moreover, the network device can retrieve a profile template that includes the range of sub network addresses and the specified size of the sub network; and create a profile based on the profile template.Type: ApplicationFiled: October 21, 2011Publication date: April 25, 2013Inventors: Joseph Garcia Baniqued, Deepika Dwivedi, Santashil PalChaudhuri, Sandeep Unnimadhavan, Brijesh Kumar Yadav, Tilak Kumar Adhya, Rajalakshmi Manoharan
-
Patent number: 8429660Abstract: Systems and methods are provided to allocate application tasks to a pool of processing machines. According to some embodiments, a requestor generates a scope request including an indication of a number of compute units to be reserved. The requestor also provides an application request associated with the scope. A subset of available processing machines may then be allocated to the scope, and the application request is divided into a number of different tasks. Each task may then be assigned to a processing machine that has been allocated to the application request. According to some embodiments, each task is associated with a deadline. Moreover, according to some embodiments an overall cost is determined and then allocated to the requestor based on the number of compute units that were reserved for the scope.Type: GrantFiled: August 22, 2005Date of Patent: April 23, 2013Assignee: Goldman, Sachs & Co.Inventors: Jay S. Dweck, Michael Fellows, David G. Richard, Mark T. Morrissey, Mary D Byron
-
Patent number: 8429221Abstract: A method of redirecting content requests among content distribution network peers. In operation, a client sends a request for content to a content distribution network (CDN). When this CDN does not currently have the capacity to deliver the content, the CDN refers to one or more content distribution tables to see if the neighbor peers are able to provide this content. The content distribution table is populated at the time of distribution of the content. When the neighbor peer has this content, the request is redirected to the neighbor peer. In redirecting request, an address of the neighbor peer is appending to the previous address such that each peer receiving the request knows where the request came from and where it has been previously.Type: GrantFiled: December 13, 2001Date of Patent: April 23, 2013Assignee: Rockstar Consortium US LPInventors: Abdulkadev Barbir, Nicholas C. Bennett, Nalin N. Mistry
-
Patent number: 8429276Abstract: In general, techniques are described for dynamic resource allocation in virtual environments. A network device comprising physical resources, a first virtual machine (VM), a second VM and a hypervisor may implement these techniques. The first VM executes within a first partition of the physical resources to process a first portion of received network traffic, while the second MV executes within a second partition of the physical resources to process a second portion of the received network traffic. The first VM determines whether physical resources in addition to those allocated by way of the first partition are required to process the incoming network traffic and issues a request requesting additional physical resources based on the determination. Either the second VM or the hypervisor, in response to the request, dynamically reallocates at least a portion of the physical resources allocated to the second partition to the first partition.Type: GrantFiled: October 25, 2010Date of Patent: April 23, 2013Assignee: Juniper Networks, Inc.Inventors: Kartik Kumar, Chandrasekaran Rajagopalan
-
Patent number: 8429231Abstract: Systems and techniques for transferring electronic data include enabling instant messaging communication between a sender an at least one recipient through an instant messaging host. In addition, voice communication is enabled between the sender and the recipient through the instant messaging host.Type: GrantFiled: September 8, 2011Date of Patent: April 23, 2013Assignee: Facebook, Inc.Inventors: Shuwu Wu, James Crawford
-
Patent number: 8428078Abstract: A mobile communication apparatus includes a storage unit that stores therein correspondence information correlating area and transmission resource; an area deducing unit that deduces in which area the mobile communication apparatus is located; a selecting unit that selects the transmission resource correlated, in the correlation information stored by the storage unit, with the area deduced by the area deducing unit; and a transmitter that using the transmission resource selected by the selecting unit, transmits data to a second mobile communication apparatus.Type: GrantFiled: July 13, 2010Date of Patent: April 23, 2013Assignee: Fujitsu LimitedInventors: Yuuta Nakaya, Ichiro Iida, Nobutsugu Fujino, Makoto Yoshida, Mamoru Machida, Masayoshi Moriya, Kazumasa Ushiki
-
Patent number: 8429652Abstract: The present invention is directed towards systems and methods for spillover threshold management in a multi-core system. A pool manager divides the spillover threshold limit of connections for vServers into an exclusive quota pool and a shared quota pool. Each vServer operating on a core is allocated an exclusive number of connections from the exclusive quota pool. If a vServer wishes to create connections beyond its exclusive number, the vServer can borrow from the shared quota pool. When the vServers are using at least a first predetermined threshold of their exclusive number of connections and the number of available connections in the shared quota pool has reached a second predetermined threshold, the multi-core system establishes a backup vServer.Type: GrantFiled: June 22, 2010Date of Patent: April 23, 2013Assignee: Citrix Systems, Inc.Inventors: Manikam Muthiah, Raghav Somanahalli Narayana, Sreedhar Yengalasetti
-
Patent number: 8428618Abstract: A system provides location-based services through an enhanced mobile device. The system determines a current location of the mobile device, and determines whether the current location of the mobile device falls within one or more geographic regions defined in a database. If the current location falls within one or more of the geographic regions, the system identifies services available within the one or more geographic regions that the mobile device is determined to be within. The system generates a customized menu based on the identified services and displays the customized menu on the mobile device.Type: GrantFiled: April 6, 2012Date of Patent: April 23, 2013Assignee: Accenture Global Services LimitedInventors: Andrew E. Fano, Scott W. Kurth
-
Patent number: 8428645Abstract: Using a local sharing client, a first mobile device shares incoming calls, email, SMS messages, pictures, screen display, etc. locally (without employing a cellular wireless network) with a second device. The second device may also have a similar client and be able to share locally with the first mobile device.Type: GrantFiled: August 8, 2007Date of Patent: April 23, 2013Inventor: Bindu Rama Rao
-
Patent number: 8429650Abstract: A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides an enterprise application virtualization solution that allows for centralized governance and control over software and Java applications. The system uses a plurality of agents to manage the software processes and resources running in the computing environment. The system also uses a controller to collect data from the agents about the current operating performance of the computing environment and to deploy the services in a way that best honors the service level agreements of all deployed services. The communication between each of the plurality of agents and the controller is secured with a mutual authentication method.Type: GrantFiled: November 13, 2009Date of Patent: April 23, 2013Assignee: Oracle International CorporationInventors: Paul Ferwerda, John Herendeen, Richard Mousseau
-
Patent number: 8429282Abstract: A computer system that provides services to clients may adaptively throttle incoming service requests in order to reach and then maintain operation at an ideal request rate. An ideal request rate may be a maximum rate at which incoming service requests can be serviced such that client-specified quality of service (QoS) expectations are met for most or all incoming service requests, or a rate within a range of rates defined by that maximum rate. Determining whether the system is operating at an ideal request rate may include determining the minimum difference between the expected and actual QoS for a group of recently serviced requests. The system may gradually modify a throttle multiplier value in order to reach or maintain an ideal request rate. Maintaining operation at an ideal request rate may allow the system to avoid entering an overloaded state, and/or oscillating between an overloaded state and a non-overloaded state.Type: GrantFiled: March 22, 2011Date of Patent: April 23, 2013Assignee: Amazon Technologies, Inc.Inventors: Sohel R. Ahuja, Jason G. McHugh
-
Patent number: 8427966Abstract: A configurable probe takes advantage of inter-dependent probe control elements that pass data control signals from one controelement to the other for controlling data extraction. The control elements operate in parallel on one word at a time, based upon a state established by one of the control elements. The data to be considered is established by timing offsets dependant upon packet header lengths, and a function to be performed on the data is controlled by individual control units based upon template information individual to each control element. The probe is agnostic about protocols. It operates on stream of packet words and executes its functions according to defined templates. It is the host that controls the probe and determines what protocol header to parse and how. The controlling host instructs the probe via defined templates that act as state machine definitions what to do and when.Type: GrantFiled: October 26, 2007Date of Patent: April 23, 2013Assignee: JDS Uniphase CorporationInventor: Slawomir K. Ilnicki
-
Patent number: 8429304Abstract: Logical partitions in an information processing apparatus share an IP address and are assigned different MAC addresses. A representative logical partition communicates with an external entity on behalf of the other logical partitions. A driver is provided with a virtual interface and a physical interface. Internal communication between the logical partitions is done via the virtual interface and communication with an external entity is done via the physical interface. If a packet received from an external destination is destined to one of the other logical partitions, the protocol stack of the representative logical partition replaces the destination MAC address by the MAC address of the destination logical partition. The protocol stack provides the packet in which the destination MAC address has been replaced to the virtual interface. The virtual interface transfers the packet provided by the protocol stack to the destination logical partition.Type: GrantFiled: October 10, 2006Date of Patent: April 23, 2013Assignees: Sony Corporation, Sony Computer Entertainment Inc.Inventors: Koji Shima, William Parks
-
Patent number: 8429263Abstract: The present invention discloses file content distribution method, device and system, wherein, the method includes: a content preparing means selecting one or more content location and distribution global controlling means, and sending a file content distributing requests to the selected content location and distribution global controlling means; after receiving the file content distributing request, the content location and distribution global controlling means selecting one or more content delivery and storage controlling means according to a predetermined distributing strategy, and transmitting the file content distributing requests to the selected content delivery and storage controlling means; after receiving the file content distributing request, the content delivery and storage controlling means selecting one or more content delivering and storing means according to the predetermined distributing strategy, and transmitting the file content distributing request to the selected content delivering and storType: GrantFiled: December 31, 2008Date of Patent: April 23, 2013Assignee: ZTE CorporationInventor: Hongfei Xia
-
Patent number: 8429275Abstract: A method, apparatus and computer readable medium for creating a social network map using non-voice communications are disclosed. For example, the method registers employment data of an employee, monitors non-voice communications of the employee, generates a social network map of the non-voice communications of the employee and analyzes the social network map to provide at least one correlation.Type: GrantFiled: September 29, 2009Date of Patent: April 23, 2013Assignee: AT&T Intellectual Property I, L.P.Inventor: Sanjay Macwan
-
Patent number: 8427670Abstract: Systems and methods for increasing throughput of print jobs in a print shop environment are disclosed. A system may include a plurality of resources, a print job workflow management system that coordinates a flow of print jobs with respect to the plurality of resources, and a processor-readable storage medium in communication with the print job workflow management system. The processor-readable storage medium may contain one or more programming instructions that, when executed, direct the print job workflow management system to receive print job characteristics pertaining to a plurality of print jobs processed in the print shop environment. Data determined based on the received print job characteristics, including a form type utilized in the print shop environment for each job and a print volume associated with each form type, may be provided. The plurality of resources may then be assigned based on the print volume associated with each form type.Type: GrantFiled: May 18, 2007Date of Patent: April 23, 2013Assignee: Xerox CorporationInventor: Sudhendu Rai
-
Patent number: 8429274Abstract: Various information about storage resources in a UNIX or UNIX derivative operating system computing environment is gathered from various sources in response to scan requests. Where a given type of information for a given storage resource is gathered from multiple sources, the information is verified for consistency, and placed in a single file in an industry standard hierarchical format. Scan threads are timed to provide reliable performance.Type: GrantFiled: September 6, 2006Date of Patent: April 23, 2013Assignee: RELDATA, Inc.Inventor: Kirill Malkin
-
Patent number: 8429647Abstract: Methods, systems and computer programs for migrating a virtual machine (VM) executing on a first host to a second host are presented, where the first host and the second are on different networks. One embodiment of a method includes assigning to the VM a VM address (VMA) belonging to a VM network and publishing a first route to an associated network (AN) via a first virtual router executing on the first host. The method further includes migrating the VM from the first host to the second host, the VM maintaining the assigned VMA after migrating, and publishing a second route to the AN via a second virtual router executing on the second host. The first and second virtual routers have addresses belonging to the VM network, and network packets to and from the VM flow through the virtual router where the VM is executing. A temporary tunnel between the virtual routers allows traffic to flow to the VM while the new route to AN is propagated throughout the network.Type: GrantFiled: May 6, 2009Date of Patent: April 23, 2013Assignee: VMware, Inc.Inventors: Shudong Zhou, Andrew Lambeth, Mark Pariente
-
Patent number: 8429277Abstract: Disclosed in some examples is a method of aggregating social networking data by receiving first authentication information for a first social networking service, the first authentication information being associated with a user and being received from a first social networking application, receiving second authentication information for a second social networking service, the second authentication information being associated with the user and being received from a second social networking application, requesting first information regarding the user from the first social networking service using the first authentication information, receiving the first information regarding the user from the first social networking service and storing the received first information, requesting second information regarding the user from the second social networking service using the second authentication information; and receiving the second information regarding the user from the second social networking service and storing tType: GrantFiled: September 26, 2011Date of Patent: April 23, 2013Assignee: Zynga Inc.Inventors: Scott Dale, Nathan Brown
-
Patent number: 8429278Abstract: A broadcasting receiver and method of interfacing resource information between a host device and a POD, sending host device resource information and obtaining host device resource information are disclosed. A POD sends a resource information requesting message. And a host device receives the resource information requesting message and responds with a resource information message including a resource identifier defined in a resource information table which includes information indicating whether the host device supports A-mode. Using a “conditional access” feature provided by a conventional cable security card, content received through any type of transport protocol (including an IP protocol) including a wired/wireless network can be protected and A-mode resource information can be systematically defined together with other-mode IP communication resource and the resource information of different modes can be integrated and transmitted to the host device.Type: GrantFiled: November 18, 2011Date of Patent: April 23, 2013Assignee: LG Electronics Inc.Inventors: Sang Hoon Cha, Bong Seok Kim
-
Publication number: 20130097321Abstract: Method, system, and programs for balancing work load in a distributed system. A plurality of multi-dimensional load metrics are received from a plurality of resource units in the distributed system. Based on the received plurality of multi-dimensional load metrics and a global statistical load model, a load deviance for each resource unit is computed. The plurality of resource units in the distributed system are then ranked based on the load deviance of each resource unit. At least one load balancing action is further determined based on the ranked resource units and at least one load balancing policy.Type: ApplicationFiled: October 17, 2011Publication date: April 18, 2013Applicant: YAHOO! INC.Inventors: Adwait Tumbde, Sahaya Andrews Albert, Adam Silberstein, Suryanarayan Perinkulam, Masood Mortazavi, Jianjun Chen, Russell Sears
-
Publication number: 20130097323Abstract: A relocation mechanism in a multi-nodal computer environment dynamically routes processing units in a distributed computer system based on incoming physical data into the processing unit. The relocation mechanism makes an initial location decision to place a processing unit onto a node in the distributed computer system. The relocation mechanism monitors physical data flowing into a processing unit or node and dynamically relocates the processing unit to another type of node within the ‘cloud’ of nodes based on the type of physical data or pattern of data flowing into the processing unit. The relocation mechanism may use one or more rules with criteria for different data types observed in the data flow to optimize when to relocate the processing units.Type: ApplicationFiled: December 8, 2012Publication date: April 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: INTERNATIONAL BUSINESS MACHINES CORP
-
Publication number: 20130097319Abstract: Embodiments associate software applications with computing resource containers based on placement rules. A placement rule indicates that a first software application is to be co-located with a second software application during execution of the first and second software applications, or that the first software application is to be separated from the second software application during execution of the first and second software applications. A target computing resource container is selected based on the placement rule and a computing resource container that is associated with the first software application. The second software application is associated with the target computing resource container, and the placement rule may be provided to the target computing resource container.Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Applicant: VMWARE, INC.Inventors: Irfan AHMAD, Anne Marie HOLLER, Mustafa UYSAL
-
Publication number: 20130097322Abstract: A server architecture for, and method of, managing devices. In one embodiment, the server architecture includes: (1) a plurality of manager clusters and (2) a dispatcher cluster coupled to the plurality of manager clusters and configured to: (2a) receive an initial contact from a device, (2b) assign the device to one manager cluster of the plurality of manager clusters, the one manager cluster becoming a home cluster for the device, (2c) cause data regarding the device to be transferred to the home cluster and (2d) cause the device thereafter to communicate directly with, and be managed by, the home cluster.Type: ApplicationFiled: October 17, 2011Publication date: April 18, 2013Applicant: Alcatel-Lucent USA, Inc.Inventors: Jigang Yang, Arabinda Bose, Vinod T. Nair, Eivind Skildheim
-
Publication number: 20130097249Abstract: An emergency response system, method of responding to emergencies and a computer program product therefor. Networked provider computers are distributed over a geographical area that includes multiple regions with at least one providing computing capability to each region and each region receiving emergency response resources during emergencies from an emergency response computer. During any local emergency the area emergency response computer provides a local response and notifies other emergency response computers for other regions that are potentially affected by the emergency.Type: ApplicationFiled: October 18, 2011Publication date: April 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Victor Fernandes Cavalcante, Ricardo Guimaraes Herrmann, Kiran Mantripragada, Marco Aurelio Stelmar Netto, Lucas Correia Villa Real, Cleidson Ronald Botelho De Souza
-
Publication number: 20130097320Abstract: The present disclosure describes methods, systems, and computer program products for providing access to business network data. One method includes identifying a logical graph from business network linked graph data to be transformed into a resource graph, the logical graph including at least two nodes and at least one edge connecting a pair of nodes and defining a connection between the nodes. Each node is converted into a resource. A resource graph associated with the logical graph can be generated, where generation comprises, for each identified node, associating at least one attribute associated with the identified node as a resource attribute of the corresponding resource, adding at least one node connected to the identified node via an edge in the logical graph as a resource attribute of the corresponding resource, and dissolving at least one connection between the identified node and at least one other entity in the logical graph.Type: ApplicationFiled: October 14, 2011Publication date: April 18, 2013Applicant: SAP AGInventors: Daniel Ritter, Christoph Herrmann, Ankur Bhatt
-
Publication number: 20130097318Abstract: A method is provided in one example embodiment and includes identifying a network location of an endpoint, which is attempting to initiate an application; identifying whether the endpoint is operating in an enterprise environment; determining whether the application is trusted based on metadata associated with the application; and provisioning a tunnel for data traffic associated with the application. In more detailed implementations, the tunnel can be provisioned if the application is trusted and the endpoint is outside of an enterprise environment. In addition, the tunnel can be provisioned if the application is untrusted and the endpoint is within an enterprise environment.Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Inventors: Philip J.S. Gladstone, Morris J. Katz
-
Publication number: 20130097304Abstract: A dynamic reliability and security capability is provided. The dynamic reliability and security capability may be configured to support use of a dynamic reliability profile (DRP) that specifies the reliability parameters of a customer both as function of time and as a function of the requirements of the application or service of the customer. The reliability parameters may specify reliability requirements and/or goals of the customer, thereby providing a time varying requirements/goals profile. The dynamic reliability and security capability may be configured to dynamically configure the cloud resources to provide the required reliability as specified by the DRP. The RSG capability may be configured to subsequently monitor and meter the behavior to assure that the specified reliability is in fact being delivered, which may include use of self-healing capabilities to provide service assurance.Type: ApplicationFiled: October 14, 2011Publication date: April 18, 2013Inventors: Abhaya ASTHANA, Marc S. Benowitz, Uma Chandrashekhar
-
Patent number: 8423645Abstract: A method of, system for, and product for managing a denial of service attack in a multiprocessor environment comprising. The first step is establishing normal traffic usage baselines in the multiprocessor environment. Once the baseline is established the next step is monitoring outgoing traffic to detect a high proportion of packets being sent to a specific destination address, and a high number of outbound packets compared to said baseline. Next is monitoring ports and protocols to detect a high proportion of packets sent to a specific port, and a consistent use of a protocol for all packets for that port. If there is such consistent use of a protocol for all packets for that port as to evidence a denial of service attack, blocking measures are started to mitigate the apparent denial of service attack.Type: GrantFiled: September 14, 2004Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Clark Debs Jeffries, Robert William Danford, Terry Dwain Escamilla, Kevin David Himberger
-
Patent number: 8423667Abstract: A system, method, and computer-readable medium for updating request routing information associated with client location information are provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a resource identifier for requested content from the client computing device. The content delivery network service provider obtains a query IP address corresponding to the client computing device. Based on routing information associated with the query IP address, the content delivery network service provider routes the DNS query. The process further includes monitoring performance data associated with the transmission of the requested resource and updating routing information associated with the query IP address based on the performance data for use in processing subsequent requests form the client computing device.Type: GrantFiled: June 21, 2012Date of Patent: April 16, 2013Assignee: Amazon Technologies, Inc.Inventors: David R. Richardson, Bradley E. Marshall, Swaminathan Sivasubramanian