UNISYS CORPORATION Patent applications |
Patent application number | Title | Published |
20160140498 | PRICE QUOTING OF ALLOTMENTS BASED UPON SELECT CATEGORIES IN A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving, at a server, a reservation request from a requestor for an allotment on an air carrier's cargo hold for a designated route and date range; assigning, by the server, an allotment category for the requested allotment; generating, by the server, an allotment rate for the requested allotment based, at least in part, upon the designated route and the allotment category; and communicating, from the server to the requestor, the generated allotment rate. | 05-19-2016 |
20160140495 | METHOD OF FINALIZING AN AIR WAYBILL AT THE TIME OF ALLOTMENT BOOKING USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving, at a server, a reservation request from a requestor for a booking on an air carrier's cargo hold for a designated route; validating, by the server, an availability of the requested booking with the air carrier; generating, by the server, a price quote for the booking; communicating, by the server, the price quote to the requestor; and receiving, by the server, an acceptance of the price and terms from the requestor to form commercial terms for the booking. | 05-19-2016 |
20160140484 | METHOD OF ASSESSING A PENALTY FEE FOR AMENDING OR CANCELLING BOOKING USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving a request from a requestor to change a booking on an air carrier's cargo hold for a designated route; assessing a penalty fee upon the requestor for changing the booking. | 05-19-2016 |
20160140483 | PRESERVING THE HIGHEST SHIPPING PRICE USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving, at a server, a request from a requestor to amend a booking on an air carrier's cargo hold for a designated route; amending, by the server, at least one of a group consisting of a routing, a weight, a volume, a special handling codes, a product, an allotment, a flight, a container type, and a change of responsible participant for charges of the booking based on the received request; and assigning, by the server, a new price for the booking based on the amendment unless a total price for the amended booking and a rate for the amended booking are both lower than an original total price and an original rate for the booking created at a time of the booking. | 05-19-2016 |
20160140457 | WORKING MULTIPLE BOOKINGS OFF A QUEUE IN ONE STEP - The present invention provides apparatuses and methods for filtering queued booking and air waybills in a centralized system. Various embodiments of the invention may reserve bookings from multiple sources and generate air waybills associated with the bookings. The bookings and air waybills may be aggregated in a centralized system and filtered according to several attributes. The integration of a centralized system may allow filtered bookings may be worked on by a user of any facility at any time. As a result, workloads may be distributed between several facilities, thus providing an efficient means for managing bookings and air waybills in a timely manner. | 05-19-2016 |
20160140456 | GENERATING PRICE QUOTES PASSING DYNAMIC HURDLE RATES WITH REAL-TIME CAPACITY USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving, at a server, a reservation request from a requestor for a booking on an air carrier's cargo hold for a designated route; generating, by the server, a price quote for the booking based, at least in part, upon the designated route and booking characteristics; and receiving a hurdle rate for the route; and comparing the price quote to the hurdle rate to determine whether to confirm the booking to ship the cargo. | 05-19-2016 |
20160140455 | METHOD OF SELECTING A CONTRACT FOR A BOOKING USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may include receiving, at a server, a reservation request from a requestor for a booking on an air carrier's cargo hold for a designated route; receiving, at a server, a selected agreement for assignment to the booking corresponding to a campaign; assigning, by the server, the terms of the selected agreement to the booking according to the campaign; and generating, by the server, a price quote for the requested booking based, at least in part, upon the terms of the selected agreement. | 05-19-2016 |
20160140149 | DYNAMIC MODIFICATION OF DATABASE SCHEMA - Systems and methods are disclosed that perform dynamic database schema modification. A database system may receive a request to change a schema. In response to receiving the request to perform the dynamic schema modification, the database system may complete pending transactions and begin modifying the database schema. Any requests to access the database received prior to completion of the modification may be paused, thereby allowing the database to remain online and continue receiving requests while the modification is in progress. After completion of the modification, the paused requests may be resumed. | 05-19-2016 |
20160140132 | ONLINE REDISTRIBUTION - Methods and systems are disclosed to perform online disk data redistribution in a database environment. The methods and systems disclosed herein provide for the redistribution of data across multiple physical disks of a database while when a new physical storage device is added to the database. In embodiments, online redistribution of the data may include creating a temporary file, copying live database from a first physical storage to the temporary file, creating a checkpoint for the database, writing the temporary file to a second physical storage device that is added to the database, and purging the live database file and the temporary database file. | 05-19-2016 |
20160125372 | Cargo Air Waybill Audit - The present invention provides apparatuses and methods for analyzing patterns and generating rules related to actions taken in auditing cargo air waybills. Various embodiments of the invention may receive one or more user actions applied to an air waybill and analyze the user's actions to determine if a pattern of behavior is consistent in the user's actions. When one or more patterns are determined, one or more rules may be generated based on the patterns and the actions. If a generated rule is approved by a user, the generated rule may be applied to any future air waybill sent to an accounting system for auditing. The integration of pattern analysis and rule generation may ease some or all of the burden of manually auditing thousands of air waybills daily and reduce the temporal costs of internal audit staff and the financial costs of employing an outside company to audit cargo air waybills. | 05-05-2016 |
20160125023 | DERIVED TABLE JOIN PROCESSING - Systems and methods for processing tables for query operations referencing the tables are described. A method may include determining whether a table is referenced one time or more than one time in a query that includes at least one operation referencing the table. The method may further include creating a single materialized view of the table when the table is determined to be referenced more than one time in the query. The method may also include creating two or more hash tables based, at least in part, on the single materialized view of the table by creating a hash table for each operator in the query that references the table, and evaluating the query using the two or more hash tables. | 05-05-2016 |
20160112346 | NONSTOP COMPUTING FABRIC ARRANGEMENTS - Systems and methods for non-stop computing in a virtualization fabric are disclosed. One system includes a computing fabric comprising a plurality of host platforms, the plurality of host platforms including at least a first host platform and a second host platform communicatively connected to the first host platform. The system also includes an interconnect service partitions residing on the first host platform. The system includes a plurality of guest partitions distributed across the plurality of host platforms. The system further includes a DNS server instance managed by at least one of the plurality of interconnect service partitions and defining at least one zone, the at least one zone including one or more partitions from among the plurality of guest partitions distributed across the plurality of host platforms. | 04-21-2016 |
20160110664 | DETERMINING LEVELS OF COMPLIANCE BASED ON PRINCIPLES AND POINTS OF FOCUS - Software may be used to organize controls in an organization from multiple groups within the organization to determine a level of compliance with specified principles. A method for determining compliance may include receiving a list of controls; receiving a plurality of point of focus identifications, wherein each point of focus of the plurality of point of focus identifications correspond to a control of the list of controls; and determining a compliance score for a plurality of principles based, at least in part, on the received points of focus. | 04-21-2016 |
20160110265 | HANDLING SERVER AND CLIENT OPERATIONS UNINTERRUPTEDLY DURING PACK AND AUDIT PROCESSES - A solution for maintaining the operation of a server and allowing the transfer of data from client devices to a database without locking the database during an audit and pack process is realized that reduces the amount of time lost due to backup file storage transfer. When a file is backed up to a first storage trail through the audit process, the trail may eventually become filled to capacity. Upon the first storage trail filling to capacity, a pack process is initiated, and a backup storage trail is created to store the data during this process. Upon completion of the pack process, the data from the backup storage trail is transferred to another active storage trail. | 04-21-2016 |
20160099945 | DNS SECURITY EXTENSIONS FOR EMULATED APPLICATIONS - The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be processed by a non-emulated interface in the host environment. The non-emulated interface may determine whether the domain-name-to-be-resolved resides in a zone on a list of secured zones. If so, the DNS query may be performed by the non-emulated interface using DNSSEC. DNS resolutions that do not pass the security checks may fail while DNS resolutions that pass the security checks will be returned to the customer. | 04-07-2016 |
20160098454 | HANDLING OF ANALYTIC QUERIES - Systems and methods for evaluating analytic queries comprising disjunctive Boolean expressions are described. A method may include receiving an analytic query comprising a first disjunctive Boolean expression. The method may further include transforming the analytic query to obtain a transformed analytic query comprising at least one nondisjunctive Boolean expression and at least a second disjunctive Boolean expression. The method may also include evaluating the transformed analytic query, wherein complete evaluation of the at least one nondisjunctive Boolean expressions and the at least a second disjunctive Boolean expressions yields the same results as evaluation of the first disjunctive Boolean expression. | 04-07-2016 |
20160087798 | COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE - Hash values for a message may be computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC). | 03-24-2016 |
20160087791 | COMPUTATION OF HASH VALUE FOR A MESSAGE BASED ON RECEIVED PORTIONS OF THE MESSAGE - Hash values for a message may computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC). | 03-24-2016 |
20160085604 | DYNAMIC METHOD INVOCATION VIA PROXY FRAMEWORK - A solution for providing an infrastructure for a generated application created from a model-driven application development framework to invoke an external library is realized that is targeted for situations when an operating platform of the generated application is different than that of the external library. First, a proxy host receives a call from the generated application to invoke a method. An intermediate library is loaded, and the call is marshaled from the proxy host to the intermediate library. Finally, an external library is loaded by the intermediate library and invokes the method that the runtime wants to invoke. | 03-24-2016 |
20160078244 | SECURED FILE SYSTEM MANAGEMENT - Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key. | 03-17-2016 |
20160078243 | SECURED FILE SYSTEM MANAGEMENT - Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage. | 03-17-2016 |
20160077937 | FABRIC COMPUTER COMPLEX METHOD AND SYSTEM FOR NODE FUNCTION RECOVERY - A fabric computer method and system for recovering fabric computer node function. The fabric computer method includes monitoring a processing environment operating on a first Processor and Memory node within the fabric computer complex, detecting a failure of the first Processor and Memory node, and transferring the processing environment from the first Processor and Memory node to a second Processor and Memory node within the fabric computer complex in response to the detection of a failure of the first Processor and Memory node. The fabric computer system includes a first Processor and Memory node, a second Processor and Memory node coupled to the first Processor and Memory node, at least one input/output (I/O) and Networking node coupled to the first and second Processor and Memory nodes, and a fabric manager coupled to the first and second Processor and Memory nodes and the at least one I/O and Networking node. The fabric manager is configured to monitor a processing environment operating on the first Processor and Memory node, to receive notification of a failure of the first Processor and Memory node, and to transfer the processing environment from the first Processor and Memory node to the second Processor and Memory node in response to the detection of a failure of the first Processor and Memory node. | 03-17-2016 |
20160077884 | DYNAMIC ALLOCATION AND ASSIGNMENT OF VIRTUAL FUNCTIONS WITHIN FABRIC - Methods and systems for allocating, one or more virtual functions of a plurality of virtual functions associated with physical functions of I/O interface devices of a computing device are described. One method includes managing one or more physical functions of an I/O interface device within an interconnect partition of a multi-partition virtualization system implemented at least in part on the computing device. The method further includes, during a boot process of a second partition on the computing device, parsing a file to determine an assignment of one or more virtual functions to the second partition and associate each of the one or more virtual functions to corresponding physical functions. | 03-17-2016 |
20160077858 | RESET OF SINGLE ROOT PCI MANAGER AND PHYSICAL FUNCTIONS WITHIN A FABRIC - Methods and systems for managing reset of a physical function of an I/O device in a computing system are disclosed, where the physical function is included in a single-root PCI manager. One method includes maintaining a count of active virtual functions associated with the physical function included in the single-root PCI manager, and, upon determining that no active virtual functions are associated with the physical function, allowing the physical function to be reset within the single-root PCI manager. The method further includes while resetting the physical function, persisting a configuration memory space associated with the physical function, and associating the persisted configuration memory space with the physical function after the physical function is reset. | 03-17-2016 |
20160077847 | SYNCHRONIZATION OF PHYSICAL FUNCTIONS AND VIRTUAL FUNCTIONS WITHIN A FABRIC - Methods and systems for instantiating a virtual function in a partition of a multi-partition virtualization system implemented at least in part on a computing device are disclosed. One method includes initializing a partition on the computing device, including determining a virtual function to be associated with the partition, the virtual function associated with a physical function of an I/O device, and, prior to attaching a processor to the partition, determining if the physical function is in a ready state and capable of being associated with the virtual function. The method further includes, upon determining that the physical function is in the ready state and capable of being associated with the virtual function, attaching the processor to the partition, thereby allowing the partition to begin execution. | 03-17-2016 |
20160070541 | CONVERSION OF BUSINESS SUITE SOLUTIONS - A system modeler may provide a framework for the development of business applications using object oriented concepts. The system modeler may also be configured to convert business suite solutions. For example, a system modeler may be configured to retrieve, by a processor, a model database comprising presentation information and layout information associated with a client application, wherein the presentation information and layout information associated with the client application are stored in the model database. Additionally, the system modeler may be configured to convert, by the processor, the retrieved model database to a software framework model and one or more client application projects, wherein the software framework model and the one or more client application projects are generated based, at least in part, on the retrieved model database, and wherein the presentation information and layout information associated with the client application are stored in the one or more client application projects. | 03-10-2016 |
20160063437 | LOGISTICS MANAGEMENT SYSTEM WITH PRICING BASED ON LINKED TRANSPORTATION AND OTHER CHARGE CONTRACTS - Systems and methods for performing air waybill pricing may include selecting a first transportation contract to price the transportation of a carriage of goods for the air waybill, wherein the first transportation contract is linked to other charge contracts. Embodiments may also include determining an identifier associated with the first transportation contract that links the first transportation contract to the plurality of other charge contracts. The one or more other charge contracts associated with the same identifier associated with the first transportation contract may be identified, and a price for the carriage of goods may be calculated based at least in part on transportation charges specified in the first transportation contract and other charges specified in the identified one or more other charge contracts. Some embodiments may further include outputting an air waybill that is generated to include at least the calculated price for the carriage of goods. | 03-03-2016 |
20160062912 | DATA INPUT/OUTPUT (I/O) HANDLING FOR COMPUTER NETWORK COMMUNICATIONS LINKS - Systems and methods for performing data input/output (I/O) operations using a computer network communications link are described. A method may include assigning a block of virtual addresses for usage with at least one computer network communications link. The method may also include registering the entire block of virtual addresses prior to an operating system partition performing I/O operations using the at least one computer network communications link, wherein registering comprises setting a plurality of virtual page frame numbers of the block of virtual addresses to point to distinct pages of physical memory. In some embodiments, one or more I/O operations may be performed using the at least one computer network communications link and the registered block of virtual addresses. | 03-03-2016 |
20160034382 | AUTOMATED REGRESSION TEST CASE SELECTOR AND BLACK BOX TEST COVERAGE TOOL FOR PRODUCT TESTING - A method for testing a computer application includes identifying components of a version of the application, said components including one or more components that are one of new and modified, generating a keyword matrix of the identified application components. A search is performed in a test script repository with respect to components listed as at least one of the first and second dimensions of the matrix. The keyword matrix is populated with test case identification numbers in the search result. Based on the populated keyword matrix, one or more of (a) gaps in test case coverage for the version of the application, and (b) one or more test cases covering the version of the application are identified. | 02-04-2016 |
20160028819 | DATA PATH SELECTION FOR NETWORK TRANSFER USING HIGH SPEED RDMA OR NON-RDMA DATA PATHS - A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack. | 01-28-2016 |
20160027075 | LOGISTICS MANAGEMENT SYSTEM WITH ALL-IN SPOT RATE PRICING - Systems and methods for performing all-in spot rate pricing with a logistics management system are provided. Embodiments may include receiving, via an interface that includes spot rate information, an instruction to produce a spot rate for an air waybill that includes a transportation charge and a plurality of other charges. Embodiments may also include calculating the spot rate that includes the transportation charge and the plurality of other charges to obtain a calculated all-in spot rate. Some embodiments may further include outputting an air waybill that is generated to include at least the calculated all-in spot rate. | 01-28-2016 |
20160004628 | PARALLEL TEST EXECUTION FRAMEWORK FOR MULTIPLE WEB BROWSER TESTING - Computer implemented methods are provided for executing one or more test scripts in parallel across a plurality of web browsers. Such methods include receiving, by a server, a plurality of testing selections, the plurality of testing selections indicating one or more test scripts from a test script repository and identifying a plurality of web browsers to execute the one or more test scripts on one or more client machines; transmitting, by the server, to each of the one or more client machines instructions to launch the plurality of web browsers; distributing, by the server, one or more test scripts to each respective web browser on each of the one or more client machines, the plurality of web browsers executing the one or more test scripts transmitted by the server from the test script repository; and receiving, by the server, from the one or more client machines one or more results of executing the one or more test scripts by each of the plurality of web browsers of the respective client machine. | 01-07-2016 |
20160004625 | METHOD OF EXECUTING TEST SCRIPTS BASED ON RUNTIME TEST SELECTION - A method for selection of test scripts for testing a computer application. The method comprises selecting for each of one or more object types corresponding to the computer application, one or more first test scripts that cover all objects in the application corresponding to the one or more object types, executing the one or more first test scripts to test functionality of the objects corresponding to the one or more object types, assigning a test script a failed status in response to a test script error. The method further includes determining whether the test script error occurred due to an error in functionality of an object, selecting one or more second test scripts that refer to the object associated with the error in functionality of the object, and assigning the failed status to the one or more second test scripts without execution of the one or more second test scripts. | 01-07-2016 |
20150382193 | SECURE NETWORK COMMUNICATIONS IN A MOBILE DEVICE OVER IPSEC - Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker. | 12-31-2015 |
20150381597 | ENTERPRISE MANAGEMENT FOR SECURE NETWORK COMMUNICATIONS OVER IPSEC - Methods and systems for managing a secure enterprise are disclosed. One method includes initiating a management service at a server within the secure enterprise, the management service including a web interface providing administrative access to configuration settings associated with the secure enterprise, the management service initializing a secure communications protocol and managing access to a credential store, the credential store including a plurality of credentials defining communities of interest within the secure enterprise, each of the communities of interest defining a collection of authenticated endpoints having common access and usage rights. The method includes initiating an object management service at the server defining an interface to a configuration database, and accessing the configuration database to obtain data defining a configuration of the enterprise according to a configuration profile. The method includes applying configuration settings to the secure enterprise based on the data defining the configuration of the secure enterprise. | 12-31-2015 |
20150381596 | REMOTE CREDENTIAL MANAGEMENT FOR HYBRID CLOUDS WITH ENTERPRISE NETWORKS - A system and method of initializing a virtual machine within a secure hybrid cloud is disclosed. One method includes transmitting service mode credentials to a cloud broker from a cloud-based virtual machine, receiving a service mode community of interest key from a credentialing service based on the service mode credentials, and establishing a secure service mode connection based on the service mode community of interest key. The method also includes receiving role VPN credentials at the cloud-based virtual machine and establishing a secure role connection to the cloud broker using the role VPN credentials, thereby providing, in response to the role VPN credentials, a role VPN community of interest key to a virtual data relay dedicated to the cloud-based virtual machine. The method further includes receiving role cloud credentials at the cloud-based virtual machine and establishing secure communications at the cloud-based virtual machine based on the role cloud credentials, including receiving a role cloud community of interest key at the cloud-based virtual machine used for secure communication among the cloud-based virtual machine and other cloud-based virtual machines within a common community of interest with the cloud-based virtual machine. | 12-31-2015 |
20150381568 | SECURE INTEGRATION OF HYBRID CLOUDS WITH ENTERPRISE NETWORKS - A system and method of managing secure integration of a cloud-based computing resource with a private domain are disclosed. One system includes a hybrid cloud arrangement including a plurality of virtual machines, the plurality of virtual machines including at least a first virtual machine within the private domain and a second virtual machine within a public cloud. The system also includes a virtual data relay within the private domain and associated with the second virtual machine. The virtual data relay includes a private domain interface used to establish a secure communication link according to a first security protocol with each virtual machine within the private domain that is a member of a community of interest, the virtual data relay assigned a community of interest key used by the private domain interface and defining the community of interest of which the second virtual machine is a member. The virtual data relay also includes a public cloud interface used to establish a secure communication link with the second virtual machine, the public cloud interface using a second security protocol different from the first security protocol. | 12-31-2015 |
20150381567 | CLEARTEXT GATEWAY FOR SECURE ENTERPRISE COMMUNICATIONS - A gateway computing system includes a memory storing cleartext gateway software and a programmable circuit communicatively connected to the memory. The programmable circuit is configured to execute computer-executable instructions including the cleartext gateway software. Execution of the cleartext gateway software by the programmable circuit causes the gateway computing system to instantiate at the gateway computing system a virtual device router including a cleartext interface configured to send and receive data packets from a cleartext endpoint and a secured interface configured to exchange data packets with one or more secured endpoints within a secured enterprise network, and load the virtual device router with community of interest material from an authentication server, the community of interest material associated with one or more communities of interest configured to allow access to the cleartext endpoint. | 12-31-2015 |
20150381439 | VIRTUAL TAPE LIBRARY (VTL) MONITORING SYSTEM - Monitoring of storage systems, including virtual tape libraries (VTLs), may be performed with automated systems. Automated monitoring may be performed through an SSH connection to a storage manager for the storage system. For example, a method may include initiating, by a monitoring server, an SSH connection to a storage manager; issuing commands, by the monitoring server, through the SSH connection to monitor a storage device coupled to the storage manager; receiving, by the monitoring server, responses to the issued commands through the SSH connection; matching, by the monitoring server, the responses to automation rules; and executing, by the monitoring server, commands based on the matched automation rules. | 12-31-2015 |
20150378782 | SCHEDULING OF TASKS ON IDLE PROCESSORS WITHOUT CONTEXT SWITCHING - Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. In particular, realtime tasks may be scheduled on idle processors without context switching an existing executing tasks. For example, a method of executing tasks on a plurality of processors may include receiving a new task with an earlier deadline than an executing task; determining whether an idle processor is available; and when an idle processor is available, executing the new task on the idle processor. | 12-31-2015 |
20150378687 | AUTOMATED CODE PARSER FOR REVIEWING AUTOMATION SCRIPTS - Automation scripts may be examined and compared to a set of new or changed operating system messages to identify potential issues with the automation script that occur with updates to the operating system. When the issue is identified, the reference in the automation script may be updated to refer to the changed operating system message. Further, the reference in the automation script may be modified to address other changes in the system messages, such as changes in information and/or parameters reported in the message. | 12-31-2015 |
20150363283 | MULTI-THREADED SERVER CONTROL AUTOMATION FOR DISASTER RECOVERY - Systems and methods for multi-threaded server control automation for disaster recovery are described. A method may include initiating a disaster recovery sequence on two or more processors, wherein the disaster recovery sequence comprises a plurality of subsequences. The method may also include implementing the disaster recovery sequence on the two or more processors in parallel, wherein one or more subsequences of the disaster recovery sequence are implemented on the two or more processors in parallel. Upon completion of the disaster recovery sequence, at least one server partition is repurposed from a first configuration, such as a test configuration, to a second configuration, such as a production configuration. | 12-17-2015 |
20150358164 | SYSTEMS AND METHODS FOR QR CODE VALIDATION - Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the QR code using a smartphone and decrypting using the issuing entity's public key. In some embodiments, a purpose-built software application executed by the smartphone may automatically recognize QR codes on a document presented for review and then automatically decrypt the QR code using the public key of the issuing entity. A user performing the validation may then compare the document's content with the decrypted data on the smartphone. | 12-10-2015 |
20150358163 | SYSTEMS AND METHODS FOR QR CODE VALIDATION - Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the QR code using a smartphone and decrypting using the issuing entity's public key. In some embodiments, a purpose-built software application executed by the smartphone may automatically recognize QR codes on a document presented for review and then automatically decrypt the QR code using the public key of the issuing entity. A user performing the validation may then compare the document's content with the decrypted data on the smartphone. | 12-10-2015 |
20150356306 | SYSTEMS AND METHODS FOR QR CODE VALIDATION - Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the QR code using a smartphone and decrypting using the issuing entity's public key. In some embodiments, a purpose-built software application executed by the smartphone may automatically recognize QR codes on a document presented for review and then automatically decrypt the QR code using the public key of the issuing entity. A user performing the validation may then compare the document's content with the decrypted data on the smartphone. | 12-10-2015 |
20150347963 | DYNAMICALLY GENERATING AND MANAGING FLIGHT ROUTINGS USING A LOGISTICS MANAGEMENT SYSTEM (LMS) - A logistics management system (LMS) may generate routes dynamically without the overhead of any pre-defined specifications of airport to connect between origin and destination airports. Further, the LMS's route construction function may take into account all the available flights segments, the shipment characteristics such as bulk/pallet/container, shipment product codes, and/or minimum connection times. A method may include receiving a request to create an allotment reservation having an origin and a destination. The method may also include receiving and assigning at least one route generation attribute; receiving available routes that have the same origin and destination as the reservation request; and sorting routes based upon at least one sort order. | 12-03-2015 |
20150331784 | SYSTEM AND METHOD FOR CONTROLLING TEST SCRIPT EXECUTION BY SMARTPHONE - A computer implemented method, and system, for selecting an appropriate test script to test software in a testing environment using a smartphone. The system fetches test scripts from a script repository as selected by a developer using a smartphone. The system executes the test script, generates an outgoing message based upon a result of executing the fetched test script, stores the outgoing message in an outgoing message buffer memory, and then transmits the outgoing message to the smartphone so the developer may review the script execution results. | 11-19-2015 |
20150331779 | FRAMEWORK TO ACCOMMODATE TEST PLAN CHANGES WITHOUT AFFECTING OR INTERRUPTING TEST EXECUTION - In an exemplary computer implemented method for executing test scripts, a computer receives a test file having a set of one or more unique test script identifiers associated with a test script stored in a test script repository. The computer fetches a test script from the test script repository according to the test file, and stores the test script as a queued test script in a buffer memory. The computer provides instructions to a processor to execute the queued test script, and then receives results. The computer continuously monitors an action request queue configured to received action requests to change a test script or change the set of test script identifiers. The computer executes the action request before storing the next queued test script in the buffer memory. | 11-19-2015 |
20150326603 | AVOIDING COLLISIONS IN INTERNET PROTOCOL (IP) PACKET IDENTIFICATION NUMBERS - A pseudo-random generator may be used to generate identification values for formatted data packets. A method for transmitting data less susceptible to man-in-the-middle attacks may include receiving data for transmission over a network according to a protocol; formatting the data into one or more internet protocol (IP) packets by fragmenting the received data; and transmitting the one or more internet protocol (IP) packets. The step of formatting the data into one or more internet protocol (IP) packets may include generating a unique pseudo-random number while avoiding collisions with previously-used numbers; and inserting the pseudo-random number as an identifier in the one or more internet protocol (IP) packets corresponding to the received data. | 11-12-2015 |
20150326602 | CLEAN-UP OF UN-REASSEMBLED DATA FRAGMENTS - A receiving device storing fragments may detect a total usage of storage space, such as a number of used queue banks (QBs), by un-reassembled fragments and take action when the total usage of storage space reaches a threshold level. For example, additional fragments may be rejected for a period of time after the threshold level is reached. In another example, the un-reassembled fragments may be cleaned up after the threshold level is reached. In yet another example, the reaching of the threshold level may be logged. | 11-12-2015 |
20150324130 | SENSITIVE DATA FILE ATTRIBUTE - Data on a storage device may be marked as sensitive data and this marked sensitive automatically destroyed (e.g., scrubbed) upon erasure. For example, when sensitive data is erased, new data may be immediately written over the erased sensitive data. To destroy the erased data, random characters and/or a fixed sequence of characters may be written over the erased data. The storage device, the operating system, and/or other software may share tasks related to tracking and scrubbing sensitive data. Scrubbing may include writing a fixed sequence, such as zeroes, or writing random characters of data. | 11-12-2015 |
20150309828 | HYPERVISOR MANAGER FOR VIRTUAL MACHINE MANAGEMENT - Adaptive virtual servers with hypervisor managers may be used to manage several hypervisors, including hypervisors of different types. An adaptive virtual server may monitor resource utilization of virtual machines and dynamically assign resources to the virtual machines. Dynamic allocation of resources may improve efficiency for usage of available resources and improve performance of the virtual machines. Further, an adaptive virtual server may allocate resources to a virtual machine from multiple hypervisors, including hypervisors of different types. | 10-29-2015 |
20150296083 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide SIP signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 10-15-2015 |
20150295981 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide sip signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 10-15-2015 |
20150295980 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide sip signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 10-15-2015 |
20150295979 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide sip signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 10-15-2015 |
20150295956 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide SIP signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 10-15-2015 |
20150294268 | PRORATION CALCULATION IN A LOGISTICS MANAGEMENT SYSTEM (LMS) - Shipping costs may be prorated in advance of accepting the reservation for transporting cargo, such as by determining whether the cargo is profitable for the LMS client, The proration may he performed according to a special prorate agreement (SPA). A method for calculating the prorated amounts may include receiving a segment and a carrier for shipping cargo, determining if a special prorate agreement (SPA) exists for the segment, and calculating, when the SPA exists, a proration amount for the segment based, at least in part, on the SPA. A decision may be made to accept the reservation or not based on whether the reservation is profitable by comparing the calculated amount to a hurdle rate. | 10-15-2015 |
20150281336 | DISTRIBUTABLE COMPUTATIONAL UNITS IN A CONTINUOUS COMPUTING FABRIC ENVIRONMENT - Systems and methods for distributing computing tasks are disclosed. One system includes a first computing system and a second computing system. The first computing system includes a processing unit and a memory, the memory storing a computer-executable workload including a plurality of procedures including at leas one distributable procedure, the at least one distributable procedures capable of execution independent of underlying operating system or platform resources of the first computing system and configured for execution on an architecture of the first computing system. The system further includes a distributable computation unit executable on a second computing system, the distributable computation unit including the at least one distributable procedure, a state of computing resources of the first computing system, and an application capable of execution on the second computing system to perform the at least one distributable procedure. | 10-01-2015 |
20150278152 | DISTRIBUTED I/O OPERATIONS PERFORMED IN A CONTINUOUS COMPUTING FABRIC ENVIRONMENT - Systems and methods for managing input/output operations of a first computing system at a second computing system are disclosed. One method includes receiving an input/output control block at a distributed input/output processor separate from a first computing system, the input/output control block built by the first computing system in response to initiation of an input/output operation at the first computing system. The method also includes enqueueing an input/output operation at the distributed input/output processor, and processing, by the distributed input/output processor, the input/output operation from memory of the first computing system. The method includes returning results from the distributed input/output processor to the first computing system. | 10-01-2015 |
20150277974 | DISTRIBUTED AND CONTINUOUS COMPUTING IN A FABRIC ENVIRONMENT - Systems and methods for continuous computing are disclosed. One such system includes a plurality of communicatively interconnected computing systems, and a workload including a plurality of tasks executing on a first computing system of the plurality of communicatively interconnected computing systems. The system includes a task management system executing on at least one of the plurality of communicatively interconnected computing systems, the task management component configured to encapsulate a task of the plurality of tasks with a current system state of the first computing system, wherein encapsulating the task includes associating metadata defining an association between the task and resources of the first computing system. The task management system is configured to transfer the encapsulated task to a second computing system among the plurality of communicatively interconnected computing systems for execution, the metadata used to associate the task with resources of a second computing system. | 10-01-2015 |
20150277861 | JUST-IN-TIME DYNAMIC TRANSLATION FOR TRANSLATION, COMPILATION, AND EXECUTION OF NON-NATIVE INSTRUCTIONS - A method for executing non-native instructions in a computing system having a processor configured to execute native instructions may include fetching a first non-native instruction from a plurality of non-native instructions; interpreting the first non-native instruction to generate a first instruction code; compiling the first instruction code to generate a first native instruction corresponding to the first non-native instruction; determining whether to execute the first instruction code or the generated first native instruction; and implementing a first virtual machine instruction corresponding to the first non-native instruction based, at least in part, on determining whether to execute the first instruction code or the first native instruction. | 10-01-2015 |
20150261952 | SERVICE PARTITION VIRTUALIZATION SYSTEM AND METHOD HAVING A SECURE PLATFORM - A secure platform system and method for a host computing device. The system includes an ultraboot application that operates in the less privileged user memory and divides the host computing device into a resource management partition, at least one virtual service partition and at least one virtual guest partition. The virtual guest partition provides a virtualization environment for at least one guest operating system. The virtual service partition provides a virtualization environment for the basic operations of the virtualization system. The resource management partition maintains a resource database for use in managing the use of the host processor and the system resources. The virtual service partition is a secure virtualization platform (s-Platform) having at least one isolated secure partition for executing at least one secure application therein. The system also includes at least one monitor that operates in the most privileged system memory. The monitor maintains guest applications in the virtual guest partition within memory space allocated by the virtual service partition to the virtual guest partition. The system also includes a context switch between the monitor and the respective virtual guest partitions and the virtual service partition. The context switch controls multitask processing in the partitions on the at least one host processor. | 09-17-2015 |
20150261560 | SERVICE PARTITION VIRTUALIZATION SYSTEM AND METHOD HAVING A SECURE APPLICATION - A secure application system and method for a host computing device. The system includes an ultraboot application that operates in the less privileged user memory and divides the host computing device into a resource management partition, at least one virtual service partition and at least one virtual guest partition. The virtual guest partition provides a virtualization environment for at least one guest operating system. The virtual service partition provides a virtualization environment for the basic operations of the virtualization system. The resource management partition maintains a resource database for use in managing the use of the host processor and the system resources. The virtual service partition is an isolated secure partition having a secure application executing therein. The isolated secure partition includes a security manifest portion for controlling the execution of the secure application within the isolated secure partition. The isolated secure partition also includes a secure application operating system (OS) portion that supports only the execution of the secure application within the isolated secure partition. The secure application operating system (OS) portion includes a secure application runtime portion that provides the runtime needed to execute the secure application within the isolated secure partition. The secure application is executed within the isolated secure partition without the need for any standard operating system (OS). The system also includes at least one monitor that operates in the most privileged system memory. The monitor maintains guest applications in the virtual guest partition within memory space allocated by the virtual service partition to the virtual guest partition. The system also includes a context switch between the monitor and the respective virtual guest partitions and the virtual service partition. The context switch controls multitask processing in the partitions on the at least one host processor. | 09-17-2015 |
20150261559 | REDUCED SERVICE PARTITION VIRTUALIZATION SYSTEM AND METHOD - A reduced service partition system and method for a host computing device having a host processor and system resources including memory divided into most privileged system memory and less privileged user memory. The system includes a virtualization boot application that operates in the less privileged user memory and divides the host computing device into a resource management partition, at least one virtual service partition and at least one virtual guest partition. The virtual guest partition provides a virtualization environment for at least one guest operating system. The virtual service partition provides a virtualization environment for the basic operations of the virtualization system. The resource management partition maintains a resource database for use in managing the use of the host processor and the system resources. A monitor operates in the most privileged system memory, and maintains guest applications in the at least one virtual guest partition within memory space allocated by the virtual service partition to the at least one virtual guest partition. A context switch between the at least one monitor and the respective virtual guest partitions and the virtual service partition controls multitask processing in the partitions on the at least one host processor. | 09-17-2015 |
20150258427 | MATHEMATICAL MODEL OF AN UNBIASED AND RANDOM ARRANGEMENT OF ELEMENTS IN AN INHERENTLY BIASED DIE - Systems and methods are disclosed herein to a die comprising a plurality of faces (N); and a plurality of elements (n), including an unbiased set of elements and a biased set of elements, that are labeled on the plurality of faces, wherein each face is labeled with one of the plurality of elements, at least one element is labeled on more faces than the other elements, and all the faces are labeled in an unbiased manner such that the faces are labeled by placing an element from the unbiased set of elements after every (N−n)/n occurrences of an element from the set of biased elements, when a count (c | 09-17-2015 |
20150256680 | SYSTEMS AND METHODS OF DISTRIBUTED SILO SIGNALING - The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide SIP signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers. | 09-10-2015 |
20150244530 | ENHANCED SECURITY FOR MEDIA DECRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 08-27-2015 |
20150244529 | ENHANCED SECURITY FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 08-27-2015 |
20150244528 | AES-GCM BASED ENHANCED SECURITY SETUP FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 08-27-2015 |
20150244527 | ENHANCED SECURITY SETUP FOR MEDIA DECRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 08-27-2015 |
20150244526 | ENHANCED SECURITY SETUP FOR MEDIA ENCRYPTION - Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call. | 08-27-2015 |
20150242275 | POWER EFFICIENT DISTRIBUTION AND EXECUTION OF TASKS UPON HARDWARE FAULT WITH MULTIPLE PROCESSORS - Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. Multiple processors executing tasks in parallel at lower frequencies and supply voltages may allow completion of the tasks by deadlines at lower power consumption than a single processor executing all tasks at high frequencies and supply voltages. Power efficiency of a computer system may be improved by using a combination of processors executing tasks using a combination of earliest deadline first (EDF), earliest deadline last (EDL), and round robin (RR) queue management methods. | 08-27-2015 |
20150212662 | DROPDOWN MODE COMMAND BUTTON - Systems and methods are disclosed herein to a method for presenting a user interface comprising: presenting a user interface with at least one standard command button and an advanced button adjacent to the at least one standard command button; receiving a first selection; performing a standard command associated with the at least one standard command button when the received first selection selects the at least one standard command button; displaying at least one advanced command button above the advanced button when the received first selection selects the advanced button; receiving a second selection; and performing an advanced command associated with the at least one advanced command button when the received second selection selects the at least one advanced command button. | 07-30-2015 |
20150187435 | SYSTEMS AND METHODS FOR MEMORY MANAGEMENT IN A DYNAMIC TRANSLATION COMPUTER SYSTEM - Systems and methods for managing memory in a dynamic translation computer system are provided. Embodiments may include receiving an instruction packet and processing the instruction packet. The instruction packet may include one or more instructions for obtaining a block of virtual memory for use in an emulated operating environment from a slab of virtual memory in a host environment, maintaining a mapping between the block of virtual memory and physical memory when the block is returned to the host environment, and for filling the block of virtual memory with zeros and a pattern based, at least in part, on a detected fill type. | 07-02-2015 |
20150186291 | SYSTEMS AND METHODS FOR MEMORY MANAGEMENT IN A DYNAMIC TRANSLATION COMPUTER SYSTEM - Systems and methods for managing memory in a dynamic translation computer system are provided. Embodiments may include receiving an instruction packet and processing the instruction packet. The instruction packet may include one or more instructions for obtaining a block of virtual memory for use in an emulated operating environment from a slab of virtual memory in a host environment, maintaining a mapping between the block of virtual memory and physical memory when the block is returned to the host environment, and for filling the block of virtual memory with zeros and a pattern based, at least in part, on a detected fill type. | 07-02-2015 |
20150186170 | IMPLEMENTING A JUMP INSTRUCTION IN A DYNAMIC TRANSLATOR THAT USES INSTRUCTION CODE TRANSLATION AND JUST-IN-TIME COMPILATION - Systems and methods for executing nonnative instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process. A system implementing the aforementioned translator may improve performance and speed associated with executing non-native instructions by optimizing the use of instruction codes and JIT-compiled native instructions corresponding to the instruction codes when executing the non-native instructions. | 07-02-2015 |
20150186169 | DEFINING AN INSTRUCTION PATH TO BE COMPILED BY A JUST-IN-TIME (JIT) COMPILER - Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process. A system implementing the aforementioned translator may improve performance and speed associated with executing non-native instructions by optimizing the use of instruction codes and JIT-compiled native instructions corresponding to the instruction codes when executing the non-native instructions. | 07-02-2015 |
20150186168 | DEDICATING PROCESSING RESOURCES TO JUST-IN-TIME COMPILERS AND INSTRUCTION PROCESSORS IN A DYNAMIC TRANSLATOR - Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process. A system implementing the aforementioned translator may improve performance and speed associated with executing non-native instructions by optimizing the use of instruction codes and JIT-compiled native instructions corresponding to the instruction codes when executing the non-native instructions. | 07-02-2015 |
20150186167 | UPDATING COMPILED NATIVE INSTRUCTION PATHS - Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process. A system implementing the aforementioned translator may improve performance and speed associated with executing non-native instructions by optimizing the use of instruction codes and JIT-compiled native instructions corresponding to the instruction codes when executing the non-native instructions. | 07-02-2015 |
20150186166 | DYNAMIC ON/OFF JUST-IN-TIME COMPILATION IN A DYNAMIC TRANSLATOR USING INSTRUCTION CODE TRANSLATION - Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process. A system implementing the aforementioned translator may improve performance and speed associated with executing non-native instructions by optimizing the use of instruction codes and JIT-compiled native instructions corresponding to the instruction codes when executing the non-native instructions. | 07-02-2015 |
20150143385 | TRIGGERING PROCESSING OF NETWORK REQUESTS - A network handler may be triggered to process input/output requests placed on a network queue to reduce latency compared to occasionally polling the network queue for new input/output requests. A method for processing network input/output requests may include receiving, by a processor, an input/output request for a network device; placing, by the processor, on a network queue the input/output request; and triggering, by the processor, a handler for the network queue. | 05-21-2015 |
20150143375 | TRANSACTION EXECUTION IN SYSTEMS WITHOUT TRANSACTION SUPPORT - Interaction between isolated partitioned execution environments may be permitted through transmission of messages. A method for interaction between partitions may include may include receiving, by a processor, a request message comprising a request to execute a transaction application code; creating, by the processor, an isolated execution environment; starting, by the processor, an operating system in the isolated execution environment; and executing, by the processor, the transaction application code in the operating system. | 05-21-2015 |
20150143358 | CONFIGURATION AND INSTALLATION AUTOMATION - A processor may be configured to process a first and second set of configuration statements. The processor may also be configured to at least partially rebuild a software product based, at least in part, on the processed first set of configuration statements. The processor may also install or reinstall the software product. The processing, rebuilding, and the installing or reinstalling features may be performed by a configuration and installation utility that can determine which steps need to be performed. | 05-21-2015 |
20150143021 | EQUALIZING WEAR ON STORAGE DEVICES THROUGH FILE SYSTEM CONTROLS - Data stored in file blocks and storage blocks of a storage device may be tracked by the file system. The file system may track a number of writes performed to each file block and storage block. The file system may also track a state of each storage block. The file system may use information, such as the write count and the block state, to determine locations for updated data to be stored on the storage device. Placement of data by the file system allows the file system to manage wear on storage devices, such as solid state storage devices. | 05-21-2015 |
20150100832 | METHOD AND SYSTEM FOR SELECTING AND EXECUTING TEST SCRIPTS - Systems and methods are disclosed herein to a method for reusing test automation framework across multiple applications, the method comprises receiving a selection of one or more test scripts from a user to test an application; creating an execution list containing every selected test script; loading the instructions of the test script into the computer-readable memory when the test script is found in the test script repository; executing the test script testing the application according to the instructions defined in the test script and according to computer instructions defined by the utility functions or the common functions when the test script calls either the common functions or the utility functions; checking the application's status after the test terminates operation; and recovering and closing the application if the application failed before executing a second test script testing the application. | 04-09-2015 |
20150100831 | METHOD AND SYSTEM FOR SELECTING AND EXECUTING TEST SCRIPTS - Systems and methods are disclosed herein to a method for reusing test automation framework across multiple applications, the method comprises receiving a selection of one or more test scripts from a user to test an application; creating an execution list containing every selected test script; loading the instructions of the test script into the computer-readable memory when the test script is found in the test script repository; executing the test script testing the application according to the instructions defined in the test script and according to computer instructions defined by the utility functions or the common functions when the test script calls either the common functions or the utility functions; checking the application's status after the test terminates operation; and recovering and closing the application if the application failed before executing a second test script testing the application. | 04-09-2015 |
20150100830 | METHOD AND SYSTEM FOR SELECTING AND EXECUTING TEST SCRIPTS - Systems and methods are disclosed herein to a method for reusing test automation framework across multiple applications, the method comprises receiving a selection of one or more test scripts from a user to test an application; creating an execution list containing every selected test script; loading the instructions of the test script into the computer-readable memory when the test script is found in the test script repository; executing the test script testing the application according to the instructions defined in the test script and according to computer instructions defined by the utility functions or the common functions when the test script calls either the common functions or the utility functions; checking the application's status after the test terminates operation; and recovering and closing the application if the application failed before executing a second test script testing the application. | 04-09-2015 |
20150100829 | METHOD AND SYSTEM FOR SELECTING AND EXECUTING TEST SCRIPTS - Systems and methods are disclosed herein to a method for reusing test automation framework across multiple applications, the method comprises receiving a selection of one or more test scripts from a user to test an application; creating an execution list containing every selected test script; loading the instructions of the test script into the computer-readable memory when the test script is found in the test script repository; executing the test script testing the application according to the instructions defined in the test script and according to computer instructions defined by the utility functions or the common functions when the test script calls either the common functions or the utility functions; checking the application's status after the test terminates operation; and recovering and closing the application if the application failed before executing a second test script testing the application. | 04-09-2015 |
20150095649 | COMMUNITY OF INTEREST-BASED SECURED COMMUNICATIONS OVER IPSEC - A method and system for establishing secure communications between endpoints includes transmitting a first message including a token having one or more entries each corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint. The method includes receiving a second message including a second authorization token including one or more entries, each entry corresponding to a community of interest associated with a second user and including an encryption key and a validation key associated with the second endpoint. The method includes, for each community of interest associated with both users, decrypting an associated entry in the second authorization token to obtain the encryption key and validation key associated with the second endpoint. The method also includes generating a shared secret based on the key pair, transmitting a third message including the created key pair to the second endpoint, and initializing tunnel using the shared secret to derive encryption keys used for IPsec-secured communications between the endpoints. | 04-02-2015 |
20150074634 | BUSINESS SUITE FRAMEWORK FOR DEVELOPING SOFTWARE APPLICATIONS - A system modeler may provide a framework for the development of business applications using object oriented concepts. The framework may expose selected attributes of these classes through a Graphical Presentation Interface. When a Graphical Presentation Interface is defined for a class, System Modeler may automatically generate a. project containing the corresponding DataModels that can be used by Client Application developers in a variety of Client technologies. The generated DataModels may be synchronized with any changes made to the class definitions in System Modeler. When an attribute is modified in the System Modeler class, then the change will automatically filter through to the corresponding DataModels used by the Client Application. | 03-12-2015 |
20150067145 | DATA RATE MONITORING TO DETERMINE CHANNEL FAILURE - Data channels of a computer system may be remotely monitored to detect data channel degradation. A monitoring agent on a client may execute script commands on the remote computer system to monitor input/output (I/O) rates of a set of channels. The monitoring agent may compute an average data rate of the data channels and compare the I/O rate of each channel to the average. When the rate of a channel falls below the average by at least a threshold amount, an alert may be generated to indicate to an administrator a possible failure with the data channel. | 03-05-2015 |
20150067139 | AGENTLESS MONITORING OF COMPUTER SYSTEMS - An agentless monitor may monitor a remote server through a communication session. The monitor may transmit commands for execution on the remote server by a simulated user. Results from the executed commands may be returned to the agentless monitor for parsing and execution of logical rules. The agentless monitor may be used, for example, to identify and terminate looping processes executing on the remote server before failure or performance degradation of the remote server. | 03-05-2015 |
20150061858 | ALERT FILTER FOR DEFINING RULES FOR PROCESSING RECEIVED ALERTS - A list of alert filters may be used to alert alerts generated by remote machines. For example, received alerts may be compared to the list of alert filters. When an alert filter matches the received alert, a new action may be taken by the monitoring agent, such as to raise or lower a priority of the alert or to take an action to message an administrator. When no alert filter matches the alert, a default action for the alert may be taken. | 03-05-2015 |
20150058946 | CONNECTIVITY SERVICES APPLICATION PROGRAMMING INTERFACE - Systems and methods are disclosed herein to method comprising: providing a first system; generating data to be sent over a network link; determining a transport protocol that will be used to transmit data over the network communication link; negotiating connection services to be performed on data that will transmitted over the network communication link; sending a request to open a network communication link; sending a request to the connectivity services of the second system for credentials of the second system; receiving the credentials from the connectivity services module of the second system; verifying that the credentials match an authenticated computer system; opening a network connection between the first system and the second system when the second system's credentials have been verified by the connectivity services module of the first system; and transmitting the data to the second system according to the determining network protocol and negotiated connection services. | 02-26-2015 |
20150052459 | SHORTCUT COMMAND BUTTON FOR A HIERARCHY TREE - Systems and methods are disclosed herein to a method for presenting a user interface comprising: receiving data from a host computer system describing a web-based user interface, wherein the data describing the web-based user interface includes information describing a hierarchical navigation tree and shortcut menu commands associated with each of the navigation elements; presenting the web-based user interface including the hierarchical navigation tree, the navigation elements, and shortcut buttons, wherein each shortcut button corresponds to and is adjacent to the one of the navigation elements; receiving a first selection from a user activating one of the shortcut buttons; displaying a shortcut menu comprising the shortcut menu commands associated with a navigation element corresponding to the selected shortcut button; receiving a second selection from the user, and transmitting a request to the host computer to perform a command. | 02-19-2015 |
20150052391 | AUTOMATED MONITORING OF SERVER CONTROL AUTOMATION COMPONENTS - Systems and methods for automated monitoring of automated server control components are provided. Embodiments may include transmitting a request for state information associated with a component of the automated server control system. At least one of a reception of the state information for the component and a threshold time period without reception of the state information for the component may be detected. Some embodiments may include determining if the received state information for the component comprises an error condition. In some instances, an alert may be output based on at least one of detecting the threshold time period without reception of the state information for the component and determining that the received state information comprises an error condition. | 02-19-2015 |
20150052256 | TRANSMISSION OF NETWORK MANAGEMENT DATA OVER AN EXTENSIBLE SCRIPTING FILE FORMAT - Network management requests may be transmitted in JSON messages over a WebSocket connection to a network device. The network device may process the request and generate a response. The response may be transmitted back over the WebSocket connection in a series of partial response messages. A method for processing network management requests includes receiving data for transmission, packaging the data as a JavaScript Object Notation (JSON) payload, opening a WebSocket connection, and transmitting the JSON payload over a network through the WebSocket connection. | 02-19-2015 |
20150052237 | TRANSMISSION OF LARGE DATA FILES OVER AN EXTENSIBLE SCRIPTING FILE FORMAT - Network management requests may be transmitted in JSON messages over a WebSocket connection to a network device. The network device may process the request and generate a response. The response may be transmitted back over the WebSocket connection in a series of partial response messages. A method of transmitting large data over the WebSocket connection includes transmitting a first message having an identifier value through a WebSocket connection and transmitting a second message having the identifier value through the WebSocket connection, in which the second message comprises an end-of-response indicator. | 02-19-2015 |
20140380421 | Insecure Connection Prohibition - A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis. | 12-25-2014 |
20140380038 | SECURE INTERNET PROTOCOL (IP) FRONT-END FOR VIRTUALIZED ENVIRONMENTS - An IPSec front-end may be configured to encrypt, decrypt and authenticate packets on behalf of a host on an insecure network and a peer on a secure network. For example, the IPSec front-end may receive internet protocol (IP) packets from the host and encrypt the data and format the data as an internet protocol security (IPsec) packet for transmission to the peer. When the peer responds with an IPSec packet, the IPSec front-end may decrypt the data and format the data as an IP packet. The IPSec front-end may be software executing on a Linux server. | 12-25-2014 |
20140358972 | INTERCONNECT PARTITION BINDING API, ALLOCATION AND MANAGEMENT OF APPLICATION-SPECIFIC PARTITIONS - Systems and methods for operating a database in system memory within a virtual partition are described. One system includes one or more host computing systems, each host computing system including at least one execution core and a system memory. The system includes a plurality of virtual partitions executing on the one or more host computing systems and including a first partition having at least a portion of the system memory associated with at least one of the one or more host computing systems and configured to store a database therein. The system also includes an interconnect layer communicatively connecting the plurality of virtual partitions, the interconnect layer providing a programming interface by which direct memory access operations between partitions are coordinated. In response to database commands received at the first partition, the data stored in the database is provided to a requesting partition a direct memory access operation. | 12-04-2014 |
20140358848 | INTERCONNECT PARTITION BINDING API, ALLOCATION AND MANAGEMENT OF APPLICATION-SPECIFIC PARTITIONS - Systems and methods for operating a database in system memory within a virtual partition are described. One system includes one or more host computing systems, each host computing system including at least one execution core and a system memory. The system includes a plurality of virtual partitions executing on the one or more host computing systems and including a first partition having at least a portion of the system memory associated with at least one of the one or more host computing systems and configured to store a database therein. The system also includes an interconnect layer communicatively connecting the plurality of virtual partitions, the interconnect layer providing a programming interface by which direct memory access operations between partitions are coordinated. In response to database commands received at the first partition, the data stored in the database is provided to a requesting partition a direct memory access operation. | 12-04-2014 |
20140351885 | CONTROL OF SIMPLE NETWORK MANAGEMENT PROTOCOL ACTIVITY - A server system may be configured to receive configuration information. The server system may also be configured to determine if the configuration information includes SNMP configuration information. The server system may be further configured to disable SNMP activity and close an SNMP port if it determines that the configuration information does not include SNMP configuration information. Therefore, in the absence of any configuration information which specifies that SNMP should be available, SNMP activity is disabled and the SNMP port is closed. | 11-27-2014 |
20140351813 | RUNTIME VIRTUAL PROCESS CREATION FOR LOAD SHARING - Methods and systems for managing execution of processes in virtual environments are disclosed. One method includes creating a virtual process from a process executing on a first virtual machine, and transferring the virtual process from the first virtual machine to a second virtual machine. The method also includes executing the virtual process on the second virtual machine, and, after the virtual process completes, removing the virtual process from the second virtual machine. | 11-27-2014 |
20140337727 | SYSTEM AND METHOD FOR DYNAMIC HELP CONTENT PRESENTATION - Systems and methods are disclosed herein to a method for presenting help content for a user interface comprising: displaying, by a computer, a user interface including a help tool window; receiving, by a computer, a request to display a first user interface page; referencing, by a computer, a first help content address of help content for the first user interface page that is stored in memory; changing, by a computer, a source attribute of the help tool window to the first help content address; and refreshing, by a computer, the help tool window so that the help content for the first user interface page is displayed by the help tool window. | 11-13-2014 |
20140325593 | USER SECURITY COMPARISON AND REVERSION - A web interface may generate reports regarding changes in user security parameters in a computer network. The report may ease administrator's duties analyzing log files to determine the modifications to user accounts. The administrator may be presented with an option to revert a user to a prior state of user security parameters. Thus, the interface provides the administrator the ability to generate reports and modify user accounts from a single web page. | 10-30-2014 |
20140325232 | REQUESTING AND STORING CERTIFICATES FOR SECURE CONNECTION VALIDATION - A client system may be configured to request a certificate from a server system and store the certificate locally. The stored certificate may be used to later authenticate a secure connection between the client system and the server system. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection. | 10-30-2014 |
20140324781 | INPUT/OUTPUT (I/O) PROCEDURE FOR DATABASE BACKUP TO MASS STORAGE - Databases may be backed up on a mass storage device. Storing the database backup on mass storage, rather than tape drive, allows operations, such as from a database manager, with large input/output to improve performance. A method of backing up a database to a mass storage device may include receiving, at a database manager, a call from a backup utility to copy data from a source file to a destination file, performing, at the database manager, a plurality of input/output requests, in response to the call, to copy data from the source file to the destination file, and returning, to the backup utility, status information regarding completion of the call Placing the database backup on mass storage can further enable use of that backup as a shadow or alternate database. | 10-30-2014 |
20140324780 | DATABASE COPY TO MASS STORAGE - Databases may be copied to a shadow database on amass storage device. The structure of the files containing the database, such as blocking information and a dump history, may be copied in whole to the mass storage device. The method may include creating a shadow database on a mass storage device, populating the shadow database with data from a production database, idling an application accessing the production database to create an idle point in the production database, and updating the shadow database to the production database. | 10-30-2014 |
20140317405 | SECURED COMMUNICATIONS ARRANGEMENT APPLYING INTERNET PROTOCOL SECURITY - A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec. | 10-23-2014 |
20140310706 | METHOD FOR MANAGING COMMODITY COMPUTING - Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure using a fabric manager. A fabric manager managing computing resources in one or more platforms and one or more partitions residing on the platform by monitoring each platform and partitions, and issuing instructions to a hypervisor or other management agent on a platform to execute one or more platform management commands, such as commission a new partition onto a platform. | 10-16-2014 |
20140310705 | OPERATING SYSTEM IN A COMMODITY-BASED COMPUTING SYSTEM - Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure. The infrastructure operating system managing one or more services residing within an operating system image of a partition. The infrastructure operating system capable of providing a service of a first partition's operating system to a second partition's operating system when the second partition is in need of the service. | 10-16-2014 |
20140310287 | METHOD AND SYSTEM FOR STORING DATA IN COMMODITY COMPUTING - Disclosed herein is a method and a system for data storage and retrieval that is agnostic to the database models of any of the databases in embodiments of the common infrastructure. Data may be stored via one database, according to a corresponding model, and then stored such that the data may be retrieved by a second database with a different database model. The data is stored in key-value pairs, and is thus not stored according to any database model. However, metadata perspectives construct a set of retrieved data into a format expected by the database retrieving the set of data. | 10-16-2014 |
20140303993 | SYSTEMS AND METHODS FOR IDENTIFYING FRAUD IN TRANSACTIONS COMMITTED BY A COHORT OF FRAUDSTERS - Disclosed are systems and methods for identifying potential fraud committed by a cohort of people using models for identifying relationships among people to build the cohort and using fraud models to identify indicators of frauds from attributes of people. Embodiments may predict a likelihood applicants seeking privileges to distribute governmental benefits by identifying members of a cohort associated with an applicant, assigning a value to the strengths of the relationships between people in the cohort, determining weights for identified indicators of fraud identified using fraud models, determining a risk score for the cohort using the values and data points, and then performing a clustering analysis for the risk score of the cohort to determine a risk factor for fraud committed by the applicant and the cohort. | 10-09-2014 |
20140286178 | COMMUNICATION PROTOCOL FOR WIRELESS SENSOR NETWORKS USING COMMUNICATION AND ENERGY COSTS - A system, method, apparatus and software are disclosed for data communication within a wireless sensor network comprising a plurality of sensors and a base station, with the sensors organized into a plurality of clusters. Each sensor is to determine a communication cost comprising an amount of power or energy required for the sensor to communicate with all other sensors within its selected cluster, and to select a sensor having a lowest communication cost as a cluster head sensor. When the sensor is the cluster head sensor, it is to determine and transmit a TDMA data transmission schedule to the other sensors within the selected cluster, to receive and aggregate sensor data from these other sensors, to transmit a data transmission request to the base station designating an amount of aggregated data to be transmitted, and to transmit the aggregated data to the base station during a designated time interval. | 09-25-2014 |
20140285443 | METHOD AND SYSTEM FOR KEYGLOVE FINGERMAPPING AN INPUT DEVICE OF A COMPUTING DEVICE - An input device and system for a computing device. The input device includes a plurality of touch-sensitive registration elements for positioning at various locations of at least one finger of at least one hand of a user of the computing device. The plurality of registration elements are configured to be coupled to a processor of the computing device. Also, the plurality of registration elements are configured to provide, in response to being touched by the user, a signal to the processor of the computing device indicative of the location of the touch-sensitive registration element. | 09-25-2014 |
20140285366 | METHOD AND SYSTEM FOR FINGERLINE (PHALANGE) MAPPING TO AN INPUT DEVICE OF A COMPUTING DEVICE - A method and system for mapping characters of an input device of a computing device to fingerline positions of a user. The method includes embedding at least one character corresponding to the input device of the computing device to a fingerline position, The method also includes registering a character corresponding to the input device of the computing device using a designated registration fingerline position, wherein the designated registration fingerline position does not have any characters embedded thereto. | 09-25-2014 |
20140285315 | SYSTEMS AND METHODS FOR AN AUTOMATED ENTRY SYSTEM - Disclosed herein are systems and methods for determining whether individuals seeking access to a facility site are authorized to enter. The system identifies a license plate of a vehicle approaching a controlled entrance of the facility site. If the vehicle is found in a database of enrolled entrants, then an enrolled entrant is loaded into a quick access memory. Iris scans of passengers the passengers are taken and compared against records of the enrolled entrants, beginning with the expected passengers identified as being associated with the license of the vehicle approaching the facility site. | 09-25-2014 |
20140282892 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - A system for integrating access to separate and physically partitioned networks from a single client device is described. The system is interposed between the client device and the networks to allow communication between the client device and the networks, such that data remains partitioned between networks. The system includes a scrambler configured to mix portions of data of variable bit lengths. Typically, the scrambler receives the portions of data from each of the plurality of networks, intermixes the portions of data from the networks, then selects different paths for transporting the intermixed portions of data to the client device. Each of the different paths for transporting the intermixed portions of data are physically and/or logically partitioned from each other. Only when the data arrives on the client device is it able to be reassembled, and then only in particular partitioned locations on the client device corresponding to the particular network from which the data originated. | 09-18-2014 |
20140281673 | HIGH AVAILABILITY SERVER CONFIGURATION - A switch may be configured with multiple zones to provide access to an external storage to certain processing systems. For example, the switch may be configured with two zones, in which a first zone configuration provides access to the external storage for a first processing system and a second zone configuration provides access to the external storage for a second processing system. Thus, the switch may provide high availability of the external storage and allow seamless transition from one computer system to another computer system. | 09-18-2014 |
20140280696 | SYSTEMS AND METHODS FOR DOWNLOADING MULTIPLE FILES - In a system and method to allow a user to download multiple files in a SharePoint environment, the system includes a detection module configured to detect a selection of at least one item from a document library by a user. The item can be one or more of a file or folder including groups of files. The system further includes a packaging module configured to package the at least one item as a zip file. Furthermore, the system includes a downloading module configured to download the zip file. | 09-18-2014 |
20140280365 | METHOD AND SYSTEM FOR DATA SYSTEM MANAGEMENT USING CLOUD-BASED DATA MIGRATION - A method and system for migrating data from a sender system located in an on-premise computing environment. The method includes importing by a receiver system located in a cloud-based computing environment coupled to the sender system via a network a program of data code and table structures exported from the sender system and transferred to the receiver system via the network. The method also includes importing by the receiver system at least one data flat file exported from the sender system and transferred to the receiver system via the network. | 09-18-2014 |
20140279899 | DATA BUS ARCHITECTURE FOR INTER-DATABASE DATA DISTRIBUTION - Systems and methods for managing distributed data using any of a plurality of data models are disclosed. One method includes receiving a data request from one of a plurality of database interfaces, each database interface associated with a different data model type. The method further includes translating the data request to a second data request based at least in part on a data model neutral description of a data model in the data store that is associated with data and the database interface, wherein the data store maintains descriptions of each of a plurality of different data models corresponding to the different data model types. The method also includes executing the second data request, thereby reflecting the data request in data storage such that data is managed consistently across each of the plurality of database interfaces. | 09-18-2014 |
20140269739 | HIGH AVAILABILITY SERVER CONFIGURATION WITH N + M ACTIVE AND STANDBY SYSTEMS - A switch may be configured with multiple zones to provide access to an external storage to certain processing systems. For example, the switch may be configured with two zones, in which a first zone configuration provides access to the external storage for a first processing system and a second zone configuration provides access to the external storage for a second processing system. Thus, the switch may provide high availability of the external storage and allow seamless transition from one computer system to another computer system. | 09-18-2014 |
20140258994 | ADAPTIVE THREADED VIRTUAL PROCESSOR - Systems and methods for generating and executing a translated code stream corresponding to a translation of a plurality of non-native operators are disclosed. One method includes, during interpreted execution of non-native code encountered by an interpreter, for a non-native operator included in a code sequence, selecting one or more native operators useable to perform a task defined at least in part by the non-native operator. The one or more native operators are further selected based on a data type of non-native operands associated with the non-native operator. The method also includes storing the one or more native operators in a shadow code array in a memory of the computing system, the shadow code array associated with the processing module. The method further includes executing the code sequence from the shadow code array, including executing the one or more native operators, thereby performing the task. | 09-11-2014 |
20140250094 | STEP IDENTIFIER BASED ON A UNIVERSAL TIMESTAMP - One or more transactions, and their audited update actions, operating on a database may be identified by a step ID. The step ID may include a first set of bits identifying a time the step was created. The step ID may also include a second set of bits uniquely identifying a step created at a certain time from other step created at the same time. The first set of bits may be generated from a coordinated universal time (UTC) that does not change with local seasons, such as daylight saving time. | 09-04-2014 |
20140250085 | ROLLBACK COUNTERS FOR STEP RECORDS OF A DATABASE - A rollback record may be created for each step identifier (ID). The rollback record indicates how many times the step record identified by the step ID has been rolled back during operation of the database. The rollback record may be stored in a periodic save record (PSR), separate from or stored in an audit trail containing the step records. By processing the rollback records in the periodic save record during a recovery, a database may identify a time on an audit trail for initiating a recovery prior to the last resume point for a step without going back in the audit trail to a time before the initial start of the step. | 09-04-2014 |
20140208294 | DOMAIN SCRIPTING LANGUAGE FRAMEWORK FOR SERVICE AND SYSTEM INTEGRATION - Systems and methods are disclosed herein to a computer-implemented method of executing an enterprise application comprising: receiving, by a computer, an external request for a service provided by a runtime engine of the enterprise application; selecting, by a computer, a script from a plurality of scripts saved on a database based on the external request; referencing, by the computer, one or more tags stored in a tag library saved on the database that are called by the script, wherein the tags in the tag library define commands of the plurality of scripts and call one or more granular services of the enterprise application; loading, by a computer, the selected script and the tags referenced by the selected script; and executing, by a computer, instructions of the script to provide the service requested by the external request, wherein the selected script is updated in the database after executing instructions of the script. | 07-24-2014 |
20140208169 | DOMAIN SCRIPTING LANGUAGE FRAMEWORK FOR SERVICE AND SYSTEM INTEGRATION - Systems and methods are disclosed herein to a computer-implemented method of executing an enterprise application comprising: receiving, by a computer, an external request for a service provided by a runtime engine of the enterprise application; selecting, by a computer, a script from a plurality of scripts saved on a database based on the external request; referencing, by the computer, one or more tags stored in a tag library saved on the database that are called by the script, wherein the tags in the tag library define commands of the plurality of scripts and call one or more granular services of the enterprise application; loading, by a computer, the selected script and the tags referenced by the selected script; and executing, by a computer, instructions of the script to provide the service requested by the external request, wherein the selected script is updated in the database after executing instructions of the script. | 07-24-2014 |
20140201829 | FILE-BASED APPLICATION PROGRAMMING INTERFACE PROVIDING SELECTABLE SECURITY FEATURES - A data communication security system is disclosed that includes a network interface including a first security module implementing a first security architecture, and a second security module implementing a second security architecture different from the first security architecture. The network interface further includes a file-based application programming interface defining a plurality of attributes of the network interface and including at least one attribute associated with data security managed by one of the first and second security modules. The file-based application programming interface includes at least one attribute from among the plurality of attributes that is associated with selecting between the first or second security modules. | 07-17-2014 |
20140195220 | METHOD AND SYSTEM FOR INTERNATIONALIZATION OF A COMPUTING DEVICE - A method for Internationalization of a product in a computing device having a locale. The method includes launching the product on the computing device, determining if a resource bundle for the locale is included in the product, obtaining a resource bundle for the locale from a predetermined location external to the product if the resource bundle for the locale is not included in the product, loading the product on the computing device using the resource bundle for the locale obtained from the predetermined location, and launching the product on the computing device with the locale as the default locale. | 07-10-2014 |
20140189235 | STEALTH APPLIANCE BETWEEN A STORAGE CONTROLLER AND A DISK ARRAY - A stealth appliance may be coupled between a storage controller and a disk array. The stealth appliance may be configured to receive a request from the storage controller encrypted with a first community-of-interest (COI) key, to decrypt the request with the first COI key, to encrypt the request with a second COI key, and to transmit the encrypted request to the disk array. | 07-03-2014 |
20140185503 | COMMUNICATION PROTOCOL FOR WIRELESS SENSOR NETWORKS USING COMMUNICATION AND ENERGY COSTS - A system, method, apparatus and software are disclosed for data communication within a wireless sensor network comprising a plurality of sensors and a base station, with the sensors organized into a plurality of clusters. Each sensor is to determine a communication cost comprising an amount of power or energy required for the sensor to communicate with all other sensors within its selected cluster, and to select a sensor having a lowest communication cost as a cluster head sensor. When the sensor is the cluster head sensor, it is to determine and transmit a TDMA data transmission schedule to the other sensors within the selected cluster, to receive and aggregate sensor data from these other sensors, to transmit a data transmission request to the base station designating an amount of aggregated data to be transmitted, and to transmit the aggregated data to the base station during a designated time interval. | 07-03-2014 |
20140181582 | AUTOMATIC RETRY FOR POSITION IDENTIFIERS - Applications performance for applications that access connections may be improved by providing a method of automatically retrying failed connections. A method for executing a communication interface may include receiving a retry timer length, receiving an indication that an application group is executing, opening position identifiers for the application group, failing to open at least one position identifier, and automatically retrying opening the position identifier after the retry timer length. | 06-26-2014 |
20140181493 | TECHNIQUE FOR DEPLOYING OPERATING SYSTEMS IN A VIRTUALIZED ENVIRONMENT - Systems and methods are disclosed herein to a method of deploying a guest disk comprising: creating a plurality of virtual disks; partitioning each virtual disk into at least an OS partition and a data partition; launching virtualization software; booting the restore environment; downloading a OS partition image file and a data partition image file, wherein the OS partition image file and the data partition image file are smaller than a final system's OS and data partitions; expanding the OS partition image file onto the guest disk's OS partition to create an OS file system; expanding the data partition image file onto the guest disk's data partition to create a data file system; and resizing an OS file system and the data file system to access unused. portions of the OS and data partitions. This resizing results in increased efficiencies in the area of engineering development, manufacturing, and customer usage | 06-26-2014 |
20140181437 | EQUALIZING WEAR ON MIRRORED STORAGE DEVICES THROUGH FILE SYSTEM CONTROLS - Data stored in file blocks and storage blocks of a storage device may be tracked by the file system. The file system may track a number of writes performed to each file block and storage block. The file system may also track a state of each storage block. The file system may use information, such as the write count and the block state, to determine locations for updated data to be stored on the storage device. Placement of data by the file system allows the file system to manage wear on storage devices, such as solid state storage devices. | 06-26-2014 |
20140181430 | EQUALIZING WEAR ON STORAGE DEVICES THROUGH FILE SYSTEM CONTROLS - Data stored in file blocks and storage blocks of a storage device may be tracked by the file system. The file system may track a number of writes performed to each file block and storage block. The file system may also track a state of each storage block. The file system may use information, such as the write count and the block state, to determine locations for updated data to be stored on the storage device. Placement of data by the file system allows the file system to manage wear on storage devices, such as solid state storage devices. | 06-26-2014 |
20140181368 | EQUALIZING WEAR ON STORAGE DEVICES WITH WRITE COUNTERS - Data stored in file blocks and storage blocks of a storage device may be tracked by the file system. The file system may track a number of writes performed to each file block and storage block. The file system may also track a state of each storage block. The file system may use information, such as the write count and the block state, to determine locations for updated data to be stored on the storage device. Placement of data by the file system allows the file system to manage wear on storage devices, such as solid state storage devices. | 06-26-2014 |
20140181176 | GRAPHICAL USER INTERFACE FOR HADOOP SYSTEM ADMINISTRATION - Systems and methods are described herein for administration of a Hadoop distributed computing network. The described embodiments include a graphical user interface (GUI) that facilitates administration and setup of a Hadoop system by removing the need for the administrator to enter complicated commands via a command line interface. The GUI also provides a visual indicator of the setup progress of the Hadoop system, among other benefits. | 06-26-2014 |
20140176983 | PROTOCOL FOR BIOMETRIC DEVICE CAPTURE AND QUALITY ANALYSIS - Systems and methods are disclosed herein to a computer-implemented method for communicating with peripheral devices comprising loading, by a computer, a configuration file specifying supported peripheral devices and defining commands for each supported peripheral device; receiving, by a computer, a selection of one of the supported peripheral devices from a list of peripheral devices presented in an interface; calling, by a computer, a device handler for the selected peripheral device; invoking, by a computer, protocols for the selected peripheral device that are specified by the device handler corresponding to the selected peripheral device; and sending, by a computer, commands entered through the interface to the selected peripheral device using the invoked protocols of the device handler corresponding to the selected peripheral device. | 06-26-2014 |
20140173552 | SYNTAX LANGUAGE GENERATOR FOR COMPILER VALIDATION - Systems and methods for validating operation of a compiler are disclosed. One method includes receiving a definition of language syntax at an automated source code generator, and generating program code at the automated source code generator, the program code represented in source code including constructed self-validating code and syntactically-correct automatically generated code. The method also includes providing the source code to the compiler to be compiled into object code. Based on execution of the self-validating code as object code in a computing system, a computing system executing the object code outputs an indication of the correctness of compilation of the program code. | 06-19-2014 |
20140172954 | SYSTEM AND METHOD FOR PRIVATE CLOUD INTRODUCTION AND IMPLEMENTATION - Systems and methods are disclosed herein to a method of introducing and acclimating an enterprise with a cloud comprising: hosting a cloud by provisioning virtual machines using the resources of a zero touch point device with a cloud management environment; installing, by a computer, the cloud on an enterprise server; evaluating, by a computer, an inventory of applications to be hosted by the enterprise server on the cloud; defining, by a computer, application tiers for the evaluated applications; classifying, by a computer, the applications in the inventory of applications into the defined application tiers; migrating, by a computer, at least one non-production application of the non-production application tier to the cloud; migrating, by a computer, at least one production application of the production application tier to the cloud; and migrating, by a computer, at least one mission critical application of the mission critical application tier to the cloud. | 06-19-2014 |
20140164749 | SYSTEM AND METHOD OF CAPACITY MANAGEMENT - Systems and methods are disclosed herein to a method for providing a system name of a computer system, comprises generating a system ID key based on a system type of the computer system using an external key generator module; installing the system ID key on the computer system in an active operating state by extracting the system name from the system ID key; updating operating system structures for immediate use of the system name; writing a machine name index into halt/load parameters that are implemented by the computer system for subsequent restarts of the computer system after suspending the computer system, wherein the machine name index identifies a location of the system name in a system registry; and writing the system name into the system registry from the system ID key. | 06-12-2014 |
20140164539 | APPLICATION SERVICE INTEGRATION - An application services broker includes a plurality of adapter modules, each of which are associated with a respective application service. Application service data is received from a first application service and converted to a first message having a predefined message format by a first adapter module associated with the first application service. The first message is sent from the first adapter module to a second adapter module associated with a second application service. The first message is converted to application service data for the second application service by the second adapter module. | 06-12-2014 |
20140164431 | DATABASE AND DATA BUS ARCHITECTURE AND SYSTEMS FOR EFFICIENT DATA DISTRIBUTION - Systems and methods for managing distributed data using any of a plurality of data models are disclosed. One method includes receiving a data request from one of a plurality of database interfaces, each database interface associated with a different data model type. The method further includes translating the data request to a second data request based at least in part on a data model neutral description of a data model in the data store that is associated with data and the database interface, wherein the data store maintains descriptions of each of a plurality of different data models corresponding to the different data model types. The method also includes executing the second data request, thereby reflecting the data request in data storage such that data is managed consistently across each of the plurality of database interfaces. | 06-12-2014 |
20140152424 | METHOD AND SYSTEM FOR SECURITY SCREENING USING BIOMETRIC VARIABLES - A method and system for security screening a screening subject. The method includes measuring by at least one biometric sensor at least one biometric parameter of the screening subject. The method also includes scoring by a biometric analysis engine coupled to the biometric sensor the at least one biometric parameter measured of the screening subject. The method also includes generating by the biometric analysis engine biometric parameter feedback in such a way that a security screening agent either terminates or escalates the security screening of the screening subject based on the generated biometric parameter feedback. | 06-05-2014 |
20140149459 | DATA EXPANSE VIEWER FOR DATABASE SYSTEMS - Systems and methods for obtaining access to a database file managed by an operating system in a computing system are disclosed. One method includes transmitting a call to an operating system from a database management system, the call requesting access to a database file. The method also includes receiving an address from the operating system at the database management system. The address represents a general address of the database file managed by the operating system. The method further includes transmitting a call to the operating system from the database management system, which includes an address and a size of a view of the database file to be created. The method also includes receiving an address of the view of the database file from the operating system. | 05-29-2014 |
20140143372 | SYSTEM AND METHOD OF CONSTRUCTING A MEMORY-BASED INTERCONNECT BETWEEN MULTIPLE PARTITIONS - The shared memory interconnect system provides an improved method for efficiently and dynamically sharing resources between two or more guest partitions. The system also provides a method to amend the parameters of the shared resources without resetting all guest partitions. In various embodiments, a XML file is used to dynamically define the parameters of shared resources. In one such embodiment using a XML or equivalent file, the interconnect system driver will establish a mailbox shared by each guest partition. The mailbox provides messaging queues and related structures between the guest partitions. In various embodiments, the interconnect system driver may use macros to locate each memory structure. The shared memory interconnect system allows a virtualization system to establish the parameters of shared resources during runtime. | 05-22-2014 |
20140136688 | OPTIMIZING PARTITION PLACEMENT IN VIRTUALIZED ENVIRONMENTS - Application performance in cloud-based virtualized environments may be improved by migrating partitions executing within the cloud between servers. When an application spans multiple related partitions spread out on different servers within the cloud, related partitions may be migrated to the same server or nearby servers to reduce input/output (I/O) delay in communications between the related partitions. A method for improving performance may include analyzing a network traffic log to identify related partitions. Then, communications costs may be calculated for the related partitions and a partition selected for migration to a new location in the cloud. | 05-15-2014 |
20140130026 | OPERAND AND LIMITS OPTIMIZATION FOR BINARY TRANSLATION SYSTEM - Methods and systems for optimizing generation of natively executable code from non-native binary code are disclosed. One method includes receiving a source file including binary code configured for execution according to a non-native instruction set architecture. The method also includes translating one or more code blocks included in the executable binary code to source code, and applying an optimizing algorithm to instructions in the one or more code blocks. The optimizing algorithm is selected to reduce a number of memory address translations performed when translating the source code to native executable binary code, thereby resulting in one or more optimized code blocks. The method further includes compiling the source code to generate an output file comprising natively executable binary code including the one or more optimized code blocks. | 05-08-2014 |
20140129844 | STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING - Methods and systems for storing data securely in a secure data storage network are disclosed. One method includes receiving at a secure storage appliance a block of data for storage on a volume, the volume associated with plurality of shares distributed across a plurality of physical storage devices. The method also includes cryptographically splitting the block of data received by the secure storage appliance into a plurality of secondary data blocks. The method further includes encrypting each of the plurality of secondary data blocks with a different session key, each session key associated with at least one of the plurality of shares. The method also includes storing each data block and associated session key at the corresponding share, remote from the secure storage appliance. | 05-08-2014 |
20140123268 | SECURE CONNECTION FOR A REMOTE DEVICE THROUGH A MOBILE APPLICATION - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine. | 05-01-2014 |
20140123230 | VIRTUAL RELAY DEVICE FOR PROVIDING A SECURE CONNECTION TO A REMOTE DEVICE - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine. | 05-01-2014 |
20140123221 | SECURE CONNECTION FOR A REMOTE DEVICE THROUGH A VIRTUAL RELAY DEVICE - Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine. | 05-01-2014 |
20140122876 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - Portions of split data belonging to a set of data are sent over different data paths to their destinations. The data set is cryptographically spat into portions of the data set, and each portion is transported over a choice of multiple data paths to its destination. For example, a message is physically separated into portions of a message which are encrypted and sent over more than one network path to reach a destination. As a result, a snooper in a network may only be able view a partial set of random, disjoint, and incoherent portions of the message which are also encrypted. The portions of the message are split up in such a way that even if the snooper captured some of the portions of data, it would be difficult to reconstruct the message without also capturing most other partial portions of the message spread throughout the entire infrastructure of the network. | 05-01-2014 |
20140122778 | RAPID NETWORK DATA STORAGE TIERING SYSTEM AND METHODS - Systems and methods are disclosed herein to a data storage tiering system comprising at least one storage array; at least one solid state storage unit; and a storage controller in communication with the at least one storage array and the at least one solid state storage unit and configured to combine the at least one storage array and the at least one solid state storage unit into one business tier data container using a virtualization layer and present the business tier data container on a storage area network as one storage array to a server, wherein the storage controller creates a business data tier by combining a partition of the solid state storage unit with the at least one storage array. | 05-01-2014 |
20140108797 | STORAGE COMMUNITIES OF INTEREST USING CRYPTOGRAPHIC SPLITTING - Methods and systems of presenting data in a secure data storage network are disclosed. One method includes defining a community of interest capable of accessing data stored in a secure data storage network, the community of interest including a plurality of users desiring access to a common set of data. The method also includes associating the community of interest with a workgroup key. and, upon identification of a client device as associated with a user from among the plurality of users in the community of interest, presenting a virtual disk to the client device, the virtual disk associated with the workgroup key and a volume containing the common set of data, the volume including a plurality of shares stored on a plurality of physical storage devices. | 04-17-2014 |
20140108796 | STORAGE OF CRYPTOGRAPHICALLY-SPLIT DATA BLOCKS AT GEOGRAPHICALLY-SEPARATED LOCATIONS - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary data blocks by performing splitting and encrypting operations on a primary data block received from the client for storage on the virtual disk. For security, the secondary data blocks are stored at geographically-distributed locations. The secure storage appliance is also capable of executing program instructions configured to reconstitute the primary data block from at least a portion of the plurality of secondary data blocks stored in shares on corresponding physical storage devices in response to a request from the client. | 04-17-2014 |
20140108617 | DATA STORAGE IN CLOUD COMPUTING - A redundant cloud storage solution may be created from individual cloud storage solutions. Files may be split into pieces and stored in separate cloud storage solutions and then retrieved from the cloud storage solutions to assemble the original file. When splitting the files, the data may be encrypted for additional security. Additionally, redundancy may be obtained by duplicating data across multiple cloud storage solutions, such as in a RAID level 5 configuration. A server may intervene between a client device and the cloud storage solutions to perform the file splitting, encrypting, and management functions. Thus, the client access to the redundant cloud solution may function as any other network drive. | 04-17-2014 |
20140032528 | RELATIONAL DATABASE TREE ENGINE IMPLEMENTING MAP-REDUCE QUERY HANDLING - Methods and systems for processing a database query are disclosed. An example method includes receiving a SQL database query at a database query handling server, and parsing the SQL database query to identify a database and one or more tables and columns identified by the SQL database query. The method also includes determining a query plan based on the parsed database query. At a database engine, and based on the query plan and the identified database, tables and columns, the method further includes identifying a set of data nodes implicated by the identified database, tables and columns, determining a set of reduce operations and levels at which each of the set of map-reduce operations are to execute, and passing the query plan, the set of data nodes, and the map-reduce operations to a map-reduce query execution framework. The map-reduce query framework returns records as query results to the client system. | 01-30-2014 |
20140019755 | DATA STORAGE IN CLOUD COMPUTING - A redundant cloud storage solution may be created from individual cloud storage solutions. Files may be split into pieces and stored in separate cloud storage solutions and then retrieved from the cloud storage solutions to assemble the original ale. When splitting the files, the data may be encrypted for additional security. Additionally, redundancy may be obtained by duplicating data across multiple cloud storage solutions, such as in a RAID level 5 configuration. A server may intervene between a client device and the cloud storage solutions to perform the file splitting, encrypting, and management functions. Thus, the client access to the redundant cloud solution may function as any other network drive. | 01-16-2014 |
20130311789 | BLOCK-LEVEL DATA STORAGE SECURITY SYSTEM - A secure storage appliance is disclosed, along with methods of storing and reading data in a secure storage network. The secure storage appliance is configured to present to a client a virtual disk, the virtual disk mapped to the plurality of physical storage devices. The secure storage appliance is capable of executing program instructions configured to generate a plurality of secondary blocks of data by performing splitting and encrypting operations on a block of data received from the client for storage on the virtual disk and reconstitute the block of data from at least a portion of the plurality of secondary blocks of data stored in shares on corresponding physical storage devices in response to a request from the client. | 11-21-2013 |
20130239180 | WEB-BASED CONFERENCE COLLABORATION TOOL WITH DYNAMIC CONTENT AND ROLES - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130239013 | MASTER NAVIGATION CONTROLLER FOR A WEB-BASED CONFERENCE COLLABORATION TOOL - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130238725 | CHAT AND NOTIFICATION SERVICES FOR A WEB-BASED CONFERENCE COLLABORATION TOOL - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130238705 | WEB METHODS FOR A CONFERENCE COLLABORATION TOOL - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130238704 | DYNAMIC CONTROLS FOR A WEB-BASED CONFERENCE COLLABORATION TOOL - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130238703 | MASTER VIEW CONTROLLER FOR A WEB-BASED CONFERENCE COMPANION TOOL - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130238618 | METHOD OF ORGANIZING A DATABASE ACCORDING TO AN EVENT FOR A WEB-BASED CONFERENCE COLLABORATION TOOL WITH DYNAMIC CONTENT AND ROLES - A conference collaboration system has a server connected to a network and configured to generate a page view requested by a client device over the network and provide dynamic content associated with the requested page view for display on the device; and a database configured to store the dynamic content, update the dynamic content in response to commands from the server, and provide the dynamic content to the server in response to requests from the server, wherein the dynamic content is associated with a plurality of services, each shown in a page view, and the dynamic content and the services are associated with a conference. The server can determine an authorization level of a user interacting with the client device and provide a page view and dynamic content in response to the authorization level, and the dynamic content is updated or created in response to or for actions during the conference. | 09-12-2013 |
20130219172 | SYSTEM AND METHOD FOR PROVIDING A SECURE BOOK DEVICE USING CRYPTOGRAPHICALLY SECURE COMMUNICATIONS ACROSS SECURE NETWORKS - A gateway device is used to control the flow of data to and from a network. To ensure that a message is not transmitted beyond the edge of an intranet without authorization such as outside of a private network, or to a device within the private network without authorization, a gateway will only establish a communication session with a computing device within the private network that possess a requisite community-of-interest key. If either the gateway device or computing device does not possess a matching community-of-interest key then a communication session cannot be established between the computing device and gateway device. Other aspects include transmitting a message destined for another network by converting it into a format in which it can be received outside the private network without knowledge of the type of security measures used within the private network. | 08-22-2013 |
20130126619 | METHOD AND SYSTEM FOR CERTIFYING CONTACT INFORMATION - A method and system for certifying contact information is described. The method includes embedding the contact information in a format and encoding the format into a matrix barcode. The encoded matrix barcode is digitally signed to certify the contact information. Further, the format includes a vCard format and the matrix barcode includes a quick response code. | 05-23-2013 |
20130007772 | METHOD AND SYSTEM FOR AUTOMATED SYSTEM MIGRATION - Methods, systems, and programs described herein can provide automated testing and migration from a first application instance to a second application instance with minimal impact on the operational system. A parallel testing environment is automatically established to allow for parallel processing of inputs and comparison of outputs. | 01-03-2013 |
20120197900 | SYSTEMS AND METHODS FOR SEARCH TIME TREE INDEXES - A system and method for searching a time tree index for a database table, where the index uses time representations. A request for data is received, the request comprising a search value. A search date value is derived. The search date value comprises at least one time unit selected in order from a largest time unit to a smallest time unit from the list: century, year, month, date, hour, minute, second and millisecond. A time tree index is searched for at least one node, such that the index path to the node comprises the search date. At least one data record associated with the node is retrieved. | 08-02-2012 |
20120101984 | METHOD FOR PERFORMANCE TUNING A DATABASE - A method for performance tuning a database is described. The method includes setting a database-allowed core value between 500 megabytes and half size of memory for the database. Further, the method declares small and heavily accessed structures as memory resident structures, and sets a memory resident limit value between 0 and the database-allowed core value for the database. In addition, the method analyzes the database to determine whether read-ahead should be enabled for the data structures. The method also analyzes the database to apply a reblocking factor between 1 and 60. The method associates system buffers ranging from 1000 to 20000 with the data structures, and stores the system buffers in memory. Moreover, the method consolidates the data structures having unused space. | 04-26-2012 |
20120011408 | GRAPHICAL USER INTERFACE SYSTEM FOR BACKGROUND INTELLIGENT TRANSFER SERVICE - A graphical user interface system for BITS. The system includes a set of input modules, a set of output modules, and notification modules. The set of input modules allow selection of files for transfer to the BITS Server Virtual Directory and activate BITS functions. The BITS functions may include starting file transfer, cancelling file transfer, retrying file transfer, or removing the selected files. The set of output modules show dynamic status and real-time progress of the transfer automatically upon activation of the transfer of the selected files. The set of output modules also display an error message upon detecting an error in the transfer. Further, the notification modules provide a real-time notification on completion of the transfer. | 01-12-2012 |
20110320587 | REAL-TIME DETERMINATION OF SOFTWARE INSTALLATION STATUS - A computer-implemented method for real-time determination of software installation status is described. The determination is performed for multiple computing devices. The method includes accepting a list of computing devices connected to a network. Further, the method includes receiving an identifier for a software component and determining installation status for the software component based on the identifier. The determination being performed on each computing device in the list in real-time. Further, the method includes producing a software installation report based on the determined installation status. | 12-29-2011 |
20110314022 | K engine - process count after build in threads - In a KStore having a plurality of K nodes with count fields a method for updating count fields, receiving a particle to provide a received particle, updating selected node counts of the plurality of nodes counts in response to the received particle to provide first updated K node count fields, and saving selected K node count fields for later updating to provide second updated count fields are recited. The K nodes include elemental root nodes and the second updated K node count fields include elemental root nodes of the plurality of elemental root nodes. The second updated K node count fields include only elemental root nodes of the plurality of elemental root nodes. The first updated K node count fields include no elemental root nodes. The second updated K node count fields include K nodes pointed to by the Result pointers of the first updated K node count fields. | 12-22-2011 |
20110296038 | SYSTEM AND METHOD FOR CONTINUATION OF A WEB SESSION - A computer-implemented method, executed on a web server, for facilitating continuation of a web session after the web session has been terminated. The method includes initiating a web session having an associated web page with a URL upon receiving a request from a web browser. During the web session, the method includes generating session information, including a transaction identifier and state information. The generated session information is then transmitted to a web browser followed by termination of the web session. After the termination, the web session is resumed by the web server by accepting the session information from the web browser, authenticating the transaction identifier, and validating the client data corresponding to the authenticated transaction identifier. After validation, the web session may be continued at the web page. | 12-01-2011 |
20110295941 | SYSTEM AND METHOD FOR CONTINUATION OF A WEB SESSION - A computer-implemented method, executed on a web browser, for facilitating continuation of a web session after the web session has been terminated. The method initiates a web session with a URL from the web browser having an associated web page. The method then communicates client data to a web server and receives session information related to the web session from the web server. Resuming the web session after termination includes transmitting the session information to the web server and receiving authentication of the transaction identifier of the session information from the web server. Further, the method transmits the client data corresponding to the authenticated transaction identifier to the web server for validation. Thus, the web session may be continued at the web page. | 12-01-2011 |
20110239019 | METHOD AND SYSTEM FOR MANAGING POWER CONSUMPTION OF A COMPUTING DEVICE - A power-state management module in any operating environment manages power consumption of a computing device in a power-on mode. The disclosed system and method based on predetermined criteria, classify computing device activity and switch the computing device from the power-on mode to either a hibernate mode or a shut down mode. The predetermined criteria include inactive computing device time compared to a predetermined time period and operational processes present in an exemption list of processes. | 09-29-2011 |