Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Computer network monitoring

Subclass of:

709 - Electrical computers and digital processing systems: multicomputer data transferring

709223000 - COMPUTER NETWORK MANAGING

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20110179165UNAFFILIATED WEB DOMAIN HOSTING SERVICE PRODUCT MAPPING - Based on usage patterns of clients who have purchased web domain offerings, providing a three dimensional visual representation that uses a visual element to represent the degree of similarity among different offerings.07-21-2011
20110179163METHOD AND APPARATUS FOR IDLING A NETWORK CONNECTION - The described embodiments include a system that configures a network interface. During operation, the system receives a signal from an operating system indicating that the network interface can be idled. The signal is sent from the operating system as soon as the operating system determines that a final route structure that depended on the network interface has expired and been deleted. The system then determines if an application has established a route that uses the network interface since the signal was sent from the operating system. If not, the system causes the network interface to be idled. Otherwise, the system leaves the network interface in a current operating state.07-21-2011
20110179160Activity Graph for Parallel Programs in Distributed System Environment - In a distributed system environment, a system profiling log can be used at a central server to collect and analyze log data. The log data can be used to gauge performance of software applications. In particular, the log data includes different activities (i.e., tasks) that are executed to implement the software applications. Correlation of the different activities versus a timeline is an important parameter in the system profiling log. For example, where the correlation of the different activities is represented in colored graphs at a user interface, a user may easily pinpoint a bottleneck. The bottleneck at the one or more activities may encourage the user to adopt system improvement in the distributed system environment.07-21-2011
20110179159Monitoring System - A configurable system that employs a processing unit, such as a computer, to which one or more responders, such as a keyboard and a mouse, through which a user interacts with the processing unit. While each of the responders is utilized by the user for its designed primary function, its activity is also used for monitoring whether the individual is interacting with the processing unit within expected bounds.07-21-2011
20110179166MANAGEMENT OF PODCASTS - Improved techniques that facilitate the use of podcasts are disclosed. The improved techniques can pertain to publishing, hosting, accessing, subscribing, managing, organizing, searching, browsing, transferring, and/or playing podcasts. According to one aspect, tags are embedded into syndication feeds (e.g., RSS feeds) that may be made available for distribution by an online media store to facilitate the management of podcasts. Such tags can include a block tag that may be embedded into a syndication feed to indicate whether the feed is to be blocked from being included in the online media store. According to another aspect, management of podcasts may be facilitated by other mechanisms. In accordance with one embodiment, a user may challenge the ownership of a podcast to block or remove a podcast from the online media store. In accordance with another embodiment, images may be stored to allow efficient retrieval of the corresponding episode(s) of a podcast.07-21-2011
20130185421Method, Terminal, and Server for Obtaining Heartbeat Period - The present invention provides a method, a terminal, and a server for obtaining a heartbeat period. According to the present invention, the terminal sends a first heartbeat message that includes location information of the terminal to the server and obtains a heartbeat period which corresponds to the foregoing location information directly from the server. This avoids each terminal needing to perform multiple heartbeat message interactions with the server when determining a heartbeat period that best matches a current network, thereby reducing power consumption of the terminal and signaling loads of a device at the network side.07-18-2013
20110185059SYSTEM AND METHOD FOR DETECTING RF TRANSMISSIONS IN FREQUENCY BANDS OF INTEREST ACROSS A GEOGRAPHIC AREA - Wireless devices form a significant portion of equipment forming the source/destination of content transmitted over telecommunications infrastructure together with applications such as RF identification, smart tags, etc. As such the wireless spectrum supports these devices operating to multiple standards, both licensed and unlicensed. In many environments it would be beneficial for a network administrator to know whether the environment and network they are responsible for is compliant to policies established in dependence of the environment/network. The invention provides distributed wireless signal analyzers within the environment/network to provide signal/spectrum analysis and determine whether received signals by the wireless signal analyzer are compliant to the network administrator policy. Compliance may be based upon time or frequency domain measurements with different rules for different wireless spectrum regions. Non-compliance is communicated to remote servers and/or network administrator and allows local control of network equipment.07-28-2011
20090222555Network performance monitor - A network performance monitor for a computer. The performance monitor maintains a baseline for communication paths between a networked computer and other networked computers connected. The network performance baseline is established and maintained by measuring and updating network performance parameters of the communication paths. The network performance parameters are updated using values obtained during time intervals when the communication path consumed a bandwidth approximately equal to its estimated bandwidth. If congestion is detected on the network or the network is underutilized, values of the network performance parameters obtained during that interval are not used to update the network performance parameters. Some performance parameters in the baseline, such as minimum and maximum bandwidth values may be updated by computing a moving average of each parameter. Asymmetric weight values for updating the moving average may be selected based on a direction of change of a value of a network parameter.09-03-2009
20130031239DATA COMMUNICATION METHOD AND APPARATUS - There is provided a method of scheduling requests from a plurality of services to at least one data storage resource. The method comprises receiving, on a computer system, service requests from said plurality of services. The service requests comprise metadata specifying a service ID and a data size of payload data associated with said service request, and at least some of said service IDs have service throughput metadata specifying a required service throughput associated therewith. The method further includes arranging, in a computer system, said requests into FIFO throttled queues based on said service ID and then setting a deadline for processing of a request in a throttled queue. The deadline is selected in dependence upon the size of the request and the required service throughput associated therewith. Then, the deadline of each throttled queue is monitored and, if a request in a throttled queue has reached or exceeded the deadline the request is processed in a data storage resource.01-31-2013
20130031251COMPLEX EVENT PROCESSING SYSTEM AND METHOD - A complex event processing system comprises a complex event processing engine (01-31-2013
20130031250APPARATUS, METHOD AND SYSTEM FOR IMPROVING APPLICATION PERFORMANCE ACROSS A COMMUNICATIONS NETWORK - An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources.01-31-2013
20130031249SYSTEM AND METHOD FOR SERVICING FIELD DEVICES IN AN AUTOMATION PLANT - A system for servicing field devices in an automation plant, comprising: a computing unit, which accesses the field devices via a communications network; a communications hardware; a server; an interpreter for electronic device descriptions; and a software component. The server, the interpreter for the electronic device descriptions and the software component are associated with the communications hardware. The software component, upon the occurrence of an event, identifies, by means of scanning, or polling, the field devices arranged in the communications network and utilizes the identification of the field devices, in order to activate corresponding electronic device descriptions in the interpreter and to provide correspondingly prepared information via the server to the computing unit for the purpose of servicing the field devices.01-31-2013
20130031246NETWORK MONITORING CONTROL APPARATUS AND MANAGEMENT INFORMATION ACQUISITION METHOD - A network monitoring control apparatus includes: a traffic information acquisition unit to acquire traffic information of a network component included in a network; a decision information switching unit to set decision information for the network component based on a comparison result between the traffic information and one of a congestion decision threshold and a congestion recovery decision threshold of the network component; and a management information acquisition unit to acquire management information of the network component based on the decision information.01-31-2013
20130031245GENERATING A CONFIGURATION FILE BASED UPON AN APPLICATION REGISTRY - A system and method are provided for generating a configuration file based upon an application registry. The method, for example, includes, but is not limited to, determining, by a processor, which users are logged into the server that are associated with a predetermined group, determining, by the processor, for each user logged into the server associated with the predetermined group, which applications each user is running, and generating, by the processor, the configuration file based upon which applications each user is running and storing the registry file in a memory.01-31-2013
20130031244Greening the Network with the Power Consumption Statuses of Network Components - In an embodiment, the disclosure includes an apparatus comprising a data store which comprises cost data associated with use of a path in a communications network. The data store also comprises power consumption data associated with the use of the path. The apparatus further comprises at least one processor configured to determine a score for the path based on the cost data and the power consumption data. The disclosure also includes an apparatus comprising a path computation element (PCE) configured to receive data from a plurality of network elements (NEs). The data comprises cost and power consumption data for establishing a path between a plurality of the NEs. The PCE is configured to determine a score for the path based on the cost and power consumption data.01-31-2013
20130031237NETWORK COMPONENT MANAGEMENT - A network component management system includes a first network element and a second network element. The second network element is at a customer location and is configured to communicate with the first network element over a communication network. A computing device is configured to communicate with the first and second network elements over the communication network and includes a visibility tool configured to actively monitor the second network element and present a status of the second network element. The status of the second network element indicates whether the second network element is provisioned and able to communicate over the communication network. A method includes querying the network element, determining the status of the network element, presenting the status, and initiating a troubleshooting procedure if the network element is not provisioned or is unable to communicate over the communication network.01-31-2013
20130031241DISTRIBUTED SERVICE INSTANTIATION FOR INFORMATION-CENTRIC NETWORKS - An exemplary communication device includes a node having a processor configured to instantiate a service at the node responsive to the processor determining that the node is a superior instantiation candidate relative to a next upstream node on a downstream path of the service. An exemplary method of communicating includes instantiating a service at a node responsive to the node determining that the node is a superior instantiation candidate relative to a next upstream node on a downstream path of the service.01-31-2013
20130031240Capacity Evaluation of Computer Network Capabilities - A method and apparatus are provided for evaluating the capacity of a capability enabled by network devices in a computer network. The method includes identifying a network capability enabled by one or more network devices, monitoring a plurality of hardware resources of the one or more network devices during implementation of one or more instances of the identified network capability and capturing respective device-specific metrics representative of a utilization level of each of the plurality of hardware resources during implementation of the one or more instances. The method also includes identifying which one of the plurality of hardware resources is most limiting for a remaining capacity of the identified network capability, calculating, based on the hardware resource that is most limiting for the remaining capacity of the identified network capability, a maximum remaining capacity for additional instances of the identified network capability, and providing an indication of the maximum remaining capacity of the identified network capability.01-31-2013
20130031238HEALTH AND WELFARE MONITORING OF NETWORK SERVER OPERATIONS - Methods, systems and computer program products for monitoring and analysis of network servers and web analytics programs are disclosed. A monitoring program, for example, is configured to monitor the status of web analytics program(s) associated with one or more network servers. The monitoring program may monitor server-specific metrics such as server free disk space, server available memory, server on-line/off-line status, report processing time, difference between system time and log file time, table size details, etc. The program may be configured to present status indicators to the user that are indicative of the health of the web analytics program and/or server. A user may receive an alert generated by the monitoring program regarding a change in web analytics program status. Additionally, the monitoring program may be configured to automatically take corrective action to remedy or prevent a critical event that may cause loss of data or delay web analytics reporting.01-31-2013
20120203891NETFLIX IN A BOX - One embodiment of the present invention sets forth a technique for testing a client for audio/video/subtitle playback capabilities. A computing device is configured to receive a virtual machine data file that includes an operating system, a web server, a content playback application, and a test program. The virtual machine data file is executed to cause the operating system and web server to initialize. The web server detects a communications connection to the client, transmits the content playback application to the client for execution, and transmits one or more tests included in the test program to test the audio/video playback capabilities of the client. The computing device is further configured to receive, from the client via the web server, test results associated with the one or more tests, and to store the test results in a memory.08-09-2012
20110208858SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR MONITORING DATA ACTIVITY UTILIZING A SHARED DATA STORE - In accordance with embodiments, there are provided mechanisms and methods for monitoring data activity utilizing a shared data store, These mechanisms and methods for monitoring data activity utilizing a shared data store can enable enhanced data monitoring, more efficient data storage, improved system resource utilization, etc.08-25-2011
20090100170APPARATUS, METHOD, COMPUTER PROGRAM PRODUCT AND SYSTEM FOR REQUESTING ACKNOWLEDGMENT OF TRANSMITTED DATA PACKETS - An apparatus, method, computer program product and system are provided for initiating a request for acknowledgment of successfully, or unsuccessfully, transmitted data packets, wherein the request is initiated in response to the detection of a potential overload situation or an upcoming resource limitation. In particular, a transmitter may monitor certain resources associated with the transmitter, such as memory consumption or processing capacity, and automatically request that a receiver transmit an acknowledgement when a potential overload of one or more of the resources is detected. This may occur, for example, when it is determined that memory consumption has exceeded a predefined threshold or that the processing capacity has been substantially exhausted, to name a few.04-16-2009
20080313323Methods, Systems, And Computer Program Products For Monitoring Transaction Status With A Presence Tuple - Methods and systems are described for monitoring transaction status with a presence tuple. A transaction having a multi-stage life-cycle and having a transaction participant is detected. A presentity is provided for tracking a status associated with a stage of the life-cycle and for publishing the status to a presence tuple associated with the presentity in response to the detection of a transition of the life-cycle to the stage. A subscription to the presence tuple is established for the transaction participant based on information determined from the transaction. At a presence server, a message is received including presence status associated with a stage of a transaction and transaction participant information. The presence information is processed for creating a presence tuple for tracking the transaction. A subscription to the presence tuple is established for the transaction participant based on the transaction participant information received in association with the message.12-18-2008
20080209032Alarm method for insufficient storage space of network storage system - An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space.08-28-2008
20080313328METHOD AND SYSTEM FOR BACKGROUND REPLICATION OF DATA OBJECTS - In an embodiment, a system and method may manage network resources to provide a near zero-cost background replication of data. Such a system may be inhibited from causing interference with foreground data flows. Such a system may also utilize a large fraction of spare network bandwidth. A system configured to implement such a method may include one or more servers and at least one client in communication via a to network. Additionally the system may include a hint server, a monitor and/or a front-end application between a demand server and the network.12-18-2008
20080281962INFORMATION ASSET MANAGEMENT SYSTEM, LOG ANALYSIS SERVER, LOG ANALYSIS PROGRAM, AND PORTABLE MEDIUM - An information asset management system in a network environment includes a monitoring program 11-13-2008
20120173719DETERMINING AN AVERAGE EFFECTIVE DATA THROUGH-PUT AS CORRESPONDS TO A NETWORK-SERVED END USER - A network monitoring apparatus in a communications network detects TCP data flows (to at least one network-served end user) to provide corresponding detected data flows. This apparatus then measures data throughput to this (or these) end user(s) via the TCP data flows and during the TCP data flows and calculates an average effective data throughput to this end user. This calculation can be based, by one approach, upon use of time variables that represent the detected data flows (to effectively garner a beginning-to-end view of the various TCP data flows while avoiding inclusion of periods that represent no (or possibly only a little) volume in these regards as may be due to application idle time or end-user idle time while including periods that represent no (or possibly only a little) volume due to network buffering, device performance problems, and so forth).07-05-2012
20120173700System for Organizing and Guiding a User in the Experience of Browsing Different Applications Based on Contexts - The present invention provides a system that enhances the experience of using a portable device such as mobile phones, smart phones, Personal Digital Assistants PDA etc. To improve the user experience in the use of a portable device, techniques are used for “context characterization, i.e., from a range of conditions possible to detect by the system, such as time (date/time), current location, motion, etc., as well as the historical use of the device, a certain grouping of actions and settings, called “context” are selected automatically or manually, modifying and setting from that moment the way of user interacts with the device.07-05-2012
20100088404MONITORING RELATED CONTENT REQUESTS - Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction.04-08-2010
20090187654SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm.07-23-2009
20090138590APPARATUS AND METHOD FOR DETECTING ANOMALOUS TRAFFIC - An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced.05-28-2009
20110191473COMMUNICATION APPARATUS, COMMUNICATION METHOD, COMPUTER PROGRAM, AND STORAGE MEDIUM - Even if the roles of apparatuses are not decided in advance when automatically setting communication parameters, communication parameter setting processing and network joining processing are appropriately executed without requiring the user to select the roles of apparatuses. The invention is characterized by a communication method for a communication apparatus, including a first search step of searching for a communication partner apparatus on a predetermined communication channel, a second search step of searching for a communication partner apparatus on all communication channels available for communication, and a search control step of searching for a communication partner apparatus using the first and second search steps.08-04-2011
20110191472DYNAMIC LINE MANAGEMENT - A management device for use in an access network including a plurality of data connections between end user devices and an aggregation transceiver device where the connections are aggregated for onward connection through the access network, the access network storing in association with each data connection a Dynamic Line Management, DLM, profile which specifies a set of values for a plurality of parameters associated with the respective data connection, together with a stability level specifying a desired level of stability for the data connection. The device includes means for receiving monitoring data specifying the stability of each respective data connection over a predetermined period of time; means for selecting a DLM profile to be applied to the connection in dependence on both the monitoring data and the stored stability level associated with the data connection; and means for requesting an OSS system of the access network to apply the selected profile to the data connection. The DLM profile selection means disregards any resynchronizations or errors estimated to have occurred as a result of an area wide event such as a thunderstorm. It performs this estimation by detecting a large number of retrains and or errors occurring within a predetermined short test period.08-04-2011
20110191468INFORMATION PROCESSING TERMINAL DEVICE AND NETWORK CONNECTION METHOD - An information processing terminal device (08-04-2011
20110191465PUBLIC WIRELESS NETWORK PERFORMANCE MANAGEMENT SYSTEM WITH MOBILE DEVICE DATA COLLECTION AGENTS - A wireless network performance management system and method. The system includes at least one collection agent for collecting data related to at least one of service coverage; service quality; and usage of public and/or private data networks for enterprise clients, and a reporting unit to graphically represent the collected data to at least one of track, troubleshoot, and analyze the one of the service coverage; the service quality; and the usage of public and/or private data networks for the enterprise clients.08-04-2011
20130046888METHOD AND DEVICE FOR MANAGING DEVICES IN DEVICE MANAGEMENT SYSTEM - A method for managing devices in a device management system includes: sending, by a server, target device condition information to a gateway; and sending, by the server, management information for a target device to the gateway, and triggering the gateway to determine the target device according to the target device condition information and send the management information to the target device. According to a trigger of the server and the target device condition information sent by the server, the gateway searches for the target device; and according to a trigger of the server, the gateway sends the management information sent by the server to the target device. Embodiments of the present disclosure also provide a server and a gateway in a device management system. Thereby, a type of target devices can be managed in batches.02-21-2013
20130046887NETWORK CAPACITY PLANNING FOR MULTIPLE INSTANCES OF AN APPLICATION - Data representing application deployment attributes, network topology, and network performance attributes based on a reduced set of element attributes is utilized to simulate application deployment. The data may be received from a user directly, a program that models a network topology or application behavior, and a wizard that implies the data based on an interview process. The simulation may be based on application deployment attributes including application traffic pattern, application message sizes, network topology, and network performance attributes. The element attributes may be determined from a lookup table of element operating characteristics that may contain element maximum and minimum boundary operating values utilized to interpolate other operating conditions. Application response time may be derived using an iterative analysis based on multiple instances of one or more applications wherein a predetermined number of iterations are used or until a substantially steady state of network performance is achieved.02-21-2013
20130046886Controlling a Network Connection Status Indicator - This disclosure describes techniques for restricting activity of a status indicator if a received data unit is determined to be a protocol control unit that is selected for filtering. In one embodiment, a method is described that comprises receiving a data unit from a network, determining whether the received data unit is a protocol control unit, and restricting activity of a status indicator if the received data unit is determined to be the protocol control unit, or allowing activity of the status indicator if the received data unit is determined to be data other than the protocol control unit.02-21-2013
20130046885System and Method for Performing Capacity Planning for Enterprise Applications - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data.02-21-2013
20130046884INTEGRATED ASSET TRACKING, TASK MANAGER, AND VIRTUAL CONTAINER FOR DATA CENTER MANAGEMENT - The present invention provides for the integration of a an infrastructure management software (IMS) asset tracking system, an IMS task manager (ITM) and an IMS virtual container or virtual container feature to alleviate issues such as personnel scheduling issues, lost asset issues and service outages within a data center.02-21-2013
20130046883End-to-End Content Delivery Network Incorporating Independently Operated Transparent Caches and Proxy Caches - Some embodiments provide an end-to-end federated CDN solution that assimilates a transparent caching server that is operated by a transparent caching server operator into a CDN that independently operates CDN caching servers. Specifically, the logs from the transparent caching server are assimilated into the CDN by aggregating the logs from the transparent caching server and processing the transparent caching server logs to identify network usage for content of a CDN content provider customer that is delivered by the transparent caching server. The network usage is then combined with the network usage that tracked by the CDN caching servers in order to provide comprehensive report metrics for the content provider customer and to bill the content provider customer for all network usage related to delivering the content provider customer's content irrespective of whether the content was delivered by a transparent caching server or a CDN caching server.02-21-2013
20130046882COMMUNICATION CONTROL SYSTEM AND COMMUNICATION CONTROL METHOD - In the case of a system where a communication device is remote-controlled from a control server, depending on timing when an entry is written into a forwarding table of the communication device from the control server, there is a possibility that a loop and discard of the traffic occur. Therefore, for registration, rewriting and deletion of the entry of the forwarding table which are performed on the communication device 02-21-2013
20130046879Server-Initiated Bandwidth Conservation Policies - In one embodiment, a social networking system maintains a moving average of the number of connection problems, including socket timeouts and failed uploads, per client in a geographic area to determine whether the wireless data network serving the geographic area is overloaded. In response to detecting a network overload, the social networking system may transmit an instruction to the clients in the particular geographic area to enter one of a plurality of traffic throttling modes. In particular embodiments, the social networking system maintains a historical log of network overload conditions, and uses the historical log to generate an estimate of the wireless network capacity serving a geographic area. Thus, the social networking system may preemptively transmit instructions to clients to enter a bandwidth-conservation mode when the estimated traffic demand exceeds the estimated capacity for a particular geographic region.02-21-2013
20130046878ASYNCHRONOUS REQUEST INTERCEPTION FOR TESTING A REQUEST LIFE-CYCLE - Methods and systems for asynchronous request interception for testing a request life-cycle are described. In one embodiment, a proxy object intercepts an asynchronous request directed to an original object used to implement a network communication interface for an application, having a client-side application and a server-side application. The proxy object is configured to allow a test entity to verify the application during a request life-cycle of the asynchronous request. The proxy object gives control to the test entity and receives permission back to further process the asynchronous request. The proxy object sends the asynchronous request to the original object when the permission is received.02-21-2013
20080215728Computer Management System and Computer Management Method - A computer management system and a computer management method are provided. The computer management system comprises a management workstation and at least one computer system based on virtualization technology. The computer system comprises a virtual machine monitor, a servo operating system, a management agent module and at least one user operating system. The management workstation comprises a detection/recognition module, an information collection module and a configuration module. The centralized management on the computer system by the management workstation can be realized through the management agent module establishing a network connection and communicating with the management workstation.09-04-2008
20090193119Methods and Systems for Reducing the Spread of Files on a Network - Methods and systems can reduce the spread of computer files or data on a network by obtaining and tracking times of arrival for chunks of data transmitted on the network. The times of arrival for a node can be transformed into time-series and periodograms computed from the time-series. Successive periodograms can be compared to determine changes in the strongest peaks of the periodograms. If a new peak is identified, a search for the occurrence of the peak in previous periodograms can be conducted. If no peak having a matching frequency is found, a search for the peak in the periodograms for neighboring nodes can be performed. If matching peaks are found, the associated data stream can be classified. Predictions of the timing and length of associated data packets can be used to randomly interrupt transmission of associated data packets resulting in reducing the spread of the classified data stream.07-30-2009
20090193118Non-centralized network device management using console communications apparatus - A apparatus for the management of one or more wide area or local area network connected devices by a collocated managing device. The managing device includes communications connectivity to each of the managed devices via a console connection and optionally via shared local area network connections. Additionally, the managing device includes a control system and a database. The device is designed to operate securely and operate autonomously or coupled with an external device, for example a management system, or a user.07-30-2009
20090193116DATA CAPTURE SYSTEM AND METHOD - A computer-implemented data capture system and method for capturing inputs made at a client system are disclosed. The data capture system 07-30-2009
20090193115Monitoring/analyzing apparatus, monitoring/analyzing method and program - A receiving unit receives data of a specific protocol, transmitted from a server to a client. An extraction unit extracts status codes from the received data. A classification unit classifies the extracted status codes, into first-type status codes and second-type status codes. A judgment unit finds a receiving rate of first-type status codes and a receiving rate of second-type status codes and compares the receiving rate of first-type status codes against a threshold value thereof, and the receiving rate of second-type status codes against a threshold value thereof. From results of comparison, the judgment unit then determines whether an increase in server load has resulted from a normal traffic or an abnormal traffic.07-30-2009
20090193114SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR ANALYZING DATA FROM NETWORK-BASED STRUCTURED MESSAGE STREAM - A system, method and computer program product for analyzing data from a message stream, are disclosed. Data in a structured format is captured from a message stream. The captured data is processed to conform to a data model format so that one or more events can be identified from an analysis of the processed data. Once an event has been identified, the message stream is monitored to detect the identified event. When detected, the event is exported via a network.07-30-2009
20090193113SYSTEMS AND METHODS FOR GRID-BASED DATA SCANNING - A computing grid for performing scanning operations on electronic data in a networked computing environment. The data scanning operations may include scanning data for viruses or other malicious software code. The computing grid for performing data scanning operations may include one or more event detectors to detect data scanning events and one or more grid scanning elements to perform the data scanning operations. The computing grid may also include a grid coordinator to monitor the grid configuration, perform necessary updates to the grid, and to take pre-determined actions based on the results of the data scans.07-30-2009
20100011100Health Check System, Server Apparatus, Health Check Method, and Storage Medium - According to one embodiment, an information processing apparatus includes a transmission module configured to acquire a status information of a plurality of devices and transmit the status information to a server apparatus via the network. The server apparatus includes a storage module configured to predetermine a condition corresponding to items of status information of the devices or a combination of the items of status information of the plurality of devices and store feedback information defined in correspondence with each condition, and a notification module configured to, when the status information or the combination transmitted by the transmission module matches the predetermined condition, notify, via the network, the information processing apparatus of the feedback information corresponding to the condition and stored in the storage module.01-14-2010
20110196964MANAGING EVENT TRAFFIC IN A NETWORK SYSTEM - A network system and associated operating methods manage event storms. The network system comprises an event analysis and control engine that detects and manages events occurring on a network. The event analysis and control engine receives events from a plurality of agents, and analyzes the events according to policies specified in a policies templates database. The event analysis and control engine processes raw network packets directly with less than full packet parsing to generate a filtered stream of events based on the analysis. The event analysis and control engine propagates the filtered stream of events to a monitoring system.08-11-2011
20110196963METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO USERS - A method, system, and program product for communicating with machines and end users connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and an end user or a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device by an end user to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if an urgent need of the end user is indicated, so that a communication may be sent either directly to the end user or to a device driver so that the device driver may communicate the message to the end user. For example, an end user may have exceeded a predetermined limit of resource usage, and needs to be informed. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information such as summary information regarding usage of network resources to the end user using e-mail.08-11-2011
20110196961METHOD FOR NETWORK ANOMALY DETECTION IN A NETWORK ARCHITECTURE BASED ON LOCATOR/IDENTIFIER SPLIT - The present invention relates to a method for detecting Network Anomaly in network architectures based on locator/identifier split, the detection flow is as follows: initialization processing, and in ITR: processing data packets, sending a Map-Request, determining whether to send an additional Map-Request, sending the data packet, processing the Map_Reply, processing EID-to-RLOC Cache entry expired; in ETR: processing data packet, processing Map-Request, determining whether the traffic of the ITR currently sending the Map-Request is abnormal, replying to the ITR of which the query traffic is abnormal, replying to ITR of which the query traffic is abnormal. With respect to the characteristic that the network architecture based on locator/identifier split needs to query the relationship between the locator and the identifier for packet delivery, the present invention detects Network Anomaly based on query traffic instead of network data packet traffic. Thus the present invention has the advantages of effectively reducing the investment on detection device, The overhead of exchanging monitoring information and the detection system maintenance cost; facilitating cross domain coordination; and efficiently handling the failures occurring during network operation in time; effectively improve the reliability of the network, being suitable for a large-scale network.08-11-2011
20110196960METHOD AND DEVICES FOR UPDATING PRESENCE INFORMATION IN A COMMUNICATION NETWORK - The present invention relates to a method and devices for updating presence information in a communication network comprising a first entity and a second entity, in particular a SIMPLE based communication network. The method comprises the steps of: selecting a plurality of services; providing a service element comprising metadata of the plurality of services; providing information within the service element, wherein the information identifies the plurality of services; and sending the service element to the second entity. Further, devices or entities as well as a computer program for performing the method are provided.08-11-2011
20110196959MIDDLEWARE-DRIVEN SERVER DISCOVERY - The present invention describes a method and system for discovering of server devices. The system and method receive a list of known server devices. The system and method obtain middleware configuration data and/or log files for each of the known server devices in the list. The system and method derives dependencies on at least one other server device from the middleware configuration data and/or log files. The system and method determines whether the at least one other server device is a new server device not included in the list. Thus, the system and method discovers the new server device upon determining that the at least one other server device is not included in the list.08-11-2011
20110196958AUTOMATIC UPDATES TO FABRIC ALERT DEFINITIONS FOR FABRIC SEGMENTATION, FABRIC MERGE, AND FABRIC PRINCIPAL SWITCH CHANGES - The present disclosure provides techniques for updating fabric alert definitions defined for a fibre channel or other fabric-based network within a storage management system. One embodiment provides techniques for detecting fabric merges, fabric segmentations, and principal switch changes of the fabric and modifying fabric alert definitions as a result of these changes. Thus, any alert definitions scoped by fabric will remain relevant even after fabric structural changes, and duplicate and/or redundant alerts may be reduced within the storage management system. In a further embodiment, detection of fabric changes is performed by first storing relationships between fabrics and switches, and comparing the current relationships between the fabrics and the switches against the stored relationships. Upon recognition of changes within the fabrics, the fabric alert definitions may be automatically analyzed and updated.08-11-2011
20110196957Real-Time Policy Visualization by Configuration Item to Demonstrate Real-Time and Historical Interaction of Policies - Multiple policy engines may be integrated with a change and configuration change database to enable coordination of multiple policies by an embodiment comprising: a data center having a plurality of configuration items and connected to a network; a database connected to the network; a plurality of policy engines connected to the network; wherein each of the plurality of policy engines is configured to apply one or more policies to the data center in accordance with an awareness of all configuration item changes made by all other policy engines connected to the network; wherein the awareness comprises a plurality of relationships, each relationship being between a policy data and a configuration item.08-11-2011
20090157872Model-based composite application platform - Embodiments provide an architecture to enable composite, autonomous composite applications and services to be built and deployed. In addition, an infrastructure is provided to enable communication between and amongst distributed applications and services. In one or more embodiments, an example architecture includes or otherwise leverages five logical modules including connectivity services, process services, identity services, lifecycle services and tools.06-18-2009
20090172158MEMORY MANAGEMENT SYSTEM AND METHOD FOR OPEN PLATFORM - The present invention relates to a memory management system and method for open platform. The memory management system and method of the present invention utilizes the main spirit of sharing service in open platform. When the used memory in local open platform exceeds an upper limit, the standard service bundle access interface is used for accessing the standard service bundle in remote open platform. Therefore, the standard service bundle in local open platform can be off-loaded to release the memory space so as to resolve the memory shortage problem. The stability of the whole system can be maintained.07-02-2009
20090070457Intelligent Performance Monitoring of a Clustered Environment - A method, system and computer-usable medium for selectively monitoring transactions in a cluster computing environment are disclosed. A transaction is received by a load balancer. A transaction monitoring manager determines if the received transaction is a candidate for monitoring. If it is, then the resource thresholds defined in the transaction's corresponding TMP are determined. The load balancer is then interrogated to determine which application server instance is assigned to process the transaction. Once determined, resource usage information is collected from the target application server instance and provided to the transaction monitoring manager. The collected resource information is compared to the transaction's corresponding TMP. If resource usage exceeds resource threshold values contained in the TPM, then the transaction is monitored. Otherwise it is not.03-12-2009
20100082804MEASURED CLIENT EXPERIENCE FOR COMPUTER NETWORK - Routing network traffic on a computer network is described. In one embodiment, a method is presented which includes transmitting instructions to a client, the instructions executable by the client to request content from two or more content servers, measure two or more network performance characteristics associated with the two or more different content servers, and issue a report to an administrative server. The report may include a first network performance characteristic and a second network performance characteristic. The method may further include selecting a target content server from one of two or more content servers based on comparison of the two or more network performance characteristics; and transmitting routing instructions to an intermediate routing system, the routing instructions executable by the intermediate routing system to direct subsequent content requests transmitted by the client to the target content server.04-01-2010
20130031248NODE DETECTION APPARATUS, NODE DETECTION METHOD AND COMPUTER READABLE MEDIUM - There is provided a node detection apparatus including: an acquisition section that acquires address information of communication equipment managed by a DNS server; an operation confirmation section that confirms operations of the communication equipment based on the address information acquired by the acquisition section; and a node registration section that registers the communication equipment having the address information acquired by the acquisition section as an operating node, based on a result of the operation confirmation by the operation confirmation section.01-31-2013
20130031247GENERATING DISPERSED STORAGE NETWORK EVENT RECORDS - A method begins by a dispersed storage (DS) processing module collecting an event record, a record regarding processing of an event request, and a plurality of records regarding processing of a plurality of sub-event requests to produce a collection of records. The event record includes information regarding an event, wherein the event is a user access operation or a system administrative operation initiated by a device affiliated with the DSN. The record regarding processing of the event request includes information regarding a dispersed storage (DS) processing module of the DSN processing the event request to produce the plurality of sub-event requests. The plurality of records regarding processing of the plurality of sub-event requests includes information regarding a plurality of DS units of the DSN processing the plurality of sub-event requests. The method continues with the DS processing module evaluating the collection of records to produce performance information regarding the DSN.01-31-2013
20130031243METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIA FOR SELF-LEARNING INTERACTIVE COMMUNICATIONS PRIVILEGES FOR GOVERNING INTERACTIVE COMMUNICATIONS WITH ENTITIES OUTSIDE A DOMAIN - Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain are disclosed. The interactive communications privileges can be used to process interactive communications requests between entities inside and outside a domain. The requested interactive communications are allowed if the interactive communications privileges configured for the entity outside the domain allow for the requested interactive communications. The interactive communications privileges are determined in an automated, self-learning manner in response to monitoring communication interactions between the entities inside and outside the domain. In this manner, the interactive communications privileges are not required to be provisioned and maintained by an administrator. The interactive communications privileges can be determined by gathering insight about the entities outside the domain. Insight about an entity outside the domain is information that is useful in determining which interactive communications privileges to configure for an entity outside the domain.01-31-2013
20130031242QUANTITATIVE MANAGEMENT ASSESSMENTS OF DATA COMMUNICATION NETWORKS WITH CONVERGED ARCHITECTURES - Techniques for quantitative converged network assessment are described. Performance information, associated with network infrastructure elements and application or service elements of a computer network, is received. One or more key performance indicators of a reference network architecture are compared with at least a portion of the performance information. A plurality of first scores is determined based on the comparison of the one or more key performance indicators and at least a portion of the performance information. Based on the plurality of first scores, a single second score is determined that indicates a converged state of the computer network with respect to the reference network architecture.01-31-2013
20080244066NETWORK CONTROL APPARATUS, NETWORK CONTROL METHOD, STORAGE MEDIUM - A network control apparatus forming a network with a plurality of image-processing apparatuses acquires attribute information about images stored in each image-processing apparatus from the plurality of image-processing apparatuses, arranges a display order of the images based on the attribute information, detects a change in the configuration of the image-processing apparatuses on the network, and rearranges the display order if a change in the configuration of the image-processing apparatuses on the network is detected.10-02-2008
20130086257METHOD AND APPARATUS FOR FINDING WEB HITS FOR PATENTS - Various embodiments of the present disclosure include methods and apparatus for finding web hits for a patent of interest. In an example method embodiment, data identifying a patent of interest is received, and at least one forward or reverse citation of the patent of interest is identified. An inventor or an owner of the at least one forward or reverse citation is identified, and a website associated with the identified inventor or owner is monitored. A watch notice is generated in response to a detection of the addition of new material to the monitored website.04-04-2013
20130086251METHODS AND APPARATUS FOR CLIENT-SIDE CONTEXT MANAGERS - Methods and apparatus for client-side context managers are disclosed. An example context manager implemented on a client machine includes a file system watcher to monitor a location of a file system implemented on the client machine for creation of a new item, wherein a virtual application implemented on a server is provided access to the file system; and a connection establisher to establish a connection between the context manager and the virtual application in response to the creation of the new item in the location of the file system by the virtual application.04-04-2013
20130086250METHOD AND APPARATUS FOR ROUND TRIP DELAY KPI MONITORING IN LIVE NETWORK USING USER PLANE PROBE SESSION - A method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session is disclosed for measuring round trip delays in a manner that allows latency to be apportioned to network elements. The method and apparatus for Round Trip Delay KPI Monitoring in a live network using a user plane probe session includes transmitting a loopback packet containing a probe session indicator and capturing timestamps of arrival and departure times at each network element traversed by the loopback packet, and then transmitting the timestamps to a Network Management System.04-04-2013
20100049846PEER TO PEER NETWORK - Peer-to-peer networks employing simple peers and super peers strike a balance between centralized (client-server based) and entirely flat peer-to-peer approaches. They introduce hierarchy into peer-to-peer networks in the form of super peer nodes, peers which have extra capabilities and duties in the network. There are problems in the identification and election of peers to take the role of super peer: in particular, the need for regular update messages to communicate peer availability across the network significantly impacts discovery times (when a simple peer attempts to advertise a service or requests a service from another peer). A presence server is implemented in the network in order to monitor the availability of each peer. A device called the “super peer elector” subscribes to receive updated availability information from the presence server and assigns super peer status to the most appropriate, and available, simple peer.02-25-2010
20110202655Data Center Manager - A computer-implemented data center manager includes an evaluation engine configured to receive information pertaining to an operating policy, a system manager configured to collect information pertaining to system devices and to communicate the collected system device information to the evaluation engine, and a facility manager configured to collect information pertaining to facility devices and to communicate the collected facility device information to the evaluation engine. The evaluation engine is configured to determine target policies for coordinated operations of the system devices and the facility devices to satisfy the operating policy.08-18-2011
20110202654CONFIGURABLE CONTENT INJECTION SERVICE SYSTEM - A configurable content injection service system and method of injecting a new content into data of a data traffic between a data source and a user device uses configuration information set by one or more content injection service users. The configuration information includes at least one condition related to the data traffic between the data source and the user device to inject the new content if the at least one condition is satisfied.08-18-2011
20110202653METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SERVICE DETECTION OVER AN RX INTERFACE - According to one aspect, the subject matter described herein includes a method for communicating service data flow (SDF) event information. The method includes steps occurring at a policy charging and rules function (PCRF) node. The method also includes communicating, via an Rx interface, a request to a deep packet inspection (DPI) node to be notified when an SDF event occurs. The method further includes receiving notification from the DPI node that the SDF event has occurred.08-18-2011
20110202652METHOD AND APPARATUS FOR MONITORING A KAD NETWORK - A method and apparatus are described including determining if a received message is from a monitored peer, forwarding the received message to a coordinator responsive to said determination, determining if the received message is a request message, opening a port for the peer responsive to the second determination, forwarding the request message to a monitored peer via the opened port and forwarding a response message to the monitored peer responsive to the second determination.08-18-2011
20110202651PRICE-AWARE NEIGHBORHOOD SELECTION FOR PEER-TO-PEER NETWORKS - A method and apparatus for peer-to-peer file sharing is provided. In some embodiments, the method includes receiving a request for a list of neighbor peers, where the request is made by a requesting peer device, and where the requesting peer device has a local internet service provider (ISP). The method may also include employing a server device to rank each neighbor peer in a plurality of neighbor peers based on whether the respective neighbor peer is external to the local ISP, and if the respective neighbor peer is external to the ISP, further based on a cost metric associated with a next ISP hop from the requesting peer device to the respective neighbor peer. The method may also include generating the list of neighbor peers based on the ranking of the neighbor peers, and enabling transmission of the list of neighbor peers to the requesting peer device.08-18-2011
20110202650METHOD AND SYSTEM FOR MONITORING DATA FLOWS IN A NETWORK - One embodiment of the present invention provides a switching system that facilitates data flow monitoring at the logical-unit level. The switching system includes a traffic monitoring mechanism configured to monitor a data flow between a host and a logical unit residing on a target device. The switching system further includes a storage mechanism configured to store data-flow statistics specific to the host and the logical unit and a communication mechanism configured to communicate the data-flow statistics to a traffic management module.08-18-2011
20090157866TRANSPARENT AUTO-DISCOVERY OF NETWORK DEVICES LOGICALLY LOCATED BETWEEN A CLIENT AND SERVER - Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake.06-18-2009
20130086260Automatic Generation of User Account Policies Based on Configuration Management Database Information - Mechanisms are provided for generating user account policies for generating user accounts to access resources of the data processing system. A determination is made that a user account policy for an identified resource in the data processing system is to be generated. Configuration information associated with the identified resource is retrieved from a configuration information database. A predefined user account policy template is retrieved from a user account policy template database system. A user account policy data structure is generated based on the retrieved configuration information and the retrieved predefined user account policy template.04-04-2013
20130086252FLEXIBLE RULE BASED USAGE METERING POLICIES - Various exemplary embodiments relate to a method of managing usage of a service. The method may include: defining a plurality of metering policies associated with the service; assigning an applicability condition to each of the plurality of metering policies; assigning a quota to each of the plurality of metering policies; selecting an applicable first metering policy for a subscriber session based on the applicability condition; measuring usage of the service according to the first metering policy; comparing the usage against the quota of the first metering policy; and selecting an applicable second metering policy for the subscriber session based on the applicability condition assigned to the second metering policy if the usage exceeds the quota of the first metering policy. Various exemplary embodiments relate to a network node for managing subscriber usage. The network node may include: a metering policy storage; a limit selector; an interface; and a processor.04-04-2013
20130086255WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser.04-04-2013
20130086254Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.04-04-2013
20130086253HIERARCHICAL METERING POLICY ATTRIBUTES - Various exemplary embodiments relate to a method performed by a policy and charging rules node for managing usage of a subscriber. The method may include: defining a primary metering policy having a first applicability condition and a first quota; defining a secondary metering policy having attributes including a second applicability condition and at least one inherited attribute that references an attribute of the primary metering policy; determining that the second metering policy is applicable when the first applicability condition and the second applicability condition are true; selecting the secondary metering policy as an active metering policy; and managing subscriber usage according to the attributes of the secondary metering policy. In various alternative embodiments, the step of managing subscriber usage includes: measuring subscriber usage according to a rating factor of the secondary metering policy; and charging the measured subscriber usage to both the primary metering policy and the secondary metering policy.04-04-2013
20130086248Managing Stability Of A Link Coupling An Adapter Of A Computing System To A Port Of A Networking Device For In-Band Data Communications - Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications, the adapter and the network device coupled for out-of-band data communications to a management module, where link stability is managed by: monitoring link health including retrieving adapter link statistics from the adapter and networking device link statistics from the networking device; determining, in dependence upon the adapter and networking device link statistics, whether the link health meets predefined health acceptability criteria; and if the link health does not meet predefined health acceptability criteria, instructing the adapter to execute one or more predefined corrective actions.04-04-2013
20100077078NETWORK TRAFFIC ANALYSIS USING A DYNAMICALLY UPDATING ONTOLOGICAL NETWORK DESCRIPTION - Network traffic analysis is performed by deploying, across a network having a plurality of network nodes, at least one data collection agent, on at least two of the plurality of network nodes. Each data collection agent may monitor at each network node, a plurality of network connections instantiated during a monitoring time period. Data resulting from the monitoring is acquired from the data collection agents and an ontological description of the network is automatically created from the acquired data. The ontological description is dynamically updated and network traffic analysis is performed using the dynamically updating ontological description.03-25-2010
20100077076MANAGEMENT APPARATUS AND METHOD THEREOF - A management apparatus determines whether or not another management apparatus exists on a network, and if it is determined that the another management apparatus exists, acquires information on a device searched by the another management apparatus from the another management apparatus. The management apparatus searches a device on the network and determines whether or not the searched device is searched by the another management apparatus, and acquires information from the device, that is not acquired among information on the device, in a case that it is determined that the device is not searched by the another management apparatus.03-25-2010
20100077075Network Diagnostic Systems and Methods for Collecting Data From Network Nodes - A system may comprise a network diagnostic device. The network diagnostic device may be configured to instantiate objects of data collection classes. The data collection classes may be configured to collect data from nodes of a network. The data collection classes may, for instance, inherit an interface object from an ancestor data collection class, and the interface object may be configured to use a protocol to collect data from nodes of a network. The network diagnostic device may be configured to automatically detect a node type associated with a node of a network. The network diagnostic device may also be configured to instantiate a node-specific data collection object associated with the detected node type. The node-specific data collection object may be configured to collect data from nodes of the detected node type at intervals less than or equal to fifteen seconds.03-25-2010
20100077074TECHNIQUES FOR HIERARCHICAL REPORT TOOL SESSION MANAGEMENT - Techniques are presented for hierarchical report tool session management. A user interacts with a hierarchical reporting tool during a first session and reaches a specific nested level within the tool for a particular hierarchy being accessed by the user. At some point in time the user exits the tool (normally or abnormally). The specific nested level is maintained on behalf of the user. So, when the user initiates a second and subsequent session with the tool, the user is presented with the specific nested level when the tool is started for that subsequent session.03-25-2010
20100077073EXECUTING RESOURCE CONSUMPTION CONTROL LIMITS - A resource consumption control execution method and system. The method includes a computing system receiving a resource consumption rate limit value for a portlet/servlet and action data associated with the resource consumption rate limit value from a portlet/servlet. The computing system receives monitor data associated with a resource consumed by the portlet/servlet. The monitor data comprises a resource consumption rate value for the portlet/servlet. The computing system compares the resource consumption rate value to said resource consumption rate limit value. The computing system determines if the resource consumption rate value exceeds the resource consumption rate limit value. The computing system stores data indicating whether the resource consumption rate value exceeds the resource consumption rate limit value.03-25-2010
20100077072Test Driven Deployment and Monitoring of Heterogeneous Network Systems - A test system (and corresponding method and computer program product) for generating unit tests for a heterogeneous network system and validating test results to ensure that the network system functions properly is described. In one embodiment, the test system is an appliance that is capable of normalizing communication protocols supported by component systems of the network system. The test system creates objects and methods corresponding to component systems and their supported protocol commands in the network system, and generates unit test cases based on the objects, the methods, and the normalized protocols. The test system transmits the unit test cases to the component systems, receives test results, and validates the test results to ensure that the network system functions properly.03-25-2010
20120246311SESSION MANAGEMENT SYSTEM, SESSION MANAGEMENT DEVICE, SESSION MANAGEMENT METHOD AND SESSION MANAGEMENT PROGRAM - A session management system including a client environment providing server, a plurality of terminals, and a session management server, wherein the session management server includes a session monitoring unit which monitors use end time of the client environment, a client environment management unit which makes a log-out request for the execution of log-out processing of a predetermined client environment to the client environment providing server, and a state of use checking unit which checks a state of use of each the client environment, wherein the session monitoring unit notifying a request for stopping use of the client environment to the state of use checking unit when the use end time of the client environment coincides with current time, and the client environment management unit, when the client environment is in use, transmitting to the client environment providing server a log-out request of the client environment.09-27-2012
20120246310Active Waterfall Charts - A processor-implemented method includes providing an analytic dashboard with a graphical user interface (GUI) that outputs aggregated results streaming in real-time of a load test performed on a target website. The load test consists of a plurality of virtual users simulated by one or more load servers that execute a test composition on one or more webpages of the website. A waterfall chart is produced on the analytic dashboard that includes a plurality of timeline bars. Each of the timeline bars represents an aggregated result for a resource of the one or more webpages across all of the virtual users. The timeline bars change in real-time as the load test progresses.09-27-2012
20120246306Unified Web Hosting and Content Distribution System and Method for Assuring Predetermined Performance Levels - A service model, integrated system, and method for enabling a service provider to deliver an integrated web hosting and content distribution service offering, which affords assured operational performance service levels, regardless of whether the customer's web site is served by the service provider's hosting center, the service provider's content distribution network (CDN), by a third party web host, or by a third party CDN. A monitoring system of the primary service provider receives detailed capacity and health statistics from any CDN under the operational control of the primary service provider, receives aggregate capacity and health statistics from other CDNs not under the operational control of the primary service provider. A redirection system then decides to which web host, content distribution network, or combination thereof, user requests for content are directed in order that operational performance service levels are maintained.09-27-2012
20120246304SERVER MANAGEMENT APPARATUS AND METHOD, AND SERVER MANAGEMENT PROGRAM - A server management apparatus that performs processing of collecting statuses of devices arranged in a target server system on the basis of a request received from an upper-level apparatus and transmits a result of the processing to the upper-level apparatus as a reply to the request, the server management apparatus includes a communication controller configured to perform a communication with the upper-level apparatus, and a processor configured, in a case where when the communication controller receives the request from the upper-level apparatus, a processing content of the request is the same as a processing content of a previously received request and a reply to the processing based on the previously received request has not been transmitted to the upper-level apparatus, to avoid starting the processing corresponding to the subsequently received request and continue the processing based on the previously received request.09-27-2012
20120246302SYSTEM AND METHODOLOGY FOR CREATING AND USING CONTEXTUAL USER PROFILES - A computing device receives an indication of an action performed on a resource by a user of a user device. The computing device stores context data corresponding to the action and analyzes the indication of the action with respect to the context data, to determine a user affinity value for a criteria associated with the resource. The computing device stores the user affinity value for the criteria in a contextual user profile associated with the user.09-27-2012
20120246299ANALYTICS PERFORMANCE ENHANCEMENTS - A method and apparatus for processing metric information is disclosed in one embodiment. Metric information is gathered from a number of end users. At least some of the reference types are converted to value types and stored in non-mechanical memory. The value types are manipulated to summarize the metric information. The value types are processed using the stack instead of the heap.09-27-2012
20120246298MULTIPLE PHASE DISTRIBUTED REDUCTION - A method and system for metric information processing is disclosed in one embodiment. Metric information is gathered with a plurality of points of presence (POPs) geographically distributed across the Internet. The metric information is processed in a hub-and-spoke fashion with a metric reduction occurring in the POPs and another metric reduction in a kernel application server according to predetermined schemes. The two-stage metric reduction generates a result set including a data structure. The result set can be processed according to a query to generate a report. The data structure and reports have metric information that is recent and updated regularly without use of a database.09-27-2012
20120246296METHOD AND A SYSTEM FOR ANALYSING TRAFFIC ON A WEBSITE INCLUDING MULTIPLE VISITS BY THE VISITORS - A method and a system for analysing traffic on a website are disclosed, the website being arranged on a server. The method comprises the steps of allowing a visitor to perform multiple visits on the website, and monitoring navigations and/or actions performed by the visitor during each visit while accumulating value points in accordance with content viewed by the visitor and actions performed by the visitor, and in accordance with predefined value point settings associated with content of the website, thereby obtaining a value point score for each visit. An origin of the first visit, leading the visitor to the website, is registered and categorised according to type of origin in accordance with two or more predefined categories of origin. An accumulated value point score for the visitor is obtained by adding the obtained value point scores of the first visit and each of the subsequent visit(s). Thereby the website owner obtains information regarding total value generated by the visitor during all visits and regarding what initially lead the visitor to the website. This allows the website owner to evaluate marketing campaigns and to focus and/or improve marketing efforts.09-27-2012
20120246295Real Time Distribution of Layered Communication Using Publish-Subscribe Data-Centric Middleware - Methods and apparatus, including computer program products, implementing and using techniques for organizing a communication session between two or more media aware network entities in a computer network. A computer network includes several media aware network entities (MANEs). The MANEs include data writers and data readers. A model for communication between the MANEs is provided. The communication model includes: subsets of planes associated with a session between two or more MANEs in a domain, each plane representing a collection of MANEs partaking on a subset of topics within the domain; a complementary subset of planes common to all participating MANEs of a domain, an aggregation of domains and topics, and methods for addressing namespaces within the topics. Data streams are exchanged in a session between two MANEs in the computer network according to the communication model. Techniques for distributing a data stream in a computer network are also described.09-27-2012
20120246293FAST DEVICE CLASSIFICATION - In a system in which one or more client devices 09-27-2012
20120246292Verifying Availability and Reachability Through a Network Device - In an embodiment, in response to receiving from a client computer a client request to connect to a server: processing the client request in a network protection device including applying one or more translations and one or more security checks, generating a server acknowledgment to the client computer as if the server acknowledged receiving the client request from the client computer, processing the server acknowledgement in the network protection device including applying one or more translations and one or more security checks and sending the server acknowledgment to the client computer; in response to receiving a client acknowledgment of receiving the server acknowledgment, determining that a first path between the client computer and the network protection device is operational; generating a server request to the server; processing the server request in the network protection device, determining that a second path between the network protection device and the server is operational.09-27-2012
20100115092Mobile device or computer theft recovery system and method - A mobile device, e.g. portable computer, location tracking and data backup-and-wipe system and method enable a lost or stolen device to be recovered by reporting to its rightful owner and optionally to others its approximate location via triangulation and the use of location service providers. Social network members may be made aware automatically of the location of a reported lost or stolen device and can assist the rightful owner in recovering it based upon their identification of the user of the device, whether by the location coordinates or by viewing a photographic image taken by the computer. Alternatively, in governmental and/or institutional settings having privacy concerns, no photographic images are sent to a public website. Instead, they are sent to a proprietary employer server and maintained behind an institutional firewall.05-06-2010
20130086247WEB PAGE SCRIPT MANAGEMENT - Web page scripts are managed in a network using a network appliance that intercepts a web page sent from a server and addressed to a client browser; modifies the web page by removing an embedded script from the web page; executes the removed embedded script; and sends the modified web page from the network appliance to the client browser.04-04-2013
20130086249SERVICE NETWORK DISCOVERY - An automated service discovery and monitoring utility employs automatically generated policies (rules) for monitoring network health of a service based on network discovery using flow data derived from transmissions sent over segments between computing components defining the service. An interactive discovery application employs flow data based on transmissions associated with a service. Analysis of the flow data identifies associated components from inspection of the transmissions. Iterative component selection allows network traversal of components based on flow data of the segments used for providing the service. The interactive service discovery therefore identifies associated components (servers) and segments based on flow data, rather than topology, rendering the flow data to allow a user to make an informed selection of segments and components for inclusion in a service, and generates a set of policies (rules) based on the discovered service dependencies for monitoring various metrics for the components providing the monitored service.04-04-2013
20130086256Forming Configuration Information about Components of Systems which Include Components for which Acquisition of Configuration Information is Restricted - [Problem to be Solved]04-04-2013
20130086259METHOD FOR ACQUIRING AN IP ADDRESS AND NETWORK ACCESS DEVICE - Embodiments of the present invention relate to a method for acquiring an IP address and a network access device. The method includes: after receiving a first IP address acquiring message from a first network, assigning a first IP address to the first network by using a process and associating an identifier of the first network with a first session, so that the network access device is capable of mapping the first IP address to a first private network IP address and sending the same to the first network, thereby avoiding the problem of complex implementation in the prior art resulted from a process where a gateway configured for a family network or an enterprise network needs to initiate an IPoE dial-up process. In this way, the gateway configured for the family network or the enterprise network is simplified, operation and maintenance costs are reduced, and flat networks are further implemented.04-04-2013
20130086258MONITORING AND LIMITING REQUESTS TO ACCESS SYSTEM RESOURCES - Systems, apparatuses and methods for preventing requests to access a system's resources from having a negative impact on higher priority data processing operations being performed by the system. The invention is directed to preventing the number of calls made by a merchant's applications through an application programming interface (API) for access to the lower priority services of a merchant service provider from having a negative impact on the ability of the service provider to perform the processing necessary to support higher priority services. The invention provides a user interface that may be used by a merchant or the service provider to configure the operation of a “throttle” that is designed to generate an alert when the number of calls by a merchant application for access to a specific service provider function or application exceeds a value or limit, where exceeding the value or limit may indicate a malfunction of the merchant's application or an attack by a malicious agent.04-04-2013
20130086263Systems and Method to Discover Clients Associated with Local Domain Name Server Using Sampling - A system includes an analyzer module, a content request data collection module, and a domain name server. The content request data collection module is configured to receive a content request sent to a tracking address, collect content request information about the content request, and provide the content request information to the analyzer module. The domain name server is configured to receive an address request from a local domain name server for a cache server address, provide a tracking address to the local domain name server, collect address request information about the address request, and provide the address request information to the analyzer module. The analyzer module is configured to receive the address request information and the content request information, and determine properties of clients served by the local domain name server based on the address request information and the content request information.04-04-2013
20130086262System and Method of Emulating a Network Controller within an Information Handling System - A system and method of emulating a network controller within an information handling system is disclosed. In one form, an information handling system can include a host chipset operably coupled to a network interface controller of a first main circuit board, and a management controller operably coupled to the host chipset. The information handling system can also include an emulated network interface controller operable to be activated by the management controller. The information handling system can further include a communication bus coupled to the host chipset and the management controller. In one form, the communication bus is operable to activate a communication link between the host chipset and the emulated network interface controller.04-04-2013
20130080634End User Performance Monitoring For Mobile Applications - A system for obtaining end-user performance data associated with a target application executing on a mobile device comprises a management system server computer configured to comprise a virtual execution environment. A mobile device is configured to support operation of a target application executing thereon via the virtual execution environment. The server computer is configured to perform at least one automated operation of the target application by emulating user actions within the virtual execution environment. One or more images are captured of a target application graphical user interface responsive to the emulated user actions from within the virtual execution environment. The images are analyzed to determine performance data of the target application, and the performance data are stored in a memory store.03-28-2013
20130080633APPARATUS AND METHOD FOR MONITORING OF CONNECTIVITY SERVICES - An apparatus (03-28-2013
20130080632CRISSCROSS CANCELLATION PROTOCOL - Technologies, systems, and methods for ordered message delivery that avoid message races or crisscrosses between communicating nodes. For example, if Node A sends message 3 towards Node B and, shortly thereafter, Node B sends message X to Node A. Node A would like to know whether or not message X reflects Node B's state after receiving message 3. If Node B received message 3 prior to sending message X, then proper state may be maintained between the nodes. But if messages 3 and X crisscrossed, or if message 3 was never properly received by Node B, then the state between the nodes may be corrupt. Technologies, systems, and methods are provided to avoid such corruption.03-28-2013
20130080631Method for Adaptively Building a Baseline Behavior Model - A method for generating an auto-adaptive baseline model for profiling individual and collective behavior of a plurality of network users. The method comprises the steps of creating a model, defining a plurality of members and a plurality of collective variables, each member corresponding to a user, and including a plurality of individual variables, defining conditions for each collective variable and individual variable, upon detecting an activity by a user, updating corresponding individual variables and collective variables, and comparing updated individual variables and collective variables against corresponding conditions. If a condition is met, an alert event is issued to notify designated personnel; otherwise, returning to the step of upon detecting activity. Finally, upon receiving an alert event, the designated personnel decides whether to manually redefine the conditions or to ignore the alert event. If the alert event is ignored, said conditions are automatically redefined in accordance with system defined mechanisms.03-28-2013
20130080629METHOD AND APPARATUS FOR DETECTING DEVICES ON A LOCAL AREA NETWORK - A method, apparatus, and system for discovering devices on a local area network. The method comprises sending a DNS request from a host networking element, receiving the DNS request at one or more devices, and responding to the host networking element with one or more DNS responses. The DNS request comprises one or more particular domain names. The one or more DNS responses comprise local network address information for the one or more VoIP devices. The apparatus comprises means for filtering a set of network traffic for a DNS request, means for responding to a DNS request with a local network address, and means for forwarding the DNS request to another device. The system comprises a computer for generating a DNS request for a particular domain, and one or more VoIP devices for receiving the DNS request and sending a DNS response to the computer with a local network address for the VoIP device.03-28-2013
20100036945Method and system for controlling and auditing content/service systems - An improved interactive network system is provided that allows the Network Operator to control the transfer of information to and from the network end users, the system preferably using triggers or markers embedded within the programming broadcast to users via the network. As a consequence of this system, the Network Operator is able to efficiently garner revenues from third parties transacting business over the network and to control the look and feel of programming offered to network users. Additionally the system can be used as a means of limiting network access, filtering programming, providing on-screen graphics or audible signals for particular programming types or providers, bookmarking programming, profiling network users, targeting advertising, and simplifying network transactions.02-11-2010
20130080622NETWORK STATUS INDICATION SYSTEM AND MOUSE WITH NETWORK STATUS INDICATION FUNCTION - A network status indication system includes a network controller, a first personal system (PS)/2 interface, and a mouse. The first PS/2 interface includes first and second idle pins. The mouse includes a second PS/2 interface, and first and second indicators. When the network controller determines that the first PS/2 interface is connected to the network, the network controller controls the first indicator to emit light. When the network controller determines that the first PS/2 interface is transmitting or receiving data with the network, the network controller controls the second indicator to flicker.03-28-2013
20130086261Detecting Behavioral Patterns and Anomalies Using Activity Profiles - Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.04-04-2013
20090182868Automated network infrastructure test and diagnostic system and method therefor - A testing system provides automated testing of one or more network infrastructures. The testing system may automatically reconfigure one or more devices within a network infrastructure and then conduct testing on the newly configured network infrastructure. Test results may be used to diagnose network anomalies and to compare performance or other characteristics of various network configurations. In one embodiment, the testing system tests a communication channel between a front-end and back-end mechanism where data traffic is encoded between the front-end and back-end mechanism.07-16-2009
20130036222INHERITABLE DIMENSIONS IN A SERVICE MODEL - A performance management tool is provided that monitors performance in a computing infrastructure in a computing environment. The performance management tool includes a service model that represents the computing infrastructure. The service model is a hierarchical tree structure comprised of a plurality of linked nodes, where each node in the tree structure represents a component of the computing infrastructure and has one or more properties of the component assigned thereto. Each node further includes an inheritance rule which defines how properties assigned to other nodes are inherited by the component. A dimension indexer module is configured to receive a request for properties associated with a particular node and operates to retrieve properties for the particular node from the tree structure, including at least one property not assigned to the particular node but inherited from another node in the tree structure in accordance with the inheritance rule assigned the particular node.02-07-2013
20130036221APPARATUS, METHOD AND SYSTEM FOR IMPROVING APPLICATION PERFORMANCE ACROSS A COMMUNICATIONS NETWORK - An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources.02-07-2013
20130036220Apparatus and Method for Implementing Point to Point Protocol Data Service Link-Disconnect - An apparatus and method for implementing Point to Point Protocol (PPP) data service link disconnection are disclosed in the present invention. The apparatus is set in a terminal and comprises: a detection module, a processing module and a link disconnection module, wherein, the detection module is used for detecting the state of a Personal Computer (PC) connected with the terminal when the terminal performs the PPP data service in a dormant state, and notifying the processing module when determining that the PC is currently in an unavailable state; the processing module is used for sending a link disconnection request to the network side when knowing that the PC in the unavailable state, and triggering the link disconnection module when receiving a link disconnection request acknowledgement from the network side; the link disconnection module is used for disconnecting the PPP link carrying the PPP data service.02-07-2013
20130036219Monitoring Tool Auditing Module and Method of Operation - A monitoring tool auditing module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring audit requests, each monitoring audit request identifying one or more monitoring targets to be audited. The memory is coupled to the interface and stores the plurality of monitoring audit requests in a queue based at least in part upon the order that the monitoring audit requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring audit requests stored in memory and determines a monitoring target to be audited based at least in part upon the particular monitoring audit request. The processor determines a plurality of monitoring tools that are deployed at the determined monitoring target, and determines status information for each determined monitoring tool deployed at the determined monitoring target. The processor further determines configuration information for each determined monitoring tool deployed at the determined monitoring target.02-07-2013
20130036218Monitoring Tool Deployment Module and Method of Operation - A monitoring tool deployment module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring deployment requests, each monitoring deployment request identifying one or more monitoring tools to be deployed for one or more monitoring targets. The memory is coupled to the interface and stores the plurality of monitoring deployment requests in a queue based at least in part upon the order that the monitoring deployment requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring deployment requests stored in memory, and determines a monitoring tool to be used based at least in part upon the particular monitoring deployment request. The processor further determines a monitoring target based at least in part upon the received monitoring deployment request, and executes commands to initiate the deployment of the determined monitoring tool for the determined monitoring target.02-07-2013
20130036217NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center.02-07-2013
20130036216SYSTEM AND METHOD FOR OPTIMIZED EVENT MONITORING IN A MANAGEMENT ENVIRONMENT - In accordance with the present disclosure, a system and method for optimizing event monitoring in a management environment is disclosed. The system may include a management system, an agent system, an intermediate management module and an event generation engine. The intermediate management module may create a device object in the management system corresponding to the agent system. The event generation engine may convert a transmission from the agent system into a pre-determined event structure and inject the event structure into the device object. The intermediate management module may then generate an alert in response to the injection of the event structure.02-07-2013
20130080630FLEXIBLE EVENT DATA CONTENT MANAGEMENT FOR RELEVANT EVENT AND ALERT ANALYSIS WITHIN A DISTRIBUTED PROCESSING SYSTEM - Flexible event data content management for relevant event and alert analysis within a distributed processing system includes receiving, by an interface connector, a raw event from a component of the distributed processing system; analyzing custom data within the raw event to determine a location to store the custom data, the custom data in a first data format; storing extended data within the raw event in a common event data format, the extended data indicating the location of the custom data; receiving, by an event analyzer, the event; and determining whether there are custom customer rules that need the custom data; and if there are such custom customer rules, retrieving the custom data based on the extended data from the event; and applying the custom customer rules to the extended data; if there are no such custom customer rules, applying the base rules to a base portion of the event.03-28-2013
20130080628SYSTEM AND METHOD FOR DYNAMIC DISCOVERY OF ORIGIN SERVERS IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof, wherein the traffic director is provided as a software-based load balancer that can be used to deliver a fast, reliable, scalable, and secure platform for load-balancing Internet and other traffic to back-end origin servers, such as web servers, application servers, or other resource servers. In accordance with an embodiment, the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. A health check subsystem periodically checks the health of its configured resource servers, and also attempts to detect changes in the one or more pools, by sending requests to any new server instances configured as origin servers within the pool, receiving appropriate responses, and updating the configuration accordingly.03-28-2013
20130080627SYSTEM AND METHOD FOR SURGE PROTECTION AND RATE ACCELERATION IN A TRAFFIC DIRECTOR ENVIRONMENT - Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof. In accordance with an embodiment the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. A traffic monitor, at the traffic director, monitors traffic, including the number of connections, between the traffic director instances and one or more of the resource servers within the origin servers. The traffic director can set a traffic rate which controls the traffic, including the number of connections, to provide surge protection, or rate acceleration/deceleration.03-28-2013
20130080626EDGE-BASED RESOURCE SPIN-UP FOR CLOUD COMPUTING - Aspects of the present invention include distributing new resources closer to end-users which are making increased demands by spinning-up additional virtualized instances (as part of a cloud provisioning) within servers that are physically near to the network equipment (i.e., web servers, switches, routers, load balancers) that are receiving the requests.03-28-2013
20130080625MONITORING APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - A monitoring apparatus include a memory which stores a program for executing procedures and a processor coupled to the memory and executes the procedures based on the program, wherein the procedures includes detecting a destination of access from a server apparatus to a storage apparatus on the basis of a result of analysis of a packet transmitted and received between the storage apparatus and the server apparatus, the storage apparatus including a plurality of storage areas, the server apparatus executing a plurality of virtual servers, part of the plurality of storage areas being allocated to each of the plurality of virtual servers as an accessible storage area, and determining that abnormal access is performed from the server apparatus to the storage apparatus when the storage areas of the detected destination are beyond a certain criterion in the plurality of storage areas.03-28-2013
20130080624MANAGEMENT COMPUTER AND METHOD FOR ROOT CAUSE ANALYSIS - In analyzing an elaborate computer system which requires large-scale or numerous event propagation models, a law-of-causality matrix gains size, so that significant amount of storage resources has been used in a management computer. To solve such a problem, the management computer to manage the computer system stores topologies, event propagation models, and causality information including one or more causal relations in the storage resources, determines, when the management computer analyzes or detects an event, whether a causal relation has already been created for the event to be analyzed, and creates the causal relation based on a topology and event propagation models, if not yet.03-28-2013
20130080623DYNAMIC ROUTE REQUESTS FOR MULTIPLE CLOUDS - Aspects of the present invention include a method of dynamically routing requests within multiple cloud computing networks. The method includes receiving a request for an application from a user device, forwarding the request to an edge server within a content delivery network (CDN), and analyzing the request to gather metrics about responsiveness provided by the multiple cloud computing networks running the application. The method further includes analyzing historical data for the multiple cloud computing networks regarding performance of the application, based on the performance metrics and the historical data, determining an optimal cloud computing network within the multiple cloud computing networks to route the request, routing the request to the optimal cloud computing network, and returning the response from the optimal cloud computing network to the user device.03-28-2013
20130080621HYBRID STORAGE DEVICES - Systems and methods for reducing power consumption and power leakage in hybrid storage clusters is provided. More specifically, the method and system is for allocating an appropriate server amongst a plurality of servers in a network by identifying an application to be executed in a network, wherein the network comprises a plurality of servers configured to execute the applications, and each server further comprising a hybrid memory system; based on the application to be executed, dynamically identifying resources to execute the application based on the hybrid memory system available and the power consumption for executing the application; and dynamically allocating the application to the identified resource for execution.03-28-2013
20130080618METHODS AND SYSTEMS FOR FACILITATING NETWORK CONNECTIVITY - Methods and systems are provided for connecting an electronic device to a network. In some situations, the electronic device connects to a first network provider and pings a first server having a static internet protocol address and a second server having a dedicated uniform resource locator. If the electronic device receives a response from the first and second server, the electronic device maintains its connection to the first network provider. Otherwise, the electronic device connects to a second network provider and pings the first and second servers.03-28-2013
20130080620RESOURCE MEASUREMENT AND MANAGEMENT - Aspects of the disclosure relate to measuring and managing data traffic in one or more networks. In some embodiments, a monitor may measure the traffic at one or more locations within the network(s) or devices associated therewith to determine whether the traffic exceeds a threshold. When the traffic exceeds the threshold, one or more actions may be taken, such as issuing or transmitting a command or directive. The command or directive may advise a device or an application to throttle or reduce an input or stimulus responsible for generating the traffic. In some embodiments, a throttling may be effectuated to reduce the data traffic.03-28-2013
20130080619SYSTEM, METHOD AND PROGRAM PRODUCT FOR OPTIMIZING VIRTUAL MACHINE PLACEMENT AND CONFIGURATION - A shared resource system, method of optimizing resource allocation in real time and computer program products therefor. At least one client device includes an optimization agent monitoring resource usage and selectively suggesting changes to resource configuration for the client device. A management system, e.g., in a cloud environment selectively makes resource capacity available to client devices and adjusts resource capacity available to client devices in response to the optimization agent. Client devices and provider computers connect over a network. The client devices and provider computer pass messages to each other over the network.03-28-2013
20130080617DYNAMIC NETWORK LOAD FORECASTING - The present disclosure involves computer-implemented methods, software, and systems for optimizing the utilization of network infrastructure resources through predictive analysis. A computer-implemented method includes calculating, using at least one hardware processor, at least one user network load profile for each user profile of a set of user profiles, calculating a predicted dynamic network load using the at least one user network load profile for each user profile of the set of user profiles, transferring the predicted dynamic network load to an at least one network infrastructure resource, and adjusting the capacity of the at least one available network infrastructure resource.03-28-2013
20090019146ASSOCIATING AND EVALUATING STATUS INFORMATION FOR A PRIMARY INPUT PARAMETER VALUE FROM A PROFIBUS DEVICE - A method and system are disclosed for managing Profibus device information in a distributed control system. After receiving input parameter data originating from a Profibus device message, the I/O module assembly performs steps for processing, maintaining and providing the input parameter data to a requesting control processor. The processing step includes extracting input parameter values from a received Profibus device message. The extracted input parameters are then deposited in a repository on the I/O module assembly, such that for a primary input parameter, the I/O module assembly stores at least: (1) a measured value, and (2) a status value. Furthermore, the I/O module assembly maintains a reference linking the first status parameter to the first input parameter. The I/O module assembly provides a data status value with the measured value for the first input parameter in accordance with an I/O read operation. The data status value is based on the status value for the first status parameter.01-15-2009
20130138809RELEVANT ALERT DELIVERY IN A DISTRIBUTED PROCESSING SYSTEM - Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system.05-30-2013
20090187651Information technology remote services management environment - An apparatus for providing remote services to an integrated information technology environment. The information technology environment comprises a services appliance. The services appliance provides agent-less monitoring of information handling systems within the information technology environment. The apparatus comprises a remote management platform. The remote management platform is configured to receive services information from the services appliance. The remote management platform analyzes the services information and determines a response based upon the services information. The remote management platform initiating the response by the remote management platform based upon the services information.07-23-2009
20090182870METHOD AND COMMUNICATION SYSTEM FOR MANAGING A COMMUNICATION NETWORK - Communication networks are automatically tested from a superordinate producer-independently managing network management center, such as when subordinate, producer-specific operation and maintenance centers (OMCs) are not occupied. Producer-dependent information is transmitted when an alarm report is sent and producer-specific hardware tests are automatically generated in the network management center (NMC). It is unnecessary for producer-specific object classes to be completely defined in the information model of the OMC-NMC interface. The tests automatically generated in the network management center can be triggered in response to errors, e.g. for a particular hardware board, or preventively, for example for the entire hardware of a network unit.07-16-2009
20090172150COORDINATED DEEP TAGGING OF MEDIA CONTENT WITH COMMUNITY CHAT POSTINGS - Embodiments of the present invention address deficiencies of the art in respect to deep tagging of media content and provide a method, system and computer program product for coordinating deep tagging of media content with chat postings. In an embodiment of the invention, a method for coordinating deep tagging of media content with chat postings can be provided. The method can include monitoring a group chat of participants co-browsing media content, identifying a token in the group chat appearing a threshold number of times within a temporal window, and creating a deep tag in the media content in association with a portion of the media content played back concurrently with the temporal window.07-02-2009
20120209994SYSTEM AND METHOD FOR ADAPTIVELY COLLECTING PERFORMANCE AND EVENT INFORMATION - Determination of an optimum batch size for aggregating data wherein, for a number of batch sizes, costs are estimated for sending batched information to persistent storage and for losing batched data. Then, the optimum batch size is selected from the number of different batch sizes based on sums of these costs.08-16-2012
20120209983CONFIGURABLE FORENSIC INVESTIGATIVE TOOL - This disclosure provides example techniques to invoke one or more forensic tools, with a forensic investigative tool. The forensic investigative tool provides a common framework that allows investigators to invoke their own trusted forensic tools or third-party generated forensic tools. The forensic investigative tool described herein seamlessly and transparently invokes the forensic tools in accordance with an investigative profile created by the investigator.08-16-2012
20130042001EVENT QUEUES - Described are techniques for communicating between one or more producers and one or more consumers. A first consumer of an event queue registers for notification regarding occurrences of one or more events. A producer of the event queue posts one or more notifications to one or more consumers of the event queue regarding one or more occurrences of one or more events. Each of the consumers receive notification regarding occurrences of events for which said each consumer is registered. The first consumer retrieves posted event notifications regarding events for which said first consumer is registered. If the first consumer is executing in user space and an event notification list to which said event notifications for said first consumer are posted is located in shared memory, said first consumer retrieves said posted event notifications without proxying into kernel space.02-14-2013
20130042000CONFIGURATION INFORMATION MANAGEMENT SERVER, CONFIGURATION INFORMATION MANAGEMENT METHOD AND CONFIGURATION MANAGEMENT PROGRAM - A configuration information management server that can correlate information collected from a virtual server to information collected from a physical server is provided. More specifically, when test load corresponding to a characteristic load pattern is generated in a server whose dependency relationship is to be analyzed, the configuration information management server refers to load information collected from all servers of a system, identifies a server in which the characteristic load pattern is measured, and thereby identifies a physical server and a virtual server having a dependency relationship, obtains correspondence of the physical server information and the virtual server information, and stores it in a configuration information management database.02-14-2013
20130041999DETERMINING INFORMATION ABOUT A COMPUTING SYSTEM - In a method for determining information about a computing system, a designated process in the computing system is monitored. A determination whether a selected event has occurred in the designated process is made. State information and configuration information regarding the computing device is collected in response to a determination that the selected event has occurred. Meta information associated with the designated process is determined in response to a determination that the selected event has occurred. The state information, the configuration information and the meta information is recorded in an accessible file.02-14-2013
20130041998DELIVERY QUALITY OF EXPERIENCE (QoE) IN A COMPUTER NETWORK - An apparatus generally having an interface and a circuit is disclosed. The interface may be connectable to a network to monitor a media program streaming across the network to a media client. The circuit may be configured to (i) generate first information by modeling a buffer of the media client, the first information being representative of a plurality of events related to the buffer during a playback of the media program and (ii) generate a signal representative of a quality of experience of the media program in response to the first information.02-14-2013
20100100620METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING COMPOSITE CAPABILITY INFORMATION FOR DEVICES IN DISTRIBUTED NETWORKS - An apparatus for providing distribution of composite capability information for devices within a distributed network may include at least one processor and at least one memory including computer program code. The memory and the computer program code may be configured to, with the processor, cause the apparatus at least to receive local capability information from a participant device in a distributed network in which the local capability information describes the capabilities of the participant device, combine the local capability information from the participant device with other capability information defining capabilities of other participant devices to produce composite capability information, generate differential information indicating differences between the local capability information and the composite capability information, and provide the differential information to the participant device. A corresponding method and computer program product are also provided.04-22-2010
20100100617System for Assignment of a Service Identifier as a Mechanism for Establishing a Seamless Profile in a Contextually Aware Presence Access Layer - A method for providing presence-related information is provided. The method includes creating a template of presence parameters for an application, storing the template, a presence access layer retrieving the template, the presence access layer using the template to create a profile of at least one presence parameter for the application, and the presence access layer using the profile to specify a presence-related action for the application.04-22-2010
20130138796DISTANCE-BASED NETWORK RESOURCE DISCOVERY - An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource.05-30-2013
20130138795Cache Eviction During Off-Peak Transactions - Transaction activity of a cache maintaining content may be monitored to determine periods of transaction activity below a first threshold amount of transactions. A period of anticipated transaction activity above a second threshold amount of transactions may be determined. A period of anticipated transaction activity below the first threshold may be selected based upon the monitored periods of transaction activity below the first threshold and the determined period of anticipated transaction activity above the second threshold. Content then may be evicted from the cache during the selected period of anticipated transaction activity.05-30-2013
20130138803METHOD FOR MONITORING A PLURALITY OF RACK SYSTEMS - A method for monitoring a plurality of rack systems is provided, which includes the following steps. The rack systems are provided, in which each rack system includes an integrated management module (IMM) and a plurality of servers, and the IMM is communicatively connected to the servers and manages and controls the servers. The rack systems are distributed into at least one rack system group, in which each rack system group includes a first rack system and a second rack system, and the first rack system and the second rack system respectively include a first IMM and a second IMM. The first IMM and the second IMM are communicatively connected, monitor each other, and judge whether an anomaly occurs in each other. When the first IMM judges that an anomaly occurs, the first IMM sends a warning message including the anomaly of the second rack system.05-30-2013
20100042718System And Method For Tracking User Activity Related To Network Resources Using A Browser - A method and system are described for tracking user activity related to network resources using a browser. According to an exemplary embodiment, a user-initiated activity related to a network resource is detected in the browser. The detected user-initiated activity is associated with the network resource to form an activity-resource pair. The activity-resource pair is associated with a record in a data store related to the detected activity or the network resource. By associating the activity-resource pair with records in the data store that relate to the network resource and/or the detected activity, the information in the data store can be used to add context to and provide insight into users' browsing activities.02-18-2010
20100042717Sharing of Media Using Contact Data - Media sharing using contact data involves identifying contact records on a personal electronic device of a user. Each of the contact records includes a contact address of a person associated with the respective contact record. The contact records are communicated to a media sharing service via a network. Media items of the user are sent to the sharing service. One or more of the contact records are associated with each of the media items. A notification is sent to the persons associated with the one or more contact records. The notification describes sharing of the media items associated with the contact records. The sharing service facilitates access to the media items by the persons associated with the contact records in response to the persons receiving the notification.02-18-2010
20100042715METHOD AND SYSTEMS FOR REDUNDANT SERVER AUTOMATIC FAILOVER - A method and systems for a redundant server automatic fail-over system is provided. The system includes a plurality of client devices communicatively coupled to a network wherein the plurality of client devices each includes an active server identification location. The system also includes a first server system communicatively coupled to the network that is configured to operate as the active server on the network wherein messages sent to the first server system are addressed to the first server system using the active server identification location on each client device. The system further includes a second server system communicatively coupled to the network that is configured to operate as a standby server on the network and is configured to switch to being the active server on the network when it is determined that the first server system is unable to operate as the active server.02-18-2010
20080313322Asynchronous Network Stack Operation in an Operating System Independent Environment - Techniques for operation of an asynchronous stack in a pre-boot environment. A token-based stack design may be used to support communications between network stack layers.12-18-2008
20090157874MONITORING AND REPORTING SYSTEM AND METHOD OF OPERATING THE SAME - A monitoring and reporting system for use with an embedded computer of a hosted system and method of operating the same. In one embodiment, the monitoring and reporting system includes a device driver configured to monitor a status of a user subsystem of the embedded computer and generate a status signal therefrom. The monitoring and reporting system also includes a modem configured to send a short message to an external device as a function of the status signal. The modem employs a low amount of overhead to send the short message expeditiously.06-18-2009
20090157875METHOD AND APPARATUS FOR ASYMMETRIC INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, copied packets that are based on original packets sent from a user client are monitored for a web content request meeting certain monitoring selection criteria. Upon detection of a copied packet having a web content request meeting the selection criteria, a replacement packet is forwarded to the user client such that the user client receives the replacement packet before receiving a response packet from a target server of the corresponding original packet, wherein the replacement packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement.06-18-2009
20090157873Verifiable online usage monitoring - In the present invention, observed online CPD or CE activities must be within a designated envelope of acceptable behaviour for accredited activity to be recorded in a session log for that user. When a watcher program detects one or more loss of user focus on the activity, it alerts the user and gives them a short opportunity to rectify the situation, otherwise a session timer is stopped and no further credits are added or verified to the user's session log. When a session is ended by a user or the watcher program, only the verified activity that can be accredited to CPD is itemised and catalogued cumulatively in the user's session log.06-18-2009
20090157871Information Processing Apparatus and Wireless Connection Service Availability Notification Method - According to one embodiment, an information processing apparatus includes a display device, an operation button, a wireless modem, and a control module. The control module determines, when the operation button is operated, wireless connection service availability in accordance with whether or not the wireless modem allows communication with a base station which forms a wireless connection service area and accommodates a mobile station within the wireless connection service area in a network, and displays the determination result on the display device.06-18-2009
20090157870RESOURCE-AMOUNT CALCULATION SYSTEM, AND METHOD AND PROGRAM THEREOF - A response-time-difference calculation/request-number converting means (06-18-2009
20090157869Tracking Content in Communication Networks - The present invention relates to methods of, and systems for, tracking content in communication networks by collecting content transmission information from the network. The collected content transmission is examined to identify discrete content items, and these are compared to predetermined content items. The result of the comparison is stored on a database, and if an identified discrete content item is the same as or substantially similar to a predetermined content item and/or if an identified discrete content item has been previously sent to or received by a subscriber or application, an event signal is triggered.06-18-2009
20090157868METHOD AND APPARATUS FOR CHECKING THE HEALTH OF A CONNECTION BETWEEN A SUPPLEMENTAL SERVICE PROVIDER AND A USER DEVICE OF A PRIMARY SERVICE PROVIDER - A system and method for communicating between a secondary content provider and a user device includes a user device locator module and a primary service provider providing primary service content to the user device. The user device communicates a user device identifier, an IP address and a port number to the user device locator module. A secondary service content provider in communication with the user device locator module provider has a healthcheck module receiving the IP address and the port number from the user device locator module. The healthcheck module communicates a healthcheck signal to the user device using the port number and the IP address of the user device through a network. The secondary service content provider communicates secondary content to the user device through the network.06-18-2009
20090157867SYSTEM AND METHOD FOR REAL-TIME GRAPHIC MONITORING OF DIFFERING GRAPHICS RESOLUTIONS USING A SINGLE GRAPHICS BUFFER - A system and method automatically scale the resolution of video output of a selected workstation blade so that an administrator can view the video output by the selected workstation blade in the same format as it is displayed at the user terminal associated with the selected workstation blade. The video is automatically scaled to the administrator's VGA resolution while maintaining the same end-user DVI resolution and displaying the video so that the administrator may see the video output regardless of display format at the end user. This system and method allows the administrator to see the entire display.06-18-2009
20090157865SYSTEM AND METHOD OF MANAGING NETWORK CONNECTIONS USING A LINK POLICY - A system and method of managing network connections using a link policy is disclosed. In one form, a network link management system can include a link control logic module operable to alter a first link data rate of a first link operable to communicate network traffic. The network link management system can also include a link manager coupled to the link control logic module. In one form, the link manager can be configured to initiate altering the first link data rate to a second link data rate value in response to a first link rate policy entry of the first link. The network link management system can also include a link rate policy accessible to the link manager and operable to store the link rate policy entry of the first link.06-18-2009
20090157864GRID COMPUTING CONTROL METHOD FOR TESTING APPLICATION PROGRAM CAPACITY OF SERVER AND SERVICE METHOD THEREOF - Disclosed is a grid computing control method for testing the application program capacity of a server and a method for providing a service based on the same. The grid computing control method includes the steps of providing a number of user clients with a capacity measurement program by a capacity measurement server; selecting user clients capable of capacity measurement from the user clients, the capacity measurement program having been installed in the user clients, by the capacity measurement server; transmitting a capacity measurement script to the selected user clients by the capacity measurement server; executing the capacity measurement script so as to create capacity measurement data by the selected user clients; transmitting the created capacity measurement data to the capacity measurement server by the selected user clients; and collecting the transmitted capacity measurement data and composing a capacity measurement result report by the capacity measurement server.06-18-2009
20100332654METHOD AND APPARATUS FOR PROVIDING MOBILE DEVICE INTEROPERABILITY - An apparatus for providing mobile device interoperability with other devices may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured, with the processor, to cause the apparatus to perform at least receiving a frame buffer update request from a remote environment, determining a scan interval defining a first portion of the frame buffer over which scanning to determine data changes is to occur and a second portion over which scanning to determine data changes is not to occur, identifying whether a data change occurs in the first portion of the frame buffer by comparing relatively newer data to relatively older data, and updating a selected portion of the frame buffer to the remote environment based on the identifying. A corresponding method and computer program product are also provided.12-30-2010
20100332651 MESSAGE-BASED COMMUNICATION SYSTEM MONITOR - Message-based communication system monitor, comprising an inspector (12-30-2010
20100332647METHOD AND SYSTEM OF UPDATING PRESENCE INFORMATION IN A COMMUNICATION SYSTEM - In implementing a method of updating presence information for a plurality of presentities in a communication system, a presence server: defines a group of presentities that share the same value for a first presence attribute; receives an update of the value of the first presence attribute for one of the presentities in the group; and applies the update of the value to all of the presentities in the group.12-30-2010
20100106830METHOD AND APPARATUS FOR COLLECTING AND DELIVERING STATISTICAL DATA - A statistical-data collecting-and-providing apparatus receives, through a statistical-data-acquisition-criterion setting interface, setting of a statistical-data acquisition criterion and setting of a notification destination, which is a destination of statistical data delivery. Subsequently, the statistical-data collecting-and-providing apparatus collects statistical data based on the thus-received statistical-data acquisition criterion. Thereafter, the statistical-data collecting-and-providing apparatus delivers the thus-collected statistical data to a service-providing application server, which is the notification destination received through the statistical-data-acquisition-criterion setting interface.04-29-2010
20100106829Device Status Notification Device - There is provided a device status notification device that notifies a notification destination, which is connected to a network, of a status change in a device connected to the network through the network. The device status notification device includes a notification destination information table in which a notification destination, to which the status change in the device is notified in a case where there is the status change in the device, is registered, a notification destination validity checking unit that checks whether the notification destination registered in the notification destination information table exists with validity, and a registration deleting unit that deletes the notification destination, of which valid existence cannot be checked by the notification destination validity checking unit, from the notification destination information table.04-29-2010
20100106828METHOD AND APPARATUS FOR INTERFERENCE REPORTING IN A N-MIMO COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate interference measurement and reporting in a network multiple-in-multiple-out (N-MIMO) communication system. As described herein, a network device can measure and report interference corresponding to network nodes outside a designated set of nodes that can cooperatively serve the device. Respective interference reports can additionally identify dominant interfering nodes, correlation between transmit antennas of respective nodes, or the like. Subsequently, respective interference reports can be combined with per-node channel information to manage coordination and scheduling across respective network nodes. As further described herein, interference from a network node can be measured by observing reference and/or synchronization signals from the network node. To aid such observation, respective non-interfering network nodes can define null pilot intervals in which transmission is silenced or otherwise reduced. As additionally described herein, loading information broadcasted by respective interfering network nodes can be identified and utilized in connection with interference calculation.04-29-2010
20100106827METHOD AND APPARATUS FOR RECOMMENDING CONTENT - Provided is a content recommending method including receiving from second users meta data regarding content belonging to each of the second users having a content preference similar to a content preference of a first user, detecting based on the received meta data a plurality of pieces of recommended content similar to content that the first user is currently using, and outputting information regarding the respective pieces of detected recommended content.04-29-2010
20100106826SERVER FUNCTION SWITCHING DEVICE, METHOD AND PROGRAM, AND THIN CLIENT SYSTEM AND SERVER DEVICE - Provided is a thin client system that automatically allows two types of user terminals, a network-boot-type user terminal and a screen-transfer-type user terminal, to share the same execution environment. A screen-transfer/network-boot switching system serves as a server function switching device used in the thin client system, including a server function switching section and a terminal process proxy execution section. The server function switching section accepts a connection request from the user terminal, and determines attribute of the user terminal. If the user terminal is the network-boot-type user terminal, the boot image transfer section transfers a boot image to the user terminal. If the user terminal is the screen-transfer-type user terminal, the boot image transfer section transmits a boot image to the terminal process proxy execution section. Moreover, the terminal process proxy execution section transmits screen information to the user terminal.04-29-2010
20100106825METHOD AND SYSTEM FOR MANAGING RELATED-PATIENT PARAMETERS PROVIDED BY A MONITORING DEVICE04-29-2010
20100106824METHOD AND DEVICE FOR DETERMINING NETWORK DEVICE STATUS - Disclosed is a method of transparently detecting authentication status of endpoint devices in a network. This method may be used for differentiating guest or rogue endpoints from enterprise endpoints.04-29-2010
20100106823CONFIGURATION SYNCHRONIZATION BETWEEN ELECTRONIC GAMING MACHINES AND A SUPPORTING SERVER - An illustrative method manages configuration information of electronic gaming machines (EGMs) and maintains server configuration information at a server that supports EGMs in a server-client relationship. The server configuration information contains stored information about the configuration of each EGM. EGM configuration information transmitted from the EMGs is received at the server. The server and EGM configuration information each contains corresponding fields with values representing information about predetermined factors. The values in the fields of the server configuration information are compared with the values in corresponding fields of the EGM configuration information. A report is generated based on the comparison.04-29-2010
20100106822Monitoring-target-apparatus management system, management server, and monitoring-target-apparatus management method - If both of LUN security information on storage apparatuses and configuration information on an iSNS server are acquirable, a management server makes reference to configuration situation of the LUN security acquired from a monitoring-target storage apparatus, thereby acquiring iSCSI initiator names which are permitted to access the storage apparatus. Moreover, the management server acquires, from the iSNS server, IP address of an iSCSI initiator name which does not exist on a monitoring-target host out of the iSCSI initiator names, then adding the IP address into monitoring-target nodes. Meanwhile, when an access from the management server to a monitoring-target node becomes impossible for a certain constant time-period due to a reason such that the monitoring-target node has been excluded from the network, the management server is capable of excluding the monitoring-target node from the monitoring targets on a GUI.04-29-2010
20100106821MANAGING CONFIGURATION ITEMS - There is provided a method for managing a plurality of configuration items that includes a repository that holds, for each configuration item, one set of data indicating at least one predetermined attribute of the configuration item and a relationship with another configuration item and a discovery section that detects information on configuration items. The method includes creating at least one new set of data from information detected by the discovery section. The method also includes storing the new set of data in the repository and managing the new set of data as a combined configuration item.04-29-2010
20100106820QUALITY OF SERVICE MANAGEMENT - A method and system for providing quality of service to a plurality of hosts accessing a common resource is described. According to one embodiment, a plurality of IO requests is received from clients executing as software entities on one of the hosts. An IO request queue for each client is separately managed, and an issue queue is populated based on contents of the IO request queues. When a host issue queue is not full, a new IO request is entered into the host issue queue and is issued to the common resource. A current average latency observed at the host is calculated, and an adjusted window size is calculated at least in part based on the current average latency. The window size of the issue queue is adjusted according to the calculated window size.04-29-2010
20100106819Script Based Computer Health Management System - A management system may use a human readable script in which is defined executable statements that may gathers status information from various services. The status information may be displayed within a management user interface, which may also include various summary statistics including an overall security state. The services may be locally running services, and services provided or accessible over a local area network or wide area network. In some cases, the human readable script may include statements for starting or resuming the services, querying a running service, or querying a database related to a service. The user interface may be refreshed when the human readable script is updated and re-executed. The services may include security related services, among others.04-29-2010
20100106818SYSTEM AND METHOD FOR MANAGING SYSTEM RESOURCES IN A NETWORK ENVIRONMENT - A method for managing system resources in a network environment. The method begins by reading from a first log timestamp T04-29-2010
20090150539Webpage domain monitoring - Webpage domain monitoring is described. In an implementation, one or more web pages are obtained at a client, with each said web page including a plurality of content that is provided, respectively, via a plurality of domains. The plurality of domains that were used to provide the plurality of content is identified and a counter is incremented, respectively, for each identified domain. When the counter for a respective said domain exceeds a threshold, a notification is output by the client that indicates that the respective said domain has a likelihood of tracking the client.06-11-2009
20090132703VERIFYING RESOURCE FUNCTIONALITY BEFORE USE BY A GRID JOB SUBMITTED TO A GRID ENVIRONMENT - A method, system, and program for verifying resource functionality before use by a grid job submitted to a grid environment are provided. When a new resource is allocated to a particular execution environment within a grid environment managed by a grid management system, then a grid verification service automatically selects and runs at least one functionality test on the new resource as controlled by the grid management system. Responsive to a result of the functionality test, the grid verification system verifies whether the result meets an expected result before enabling routing of the grid job to the new resource, such that the functionality of the new resource is automatically verified before access to the new resource is allowed to maintain quality of service in processing grid jobs.05-21-2009
20120215914REQUEST ROUTING BASED ON CLASS - A system and method for management and processing of resource requests is provided. A content delivery network service provider receives a DNS query from a client computing device. The DNS query corresponds to a requested resource from the client computing device. The content delivery network service provider associates the client computing device with a cluster of other client computing devices. Based on routing information for the cluster, the content delivery network service provider routes the DNS query. The process can further include monitoring performance data associated with the delivery of the requested resource and updating the routing information for the cluster based on the performance data for use in processing subsequent requests from client computing devices in the cluster.08-23-2012
20120215913INFORMATION MANAGEMENT APPARATUS AND INFORMATION MANAGEMENT SYSTEM - An information management apparatus may include a first collection unit that collects a measurement value measured by a measurement device connected to the information management apparatus via a network, a second collection unit that collects status information indicating statuses of the measurement device and the network, and a correction unit that correcting quality information indicating validity of the measurement value, which has been collected by the first collection unit, by using the status information that has been collected by the second collection unit.08-23-2012
20120215908METHOD AND SYSTEM FOR DETECTING IMPROPER OPERATION AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM - An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation.08-23-2012
20120215906METHOD AND APPARATUS OF MATCHING MONITORING SETS TO NETWORK DEVICES - A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example method of assigning a sample set to a network device operating on a network may include identifying the at least one network device, and identifying at least one object identifier associated with the at least one identified network device. The method may also include transmitting the at least one object identified to a memory location, and comparing the at least one object identifier to a plurality of sample sets and assigning relevancy scores to the plurality of sample sets based on the comparison. The method may also include assigning at least one sample set having a greater relevancy score than the other sample sets to the at least one network device. The sample sets may be SNMP sample sets.08-23-2012
20120185591WEB SERVICE SYSTEM, SCHEDULE EXECUTION APPARATUS AND CONTROL METHOD THEREOF - A schedule execution unit accesses a storage unit for storing a call list registered in a database and determines whether or not there is a Web service call to be executed. If the presence of a Web service call to be executed is confirmed, the schedule execution unit reads out the Web service address and process details and calls the Web service. By so doing, the apparatus that provides the function and the apparatus that carries out the call can be separated, thus enabling a particular program to be executed simply and flexibly according to a schedule.07-19-2012
20120185586SYSTEMS AND METHODS FOR GROUP BANDWIDTH MANAGEMENT IN A COMMUNICATION SYSTEMS NETWORK - An embodiment is a method of managing bandwidth, performed by a computing system. The system receives user-selected connection parameters associated with a subscriber device. The system associates a network identifier of the subscriber device with a group bandwidth policy, based on the user-selected connection parameters. The system stores, in computer-readable storage media, parameters associated with the group bandwidth policy, in association with the network identifier of the subscriber device. The system receives, at a gateway device, network communication data from the subscriber device. The system limits, at the gateway device, bandwidth available to the network communication data, based on the stored parameters associated with the group bandwidth policy.07-19-2012
20120185581DOMAIN BASED ISOLATION OF NETWORK PORTS - When an operating system process evaluates a rule for an operation being attempted on a logical network port, the operating system process determines whether the target logical port falls within a range of logical ports, and then determines whether the operation is associated with a permitted domain of the range of logical ports. If the operation is a bind operation, then the process attempting to bind to the target port will be allowed to bind if the target port falls within the range and the operation/process is associated with a permitted domain. Otherwise, the binding operation will not be allowed to proceed.07-19-2012
20090125623DATA VALIDATION USING SIGNATURES AND SAMPLING - Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process.05-14-2009
20090125622SYSTEM AND METHOD FOR PROVIDING SERVER STATUS AWARENESS - A method including analyzing one or more network interactions of a user. One or more servers associated with the one or more network interaction may be identified. A listing of at least a portion of the one or more servers may be rendered.05-14-2009
20130046881Method and Apparatus For Network Device Detection - A method and apparatus for detecting remote network devices. In one embodiment, the method comprises detecting an event and a) transmitting a message requesting a response from one or more remote network devices, the message comprising a first network identification code, and b) determining whether a response to the message has been received, the response transmitted by a remote network device after receiving the message and determining that the first network identification code matches a second network identification code stored within the remote network device, the response comprising identification information of the remote network device. If c) a response has not been received, terminating the method for detecting remote network devices if a pre-determined time period has elapsed since transmitting the message. If d) a response has been received, storing identification information associated with the responding remote network device and repeating steps a-d until no further responses are received.02-21-2013
20130046880SYSTEM AND METHOD FOR PROVIDING REDIRECTIONS - A redirection of a URL page request may be performed by monitoring an upstream path from a subscriber to the internet through an ISP. When a URL page request is detected from a subscriber for whom a redirection is required, a redirection device generates a single TCP packet response that mimics a response from the intended destination server. The single TCP packet includes a set FIN bit that closes any active session with the destination server to prevent the subscriber from accepting packets from the destination server.02-21-2013
20100094997Event logging techniques for broadband wireless access networks - An apparatus, system, method, and article for event logging for broadband wireless access networks are described. The apparatus may include a managed node to store a managed object associated with an event and to provide the managed object to a network management system. The managed object may include an event table to store an event table entry defining an event at the managed node and including an event severity attribute. The managed object may include an event log table to store an event log table entry when the event severity attribute is greater than or equal to a severity threshold. Other embodiments are described and claimed.04-15-2010
20100094993Use of Persistent Sessions by a Presence Access Layer - A method for a watcher to receive presence information. The method includes the watcher requesting presence information from a presence access layer and then disconnecting from the presence access layer. The method further includes the presence access layer receiving the requested information through a persistent session with a presence server, storing the requested information, and delivering the requested information to the watcher after the watcher reconnects to the presence access layer.04-15-2010
20100094988 AUTOMATIC DISCOVERY FRAMEWORK FOR INTEGRATED MONITORING OF DATABASE PERFORMANCE - Provided are techniques for monitoring information. In response to a database process starting, a monitoring agent is loaded under control of the database process, wherein the monitoring agent invokes a discovery service to discover a central server and monitoring service. Under control of the monitoring agent, monitor information about the database process is sent to the central server and monitoring service.04-15-2010
20120166641METHOD, SYSTEM AND APPARATUS FOR MANAGING COMPUTER PROCESSES - Methods, systems and apparatuses for managing computer processes in a computing environment may be described. An exemplary method may include the defining of a plurality of computer processes; the defining of a sequence that dictates the starting and stopping of the plurality of computer processes; the Defining of any process dependencies for the plurality of computer processes; the defining of a first networked environment where the plurality of computer processes run; the determining of an action to take following a system event; and the executing of the action06-28-2012
20120166638MODULAR MONITOR SERVICE FOR SMART ITEM MONITORING - Monitor services deployable on device networks may be implemented using a modular approach, in which a core monitor service is mapped to one or more devices included in, or associated with, the device networks. Additional monitoring-related functionality may be provided to such devices using plug-ins, add-on services or service components, or other service modules, which interact with the core monitor service. The core monitor service(s) and any monitor service modules may be mapped, to specific ones of the devices, based on, for example, requirements of other services and/or relevant device metadata (e.g., capabilities) of the devices. In additional or alternative implementations, various protocols may be used to register new devices and deployed monitor service(s) with the distributed monitoring service(s) in a fast, secure, energy-efficient, and reliable manner, even as devices join or leave the device network(s).06-28-2012
20120166636METHOD OF MONITORING THE PERFORMANCE OF A SOFTWARE APPLICATION - A method of monitoring the level of performance of a software application running on a network-attached computing device, comprises monitoring information exchange at least one station on the network; measuring at least two performance indicator metrics, such as delay, jitter, loss, response time, throughput, goodput, and object size; and deriving an indicator parameter from a non-linear combination of the indicator metrics. A transformation may be applied to each indicator metric to obtaining a corresponding derived value, and the derived values then additively combined, to obtain the said indicator parameter. The transformation has a first region in which the derived value depends relatively weakly on the corresponding metric, and a second region, in which the derived value depends relatively strongly on the corresponding metric. A score value may be entered by a user, indicative of the user's perception of the performance of the software application, and compared with the derived indicator parameter. The calculation used to derive the indicator parameter may be varied, in dependence on the user-entered score. Diagnostic traces may be triggered in dependence on the derived indicator parameter. Values of the indicator parameter and associated trace data may be collected in a database and collated to diagnose and/or predict problems in the said computer system.06-28-2012
20120166634MONITORING PERFORMANCE AND OPERATION OF DATA EXCHANGES - A system and method for monitoring the performance associated with fulfilling resource requests are provided. One or more client computing devices obtain an original resource request and associate a record identifier with the original resource request. The one or more client computing devices also determine performance data associated with processing each embedded resource request included in a response to the original resource request. Each embedded resource request is associated with a component record identifier that is associated with, but different from, the record identifier of the original resource request. The one or more client computing devices can then transmit the determined performance data with the record identifier to another processing device.06-28-2012
20120166633OPTIMIZING CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a CDN service provider for alternatively hosting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative CDN service providers. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of CDN service providers with respect to specific resource requests are also provided.06-28-2012
20120166631DEVICE AND METHOD FOR MONITORING, RATING AND/OR TUNING TO AN AUDIO CONTENT CHANNEL - Devices, methods and computer-readable code for simultaneously monitoring the content of at least two streaming audio content channels are disclosed. In some embodiments, the monitored content is analyzed, and one or more features of the monitored content channels are computed, including but not limited to music classification features, content genre features, and spoken content features. These computed features may be used, for example, to compute a rating or score for each monitored audio channel, for example, a rating computed relative to user listening preferences, expressed, for example, in preference rules. In some embodiments, the presently disclosed device includes a channel selector for automatically tuning, for example, to a channel assigned a higher rating at a given time. Alternatively or additionally, content rating scores may be displayed to a user who manually selects and tunes to an audio content channel.06-28-2012
20120166629INFORMATION PROCESSING DEVICE, ADDRESS DUPLICATION HANDLING METHOD, AND COMPUTER-READABLE NON-TRANSITORY RECORDING MEDIUM - A sensor device 06-28-2012
20120166626Updating Traffic Rate for MSRP Sessions - A system and method is provided for adjusting a traffic rate for a Message Session Relay Protocol (MSRP) session established between two network nodes at a per session level. Each MSRP session has a traffic rate for which MSRP messages are transmitted over the MSRP session. The traffic rate per session can be adjusted, and the adjusted traffic rate per session can be communicated to adjacent nodes.06-28-2012
20120166621Sharing the Status of S-CSCF Nodes Across I-CSCF Nodes in a Communications Network - Methods and apparatuses, including computer program products, are described for sharing the status of S-CSCF nodes across a plurality of I-CSCF nodes in a communications network. The system includes a first I-CSCF node of the plurality of I-CSCF nodes configured to monitor status of one or more S-CSCF nodes connected to the first I-CSCF node, wherein the one or more S-CSCF nodes connected to the first I-CSCF node comprise a subset of the S-CSCF nodes in the network, and transmit the monitored status of the one or more S-CSCF nodes connected to the first I-CSCF node to a second I-CSCF node. The second I-SCSF node is configured to monitor status of one or more S-CSCF nodes connected to the second I-CSCF node, wherein the one or more S-CSCF nodes connected to the second I-CSCF node comprise a subset of the S-CSCF nodes in the network.06-28-2012
20120166616System and method for energy performance management - A system for resource performance management, comprising a network-connected data collection service adapted to receive data from a plurality of resources, a network-connected data aggregation and reporting service adapted to aggregate resource-related data on at least temporal, organizational, geographic, and resource-specific dimensions, a network-connected initiative modeling service adapted to facilitate modeling by a user of a plurality of resource-related initiatives, and a network-connected initiative monitoring service adapted to receive data from one of the data collection service and the data aggregation and reporting service, and further adapted to measure performance of a plurality of resource-based initiatives, wherein a plurality of resource-based initiatives are assembled within the initiative modeling service into a plurality of initiative portfolios, and the plurality of initiative portfolios are modeled under a variety of forecast scenarios to determine an optimal initiative portfolio from among the plurality of portfolios, is disclosed.06-28-2012
20130212264Controlling access of clients to service in cluster environment - First, second, and third sets of addresses are created. The first set includes addresses registered in a name server; both the second and third sets include addresses not registered in the name server and that are disjoint. A first address of a first server that has failed and to which access is to be prohibited is moved from the first to the third set., is removed from the first server, assigned to a second server, and removed from the name server. Usage parameter values of the first address are monitored to determine whether at least one is below a value. If so, the first address is removed from the second server and moved from the third to the second set. Upon access to the first server no longer being prohibited, a second address of the second set is assigned to the first server and added to the name server.08-15-2013
20090119400Presence Management System - According to one embodiment a presence management system including: a first presence server that controls a first network; a plurality of presentities that belong to the first network; a second presence server that controls a second network, the second network connected to the first network via a communication channel; and a plurality of watchers belonging to the second network; wherein the first presence server includes: a first watcher list that registers a given presentity under the first network associated with one of the watchers that requests presence information of the given presentity; and an external notification section that sends the presence information of the given presentity to the second presence server, and wherein the second presence server includes: a second watcher list that registers the one of watchers associated with the given presentity; and an internal notification section that sends the presence information to the one of watchers registered correspondingly to the given presentity.05-07-2009
20090119403Composite Resource Models - A mechanism and model are provided for representing and managing composite resource models. When a resource monitor is deployed for a resource, the resource monitor scans for information that indicates that the resource under monitoring is part of a cluster, grid, or other composite configuration. The resource monitor then determines whether monitoring information for the resource should be reported differently because of the composite configuration. If monitoring information for the resource is to be reported differently, the resource monitor alters the reporting format to reflect the composite resource model. The resource manager may then receive the monitoring information and apply this information to individual resources and aggregates the monitoring information for composite resources.05-07-2009
20090119401CONTENT PROVIDING SYSTEM, MONITORING SERVER, AND SIP PROXY SERVER - A content providing system that provides content to a user terminal via a network includes a content providing server that is connected to the network and provides content, an SIP proxy server that is connected to the network and relays transmission and reception between the user terminal and the content providing server, and a monitoring server that is connected to the network and stores monitoring information regarding transmission and reception between the user terminal and the content providing server, the monitoring information being transmitted from the SIP proxy server.05-07-2009
20090043887Heartbeat mechanism for cluster systems - A heartbeat system and method is provided for a cluster system. In one embodiment, a heartbeat mechanism includes a quorum file for receiving heartbeat messages from the plurality of nodes. A network controller connects the quorum file to the plurality of nodes with a serial bus that establishes peer-to-peer and point-to-point device communication. A node map maintained by the network controller identifies active nodes based on signals from the serial bus. A status logic for determining a status of a node from the plurality of nodes by comparing heartbeat messages in the quorum file written by the node and the node map.02-12-2009
20090043886OPTIMIZING VIRTUAL INTERFACE ARCHITECTURE (VIA) ON MULTIPROCESSOR SERVERS AND PHYSICALLY INDEPENDENT CONSOLIDATED VICs - Optimization of the Virtual Interface Architecture (VIA) on Multiprocessor Servers using Physically Independent Consolidated NICs (Network Interface Cards) allows for improved throughput, increased resiliency and transparent fail-over; and also by hiding the actual NICs involved in particular data transactions, enables operations with substantially unmodified applications software.02-12-2009
20090043885System and Method for Maintenance Support - System and method for maintenance support for electronically actuated and/or monitored appliances implemented within an electronically networked automation system, having a central monitoring unit processing present operating parameters for appliances for establishing the servicing state of the appliances using comparison operating parameters, where an external SSIS server logically combines the servicing request established by the monitoring unit with appliance-specific servicing performance information stored in a database and forwards these data to electronic mobile terminals of the servicing personnel in order to perform the servicing.02-12-2009
20090043883Method for Monitoring a Technical Appliance - There is described a method and a device which is suitable for carrying out said method. Said method monitors a technical device, wherein a communication connection is established or can be established between the technical device and a device for supporting the monitoring. Data communication with the device for supporting monitoring is carried out by means of the communication connection. The technical device is monitored in a flexible manner possible. The monitoring of the technical device can be configured in such a way that modifications of a monitoring configuration can be transmitted from the device to the monitoring support on the technical device. The internet is used, in particular, for transmission, and the device for supporting monitoring is a webserver.02-12-2009
20090043880CREDIT DEPLETION NOTIFICATION FOR TRANSMITTING FRAMES BETWEEN A PORT PAIR - Provided are a method, system, and article of manufacture for credit depletion notification for transmitting frames between a port pair. Credits indicate a number of outstanding frames a first device may transmit to a second device. The credits are decremented in response to transmitting a frame to the second device. The credits are incremented in response to receiving a ready code from the second device indicating that the second device processed the transmitted frame. A determination is made as to whether additional credits are needed for communicating frames from the first device to the second device. A credit depletion notification is sent to the second device in response to determining that the additional credits are needed for communication with the second device.02-12-2009
20110004684Prediction Of Systems Location Inside A Data Center By Using Correlation Coefficients - The present invention enables location prediction of a system in a data center. Specifically, the invention monitors resources from the systems in the data center and measuring points in the data center. A system resource monitors the internal conditions of the system. A data center measuring point is any device which provide environment or data center resource information of the data center. The conditions obtained from the system resources and measuring points are correlated, and then utilized to predict the location of the system in the data center. For example, by correlating heat sensor values and bandwidth measurements, the prediction mechanism may be able to predict that a system that has a spike in network usage and is at fully capacity is near measuring points that detected an increased heat sensor value and detected increased bandwidth usage at the same time that the machine had its spike in network usage.01-06-2011
20110004680SYSTEMS AND METHODS FOR UNIFIED MANAGEMENT OF DESKTOP SESSIONS - A method for using standards-based functionality to provide unified management for a plurality of remote desktop sessions includes executing an enhanced management access point on a first physical machine. The method includes monitoring a plurality of desktop sessions including a desktop session executing on one of a second physical machine and a virtual machine executing on the second physical machine. The desktop session provides access to at least one application or file. The method includes determining a first level of activity of the desktop session. A level of activity may be one of: active, inactive, hibernating and standby. The method includes receiving a notification of a migration of the desktop session to a third physical machine, the migrated desktop session maintaining the first level of activity. The method includes instructing a management component on the third physical machine to modify the migrated desktop session to a second level of activity.01-06-2011
20090319653SERVER CONFIGURATION MANAGEMENT METHOD - A method for monitoring changes in at least two servers, that creates difference results that encapsulate effects of changes applied to file systems of at least two servers. These differences results are defined by predetermined creation rules. The method includes comparing the difference results between the at least two servers to detect differences in the respective difference results. These detected differences are defined in accordance with predetermined comparison rules. The method further includes: analyzing the detected differences in comparison results in accordance with predetermined analysis rules and indicating potential problems from the analyzed and detected differences.12-24-2009
20090307351SYSTEMS AND METHODS FOR MONITORING COMPONENTS OF A REMOTE ACCESS SERVER FARM - The present application is related methods to monitor a state of one or more components of a remote access server farm by an intermediary to distinguish between operating and functional components and improve farm availability for user application requests. The intermediary may be deployed between a client and the remote access server farm and forwards client requests to functional components of the remote access server farm.12-10-2009
20090307350IN-KERNAL CONTENT-AWARE SERVICE DIFFERENTIATION - The increasing number of Internet users and innovative new services such as e-commerce are placing new demands on Web servers. It is becoming essential for Web servers to provide performance isolation, have fast recovery times, and provide continuous service during overload at least to preferred customers. The invention describes a kernel-based architecture for content-aware service differentiation that protects Web servers against overload by controlling the amount and rate of work entering the system. We have invented a mechanism that provides admission control and service differentiation based on connection and application level information. The application header-based connection control uses application-level information (such as URIs and cookies for HTTP) to define different service differentiation actions. The present invention provides the kernel mechanisms that are more efficient and scalable than application level controls implemented in current Web servers.12-10-2009
20090307349SYSTEM AND METHOD FOR COMMUNICATION BASED ON AN AVAILABILITY OF A USER - The present invention provides a system and method for communication based on an availability level of a presence entity in a communication network that includes a first step (12-10-2009
20090307348SYSTEMS FOR DISTRIBUTING DATA OVER A COMPUTER NETWORK AND METHODS FOR ARRANGING NODES FOR DISTRIBUTION OF DATA OVER A COMPUTER NETWORK - Various embodiments of the present invention relate to a system for distributing data (e.g., content data) over a computer network and a method of arranging receiver nodes in a computer network such that the capacity of a server is effectively increased (e.g., the capacity of a server may be effectively multiplied many times over; the capacity of the server may be effectively increased exponentially). In one embodiment the present invention may take advantage of the excess capacity many receiver nodes possess, and may use such receiver nodes as repeaters. The distribution system may include node(s) having database(s) which indicate ancestor(s) and/or descendant(s) of the node so that reconfiguration of the distribution network may be accomplished without burdening the system's primary server. An embodiment of the present invention may include a process for configuring a computer information distribution network having a primary server node and user nodes docked in a cascaded relationship, and reconfiguring the network in the event that a user node departs from the network. In one example (which example is intended to be illustrative and not restrictive), the process may include the steps of providing a new user node (or connection requesting user node) with a connection address list of nodes within the network, having the new user node (or connection requesting user node) go to (or attempt to go to) the node at the top of the connection address list, determine whether that node is still part of the distribution network, and connect thereto if it is, and if it is not, to go to (or attempt to go to) the next node on the connection address list. In another example (which example is intended to be illustrative and not restrictive), when a user node departs from the distribution network, a propagation signal may be transmitted to the nodes below it in the network, causing them to move up in the network in a predetermined order. In another example (which example is intended to be illustrative and not restrictive), the present invention may provide a decentralized approach which provides, to each new user node (or connection requesting user node) a path back to the root server.12-10-2009
20090307347Using Transaction Latency Profiles For Characterizing Application Updates - One embodiment is a method that determines transaction latencies occurring at an application server and a database server in a multi-tier architecture. The method then analyzes the transaction latencies at the application server with Central Processing Unit (CPU) utilization during a monitoring window to determine whether a change in transaction performance at the application server results from an update to an application.12-10-2009
20090307344WEB PAGE RANKING METHOD AND SYSTEM BASED ON USER REFERRALS - A system and method for ranking web pages based on referrals sent from one user to another. Web pages that are sent to other users are tracked and their information is stored in a referral depository coupled to a referral server. Referral messages are also tracked when the recipient accesses the referred web page and when the recipient further refers the web page to another user. A ranking server can respond to a query regarding accessed web pages by accessing the referral depository and analyzing its contents.12-10-2009
20090113045System and method for an integrated DSL/cable modem performance test - A modem, method, and system is presented for performing a data communications speed test or line speed test between a network node and a customer premises. The modem may be configured to perform calculations for determining the data communications speed without interference of network elements or overhead modules that cause data communications to be inaccurate or otherwise affected.04-30-2009
20100274892Method for Monitoring a message associated with an action generated by an element or the user of an IS, and corresponding computer software product, storage means and device - The invention relates to a method for monitoring at least one message, each message being associated with an action generated by at least one element or user of an information system (10-28-2010
20110270982SYSTEM AND METHOD FOR UPDATING INFORMATION USING LIMITED BANDWIDTH - A system and method detects an amount of data attributed to a device including reports sent to the device, and reduces the amount of data being used to provide reports to the device if the amount of data attributed to the device exceeds an amount assigned to the device. Data uploaded from the device is also minimized.11-03-2011
20120191852NETWORK EVALUATION GRID TECHNIQUES - Network evaluation grid techniques are presented. Local specifications for traffic patterns are evaluated for local traffic on local grids of a grid computing environment and reported out. The local traffic reported out is then evaluated in response to global traffic pattern specifications and a global traffic policy in order to identify one or more remedial actions to take or to recommend in response to that evaluation.07-26-2012
20120191851HTTP Streaming With Proved Service Quality - This invention relates to a method for streaming a media file to an end user using a hypertext transfer protocol HTTP, wherein a proxy monitors HTTP messages for detecting a streaming of the media file using HTTP. When a HTTP message is received, the proxy determines bearer parameters required for streaming the media file and determines whether a bearer meeting an appropriate service quality is necessary. If necessary, the proxy triggers a provision of the bearer meeting with said appropriate service quality.07-26-2012
20120191849Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID.07-26-2012
20120191848METHOD AND APPARATUS FOR DISCOVERING PEOPLE, PRODUCTS, AND/OR SERVICES VIA A LOCALIZED WIRELESS NETWORK - Electronic devices may exchange messages over a localized wireless network to discover persons, products, and/or services. The exchanged messages may comprise personalize messages that enable the users of the devices to connect (e.g., via a social networking website). The messages may enable the wireless exchange of feedback and recommendations. The messages may comprise advertisements which generate pay-per-click revenues. The messages may be generated and/or transmitted in accordance with a low-power wireless protocol such as ISO 18000-7.07-26-2012
20120191847METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SCREENING DIAMETER MESSAGES WITHIN A DIAMETER SIGNALING ROUTER (DSR) HAVING A DISTRIBUTED MESSAGE PROCESSOR ARCHITECTURE - According to one aspect, the subject matter described herein includes a method for screening Diameter messages within a Diameter signaling router (DSR) having a distributed message processor architecture. The method includes steps occurring at a DSR comprising a plurality of Diameter message processors, each configured to perform at least one Diameter function. The steps include receiving, at an ingress Diameter message processor of the Diameter message processors, a Diameter message from a Diameter peer node. The steps also include identifying, at a Diameter application message processor of the Diameter message processors, a Diameter message screening rule associated with the received Diameter message. The steps further include performing, at the Diameter application message processor of the Diameter message processors, a screening function associated with the identified Diameter message screening rule on the received Diameter message.07-26-2012
20120191846MONITORING SYSTEM, MONITORING APPARATUS, MONITORING METHOD AND MONITORING PROGRAM - A monitoring system, includes a monitoring apparatus which monitors a monitored object equipment; and a managing server which manage a result of the monitoring apparatus monitoring the monitored object equipment, wherein the monitoring apparatus includes an information acquiring unit to acquire connection information, which is used for connecting with the managing server, from an information storing medium which stores the connection information, wherein in the case that the information acquiring unit acquires the connection information from the information storing medium, the monitoring apparatus connects with the managing server on the basis of the connection information to communicate with the managing server, and then sends the monitoring result to the managing server, and wherein the managing server acquires the monitoring result while the communication connection with the monitoring apparatus is maintained.07-26-2012
20120191845Methods and Systems for Executing Applications on Personal Digital Assistant Terminals - Methods, systems, non-transitory media comprising computer-readable instructions, and logic for obtaining information related to an application may include receiving, at a terminal device, data exchange information, including data transfer speed information, that is related to a data exchange between the terminal device and a web service. The method further may include storing, at the terminal device, at least a portion of the data exchange information received at the terminal device.07-26-2012
20120191844METHODS AND SYSTEMS FOR MANAGING DEVICE SPECIFIC CONTENT - Methods and apparatus for managing content may include receiving feedback information for content associated with a device having a set of device characteristics. The methods and apparatus may further include determining a compatibility rating of the content based on the feedback information. The methods and apparatus may also include providing a message based on a portion of the compatibility rating of the content for an other device having a portion of the set of device characteristics.07-26-2012
20120191843SYSTEMS AND METHODS FOR APPLICATION DEPENDENCY DISCOVERY - Systems and methods for discovering a set of applications that run on a network are disclosed. In accordance with one method, aggregate traffic volumes are determined for pairs of nodes on the network over a plurality of time intervals. The method further includes building a traffic matrix denoting each of the pairs of nodes and denoting respective aggregate traffic volume histories of each of the pairs of nodes that are based on the determined traffic volumes. In addition, the traffic matrix is formulated as a combination of bases vectors that model the set of applications. The bases vectors are determined by applying a covariance matrix adaptation evolutionary strategy based on the traffic matrix. An indication of the set of applications based on the bases vectors is output.07-26-2012
20120191842SCALABLE POLICY DEPLOYMENT ARCHITECTURE IN A COMMUNICATION NETWORK - Aspects describe using a Policy Access Gateway to facilitate scalability within a communication network and to provide a solution to deploy an enhanced policy gateway. The Policy Access Gateway can enhance standard defined Diameter Routing Agent (DRA) functions with session binding mechanisms. Further, the Policy Access Gateway is scalable and can be deployed in a very large network that supports hundreds of millions of users. Further, the Policy Access Gateway can provide additional policy information to enable policy information consolidation and caching capabilities.07-26-2012
20120191841SYSTEMS AND METHODS FOR RATING A CONTENT BASED ON TRENDS - A system for and method of rating a content is presented. The method may include receiving first user data associated with one or more contents for a first predetermined time period and second user data associated with the one or more contents for a second predetermined time period. The method may also include determining a first average of the first user data associated with the one or more contents for the first predetermined time period and a second average of the second user data associated with the one or more contents for the second predetermined time period. The method may further include determining a variance between the first average of the first user data associated with the one or more contents for the first predetermined time period and the second average of the second user data associated with the one or more contents for the second predetermined time period. The method may additionally include determining trend value of the one or more contents based at least in part on the variance between the first average of the first user data associated with the one or more contents for the first predetermined time period and the second average of the second user data associated with the one or more contents for the second predetermined time period.07-26-2012
20110016209NETWORK CHARACTERISATION - Methods and systems for assigning information indicative of a network characteristic to one of a plurality of data units traversing a path across a network, said data units having associated therewith values indicative of said network characteristic, said path having at least one portion passing through a lower-capability region and at least one portion passing through a higher-capability region, said lower-capability region being a region in which information indicative of said network characteristic may be represented by values having a first resolution, and said higher-capability region being a region in which information indicative of said network characteristic may be represented by values having a second resolution, said second resolution being greater than said first resolution, said one data unit being a data unit entering said higher-capability region.01-20-2011
20130073718TEST ANALYSIS SYSTEM OF NETWORK AND ANALYSIS METHOD THEREOF - The test analysis system of a network according to an exemplary embodiment of the present invention includes: a server group having at least one server performing at least any one of generation of real-time information and storage of a server local log according to test scenarios; a client group having at least one client. communicating with the server group and performing at least any one of the generation of the real-time information and the storage of the local log according to the test scenarios; and a monitoring system storing the real-time information as a system log while monitoring the real-time information received from the server group and the client group during the execution of the test scenarios and informing a test manager of the monitored real-time information.03-21-2013
20090094363METHOD, SYSTEM, CLIENT AND SERVER FOR LOCATING OPERATION NODES IN COMMUNICATION SYSTEM - The present disclosure relates to the field of mobile communication technologies, and provides a method for locating operation nodes in a communication system. The method includes using an identifier in the received message to obtain an adjusted path from the root node of the management tree of the client to the standard management object corresponding to the identifier, using the message to obtain a relative path between the target operation node and the root node of the standard management object on the management tree, concatenating the adjusted path with the relative path, and locating the target operation node according to the concatenated path. The present disclosure also provides a system for locating operation nodes, a client for locating operation nodes in a communication system, and a server for performing management operations for clients.04-09-2009
20090094359Local Area Network Management - There is provided a method for managing a Local Area Network (LAN) having at least one video server in signal communication with a plurality of clients. In one embodiment of the present invention, the method includes providing a lossless Transmission Control Protocol/Internet Protocol (TCP/IP) Virtual Local Area Network (VLAN) fabric within the LAN. The method further includes providing a shared file system on the at least one video server. Moreover, the method includes deterministically managing isochronous access to the shared file system on the at least one video server by the plurality of clients, over the VLAN fabric, utilizing at least one Internet Small Computer System Interface (ISCSI) block protocol, to provide lossless delivery of video applications from the at least one video server to any of the plurality of clients without invoking TCP error recovery mechanisms.04-09-2009
20090094357ROGUE ROUTER HUNTER - A computer implemented method, data processing system, and computer program product for discovering an unauthorized router in a network. The process in the illustrative embodiments first obtains a physical address of a suspected router or destination device. A data packet is created which comprises at least a destination media access control field, a destination internet protocol field, and a time-to-live field, wherein the destination media access control field comprises the physical address of the destination device, wherein the destination internet protocol field comprises a bogus internet protocol address, and wherein the time-to-live field comprises a value indicating the data packet has exceeded a time limit. The data packet is sent to the destination device using the physical address in the destination media access control field. If a time exceeded message is received from the destination device, the destination device is determined to be enabled for routing.04-09-2009
20130073727SYSTEM AND METHOD FOR MANAGING DATA DELIVERY IN A PEER-TO-PEER NETWORK - A system and method for managing content data transfers in a peer-to-peer communications network is described. The system includes a hierarchical arrangement of tracker modules, each tracker module being responsible for managing a tracker domain of network elements. Each tracker module has stored therein a content table including a record of content data available to the network elements within its respective tracker domain. Each tracker module responsible for a tracker domain containing end user peers is configured so that, if a content data request is received from a requesting peer in its respective tracker domain and the requested content is held by other peers in that tracker domain, a list of peers having the content data stored thereon is sent to the requesting peer. If the requested content is not held by enough other peers in that tracker domain, the content data request is transferred to the next tracker module up in the hierarchy.03-21-2013
20130073726RESTARTING EVENT AND ALERT ANALYSIS AFTER A SHUTDOWN IN A DISTRIBUTED PROCESSING SYSTEM - Restarting event and alert analysis after a shutdown in a distributed processing system includes identifying a shutdown condition of the distributed processing system; determining whether the shutdown was a planned shutdown or an unplanned shutdown; if the shutdown was planned, storing an identification of the last event in an event log that was injected in an event queue at the time of the planned shutdown and restarting event and alert analysis using the next event identified in the event log; and if the shutdown was unplanned, for each event analyzer, identifying the last event included in the last event pool that the event analyzer closed; and restarting event and alert analysis at the event analyzer using the next event received by the event analyzer after the identified last event.03-21-2013
20130073725SYSTEM AND METHOD FOR AUTOMATED CONTENT DISTRIBUTION - A system and method for automated content distribution is disclosed. A content distribution system includes a detector module for intercepting a network communication and verifying whether content is available for a client, and a notification module coupled to the detector module for notifying the client that the content is available. A method for content distribution includes intercepting a network communication, analyzing the network communication for determining whether content is available for a client, and notifying the client that the content is available.03-21-2013
20130073724Autonomic Workflow Management in Dynamically Federated, Hybrid Cloud Infrastructures - An autonomic workflow framework may include a federated cloud that includes a plurality of clouds, where each cloud in the federated cloud includes one or more nodes. An autonomic workflow framework may include a workflow manager configured to receive a workflow. The workflow may include a plurality of stages, and the workflow may be associated with a user objective. An autonomic workflow framework may include an autonomic scheduler in communication with the workflow manager. The autonomic scheduler may be configured to provision one or more of the one or more nodes to process the stages to achieve the user objective.03-21-2013
20130073723MATCHING ENGINE FOR COMPARING DATA FEEDS WITH USER PROFILE CRITERIA - An event notification matching system, including an event matching table forming a plurality of nodes. Each node is assigned a subscriber request value and contains identifiers for one or more subscribers to be notified at the occurrence of an event relating to the subscriber request value. The event notification matching system may also include a table index. The table index receives input values from an event processing module and selects one or more of the nodes that have subscriber request values corresponding to the received input values. The event processor receives event data from a predetermined source, and formats the input values to simplify the operations performed by the event matching table. The event notification matching system is configured such that the event data need not be compared to non-matching nodes in the event matching table.03-21-2013
20130073722Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future.03-21-2013
20130073721Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future.03-21-2013
20130073720METHOD AND APPARATUS FOR PROVIDING INFORMATION REGARDING A DEVICE - A method and apparatus of providing information regarding at least one device is provided. The method includes receiving location information and service information from an external device; and transmitting information regarding at least one device capable of providing a service based on according to the service information in a predetermined region based on the location information to the external device.03-21-2013
20130073719INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD - A disclosed information processing system includes a first apparatus including a storage unit storing types of events which occur in the first apparatus so as to be reported to an information processing apparatus via a network, and a sending unit sending, when one of the events stored in the storage unit occurs, event information of the event to the information processing apparatus; and the information processing apparatus including a delivery destination storage unit storing identification information of a second apparatus existing at a delivery destination of the event in the first apparatus, and a delivery unit sending the event information of the event to the second apparatus of which identification information is stored in the delivery destination storage unit when the event information is received by the information processing apparatus.03-21-2013
20130073717OPTIMIZING CLUSTERED NETWORK ATTACHED STORAGE (NAS) USAGE - A system and associated method for optimizing usage of a clustered-network attached storage (NAS). An administration module of the clustered NAS calculates a number of nodes in the clustered NAS necessary to service a required amount of load for a specific number of client systems, and a number of addresses associated with the nodes through which the client systems accesses the clustered NAS. The load is evenly shared by all client systems and uniformly serviced by the nodes of the clustered NAS. When a node fails, the rest of operating nodes in the clustered NAS take over addresses associated with the failed node and evenly share additional load associated with an address taken from the failed node to provide seamless services for the production by the client systems.03-21-2013
20130073716DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center.03-21-2013
20130073715METHODS AND APPARATUS FOR REMEDIATING POLICY TEST FAILURES, INCLUDING CORRELATING CHANGES TO REMEDIATION PROCESSES - Disclosed herein are methods, systems, and articles associated with correlating detected changes within a computer network with remediation processes performed in response to policy test failures. In embodiments, on determination that a failure of a policy test has occurred within a computer network having a number of nodes, a remediation process may be executed to remediate the failure. Change at a node may be detected. Further, the detected change may be correlated with the execution of the remediation process, and the correlation may be identified.03-21-2013
20130073714System and Method for Data Set Synchronization and Replication - According to one embodiment of the present disclosure, a method for synchronizing data sets includes receiving a request to synchronize a first data set associated with a first server and a second data set associated with a second server. The method also includes determining, with reference to one or more replication constraints, whether to begin synchronization. The method further includes applying one or more resource control actions in response to determining to begin synchronization.03-21-2013
20130073713Resource Selection Advisor Mechanism - A method, an apparatus and an article of manufacture for generating resource selection information. The method includes monitoring at least one resource and at least one resource change performed by at least one user, analyzing a user request, wherein the user request comprises resource parameter information, searching for at least one similar resource request based on the user request and on monitored information and generating an output based on analysis of the user request, wherein the output comprises at least one candidate resource set and a corresponding rationale for selection of the at least one candidate resource set based on historical data.03-21-2013
20130060939METHOD FOR CHECKING WHETHER PROGRAM INSTRUCTIONS HAVE BEEN EXECUTED BY A PORTABLE END DEVICE - A method and a system for checking whether program instructions have been executed by an end device, wherein, the end device calls for program instructions and the program instructions are stored in executable form in a trustworthy entity, in particular a chip card. Subsequently, the program instructions are variably modified in the trustworthy entity such that the modified program instructions vary upon each execution of the method. Through execution of the instructions in the end device there is obtained a check value which is in turn transferred to the trustworthy entity and verified in the trustworthy entity.03-07-2013
20130060938METHOD AND SYSTEM FOR MONITORING OF ASPECTS FOR USE BY A TRIGGER - A method and apparatus within a computing execution environment for establishing monitoring of an instance of a context for an observer, including receiving, from a PAL client, a message at the PAL server, the message; requesting establishment of a presence context; resolving an aspect based on the message to establish the presence context, the presence context providing a simplified or abstracted view of presence information on behalf of the PAL client; and placing the presence context into at least one of a monitoring state and a monitoring-capable state if a trigger is associated with the aspect.03-07-2013
20130060934SECURE ELECTRONIC ELEMENT NETWORK - A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element.03-07-2013
20130060937SYSTEM AND METHOD FOR FAST FILE TRACKING AND CHANGE MONITORING - Embodiments are directed towards a dynamic change evaluation mechanism, whereby items having a detected possible change are scheduled for re-evaluation for possible changes at a higher frequency than items detected to not have previously changed, while those items detected as not to have changed are dynamically scheduled for re-evaluation based on an evaluation backlog that may be in turn based, in part, on a time from when an item is assigned an expiration time to when the item is evaluated. In one embodiment, a possibly changed item may be assigned a new expiration time independent of the evaluation backlog. In another embodiment, if no change is detected, then the item may be assigned a new expiration time as a function of a previous expiration time and on the evaluation backlog.03-07-2013
20130060935SYSTEM AND METHOD FOR CREATING A DATA DISPLAY TO MONITOR STATUS OF A RELATIONSHIP BETWEEN TWO INDIVIDUALS - Embodiments of the invention include a system and method for monitoring status of a relationship between two individuals. Using a computer network or mobile network, the two individuals in the relationship create profiles, each profile including a sub-profile of input variables. These customizable input variables correspond to behavior conducive to the relationship. The first individual enters data by tallying observed behaviors of the second individual corresponding to each particular input variable, and the second individual enters data by tallying observed behaviors of the first individual corresponding to each particular input variable. A visual representation is displayed based upon the entered data and the sub-profile. The system is presented on a mobile device of each individual connected to a network, so that each individual can easily enter data, view the display, and monitor status of the relationship. Status, reminder, tips, rewards, comments, and notifications are additional parts of the invention.03-07-2013
20130060933CLOUD SERVICE MONITORING SYSTEM - A cloud services monitoring system (CSMS) helps a consumer of cloud computing resources determine the state of the cloud computing resources available to the consumer. The CSMS is particularly effective for cloud models where the consumer of the cloud computing resources is not the same as the provider of the cloud resource. The CSMS 03-07-2013
20130060932DISCOVERING TIERS WITHIN AN APPLICATION - A method for discovering tiers within an application includes monitoring network traffic. A periodic report may be assembled based on the network traffic. Tiers may be discovered using the periodic report.03-07-2013
20130060936Backup Coverage in a Wireless Network - Concepts and technologies are disclosed herein for identifying backup coverage in wireless networks. An active network resource to be analyzed is identified, and a at least one potential backup network resource is identified. The at least one potential backup network resource is evaluated to determine if the at least one potential backup network resource is available to function as the backup coverage for the active network resource. If the at least one potential backup resource is available to funtion as the backup coverage for the active network resource, a power management parameter associated with the wireless networking environment can be updated.03-07-2013
20130060931CONTENT DELIVERY SESSION ACCOUNTING FOR ACCESS/NETWORK SERVICE PROVIDER - An edge node of an Access/Network Service Provider (ANP) network tracks the delivery into the ANP network of content from Contzzent Providers (CP), and generates accounting sessions with an accounting server. The edge node is provisioned with the IP addresses of known CP servers. A content delivery session, characterized by a CP IP address and a content identifier, such as a Differentiated Service Code Point (DSCP) value, is started upon the source IP address of a packet matching a known CP, and a packet count is incremented for each subsequent packet from the CP with the same content identifier. An accounting session is initiated with an accounting server when the content delivery session is started, and the accounting session is terminated, with the packet count for the session, upon a time-out since the last packet received. Multiple content delivery sessions may be ongoing simultaneously.03-07-2013
20130060930SYSTEMS, METHODS, AND INTERFACES FOR ANALYZING WEBPAGE PORTIONS - A method includes aggregating a set of analyzed webpage portions from at least two unaffiliated websites. The method also includes transmitting an aggregated result, the aggregated result associated with an aggregated set of analyzed webpage portions. Another embodiment includes the set of analyzed webpage portions being associated with a topic. Yet another embodiment includes receiving an indication of an occurrence of a browser event and analyzing, in response to receiving the indication, a webpage portion then storing an analyzed webpage portion and the browser event in a database. Yet another embodiment includes analyzing the webpage portion by downloading a webpage portion from at least one website, extracting a text portion from the webpage portion and associating, in response to extracting the text portion, at least one topic from the text portion.03-07-2013
20130060929DISTRIBUTED CONTROL PLATFORM FOR LARGE-SCALE PRODUCTION NETWORKS - Some embodiments provide a program that monitors several network controllers in a network. Each network controller manages a logical data path set that is implemented across several managed switching elements. The program detects that a first network controller in the several network controllers has failed. The program selects a second network controller in the several network controllers to manage the logical data path set managed by the first network controller.03-07-2013
20090300175INFORMATION PROCESSING APPARATUS, CONTROL METHOD OF INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM OF STORING COMPUTER PROGRAM TO PERFORM CONTROL METHOD - In a search server, a search request for searching for a device is received from a client PC, the device satisfying a search condition included in the received search request is searched for, and a searched result is transmitted to the client PC. Further, it is judged whether or not an apparatus at a transfer destination to which the search request is transferred has been registered in the search server. If it is judged that the apparatus at the transfer destination has been registered in the search server, the search request is transferred to the registered apparatus at the transfer destination based on the received search request.12-03-2009
20090271514SYSTEM AND METHOD FOR MONITORING USER INTERACTION WITH WEB PAGES - Systems and methods for monitoring usage of an electronic device are disclosed herein. A client component in stalled in a client device is operative to monitor usage of the client device in accordance with a monitoring profile, and to generate corresponding usage data. The monitoring profile typically includes information specifying which features of which application programs are to be disabled on the client device. A server component, installed on a server device in communication with the client device, provides the monitoring profile to the client device and receives the usage data from the client device.10-29-2009
20090271513Method and system for adaptive data transfer over packet networks - There is provided a method for adaptive data transfer over packet networks. The method comprises selecting a first communication path for transferring the data to the second computer, starting to transfer the data over the first communication path to the second computer, monitoring transfer characteristics of the first communication path related to the data transfer, storing the transfer characteristics associated with the first communication path in a database, comparing the transfer characteristics against one or more previously stored transfer characteristics related to one or more prior data transfers, and determining whether to alter a transfer algorithm being utilized for transferring the data to the second computer based on the comparing.10-29-2009
20090271512TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) PACKET-CENTRIC WIRELESS POINT TO MULTI-POINT (PtMP) TRANSMISSION SYSTEM ARCHITECTURE - A packet-centric wireless point to multi-point telecommunications system includes: a wireless base station communicating via a packet-centric protocol to a first data network; one or more host workstations communicating via the packet-centric protocol to the first data network; one or more subscriber customer premise equipment (CPE) stations coupled with the wireless base station over a shared bandwidth via the packet-centric protocol over a wireless medium; and one or more subscriber workstations coupled via the packet-centric protocol to each of the subscriber CPE stations over a second network. The packet-centric protocol can be transmission control protocol/internet protocol (TCP/IP). The packet-centric protocol can be a user datagram protocol/internet protocol (UDP/IP). The system can include a resource allocation means for allocating shared bandwidth among the subscriber CPE stations. The resource allocation is performed to optimize end-user quality of service (QoS). The wireless communication medium can include at least one of: a radio frequency (RF) communications medium; a cable communications medium; and a satellite communications medium. The wireless communication medium can further include a telecommunications access method including at least one of: a time division multiple access (TDMA) access method; a time division multiple access/time division duplex (TDMA/TDD) access method; a code division multiple access (CDMA) access method; and a frequency division multiple access (FDMA) access method.10-29-2009
20090271511AUTOMATIC CONTEXT-BASED BASELINING FOR TRANSACTIONS - Application health is determined by calculating baseline deviation for one or more transactions based on past data having the same context as current data being examined. The performance data is generated in response to monitoring one or more applications that perform transactions during a time period. The performance data may include transaction metric data and the context data describing conditions under which one or more transactions were performed. A baseline is determined by predicting current or recent transaction performance data values using past transaction performance data associated with the same context. Based on the comparison of the actual and predicted data with the same or similar context, a deviation from the baseline value is determined for the transaction and reported, for example to a user through an interface.10-29-2009
20090271510NETWORK STATE PLATFORM - A network state platform for managing a network having a number of network nodes is disclosed. A user provides a policy layer a high level instruction indicative of the desired network performance. The policy layer parses the high level instruction to generate a number of configuration instructions for the network nodes. The network nodes provide data logs of their activity to a data layer that collates the logs into a single entry that is stored, and can be accessed by an observation layer. External applications interface with the observation layer to access the stored data and use this information to generate requests to change portions of the network configuration. These requests are provided to a control layer that converts the requests from the applications to a high level instruction that is then provided to the policy layer to implement.10-29-2009
20090271509PROBABILISTIC AGGREGATION OVER DISTRIBUTED DATA STREAMS - In one embodiment, a method of monitoring a network. The method includes, at each node of a set, constructing a corresponding vector of M components based on a stream of data packets received at the node during a time period, the set including a plurality of nodes of the network, M being greater than 1; and estimating a value of a byte traffic produced by a part of the packets based on the constructed vectors, the part being the packets received by every node of the set. The constructing includes updating a component of the vector corresponding to one of the nodes in response to the one of the nodes receiving a data packet. The updating includes selecting a component of the vector to be updated by hashing a property of the received data packet.10-29-2009
20090271508METHOD AND APPARATUS FOR PROVIDING A MEASUREMENT OF PERFORMANCE FOR A NETWORK - A method and an apparatus for providing a measurement of performance for a network are disclosed. For example, the method sends a plurality of multi-objective probes on a path, and receives one or more of said plurality of multi-objective probes for the path. The method then determines a plurality of performance measurements.10-29-2009
20090271507SYSTEM AND METHOD FOR ASSISTED ADMINISTRATION OF REMOTE DEVICE UPDATES - The subject application is directed to a system and method for assisted administration of remote device updates. Device data is first received for each networked document processing device that includes data representing the current state of the hardware and software associated with each of the networked document processing devices. Update data is then received including the identity and availability of revised software. A comparison of the update data with the device data is performed. The compatibility of the received update data is determined based upon the comparison, and a display is generated representing each of the compatible devices. Selection data is then received corresponding to each displayed document processing device. The revised software is thereafter communicated to each document processing device identified by the selection data. The revised software is then installed on each device to which it was communicated.10-29-2009
20090077226METHOD AND SYSTEM OF AUTO-MONITORING NETWORK PORTS - A method of auto-monitoring network ports includes the steps of: receiving at least one path of an application program; detecting whether or not the application program represented by the received path needs at least one network port; notifying a router to open the relative network port required by the application program if the detecting result indicates that the application program needs the network port; and notifying the router to close the relative network port required by the application program if the detecting result indicates that the application program no longer needs the network port. Hence, the present invention can achieve the purpose of exempting users from a mandatory setup of network ports for the router according to different application programs.03-19-2009
20090070463Preliminary Classification of Events to Facilitate Cause-Based Analysis - The present invention provides methods and systems for performing preliminary cause-based classification of events in a computer or networked computer system. Methods are provided in which, based on an event message, cause-based preliminary classification of an associated event is performed. The result of the preliminary classification is used to facilitate subsequent cause-based analysis, such as root cause analysis, relating to the event. Methods are provided in which preliminary classification is performed using a database including a catalog associating event messages with appropriate preliminary classifications of events associated with the event messages.03-12-2009
20120226801Network Appliance with Integrated Local Area Network and Storage Area Network Extension Services - Techniques and a network appliance apparatus are provided herein to extend local area networks (LANs) and storage area networks (SANs) beyond a data center while converging the associated local area network and storage area network host layers. A service flow is received at a device in a network. It is determined if the service flow is associated with storage area network or with local area network traffic. In response to determining that the service flow is storage area network traffic, storage area network extension services are performed with respect to the service flow in order to extend the storage area network on behalf of a remote location. In response to determining that the service flow is local area network traffic, local area network extension services are performed with respect to the service flow in order to extend the local area network on behalf of the remote location.09-06-2012
20120226797Active Load Distribution for Control Plane Traffic Using a Messaging and Presence Protocol - Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server devices that are configured to manage traffic for messaging and presence clients communicating via a messaging and presence protocol. The control plane traffic is associated with the messaging and presence protocol. A determination is made as to when the control plane traffic load level has become unbalanced among the two or more server devices and in response to determining that the control plane traffic load level has become unbalanced, sending a transfer message to one or more clients comprising information configured to initiate migration of one or more clients from a server device that is relatively overloaded to a server device that is relatively underloaded in order to balance the control plane traffic load level among the two or more server devices.09-06-2012
20120226796SYSTEMS AND METHODS FOR GENERATING OPTIMIZED RESOURCE CONSUMPTION PERIODS FOR MULTIPLE USERS ON COMBINED BASIS - Embodiments relate to systems and methods for generating optimized resource consumption periods for multiple users on a combined basis. A set of aggregate usage history data can record consumption of processor, software, or other resources subscribed to by a set of users, in one cloud or across multiple clouds. An entitlement engine can analyze the usage history data to identify a subscription margin for the subscribed resources, reflecting collective under/over-consumption of cloud resources by the users against subscription limits. The entitlement engine can track the short-term subscription margin for one or multiple resources over hours of a day, or over other intervals. The entitlement engine can thereby generate a set of variable or dynamic consumption periods over which to track the resource consumption, based on trends or conditions demonstrated in that consumption pattern by the set of users on a combined basis. Combined consumption can be metered on smaller, larger, and/or more rapidly changing intervals when the collective consumption rate is rapidly changing.09-06-2012
20130067078SYSTEM AND METHOD FOR PROVIDING A SCRIPT-BASED COLLECTION FOR DEVICES IN A NETWORK ENVIRONMENT - A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The method also includes executing script provided in the network element, which is configured for exchanging packets in a network environment. The script initiates a collection of data being retrieved from the end device. The data can be Fault, Configuration, Accounting, Performance, and Security (FCAPS) data associated with the end device. The data collected from the end device is communicated to a next destination.03-14-2013
20130067077PROMOTION OF PERFORMANCE PARAMETERS IN DISTRIBUTED DATA PROCESSING ENVIRONMENT - A method of performance monitoring in a data processing environment is provided. The data processing environment includes multiple systems, each of which has resources. Each resource relates to a resource type, wherein at least one performance parameter is defined for each resource type. The method includes determining a value of the at least one performance parameter for at least one resource, aggregating performance parameter values and related resources of a resource type, creating for at least a part of the resources a next predefined aggregation level which includes all resources relating to the resource type and associating all performance parameter values to this aggregation level, and repeating the creating for at least a part of the resources a next predefined aggregation level until a predefined target aggregation level of the data processing environment has been reached.03-14-2013
20130067076INCREMENTALLY IMPROVED AUTO-DISCOVERY OF NETWORK DEVICES - The embodiments improve the results of an auto-detection of network devices responsive to the causes of detection failures in preceding runs of the auto-detection process. The network may comprise various devices that are believed to be in the network. If a device that is believed to be in the network, but is undiscovered, the embodiments identify the device and information regarding the cause or causes of non-discovery. In response, the discovery parameters are modified, based on the causes associated with the undiscovered devices. The extent to which the discovery parameters are modified is based various criteria, such as the characterization of the network, or upon the detection of changes to the network.03-14-2013
20090031025Load optimization - Methods, computer code, and means are described that can control load in a network. In some applications, the monetary cost of operating the network can be reduced. Utilization of links in the network can be monitored. A degree of suboptimality with respect to some criteria can be assessed. In some instances, the criteria could be based at least partly one or more monetary billing structures of some subset of two or more links. A subset of the forwarding decisions of one or more forwarding nodes in the network can be adjusted automatically, based at least partly on the assessing. The adjustment can attempt to reduce the degree of suboptimality.01-29-2009
20090031024Method and System for Monitoring Server Events in a Node Configuration by Using Direct Communication Between Servers - In a method and system for monitoring events occurring at respective servers of a configuration of nodes, a first server located at a first node receives information from a messaging system pertaining to events at servers located at other nodes. The messaging system usefully comprises a highly available (HA) bulletin board or the like. When the first server receives a start event notification pertaining to a second server located at a second node, a direct communication path is established between the first and second servers. The first server identifies events in the second server that affect or are of interest to services of the first server. The first server then registers with the second server, to receive notification through the direct communication path when respective identified events occur.01-29-2009
20090031023Digital File Path Tracker (DFPT) Technology for Tracking Comsumption of Digital Content - Digital File Path Tracker (DF′PT) technology for tracking consumption of digital content for business information purposes, digital content distribution purposes, online multiplayer gaming environments, and the like. Tracking consumption of digital content is achieved by provisioning digital files with a so-called DF′PT for including consumption information regarding their Server consumption, and providing a DFTP mechanism for iteratively updating DFPTs.01-29-2009
20090031022Multi-Hierarchy Latency Measurement in Data Centers - A method for monitoring performance of a data center that includes: (a) a performance monitor analyzing packets that flow between a client and a web or application server; (b) assigning packets to contexts where a context is a request-reply entity; (c) determining one or more of application, network, and back-end latency measures wherein: (i) the application latency measure is a time it takes for an application to respond to a request, (ii) the network latency measure is a time that it takes for packets to go through a network between the client and the web or application server, and (iii) the back-end latency is a time required for a back-end system to execute a request and respond to the application server.01-29-2009
20090031021TRANSMITTING/RECEIVING METHOD OF SVC FILE AND APPARATUS THEREOF - In the conventional content, a minimum access unit of the random access information is one frame unit. In the case of SVC video content, one frame consists of a plurality of scalable layers. The SVC data can be used for each salable layer only when the data is accessible for each scalable layer. The present invention provides a method and apparatus for transmitting and receiving an SVC file for each scalable layer wherein the SVC file can be accessed for each scalable layer by allowing metadata to contain a layer descriptor in a network abstraction layer unit (NALU) or in a byte unit.01-29-2009
20090031019Technique for Graphically Displaying Application Processing Time Distributions in Real-Time - A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times.01-29-2009
20090031018Web based fault detection architecture - A remote analysis system for equipment condition monitoring and the like, using a data acquisition device operable at the remote site of monitored equipment, a wide area network for communication of data to an analysis server, and an empirical model for analyzing operational performance based on data from the device. An information processor such as a personal computer (PC) or an embedded processor application is coupled to the data acquisition device for collecting signals indicative of the monitored machine or process. A communications network, such as a wireless or telephony network, or a wide area network application such as an intranet or the Internet, facilitates communications to an analysis server for conveying the collected signals to an application service provider (ASP) for analysis of the remotely monitored site. A communications server may also be used for facilitating communications via a number of different communications networks. A notification server is provided responsive to the analysis server for completing a notification procedure for a customer subscribing to the ASP services for remote analysis with the data acquisition device at the process-monitoring site. The customer may be notified through a variety of electronic or telephonic communication methods, including, e-mail, facsimile, telephone calls, or subscriber dial-up and the like.01-29-2009
20130067075SYSTEM AND METHOD FOR EVALUATING COVERAGE OF SERVICES BY COMPONENTS OF AN IT INFRASTRUCTURE - Embodiments of the invention provide a system and method of evaluating compliance by components of an IT computer infrastructure with a policy by comparing a recipient component of a service that is identified by a component providing such service, to an identity of a component providing such service that is identified by a component receiving of such service.03-14-2013
20130067074FLOW TOPOLOGY OF COMPUTER TRANSACTIONS - A visualization of a topology of a flow of multiple transactions is generated. A first computer system receives a current transaction initiation request from a precursory transaction. The current transaction initiation request is for an initiation of a current transaction in the first computer system, and the precursory transaction is part of a flow of other transactions that are upstream from the current transaction. The current transaction initiation request contains parameter information that holds a hop count, which identifies how many computer systems have received other transaction initiation requests in the flow of other transactions, and a transaction initiation count, which identifies how many transaction initiation requests have been transmitted in the flow of other transactions. A processor generates a visualization of a topology map of the current transaction and the other transactions based on information in the parameter information from the current transaction initiation request.03-14-2013
20130067073NETWORK DELAY ANALYSIS INCLUDING PARALLEL DELAY EFFECTS - The embodiments facilitate the analysis of application delays, including delays that occur on multiple paths. A trace file of an application's network events is processed to categorize the causes of delays incurred in the propagation and processing of these events. The system identifies the amount of delay that can be eliminated by eliminating each of the components of delay individually, as well as the amount of delay that can be eliminated by eliminating combinations of the delay components. A user interface displays the amount of reduction that can be achieved by eliminating various delays alone or in combination. The interface also allows the user to view the individual delay components contained in combinations of delay components. In this manner, the user is provided a view of each of the delay components that would need to be addressed, either individually or in combination, to improve the overall application delay.03-14-2013
20130067072MONITORING REMOTE ACCESS TO AN ENTERPRISE NETWORK - Techniques to provide an improved representation of remote network access for a network administrator managing and controlling access to resources on an enterprise network. The representation indicates resources accessed by a remote computer or by a user of that computer and provides associated information useful for managing remote network access. To create the representation, multiple security associations formed between a remote client computer and resources on the enterprise network are associated with entity sessions, based on identical session identifiers generated for each security association within an entity session. The entity sessions may be aggregated into a to DirectAccess “connection” between the remote client computer and the enterprise network, based on an identity of the remote client computer. Resources accessed over the connection may be identified using a session identifier of each entity session so that security associations in that entity session may be matched with the resources.03-14-2013
20130067070System and Method for Indirectly Classifying a Computer Based on Usage - A server computer receives web request events corresponding to web requests issued by users. Each web request event includes: a cookie that identifies the user computer that originated the corresponding web request; an IP address corresponding to the user computer; and a date/time stamp indicating when the corresponding web request was received at a web server. The server stores the web request events. The server selects a subset of the web request events, all of which are associated with the same cookie. Then the server computes a geographical location corresponding to the user computer, where the computation uses the IP address associated with the web request event. The server determines the local time and day of week corresponding to the web request. The server then classifies the user computer based, at least in part, on a usage pattern corresponding to the web request events in the subset.03-14-2013
20130067069FLOW TOPOLOGY OF COMPUTER TRANSACTIONS - A visualization of a topology of a flow of multiple transactions is generated. A first computer system receives a current transaction initiation request from a precursory transaction. The current transaction initiation request is for an initiation of a current transaction in the first computer system, and the precursory transaction is part of a flow of other transactions that are upstream from the current transaction. The current transaction initiation request contains parameter information that holds a hop count, which identifies how many computer systems have received other transaction initiation requests in the flow of other transactions, and a transaction initiation count, which identifies how many transaction initiation requests have been transmitted in the flow of other transactions. A processor generates a visualization of a topology map of the current transaction and the other transactions based on information in the parameter information from the current transaction initiation request.03-14-2013
20130067068EVENT-DRIVEN DETECTION OF DEVICE PRESENCE FOR LAYER 3 SERVICES USING LAYER 2 DISCOVERY INFORMATION - Techniques for detecting presence of a remote device at Layer 2 in response to an indication of an attempt to use the device and without maintaining a Layer 3 connection to the device. The techniques allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection to the remote device to provide services to a user. The Layer 3 connection and underlying Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated when the Layer 3 connection is not actively used. Once use of the remote device is desired, its presence may be detected using a Layer 2 device discovery mechanism and the Layer 2 and Layer 3 connections to the device may be reestablished. Services provided at Layer 3, such as steaming data, may then be performed over the reestablished Layer 3 connection.03-14-2013
20130067065DETECTING DEVICE PRESENCE FOR A LAYER 3 CONNECTION USING LAYER 2 DISCOVERY INFORMATION - Techniques for monitoring presence of a remote device at Layer 2 that allow reducing power consumption without compromising the device's availability. A device that pairs with a remote wireless device may establish a Layer 3 connection, such as an IP connection, to the remote device to provide services to a user. The Layer 3 connection may be formed over a Layer 2 connection via an access point or as a peer-to-peer wireless connection between the devices. When the Layer 3 connection is not actively used to access the remote device, the Layer 3 connection and the supporting Layer 2 connection (e.g., WI-FI, WI-FI DIRECT™ or BLUETOOTH®) may be terminated and presence of the remote device may be monitored using a Layer 2 device discovery mechanism. The Layer 2 and Layer 3 connections to the device may be reestablished when use of the remote device is desired.03-14-2013
20130067064NETWORK ADAPTIVE CONTENT DOWNLOAD - Techniques for managing content downloads to a computing device. The techniques include an agent on the computing device determining for each network of a plurality of networks available to the computing device, costs of downloading content and an exemption list. The exemption list includes content downloads that are exempted from costs charged by a particular network. The agent determines possible content downloads for the computing device. The agent also assesses potential costs associated with the possible content downloads based upon the costs and exemption lists determined for the plurality of networks. Based upon the assessment, the agent selects one of the networks for downloading at least part of the possible content downloads.03-14-2013
20130067063DYNAMIC KEEPALIVE PARAMETERS FOR REVERSE PATH VALIDATION IN COMPUTER NETWORKS - In one embodiment, a network device determines a path from itself to a source device in a computer network, where the source device utilizes the path in reverse to reach the network device. Based on determining a reliability of the path in reverse, the network device may dynamically adjust one or more keepalive parameters for keepalive messages sent on the path. Accordingly, the network device may then send keepalive messages on the path based on the dynamically adjusted keepalive parameters.03-14-2013
20130067062Correlation of Users to IP Address Lease Events - Techniques for correlation of users to IP address lease events are described herein. In one or more embodiments, an audit system is provided to collect IP address lease events from a DHCP server and authentication data from one or more sources of authentication data. The audit system may store the collected data in a common data store. The common data store may be searched to correlate the IP address lease events with authentication data. In this manner, a comprehensive record of the computers or devices used by a user within a given time period can be established through correlation of the historical IP address lease information from the DHCP server with the user login information from an authentication source. This may occur by matching events using timestamps of the events and the IP address and/or other common elements between two event sources.03-14-2013
20130067061Network Communication and Cost Awareness - Network communication and cost awareness techniques are described. In one or more implementations, functionality is exposed through one or more application programming interfaces (APIs) that is accessible to a plurality of applications of the computing device to perform network communication. Data is returned to one or more of the plurality of applications regarding a cost network used to perform the network communication.03-14-2013
20130067059Keep Alive Management - Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network.03-14-2013
20130067058PROVIDING EXTERNAL ACCESS TO SERVICE VERSIONS VIA A BUNDLE FRAMEWORK - A bundle entering a set of starting and active bundles within a bundle framework is detected by a controller bundle executed by a processor. It is determined whether a manifest of the bundle includes an extension header that identifies an application and an aliased additional version of the application. It is determined whether an active application proxy object that represents the application as an active service registered from a previously-started bundle already exists within a service registry. An inactive application proxy object that represents a defined entry point class of the application and an additional active application proxy object that represents a defined entry point class of the aliased additional version of the application are created. The created additional active application proxy object is registered as an additional service within the service registry of the bundle framework.03-14-2013
20130067060Wake Pattern Management - Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device is monitored and a traffic pattern is recognized in the monitored network traffic. An application of the computing device is identified that corresponds to the recognized traffic pattern and responsive to this identification, at least a portion of the identified application is woken.03-14-2013
20110022710LOCATION INFORMATION SERVICE METHOD - A location service method in a terminal includes: receiving a message including a first parameter with respect to an inner area determined based on a particular geographic area and a second parameter with respect to an outer area from a server; and checking whether or not the terminal leaves the particular geographic area through the parameters of the inner area and the outer area.01-27-2011
20110022708METHOD AND DEVICE FOR MEASURING THE TEMPORAL DRIFT OF AN ITEM OF ELECTRONIC EQUIPMENT CONNECTED TO A NETWORK - A method of measuring temporal drift of an electronic apparatus linked to a network and capable of providing a time-stamp including capturing at least two messages including a gauge reference time circulating around the network, and determining precision of the time-stamping function of the apparatus as a function of the gauge reference time and of a time-stamp provided by the apparatus. The apparatus can be a network analyser and each message captured includes at least one Ethernet frame including a gauge reference time in accordance with NTP (Network Time Protocol).01-27-2011
20110022707HIERARCHY FOR CHARACTERIZING INTERACTIONS WITH AN APPLICATION - Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).01-27-2011
20110022706Method and System for Job Scheduling in Distributed Data Processing System with Identification of Optimal Network Topology - The method of the present invention provides an automatic and optimised selection of the network topology for distributing scheduling of jobs on the computers of the modified network topology. The automatic and optimised selection of the network topology starts from the current topology and a desired number of additional connections. In this way the method of the present invention provides a higher convergence speed for the modified consensus algorithm in comparison, e.g., to a simple ring network. The method exploits the so called small-world networks. Small-world networks are more robust to perturbations than other network architectures. The preferred embodiment provides a workload scheduling system which is highly scalable to accommodate increasing workloads within a heterogeneous distributed computing environment. A modified average consensus algorithm is used to distribute network traffic and jobs amongst a plurality of computers.01-27-2011
20110022705METHOD AND APPARATUS FOR SUBSCRIPTION-BASED BANDWIDTH BALANCING FOR INTERACTIVE HETEROGENEOUS CLIENTS - A method or system for enabling client devices connected to a network to subscribe to a one or more multimedia signals available in a selection of bandwidths, based on an analysis of capabilities of the client, the quality of the connection, and the real-time changes in the ability of the client to process the signal.01-27-2011
20110022704METHOD AND SYSTEM FOR COLLECTING INFORMATION ON A USER VISIT - The present invention provides a computer implemented method and system for collecting information on a user visit for web analytics. An information collection module is sent to a client in response to a page opening request from the client. The information collection module is for collecting additional information on user visit of the client. Additional information on user visit and basic information on user visit of the client is obtained from a web service request. A web beacon request is generated based on the obtained information. The invention adopts a non-intrusive information collection manner that does not require modifying code of a web application and thus, is much simpler, feasible, and cost-effective than prior art. Further, centralized collection and management for the information on user visit can be implemented. Thus, it is more flexible and convenient for maintenance and optimization.01-27-2011
20110022703METHOD AND SYSTEM FOR ESTIMATING A NUMBER OF USERS OF A WEBSITE BASED ON LOSSY COMPRESSED DATA - The invention relates to a method and system for estimating a number of users of a website. According to the method, it is repeatedly determined that the website is accessed by an entity and data dependent on the entity is determined and stored. The stored data is repeatedly compressed using a lossy compressing algorithm and based on the compressed data a number of users of the website is estimated.01-27-2011
20110022702MECHANISM FOR DETECTING AND REPORTING TRAFFIC/SERVICE TO A PCRF - A method implemented by a policy server operating on a network to which is connected a device that performs a data packet inspection function, the method involving: sending a first message over the network from the policy server to the device, the first message instructing the device to detect an occurrence of a particular network traffic or service taking place over a connection on the network and to send a notification to the policy server upon detecting the occurrence of that particular network traffic or service; at the policy server receiving a notification from the device that the device has detected the occurrence of that particular network traffic or service; and in response to receiving the notification, sending a second message over the network from the policy server to a network component, the second message containing information associated with the notification.01-27-2011
20110022700Real World Network Testing Combining Lower Layer Network Tests, Application Layer Tests and Interdependent Interactions - Combining lower layer network tests and upper layer network tests is disclosed. A method includes receiving a user selection to create an upper layer test and a lower layer test, receiving upper layer test information and lower layer test information, displaying a first timeline showing the activity of the upper layer test in a first pane and a second timeline showing the activity of the lower layer test in a second pane. Synchronization between the lower layer tests and upper layer tests may be defined. The method allows for observing and ascertaining the impact of the lower layer tests on the upper layer tests. The method may be implemented in software, stored on a storage medium and performed on a network testing system that includes one or more network cards and in one or more network testing systems.01-27-2011
20110022699Method And System For PHY Initiated Wake-Up In Energy Efficient Ethernet Networks - One or both link partners coupled via an Ethernet link may comprise a PHY device operable to initiate a wake-up interval. The PHY device may monitor parameters that may indicate Ethernet link status. Exemplary parameters may comprise a timer, communication performance metrics and/or configuration parameters. From a low power mode, the PHY device may generate a wake state idle symbol based on the monitoring and may communicate it to a local and/or a remote MAC. The local and/or remote MAC may establish a wake-up interval. The wake-up interval may comprise synchronization, circuit adaption and updating of communication parameters, which may enable control of noise cancellation functions and/or equalization functions. One or both of the link partners may transition to a low power mode after the wake-up interval and/or to an active state after the wake-up interval.01-27-2011
20110022698DYNAMIC MANAGEMENT OF MAINTENANCE ASSOCIATION MEMBERSHIP IN A COMPUTER NETWORK - In one embodiment, a new maintenance end-point (MEP) may join a particular network (and initiate its sending of continuity check messages, “CCMs”) by transmitting one or more join announcement messages (JAMs). When the JAMs are received by remote MEPs in the particular network, the new MEP may be added to a configured list of MEPs within the particular network at each remote MEP without an alarm. Also, a current MEP may leave the particular network (and cease its transmission of CCMs) by transmitting one or more leave announcement messages (LAMs), which request removal of the current MEP from the configured list at each of the remote MEPs without alarms. Otherwise, transmission of CCMs (that are not JAMs or LAMs) may result in alarms being generated by the MEPs in the particular network for unexpected MEPs or missing MEPs, accordingly.01-27-2011
20110022697DYNAMIC RESOURCE COLLABORATION BETWEEN NETWORK SERVICE PROVIDERS - Service providers capable of dynamic resource collaboration and corresponding dynamic resource collaboration techniques are provided. In one embodiment, a network service provider includes a service server that processes service requests, a resource monitoring unit that monitors available computing resources of the service server and generates a resource request for supplementary computing resources from one or more collaborating network service providers based on the result of the monitoring, and a resource collaboration unit acquires supplementary computing resources from at least one of the collaborating network service providers.01-27-2011
20120117235Method, Apparatus and Computer Program for Enforcing Policy Across Associated Sessions Taking Into Account a Total Usage Quota for Associated User - A server configured to provide a policy decision point for a packet-based communication network. The server comprises a user account manager for maintaining and/or determining, for each of a plurality of users, an available total usage quota and a set of registered, linked connection identifiers. A request handler is provided for receiving from a policy enforcement point, a request for allocation of a quota in respect of a packet session associated with a specified connection identifier. A quota determiner responds to receipt of a quota request by determining a quota for said packet session taking into account the total usage quota for the associated user and any currently ongoing sessions associated with other connection identifiers belonging to the same set as said specified connection identifier. A responder is provided for sending the determined quota to said policy enforcement point.05-10-2012
20120117233USING SMART OBJECTS IN A VIRTUAL UNIVERSE TO CONSERVE COMPUTING RESOURCES - Described herein are some embodiments that use smart objects in a virtual universe to conserve computing resources. Some embodiments describe a first object that detects an indication to reduce resource usage of a computing resource that supports a virtual universe. Some embodiments further describe reducing, based on detection of the indication to reduce resource usage, display quality of the first virtual object according to an order of degrees of display quality reduction that corresponds to one or more degrees of resource reduction required for the computing resource. Further, some embodiments describe a second virtual object that is not reduced in display quality while simultaneously the first virtual object is reduced in display quality.05-10-2012
20120117232Device Identification and Monitoring System and Method - A method and system for collecting and recognizing information from a monitoring device is provided. On a mobile computer device a user can capture an image of a monitoring device. The image captures at least two aspects: (1) monitored data tracked or acquired by the monitoring device, and (2) a portion of the monitoring device sufficient to recognize the monitoring device. Recognition functions are provided for: (1) recognizing and converting the monitored data visible in the captured image into quantifiable data, and (2) for recognizing the monitoring device. A note taking function can be provided to allow a user to create notes. The notes can be enriched with the quantifiable data and/or the recognized monitoring device (or vice versa). A suggestion function can be provided for suggesting services where the quantifiable data, the recognized monitoring device, and/or the notes can be bound.05-10-2012
20120117228DYNAMIC TRAFFIC MANAGEMENT IN A DATA CENTER - A network element in a data center includes a plurality of servers and a switch. The switch includes a plurality of physical ports, a packet-forwarding table, and an application program interface (API) for modifying a packet-forwarding behavior of the switch. The packet-forwarding table determines a packet-traffic distribution across the servers by mapping packet traffic arriving at the switch to the plurality of ports. Each port of the plurality of physical ports is in communication with one of the servers. The network element further includes means for determining in real time the packet-traffic distribution across the servers, and means for dynamically changing the packet-traffic distribution across the servers in response to the determined packet-traffic distribution by modifying the packet-forwarding behavior of the switch through the API of the switch.05-10-2012
20120117227METHOD AND APPARATUS FOR OBTAINING FEEDBACK FROM A DEVICE - An apparatus and method for utilizing user feedback of a user device. The method includes obtaining usage data of a user device using an application programming interface (API) and creating a data file based on the obtained usage data. The data file is uploaded from the user device to an external server device where data analysis of the data file is performed and a result of the data analysis is generated. This result is presented using a display unit.05-10-2012
20120117226MONITORING SYSTEM OF COMPUTER AND MONITORING METHOD - There is provided a monitoring system capable of representing relationships of computer resources that virtual servers use in a tree structure and aggregating the performance statistics of the virtual resources sharing physical resources. The monitoring system has: a virtualization module that makes virtual computers operate; and a monitoring module for monitoring the physical computers and components of the virtual computers. The monitoring module designates the physical computer and the components of the virtualizing module as base resources, manages the components of the virtual computers as virtual resources, generates a platform tree by extracting a tree structure from the virtual resources and the components of the base resources for predetermined platforms, generates a service provision tree by extracting a tree structure having the base or virtual resources as starting points, and establishes a reference relationship for the components contained in the platform tree and also contained in the service provision tree.05-10-2012
20120117231MODEL-BASED DATA CENTER MANAGEMENT - Computer-readable media, systems, and methods for model-based data center management. In embodiments, a request to perform a management operation on a device in a data center is received and available paths to the device are determined. The paths are determined based on an artifact storing a topology of the data center. Further, a current favored path that is one of the available paths is determined based on a policy and the device is bound for performance of the management operation using the current favored path. In embodiments, the model-based data center management is configured to provide a generic description of the data center architecture and a generic description for one or more devices in the data center. The generic description provides for dynamic runtime data center configuration.05-10-2012
20120117230SYSTEM AND METHOD FOR PROVIDING AND MANAGING A TARGET LIST ON BEHALF OF A USER AGENT CLIENT - A method and system for managing a target list on behalf of a user agent client, the method receiving a subscription request from the user agent client, the subscription request containing at least one uniform resource identifier identifying a resource; providing a subscription request to a an information owning enabler; receiving a notification containing information associated with a candidate uniform resource indicator set; evaluating information associated with the candidate uniform resource indicator set to create a selected uniform resource indicator set; and notifying the user agent client of the selected uniform resource indicator set.05-10-2012
20120117229Virtualization Layer in a Virtual Computing Infrastructure - A cloud computing environment having a plurality of computing nodes is described. The plurality of computing nodes may be organized into a plurality of clusters, each of the plurality of clusters including a cluster controller. A virtual computing environment is created on each of the plurality of computing nodes. Communication with the virtual computing environment is enabled. An authorization to service a launch plan is received from a user. The launch plan includes at least one instance to launch. Bandwidth information is requested from each of the cluster controllers of the plurality of clusters. A score is computed for each of the plurality of clusters that responded to the requested bandwidth information. The launch plan is assigned to a cluster from the plurality of clusters based on the computed scores.05-10-2012
20120117224UNIVERSAL STATE-AWARE COMMUNICATIONS - A communications system for general business environments that exploits knowledge of user state to provide advantages of efficiency and control for individual users and for the business. The communications system also provides particular advantages in environments where users have multiple communication devices and for communications of a business with external parties. In other aspects, the communication system provides features of application flexibility and system fault-tolerance with broad applicability to communication systems. The communication system includes a controller that receives requests for establishing communications when a user is in an appropriate state to receive communications and communicates state of the user to other users. The controller receives a user request for establishing a communication when the user is not in the appropriate state for communication, receives a user request for a state change to the appropriate state to receive the communication, and initiates the communication without changing state of the user.05-10-2012
20120117222RECORDING INTERNET VISITOR THREAT INFORMATION THROUGH AN INTERNET-BASED PROXY SERVICE - An Internet-based proxy service server accesses a set of visitor characteristics for multiple visitors to a set of one or more domains operated by a customer. The set of visitor characteristics are reported from a set of one or more proxy servers that are situated between client devices and a set of one or more origin servers for the set of domains. The service server causes the set of visitor characteristics to be displayed through a threat reporting interface that allows the customer to report visitors as posing an Internet security threat. The service server receives input from the customer through the threat reporting interface that at least one of the visitors poses an Internet security threat, and records that visitor as an Internet security threat in one or more threat databases that are used by the proxy servers when determining whether to allow visitors to access network resources hosted at a set of one or more origin servers.05-10-2012
20120117221PREVIEW-BASED CONTENT MONITORING AND BLOCKING SYSTEM - Systems and methods are disclosed for enabling an administrator to monitor and control usage of media content in a locale. In one embodiment, the locale includes one or more media devices that have access to media content from one or more local and/or remote content sources. Usage data defining usage of the media content by a user is obtained. A pattern including two or more media segments consumed by the user is detected based on the usage data and one or more predefined pattern detection rules. The administrator is then enabled to review the pattern and choose whether to block usage. Usage of at least one of the media segments included in the pattern is then blocked at the one or more media devices at the locale in response to the administrator choosing to block usage of the at least one of the media segments included in the pattern.05-10-2012
20130067071METHOD AND POWER-SAVING CONTROL DEVICE FOR CONTROLLING OPERATIONS OF COMPUTING UNITS - A method and a power-saving control device for controlling operations of a plurality of computing units are provided. The method includes pre-estimating network service demands for the computing units within a next period. The method further includes: before the next period, calculating a first number and a second number of the computing units which are expected to be respectively in a busy state and a standby state within the next period according to the pre-estimated network service demands. The method further includes controlling the computing units such that the numbers of the computing units which are in the busy state and the standby state within the next period are respectively equal to the first number and the second number.03-14-2013
20130067067Cross-Machine Event Log Correlation - In computing environments having multiple computers, where such computers may comprise virtual machines, events are logged in association with corresponding activity identifiers. When a data packet associated with an activity is transferred to a destination machine, the activity identifier corresponding to the activity is transferred along with the data packet and used by the destination machine when logging its events. This allows events from the two machines to be correlated according to the activities to which they pertain.03-14-2013
20130067066BEST PRACTICES ANALYSIS OF ZONES AND COMPONENTS IN A NETWORK - Provided are a computer program product, system, and method for best practices analysis of zones and components in a network. A database has information on components in the network and configuration settings for the components. Best practices rules indicate best practices configuration settings for components in the network. The database and the accessed best practices rules are processed to determine whether the configuration settings for the components in the network satisfy the best practices configuration settings for the components indicated in the best practices rules. A report is generated indicating whether the configuration settings of the components in the network satisfy the best practices configuration settings for the components indicated in the best practices rules.03-14-2013
20080294768HOT WITHIN MY COMMUNITIES - Embodiments of the invention are directed to identifying network resources or other topics that are of interest to members of multiple online communities to which a user belongs. Online communities include blogs, websites, games, e-commerce systems, messaging systems, wikis, etc. For each online community, click activity or other client behaviors are tracked and analyzed to determine statistical metrics about community activity, such as which articles, links, services, or other network resources are popular in the online community. At least some of the tracking or analysis can be performed by clients that access the online communities, by a server of each online community, and/or by a central tracking system. The results for each community may be further analyzed relative to each other. The results are provided for all communities with which a given user is associated. For example, a list of the most popular links in the user's selected online communities.11-27-2008
20120198058Computer Network Service Providing System Including Self Adjusting Volume Enforcement Functionality - A Computer Network Service Providing System including Self Adjusting Volume enforcement functionality and methods for diminishing or minimizing volume leakage.08-02-2012
20120198049System and Method for Stateless, Fault Tolerance and Load Balanced Data Collection Using Overlay Namespaces - Systems, methods and computer readable media that provide stateless fault tolerance and load balanced data collection using overlay namespaces are described. A cluster is used. Each node of the cluster may be a monitoring system. A data provider process may run on each node in the cluster. Each node has an overlay namespace which comprises one or more links to namespaces on other nodes, and local viewpoints of those linked namespaces. When a node detects a resource waiting to be monitored, it queries other nodes to determine whether object creation for that resource is allowed. It creates an object only if no other node is creating or has created an object for that resource. A node may stop monitoring more resources if the load on the node reaches a specified threshold. The node may also stop monitoring a resource if it determines the load level on another node is at a predefined low level compared with its own load level.08-02-2012
20090254655Generation and Control of Network Events and Conversion to SCADA Protocol Data Types - A system and method is disclosed for receiving a network event in a network format, mapping the network event into a format expected by a central monitoring system, and communicating the mapped network event to the central monitoring system. The system may employ a variety of communication protocols and physical architectures. The system may include an access controller that may connect a plurality of intelligent electronic devices and may be the primary interface with an information system or central monitoring system. The access controller may include a programmable logic engine in compliance with the IEC-61131-3 standard. The access controller may further be configured to implement rules designed to govern actions taken as a result of network information.10-08-2009
20080307088Performance Monitoring Web Console for Distributed Transaction Service - A computer-implemented system to support performance monitoring of distributed transaction service can comprise one or more distributive transaction monitoring infrastructures, wherein each distributive transaction monitoring infrastructure contains at least one local monitor server that receiving monitoring data from one or more distributive transaction monitoring processes; a central monitor server that accepts monitoring data from one or more distributive transaction monitoring infrastructures and stores monitoring data into a database; and a web application that communicates with the central monitor server and provides interaction with a user.12-11-2008
20100042716ADAPTIVE CLUSTERING FRAMEWORK IN FREQUENCY-TIME FOR NETWORK MIMO SYSTEMS - A method for wireless communications is provided. The method includes analyzing a set of network parameters and automatically forming a set of network clusters based in part on the network parameters. This includes dynamically selecting at least one network cluster from the set of network clusters to provide wireless service to a subset of user equipment.02-18-2010
20130166737DUPLICATE IP ADDRESS DETECTION BY A DHCP RELAY AGENT - Techniques are described for detecting duplicate IP addresses at a DHCP relay agent. Embodiments identify a list of DHCP clients that have valid IP address leases from one or more DHCP servers. Additionally, network traffic from a first node passing through the DHCP relay agent is monitored. Embodiments then determine whether the first node is using a duplicate IP address, based on the monitored network traffic and the identified list of DHCP clients.06-27-2013
20130166740NETWORK EVALUATION DEVICE, METHOD FOR EVALUATING NETWORK, AND RECORDING MEDIUM - A network evaluation device evaluates a communication state of an information processing apparatus including a plurality of processors which communicate with one another and which execute a program. The network evaluation device includes: a memory configured to store a network evaluation program; and a processor configured to execute a process based on the network evaluation program in the memory. The process includes: obtaining first communication processing time between the plurality of processors while the plurality of processors are not executing the program; recording the first communication processing time; obtaining second communication processing time between the plurality of processors while the plurality of processors are executing the program; comparing the first communication processing time with the second communication processing time; and outputting a time difference between the first communication processing time and the second communication processing time.06-27-2013
20130166741EFFICIENT MONITORING IN A SOFTWARE SYSTEM - A monitoring of a server system during an execution of a server system processing logic, includes: during collection and storage of operational metrics by a given thread in a thread-local memory, determining that a checkpoint within the server system processing logic is reached; determining whether a threshold number of checkpoints have been encountered by the given thread; in response to the threshold number of checkpoints having been encountered, determining whether a threshold time interval since a last rollup of the collected operational metrics has been exceeded; and in response to the threshold time interval being exceeded, performing a rollup of the collected operational metrics from the thread-local memory to an accumulation point in a shared memory, where the accumulation point stores aggregated operational metrics from a plurality of threads.06-27-2013
20130166742SYSTEMS, METHODS AND MEDIA FOR IDENTIFYING AND ASSOCIATING USER DEVICES WITH MEDIA CUES - Systems, methods, and media for identifying and associating user devices with media cues are provided. In some embodiments, a plurality of data streams from a plurality of endpoints is received. At least one media segment is then received from a user device. It is determined whether the at least one media segment from the user device corresponds with one of the plurality of data streams from the plurality of endpoints. In response to being unable to match the at least one media segment, a media cue is inserted into one of the plurality of data streams. In response to detecting that the media cue in that data stream is received by the user device, identification infomlation is transmitted to the user device that associates the user device with one or more services on a communications server.06-27-2013
20130166743Relevant Alert Delivery In A Distributed Processing System - Methods, systems and products are provided relevant alert delivery including assigning by an event analyzer each received event to an events pool; determining by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool whether to suppress one or more of the events; identifying by the event analyzer in dependence upon event analysis rules and the events assigned to the events pool one or more alerts; sending by the event analyzer to an alert analyzer all the alerts identified by the event analyzer; assigning by the alert analyzer the identified alerts to an alerts pool; determining by the alert analyzer in dependence upon alert analysis rules and the alerts in the alert pool whether to suppress any alerts; and transmitting the unsuppressed alerts to one or more components of the distributed processing system.06-27-2013
20130166744DISPLAY PROCESSING SYSTEM, DISPLAY PROCESSING METHOD, AND PROGRAM - A display processing system (06-27-2013
20120233318In-Line Network Device For Storing Application-Layer Data, Processing Instructions, And/Or Rule Sets - A network device located in the data path between a user computer and a server stores application data, processing instructions, and/or rule sets. By storing user computer-specific application data, processing instructions, and/or rule sets in the data path between the user computer and the server, the invention reduces the complexity of the web server, improves the handling of server failure, and increases the overall scalability and performance of the system.09-13-2012
20090013075Monitoring apparatus, executive program, and information processing system - The present invention has: a data deriving section 01-08-2009
20090013074SYSTEM AND METHOD FOR DISTRIBUTED NETWORK MONITORING FOR STEGANOGRAPHIC MESSAGES - This invention relates to distributed monitoring of networks for steganographically encrypted or encoded messages. Terrorists or criminal groups may use stenography to encode or hide messages in image data or other encrypted data. Law enforcement agencies seek to monitor the distributed networks for the hidden information. However, the size of the Internet exceeds the capacity of law enforcement resources. A method and system are described that use various computational devices distributed about the network to individually monitor network locations. Suspect data is documented on a set of servers. These servers then alert analysts to the presence of suspicious data. In one exemplary embodiment, a common interpreted programming language is used to program a set of instructions that may be performed by various devices distributed about the Internet to monitor network locations for encoded or hidden communications.01-08-2009
20090013073METHOD AND SYSTEM FOR DETECTING WIRELESS ACCESS DEVICES OPERABLY COUPLED TO COMPUTER LOCAL AREA NETWORKS AND RELATED METHODS - A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices01-08-2009
20090013072NETWORK APPARATUS TEST SYSTEM AND NETWORK APPARATUS TEST METHOD - An object of the present invention is to provide a network apparatus test system capable of highly efficiently performing a test of a network apparatus, wherein the host server includes a first control unit which transmits a test signal to a monitoring server, the monitoring server includes a second control unit which detects a test request signal and transmits the detected test request signal to a setting server, and which transmits the test signal to the network apparatus, and the setting server includes a storage unit which stores a plurality of IP addresses, and a third control unit which is configured, each time the test request signal is received, to assign one of the plurality of IP addresses to the network apparatus, and to perform processing for generating identification information, and is configured to make the first control unit transmit and the second control unit transmit the test signal.01-08-2009
20090013071Provision Information Notification Apparatus, Provision Information Notification Method and Software Program - An apparatus and method is provided which enable a user using a plurality of terminals to obtain information in a convenient manner compared to conventional systems. An image forming apparatus includes a notification setting database 01-08-2009
20090013070SYSTEM AND METHOD FOR PROVIDING NETWORK APPLICATION PERFORMANCE MANAGEMENT IN A NETWORK - The present invention relates to a system and method for network performance management for monitoring performance of network applications. The system comprises a transmitter for sending one or more types of probe packets to the network, a receiver for receiving the one or more network probe packets from the network and for receiving one or more network application performance queries from one or more network applications, a processor connected to the transmitter and the receiver and operable to process network probe packets received by the receiver to generate network performance statistics for each type of probe packet and to look up the network application performance requirements of the one or more network applications and compare the network application performance requirements with the corresponding network performance statistics to determine whether the network application should access the network. Network performance statistics may be obtained using lean packet probes, using real traffic test streams or obtaining network performance statistics from a service provider. Thus by providing a probe, lookup, feedback methodology, network parameters, or network application requirements, may be adjusted to meet performance requirements of one or more network applications.01-08-2009
20090013069INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSOR, SERVER, INFORMATION PROCESSING METHOD AND PROGRAM - An information processor (01-08-2009
20090013068SYSTEMS AND PROCESSES FOR EVALUATING WEBPAGES - Systems and methods may manage webpages in a set of webpages. The set of webpages may include webpages in an intranet and/or an extranet of an enterprise. Queries may be performed on the webpages and a list of results determined based at least in part on query terms and webpage scores. Webpage scores may be based on ratings of webpages and/or metrics of change. A metric of change of a webpage may be based at least in part on changes in text, images, and/or ratings of the webpage.01-08-2009
20090006615METHOD AND APPARATUS FOR EXTRACTING AND VISUALIZING EXECUTION PATTERNS FROM WEB SERVICES - One embodiment of the present method and apparatus for extracting and visualizing execution patterns from Web Services collects data relating to one or more transactions executed in accordance with one or more Web Services-based applications (e.g., messaging systems or other services). One or more patterns is then extracted from the collected data, where the patterns are representative transactions commonly executed in accordance with the Web Services configuration under analysis.01-01-2009
20090006613System and a method for updating a user presence status on a terminal by aggregating multisource information - A method of updating a user presence status at at least one terminal connected to a telecommunications network, on the basis of presence status information provided by at least one status source of said terminal. The presence status is determined during an aggregation step comprising collecting a plurality of unit presence probability values provided by a plurality of status sources associated with said terminal; and calculating an aggregated presence status probability resulting from a linear combination of said unit presence probability values.01-01-2009
20090006612COMMUNICATION SYSTEM, PROXY SERVER, METHOD OF CONTROLLING SAME AND CONTROL PROGRAM THEREFOR - It is arranged so that the history of access to a web page at a terminal device that does not have a unique IP address can be determined. To achieve this, a proxy server generates identification data of the terminal device upon accepting a request for a web page from the terminal device the first time. A link destination URL included in the web page conforming to the request is changed by the proxy server and a web page in which the URL after the change has been embedded is displayed on the terminal device. If the proxy server is requested for the web page having the URL after the change, the URL is restored by the proxy server to the URL that prevailed before the change and the web server is requested for the web page having the URL that prevailed before the change. Since the URL after the change is one that only the terminal device of the generated identification data can ascertain, the history of access by the terminal device can be determined by storing the URL, which prevailed before the change, of the requested web page in correspondence with the identification data.01-01-2009
20090006611COMMUNICATION NETWORK ANALYSIS SYSTEM IN MULTI-LAYERED COMMUNICATION SYSTEM - The present invention relates to a communication network analysis apparatus in a multi-layered communication system and a method using the apparatus, and more specifically, to a communication network analysis apparatus in a building automation and control system, a communication method using the apparatus, and a protocol conversion method.01-01-2009
20090006610Event driven plugin architecture for importing scanned image data into a production workflow - Systems and methods are described that facilitate importing scanned image data into a production workflow, in accordance with various features described herein. A plurality of loosely-coupled, dynamically loaded plugins can be defined in a configuration file for a given production scanning job. The plugins can be invoked in response to a trigger with which each plugin is associated, and triggers can be associated with different phases of the production workflow, such as image data acquisition (importation), data filtering (pre-scanning), image analysis (scanning), and metadata processing (post-scanning). In this manner, the overarching scanning architecture need not have direct knowledge of which plugins are triggered, or even present, and custom plugins as well as standard plugins can be provided for each production scanning job.01-01-2009
20090006609MEDIA CONTENT DISTRIBUTION INDICATOR - A method includes providing an expandable element associated with a message transmit key of a device. An outer border of the expandable element moves or expands to reflect a number of recipients of a message to be sent from the device. The message transmit key of the device is contacted to cause the initiation of the message transmitted to each of the recipients, and a size of an inner region within the outer border is expanded to reflect a state of the message transmission to each of the recipients, wherein the size of the inner regions expands to fill an area within the outer border in order to send the message to each recipient.01-01-2009
20090006607SCALABLE METHODS FOR DETECTING SIGNIFICANT TRAFFIC PATTERNS IN A DATA NETWORK - Methods and apparatuses are provided for detecting traffic patterns in a data network. A sequential hashing scheme can be utilized that has D hash arrays. Each hash array i, wherein 1≦i≦D, includes M01-01-2009
20090006606COMMAND QUEUE LOADING - A data storage system and associated method are provided wherein a policy engine continuously collects qualitative information about a network load to the data storage system in order to dynamically characterize the load and continuously correlates the load characterization to a command queue depth of data transfer requests.01-01-2009
20090006605EXTENDED WRITE COMBINING USING A WRITE CONTINUATION HINT FLAG - A computing apparatus for reducing the amount of processing in a network computing system which includes a network system device of a receiving node for receiving electronic messages comprising data. The electronic messages are transmitted from a sending node. The network system device determines when more data of a specific electronic message is being transmitted. A memory device stores the electronic message data and communicating with the network system device. A memory subsystem communicates with the memory device. The memory subsystem stores a portion of the electronic message when more data of the specific message will be received, and the buffer combines the portion with later received data and moves the data to the memory device for accessible storage.01-01-2009
20130166736GEOLOCATION ENGINE - Embodiments of the present invention for determining a geo-location begin with receiving, from a client computing device, information regarding one or more Wi-Fi networks in range of the client computing device a MAC address of the client computing device. A geo-location is determined from the received Wi-Fi network information and the MAC address. An indication may be recorded as to whether the client computing device geo-location satisfies a geo-location requirement.06-27-2013
20130166739Localization Of Peer To Peer Traffic - A method of processing peer-to-peer requests is provided. The method may include; storing, at a network element, peer information in a database for each peer of a plurality of peers, the peer information indicating at least one ISP associated with the peer and the content contained by the peer, receiving a request for content from a requester, and sending a response to the content requester based on the ISP with which the requester is associated and the stored peer information.06-27-2013
20130166738Web Page Download Time Analysis - Systems and methods for determining web page download times are described. HTTP transactions data is collected from flow records or PDUs. A subscriber IP address, HTTP URI, and referrer are extracted from the flow records. A subscriber record is identified using the subscriber IP address, and a configured web page is identified using the HTTP URI. A processing path is then determined for the HTTP transaction The processing path is selected from one of: a new page download path for a configured page, a collision path for HTTP transactions that collide with an existing page download, and a page object path for artifacts pages that are already being tracked.06-27-2013
20130166731APPARATUS, MOBILE TERMINAL, AND METHOD TO ESTIMATE QUALITY OF EXPERIENCE OF APPLICATION - A method of notifying estimated QoEs (Quality of Experiences) for applications between a mobile terminal and a plurality of application servers that provide services of the applications, may measure first QoEs for the applications between the apparatus and the mobile terminal, measure second QoEs for the applications between the apparatus and the application server, estimate the estimated QoEs for the applications, based on the first and second QoEs for the applications, and notify the estimated QoEs to the mobile terminal.06-27-2013
20130166732CLIENT MANAGING SYSTEM, CLIENT MANAGING METHOD, AND INFORMATION PROCESSING APPARATUS - In one embodiment, there is provided a client managing system including: a server; a client connected to the server via the Internet. The server includes: a generator configured to generate a policy data for the client; a first storage configured to store the policy data; a delivering module configured to deliver the policy data to the client; and a second storage configured to store a first index data therein, wherein the first index data corresponds to a first log data representing contents of operations performed on the client. The client includes: a sender configured to: i) generate a second log data representing contents of operations performed on the client; ii) send the second log data to a file storage connected to the client via a network; iii) generate a second index data corresponding to the second log data; and iv) send the second index data to the server.06-27-2013
20130166733NETWORK BANDWIDTH DISTRIBUTION DEVICE AND METHOD THEREOF - Disclosed is a network bandwidth distribution device which includes an information collector which collects information associated with a connection environment; a controller which judges a state of a connection environment according to the collected information and collects information of each user to judge whether an occupied bandwidth of each user is exceeded; and a bandwidth allotter which limits an occupied bandwidth of each user based on the judged state of a connection environment and whether an occupied bandwidth of each user is exceeded.06-27-2013
20130166734SYSTEM AND METHOD FOR ACCESS TO CONTINOUSLY RUNNING APPLICATION PROGRAMS BY NETWORK CONNECTED END-USER DEVICES - A system for providing access to one or more application device, such as a respective processed application program, is connected to a telecommunications network including at least one user device. The system includes a manager device connected to the respective application device, and the manager device communicatively connects to the respective user device. Each application device includes a respective processing state and a state table of each respective processing state. The manager device updates the respective processing state of the state table for each application device and respective user device. Each user device accesses the manager device to obtain the respective processing state in the state table of the particular application device for the particular user device. User devices can switch communications with the manager device and application device, providing continuing operations of the application device with same processing state.06-27-2013
20130166735LOCATION SPECIFIC EVENT BROADCASTING - Applications in a broadcast environment distribute events in real-time to a large number of receivers within specified geographic locations while efficiently sharing bandwidth resources with other applications using the same broadcast network. Applications need not be aware of the other applications sharing the resources, nor of the methods, protocols, and other mechanisms used to actually broadcast the data over the broadcast medium. Server-side applications that serve data, send notifications, or distribute events to specific locations within the network use a broadcast location manager. Client applications that receive such data, notifications, or events use a client location filter to obtain events that are relevant based on the location of the device. The broadcast location manager and client location filter work together to reliably and efficiently transmit data, notifications, and events to specific locations over the broadcast network for all applications involved.06-27-2013
20130166726METHOD AND APPARATUS FOR PROVIDING INTENT-BASED MONITORING USING SENSORY INFORMATION - An approach is provided for providing intent-based monitoring using sensory information. The monitoring platform determines to detect, at a device, sensory information from an environment, the environment relating to a user of the device, one or more other users, or a combination thereof. Next, the monitoring platform processes and/or facilitates a processing of the sensory information to determine intent information associated with the user, the one or more other users, or a combination thereof.06-27-2013
20130166721SYSTEMS AND METHODS FOR A SOCIAL MEDIA NETWORK/BUSINESS PLATFORM INTERFACE - According to some embodiments, information associated with a task may be received, including a trigger entity and a related action entity. A social media network/business platform interface may monitor a trigger condition associated with the trigger entity. The social media network/business platform interface may then automatically detect that the trigger condition is satisfied. Responsive to that detection, an action defined by the action entity related to the trigger entity may be automatically performed.06-27-2013
20120239809METHODS AND APPARATUS TO DETERMINE IMPRESSIONS USING DISTRIBUTED DEMOGRAPHIC INFORMATION - Example methods and apparatus to determine impressions using distributed demographic information are disclosed. A disclosed example method to monitor media exposure involves receiving, at a first internet domain, a first request from a client computer, the first request indicative of access to the media at the client computer. The example method also involves determining if the client computer is known. If the client computer is not known, a response is sent from the first internet domain to the client computer, the response to instruct the client computer to send a second request to a second internet domain, the second request to be indicative of access to the media at the client computer. If the client computer is known, an impression of the media is logged.09-20-2012
20120239807SYSTEMS AND METHODS FOR CONTROLLING COMMUNICATION BETWEEN A HOST COMPUTER AND COMMUNICATION DEVICES - An exemplary embodiment of the present invention provides a site controller for use in a communication system. The site controller can be configured to receive original data messages and repeated data messages, identify remote devices in associated with sensor data signals of received data messages and repeated data messages, and provide information related to the sensor data signals to a wide area network for access by a first host computer.09-20-2012
20080294772AUTOMATICALLY INFERING AND UPDATING AN AVAILABILITY STATUS OF USER - A system, system, and program for automatically inferring and updating an availability status of a user are provided. At least one current activity of a user is detected, where the current activity includes at least one system level event within a computer environment accessible to the user. A current availability status for a particular communication request is inferred from the current activity of the user in view of multiple availability rules, where the multiple availability rules map current activity to multiple possible availability statuses. In addition, inference of the current availability status is determined based on the identity of the requester of communication with the user, where the multiple availability rules map the requester identity in combination with the current activity to multiple availability rules. Output of the current availability status is controlled, such that the requester of the particular communication request is notified of an availability of the user to respond to the particular communication request.11-27-2008
20080294771ASSET MONITOR FOR FIELDBUS DEVICES - A software product and method of monitoring a field device in an enterprise having an industrial process. A subscription to the OPC DA server for diagnostic data from the field device is made and a subscription to an OPC AE server for event notifications from the OPC AE server is made. The subscription to the OPC AE server is activated, but the subscription to the OPC DA server is not activated. When an event notification is received from the OPC AE server, the subscription to the OPC DA server is activated. Diagnostic data from the field device is received and device health information from the diagnostic data is generated. The device health information is displayed on a viewing monitor. The subscription to the OPC DA server is then deactivated.11-27-2008
20080294770SYSTEM AND METHOD FOR MANAGING COMPUTER NETWORKS - A system and method are provided for monitoring traffic in an enterprise network. Similar hosts may be grouped using flow information. Network policy may then be created at the group level based on the signatures of the hosts and groups of hosts in the enterprise. Hosts may be arranged in hierarchical clusters. Some of these clusters may be selected as groups based on a desired degree of similarity between hosts in a group. The similarity between hosts may be determined based on similarity of network behavior of the hosts.11-27-2008
20080294769Efficient synchronization of agents starting a task where the agents poll a server to learn the task start time - A server sets a task start time equal to a next polling time by a last agent that has most recently polled the server. In response to each of a number of agents, including the last agent, polling the server, the server provides the task start time. At each agent, a task is started at the task start time, such that all the agents start the task at a same time. As such, all the agents except for the last agent have to wait for the task start time to start the task after polling the server, whereas the last agent starts the task immediately after polling the server. The server may also determine a polling interval time based on a number of the agents that have polled the server, where the polling interval time indicates how long each agent waits between successive pollings of the servers.11-27-2008
20080294767Ubiquitous Wireless Network System, Node Module, and Operation Method of the Node Module - A ubiquitous wireless network system, node module, and operation method of the node module are disclosed. The present invention allows a display unit to display detected information or received information when the information corresponds to its own node module as an arrival destination. Therefore, the present invention enables users to ascertain the surrounding physical context around the corresponding node module or the information inputted by the administrator.11-27-2008
20110029665DYNAMICALLY CONFIGURABLE SESSION AGENT - A monitoring system captures the behavior of distributed applications and also provides a framework for augmenting functionality of the application in response to user interactions and different states of the application and network. Network events exchanged between an application and an application server are captured and the local client events on the client device are also selectively captured. The different disparate network events and client events are then combined together during a replay operation to simulate the user experience during the previous application session.02-03-2011
20120102191USING PAUSE ON AN ELECTRONIC DEVICE TO MANAGE RESOURCES - An electronic device for using pause to manage resources is described. The electronic device includes a processor and instructions stored in memory. The electronic device monitors a pause duration and determines whether to perform a resource management operation based on the pause duration. The electronic device performs the resource management operation based on the pause duration.04-26-2012
20120102185RESOURCE MANAGEMENT OF SERVER HOSTS IN ONLINE GAME ENVIRONMENT - Managing resources of server hosts in an online game environment, including: monitoring metrics data of the online game environment including configurable thresholds and rules defined for a game title; processing and analyzing the metrics data; determining whether the metrics data indicates an over or under capacity of the server hosts in the online game environment; sending a first request to locate, deploy, connect, and register additional game servers to the online game environment to support increasing load, when the metrics data indicates the under capacity of the server hosts; and sending a second request to isolate, remove, disconnect, and un-register surplus game servers from the online game environment to make them available to support the player load in other game titles, when the metrics data indicates the over capacity of the server hosts. Keywords include resource management, online gaming, and server architecture.04-26-2012
20120102184APPARATUS AND METHOD FOR ADAPTIVE STREAMING OF CONTENT WITH USER-INITIATED QUALITY ADJUSTMENTS - According to one embodiment of the invention, a digital device comprises adaptive streaming logic to control a manual setting of play parameters that are used to adjust a display resolution of the incoming content and a data rate at which the streaming content is downloaded to the content interface unit. Hence, very low resolution content or greatly varying resolution which can be annoying to a viewer caused by excessive network congestion can be avoided or mitigated.04-26-2012
20080215720Apparatus and system for lost/stolen data storage device recovery - A recoverable data storage apparatus including a hand-portable housing configured with an input/output (I/O) port presented outwardly therefrom, a data storage means retained within the housing and operatively coupled with the input/output port, and a client agent embodied as device-executable code residing on the data storage device and configured. When executed on a network-linked computing device, the client agent is configured to establish communication with a remote server and receive data indicating a possession status of the data storage apparatus. A device tracking system including a data network means, a hardware portion, and a software portion. The hardware portion includes at least, (1) a server device operatively coupled with the network means, and (2) a data storage device with an externally presented input/output port configured to operatively couple with a host device, and a software portion including. The software portion includes at least, (1) a data storage device tracking means configured to identify a data storage device based upon unique identification-relevant data included in a polling message received via the network means, and (2) a client agent stored as device executable code stored at a memory means operatively coupled with the data storage device, wherein the client agent is configured so operatively when coupled to cause a host device to transmit host device-relevant identifying data via the network means.09-04-2008
20110029663METHOD OF GATHERING INFORMATION RELATED TO ACTIVITY OF A USER AND A DATA PROCESSING SYSTEM PROGRAM PRODUCT - Information related to activity of a user may be provided using a method or a data processing system program product to perform the method. In one embodiment, the method includes sending a first view request to a first electronic site, receiving a first view from the first electronic site, and first information related to the first view request to a second entity that is different from the first entity. In another embodiment, a data processing system program product may perform a method of sending information related to a view request from the user for an electronic site. The information is to be sent to an entity that is different from an entity that substantially controls or owns the electronic site and different from an Internet service provider of the user, if the user is to use the Internet service provider in accessing the electronic site.02-03-2011
20110087773CONTENTS' RELATIONSHIP VISUALIZING APPARATUS, CONTENTS' RELATIONSHIP VISUALIZING METHOD AND ITS PROGRAM - There is provided a contents' relationship visualizing apparatus including a usage history acquiring unit for acquiring usage histories of multiple contents, a users' set specifying unit for specifying a content's users' set indicating users utilizing each content by use of the contents' usage histories, a similarity calculating unit for calculating a similarity between the specified users' sets by use of a similarity index, and a network creating unit for creating a network indicating a relationship between the contents by use of the calculated similarity between the users' sets.04-14-2011
20110145405Methods for Collecting and Analyzing Network Performance Data - In an embodiment, a method comprises: collecting first connection data for first data connections that are (a) established between one or more clients and one or more servers, and that are (b) serviced by a first Internet service provider; based on the first connection data, determining a first re-transmission rate for the first data connections; collecting second connection data for second data connections that are (a) established between the clients and the one or more servers, and that are (b) serviced by a second Internet service provider; based on the second connection data, determining a second re-transmission rate for the second data connections; in response to determining that the first re-transmission rate exceeds a threshold value and that the second re-transmission rate does not exceed the threshold value, recommending, to the clients, that the clients reconfigure their Internet services to be serviced by the second Internet service provider.06-16-2011
20100077071METHOD AND SYSTEM FOR AUTOMATIC NETWORK CONNECTION ESTABLISHMENT IN CASE OF NETWORK ADDRESS RENEWAL - A method and system for maintaining a connection in a communication network is provided. One implementation involves activating a first network interface for obtaining a first network address for communication over the network; monitoring the network and determining a first lease time for the first network address; activating a second network interface for obtaining a second network address for communication over the network upon approaching end of the lease time, thereby maintaining communication over the network via the second network address; and deactivating the first network interface.03-25-2010
20120303795QOS CONTROL IN WIRELINE SUBSCRIBER MANAGEMENT - Various exemplary embodiments relate to a session management node. A session management node may include: a receiver configured to receive an accounting message; a session information storage that includes a record of accumulated network usage of the subscriber; a session manager configured to determine a Quality of Service (QoS) for the subscriber based upon the subscriber's accumulated network usage and an update time; and a transmitter configured to send an authorization message to the NAS. A session management node may also include: a configurable NAS profile; a usage reporter; a policy engine; and a reauthorization scheduler. Various exemplary embodiments may relate to a method of authorizing QoS based on subscriber usage and current time period. The method may include: receiving an accounting message; monitoring the usage of the subscriber; authorizing a QoS; and transmitting an authorization message. Subscriber network usage may be associated with a monitoring key and/or rating factor.11-29-2012
20110060823NETWORK-ASSISTED HEALTH REPORTING ACTIVATION - A system and method for generating and tracking health diagnoses of devices connected to a computer network via a statement of health provided by each device. The system monitors the health of devices on the network and attempts to engage the operator of undiagnosed devices in order to provide a diagnosis. Undiagnosed devices are quarantined to restrict their access to network resources. For example, access requests from quarantined devices to certain Web services may be intercepted and the device redirected to a page informing the operator of the need to provide a health diagnosis by installing or activating a compatible system health agent.03-10-2011
20080235369Distributing replication assignments among nodes - Replication in distributed systems may be based on a determination of the number of connections to a node to be replicated. When a new user is adding a node in a distributed system, the number of connections between nodes connected to the new node is determined. In addition, the change in relationships among nodes directly influence the changes in their respective connections. A ranking based on the number of connections is developed and data associated with a node is replicated based on its ranking.09-25-2008
20110264796SEARCH AND NAVIGATIONAL RATING SYSTEM FOR ONLINE SOCIAL ENVIRONMENT - The subject application involves enhancing search and navigation through a social virtual environment through the use of a ratings system. The environment is comprised of smaller communities or villages. The rating of a village is determined in part by the activities performed in a village, by the user who is performing the activity, and the duration and recurrence of the activity. Another element that affects a village's current rating is the state of decline or decay to which it is subjected. Certain activities that are performed can effectively delay or negate an amount of decay to the rating, but even so, village ratings are in a continual state of decline. To increase or maintain a particular rating, village residents need to perform activities.10-27-2011
20120124192USING BEHAVIORAL DATA IN RATING USER REPUTATION - In a system and method for using user behavior and interaction data to rate a reputation of a user, a processor-implemented tracking component tracks an interaction of a user with a network-based publisher. A processor-implemented reputation component generates a reputation value for the user from the tracked user interaction.05-17-2012
20110066725SOCIAL NEWS RANKING USING GOSSIP DISTANCE - Devices, systems, and methods are directed towards ranking of messages based on a hop distance a forwarded message travels through a social network. As a message is forwarded by a member of the social network the hop distance increases. As the message is forwarded, recipients and/or senders may view the hop distance in real-time. The hop distance may reflect a number of times the message is forwarded to reach a recipient, or the maximum number of times the message is forwarded. The message may be displayed to a member in a rank ordering based on the hop distance, and messages with hop distances below a defined value may be deleted from a displayed list after a period of time. In one embodiment, a message may be forwarded anonymously to, for example, encourage members to forward the message.03-17-2011
20080301292POWER MANAGEMENT OF NETWORK ATTACHED DEVICE - Power management of one or more network-attached devices connected to a plurality of computer units is disclosed. In an exemplary arrangement, each computer unit as one computer unit, in response to a command for shutdown of the one computer unit, determines whether or not at least one remaining computer unit has been placed in a shutdown state, and the one computer unit, in response to a determination that the at least one remaining computer unit has been placed in a shutdown state, transmits a terminate-command signal to the one or more network-attached devices via the network for termination of the one or more network-attached devices.12-04-2008
20130013772PROVIDING CUSTOMIZED INFORMATION TO A USER BASED ON IDENTIFYING A TREND - To provide customized information to the user, a wireless communications network node receives a stream of data associated with a user. A first trend associated with at least a first attribute in the stream of data is identified, and based on the identified first trend, customized information is sent for presentation to the user at a mobile station.01-10-2013
20130024559Automatic Zone-Based Management of a Data Center - Automatic zone-based management of a data center. Nodes are assigned to a first zone. One of the nodes is selected as zone leader. A load ratio of the zone leader is monitored, nodes are identified for shedding if the load ratio exceeds a predetermined maximum, and the identified nodes are assigned to a new zone. One of the nodes in the new zone is selected as zone leader. The load ratio of each zone leader is monitored, nodes are identified for shedding if the load ratio exceeds a predetermined maximum, and the identified nodes are assigned to an additional new zone, the zone leaders negotiate for reassignment of loads.01-24-2013
20090113049SYSTEMS AND METHODS FOR REAL-TIME FORECASTING AND PREDICTING OF ELECTRICAL PEAKS AND MANAGING THE ENERGY, HEALTH, RELIABILITY, AND PERFORMANCE OF ELECTRICAL POWER SYSTEMS BASED ON AN ARTIFICIAL ADAPTIVE NEURAL NETWORK - A system for utilizing a neural network to make real-time predictions about the health, reliability, and performance of a monitored system are disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The data acquisition component acquires real-time data output from the electrical system. The power analytics server is comprised of a virtual system modeling engine, an analytics engine, an adaptive prediction engine. The virtual system modeling engine generates predicted data output for the electrical system. The analytics engine monitors real-time data output and predicted data output of the electrical system. The adaptive prediction engine can be configured to forecast an aspect of the monitored system using a neural network algorithm. The adaptive prediction engine is further configured to process the real-time data output and automatically optimize the neural network algorithm by minimizing a measure of error between the real-time data output and an estimated data output predicted by the neural network algorithm.04-30-2009
20090063673END-TO-END (E2E) SERVICE LEVEL AGREEMENT (SLA) COMPLIANCE ACROSS BOTH MANAGED AND UNMANAGED NETWORK SEGMENTS - Embodiments of the present invention address deficiencies of the art in respect to e2e SLA support in a network of both manageable and unmanageable portions and provide a method, system and computer program product for e2e SLA compliance across both managed and unmanaged network segments. In one embodiment of the invention, a method for e2e SLA compliance across both managed and unmanaged network segments can be provided. The method can include identifying both a managed segment and an unmanaged segment of an e2e network for a communications path implicated by an SLA, determining an observed delay for the unmanaged segment of the e2e network, computing from a desired delay for the communications path and the observed delay a differential delay, and constraining the managed segment to meet the differential delay in order to assure meeting the desired delay for the communications path implicated by the SLA.03-05-2009
20090063672MONITORING OF COMPUTER NETWORK RESOURCES HAVING SERVICE LEVEL OBJECTIVES - In a typical computer network, at least some of the managed resources are monitored to determine whether those resources are meeting predetermined performance goals or service level objectives. To simplify the process of configuring a network monitor, information about the service level objectives is loaded into the resource itself. When the resource is detected, the service level objective information is extracted from the resource information and made available to a translating engine. The translating engine converts the extracted information to monitoring directions that are used to configure the network monitor. Embodiments in which new resources are detected either buying a registration process or a polling process are described.03-05-2009
20110191463MANAGEMENT METHOD FOR INTERNET PROTOCOL SHARING COMMUNICATION MECHANISM - A management method for an Internet protocol sharing communication mechanism comprises the steps of: setting up a plurality of rules for an Internet protocol sharing communication mechanism; providing a schedule divided into different time slots; assigning one rule from the rules for the Internet protocol sharing communication mechanism for each time slot of the schedule; and conducting a network communication according to the assigned rules.08-04-2011
20100268819EVENT PROBLEM REPORT BUNDLES IN XML FORMAT - A network device may include logic configured to detect that an event has occurred in the network device, determine an XML document structure based on the detected event, and generate an XML document with the determined structure including information relating to the detected event.10-21-2010
20110282992Method and Apparatus for Usage Estimation and Prediction in Two-Way Communication Networks - Methods, apparatus, and network oriented systems are discussed for estimating system, e.g. web site, usage removed from the web site, as well as scheduling and directing a data broadcast source to provide content based on web site usage estimates and predictions in a broadcast data stream.11-17-2011
20110282990Method and system for constraining server usage in a distributed network - A “velvet rope” mechanism that enables customers of a shared distributed network (such as a content delivery network) needing to control their costs to control the amount of traffic that is served via the shared network. A given server in the distributed network identifies when a customer is about to exceed a bandwidth quota as a rate (bursting) or for a given billing period (e.g., total megabytes (MB) served for a given period) and provides a means for taking a given action based on this information. Typically, the action taken would result in a reduction in traffic served so that the customer can constrain its usage of the shared network to a given budget value.11-17-2011
20110282988GEOGRAPHIC LOCATION SYSTEM AND METHOD - A method for determining a derived geographic location of a target Internet host includes identifying plural landmark Internet hosts communicatively coupled with the target Internet host by a network. The method also includes measuring network latencies of probe packets transmitted to the target and landmark Internet hosts along different network pathways and calculating relative distances between the target Internet host and one or more of the landmark Internet hosts based on the network latencies. The method further includes comparing the relative distances to identify at least one of the landmark Internet hosts that is geographically closer to the target Internet host than one or more other landmark Internet hosts and determining the derived geographic location of the target Internet host based on a geographic location of the at least one of the landmark Internet hosts that is geographically closer to the target Internet host.11-17-2011
20130024567NETWORK MONITOR - A computer network monitoring controller for monitoring the performance of a plurality of virtual machines in a cloud computing environment, each virtual machine being a set of resources hosted on a hardware platform and arranged to appear as a real hardware to a client, the virtual machines being allocated and generated by a management system, the monitoring controller comprising: a plurality of interfaces, each one connected to a monitoring system having links to at least one of the virtual machines, and each monitoring system being arranged to capturing event messages relating to the status of the virtual machine and outputting these event messages in a monitoring system specific format; an data store for storing event messages received from each of the monitoring systems via the interfaces; a receiver for receiving monitoring requests from said management system, each request specifying monitoring requirements relating to at least one of the virtual machines; a converter for converting the messages from the monitoring systems into a common format for storage in the event log; a processor for processing the received requests and matching the requirements to event messages received from the plurality of virtual machines; and a sender for sending matched event messages to the management system in the common format.01-24-2013
20110282989RESOURCE COORDINATION FOR PEER-TO-PEER GROUPS THROUGH DISTRIBUTED NEGOTIATION - Techniques for determining resources to use for peer-to-peer (P2P) communication are disclosed. In an aspect, a network entity may receive feedback information (e.g., resource usage information and/or channel state information) from P2P devices and may perform resource partitioning based on the feedback information to allocate some of the available resources for P2P communication. The allocated resources may observe little or no interference from devices engaged in wide area network (WAN) communication. In another aspect, P2P groups may perform resource negotiation via a WAN connection (e.g., with little or no involvement by the WAN) to assign the allocated resources to different P2P groups. In yet another aspect, a device may autonomously determine whether to communicate with another device directly or via a WAN, e.g., whether to initiate P2P communication with another device and whether to terminate P2P communication. In yet another aspect, a network entity may participate in resource negotiation by P2P devices.11-17-2011
20090150542MANAGEMENT COMPUTER, COMPUTER SYSTEM AND METHOD FOR MONITORING PERFORMANCE OF A STORAGE SYSTEM - To solve a problem in that reliable detection of a performance problem caused by a configuration change needs detailed performance information, which is costly to keep and analyze, a management computer which manages a computer system having a host computer and a storage system is provided. The management computer is configured to: store performance information obtained from resources that belong to paths at first time intervals until a predetermined length of time elapses since the detection of an addition or removal of the resources to the paths; store performance information obtained from the resources that belong to the paths at second time intervals, which are longer than the first time intervals, without storing performance information obtained from the resources that belong to the paths at the first time intervals after the predetermined length of time elapses since the detection of the addition or removal of the resources to the paths.06-11-2009
20100268817HIERARCHICAL TREE-BASED PROTECTION SCHEME FOR MESH NETWORKS - In a hierarchical tree-based protection scheme, a node in a mesh network is designated as a root node of a spanning hierarchical protection tree and subsequently invites each adjacent node to become its child within the tree. If the inviting node provides a more capacious protection path to the root node than is currently enjoyed by the invitee, the invitee designates the inviting node as its primary parent and assumes a new tree position. Otherwise, the invitee designates the inviting node as a backup parent. A node assuming a new tree position invites all adjacent nodes except its parent to become its child. The invitations propagate throughout the network until a spanning hierarchical protection tree is formed. Upon a subsequent failure of a straddling link, the tree may be used to re-route data. Further, given a tree link failure, protection switching is quickly achieved at a disconnected node through use of a backup parent as the new primary parent. Dynamic tree reconfiguration in the event of network topology changes may be limited to the network area surrounding the change.10-21-2010
20100268812System and Method of Migrating Virtualized Environments - A system and method migrating virtualized environments is disclosed. According to an aspect of the disclosure, the information handling system can include a migration monitor configured to initiate migration of a remote virtualized environment operating on a first remote system. The information handling system can also include a trusted platform module including a local memory storing a plurality of access keys configured to enable use of a plurality of virtualized environments. According to an aspect, the plurality of access keys can include a first access key configured to be used with a first remote system. The information handling system can also include a secure communication channel configured to enable a mapping of the first access key to a second remote system upon the migration monitoring determining the second remote system is capable of satisfying an operating characteristic of the remote virtualized environment.10-21-2010
20080313326Information Processor and Information Processing System - The information processor includes a device communication performance management module. The device communication performance management module includes: a communication performance evaluation unit that measures and evaluates the communication performance with respect to a device to be used when it is used by a device-use application; a device naming rule management unit that manages a naming rule for incorporating the communication performance evaluated by the communication performance evaluation unit into the name of the device file for a device as the target of evaluation; and a device file management unit that creates a device file for a device as the target of evaluation in accordance with the naming rule based on the result of communication performance evaluation. The result of communication performance evaluation by the communication performance evaluation unit is incorporated into the name of a device file and the evaluation result is thereby provided to a device-use application.12-18-2008
20110040869ELECTRONIC DEVICE WITH WEBSITE INFORMATION - An electronic device is capable of communicating with at least one website via a network. The electronic device includes a storage module, an executing module, an integrating module, and a display module. The executing module is capable of retrieving information from the at least one website via the at least one webpage address. The integrating module is capable of determining positions where the information would be displayed in the electronic device. The display module is capable of displaying the information in the determined positions.02-17-2011
20120290705Component Independent Process Integration Message Monitoring - The present disclosure involves systems, software, and computer implemented methods for centralized monitoring of business processes. One process includes identifying a process integration (PI) domain, where the PI domain includes at least one PI component, accessing at least one PI component included in the identified PI domain. retrieving a set of local monitoring information from the accessed at least one PI component, persisting the retrieved set of local monitoring information in a centralized repository, and presenting at least a portion of the persisted set of local monitoring information to a client in response to a request from the client.11-15-2012
20120290709METHOD AND APPARATUS TO DETERMINE THE AMOUNT OF DELAY IN THE TRANSFER OF DATA ASSOCIATED WITH A TCP ZERO WINDOW EVENT OR SET OF TCP ZERO WINDOW EVENTS - Network monitoring method and apparatus determines the zero window event data transfer delay, reporting the amount of data transfer delay caused thereby. Non-data-transfer-delaying zero window events can be separated from those causing actual delay, allowing reporting of actual delay events separate from non-delay causing events.11-15-2012
20090094362Method and system for managing quality of service in a network - According to embodiments, the present invention comprises a method and system for managing support of quality of service requirements for various clients of a telecommunications network at a server level. Servers assigned to the various clients may include quality of service descriptors that identify relative priorities of the clients. In the event of a failure or reduced performance of a server, for example, an assignment of respective servers to respective clients may be changed based on the relative priorities of the respective clients.04-09-2009
20110302305ROOT CAUSE ANALYSIS METHOD, APPARATUS, AND PROGRAM FOR IT APPARATUSES FROM WHICH EVENT INFORMATION IS NOT OBTAINED - In the system management server, an information processing apparatus that is an event-information acquisition target is registered as a monitored apparatus in configuration information; event information that complies with a rule stored in advance is identified from among a plurality of pieces of event information stored in the system management server; a server apparatus for a network service related to the event information is identified; and a message is displayed which indicates that the cause of the event that occurred in a client information processing apparatus which has generated event information is an event related to the network service, which occurred in the server apparatus.12-08-2011
20120290706STATE CONTROL OF REMOTE HOSTS FOR MANAGEMENT OF DISTRIBUTED APPLICATIONS - Configuring a node. A method includes determining a current state of a target node. The current state of the target node refers to objects currently deployed or running in the remote target node. It includes at least one of an operating system, one or more applications, or configuration setting at the target node. The method further includes determining a desired state for the target node to change the current state. The method further includes accessing a dependency graph based on the version of an agent running on the target node. The dependency graph is supplied to a state machine. The state machine is particular to the target node. The state machine using the current state of the target node, the desired state and the dependency graph, performs operations to drive the target node toward its goal.11-15-2012
20120290710METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING DATA STORAGE RATES IN AN APM SYSTEM - Data storage rates are dynamically adjusted in an APM system, by monitoring data storage elements and modulating the data storage when a determination is made that the storage buffer utilization is too high.11-15-2012
20120290707SYSTEM AND METHOD FOR UNIFIED POLLING OF NETWORKED DEVICES AND SERVICES - The present invention provides methods, systems and computer readable media for unified polling of networked devices and services. A system for unified polling of networked devices and services according to one embodiment comprises one or more pollers in communication with one or more devices, the one or more pollers operative to request and perform one or more polling tasks of the one or more devices. The system further comprises a unified poller in communication with the plurality of pollers, the unified poller operative to receive requests for one or more polling tasks; determine priorities of the one or more polling tasks; and assign one or more threads to control the one or more pollers on the basis of the priorities of the one or more polling tasks.11-15-2012
20110302301CAPACITY CONTROL - There are described a system, apparatus and/or method according to which collected history data from monitorable and/or manageable entities within a server estate or data centre is used to tailor a model to the past behaviour and/or loading upon individual ones or parts of ones of the entities. The tailored model can then be used to predict a future value for one or more metrics included in the history data for an entity or part of an entity under consideration. The predicted value can then be used to determine whether some form of corrective action is required in respect of the entity, entity part or some other entity or entity part. Alternatively or in addition, predicted values for more than one entity or entity part can be aggregated to determine whether some form of corrective action is required in respect of the entity, entity part or some other entity or entity part. A corrective action can be applied on an automated or on a manual basis.12-08-2011
20120110163METHOD AND SYSTEM FOR DATA PACKET QUEUE RECOVERY - Resource-aware dynamic bandwidth control uses information about current network state and receiver performance to avoid, minimize and/or recover from the effects of network spikes and data processing spikes. Linear models may be used to estimate a time required to process data packets in a data processing queue, and are thus useful to determine whether a data processing spike is occurring. When a data processing spike occurs, an alarm may be sent from a client to a server notifying the server that the client must drop packets. In response, the server can encode and transmit an independent packet suitable for replacing the queued data packets which can then be dropped by the client and the independent packet present to the processor instead.05-03-2012
20110302297Agent-less Follow-me Service for Cloud-based Applications - Technologies are generally described herein for providing an agent-less follow-me service. An example web browser may be configured to receive a first link to a reference table from a portable token. The web browser may be configured to retrieve a second link to an on-going web application from the reference table. The second link may reflect a first state of the on-going web application. The web browser may be configured to open the on-going web application corresponding to the second link. As a user interacts with the on-going web application, the on-going web application may be configured to transition from the first state to a second state. The web browser may be configured to update the second link in the reference table to reflect the second state of the on-going web application.12-08-2011
20110302306SYSTEMS AND METHODS FOR TRACKING WEB ACTIVITY - Systems and methods of tracking activity over networks and, in particular, tracking web activity over the Internet are described. Exemplary systems and methods may include a receiver for receiving a request from a visitor for a data object, a processor for providing a cookie to track the visitor's web activity, and a transmitter for transmitting the cookie to the visitor in response to the request. The cookie may comprise tracking information for a plurality of web sites visited by the visitor.12-08-2011
20110302307REPORTING PROCESSING METHOD, ORIGIN SERVER AND USER CLIENT FOR USER AGENT PROFILE INFORMATION - The present invention discloses a reporting processing method for User Agent Profile (UAP) information including: issuing, by an origin server, a reporting policy to a user client to instruct the user client to report UAP information according to the reporting policy; and reporting, by the user client, the UAP information according to the reporting policy issued by the origin server. The invention also discloses an origin server including a reporting policy issuing unit adapted to issue a reporting policy to a user client to instruct the user client to report UAP information according to the reporting policy; and a UAP user client including a UAP information reporting unit adapted to report UAP information of the user client according to a reporting policy issued by the origin server. The invention can enable the user client in a UAP system to report the UAP information with more flexibility and diversity.12-08-2011
20110302300INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An apparatus and method provide logic for formatting electronic content. In one implementation, an apparatus includes an identification unit configured to identify a plurality of devices associated via a network, and a receiving unit configured to receive information corresponding to the associated devices. The information includes a function provided by the associated devices and performance data corresponding to the associated devices. A generation unit is configured to generate a first value of an execution metric describing at least one of an execution of the function by the associated devices or the performance data corresponding to the associated devices, based on at least the received information, and an output unit is configured to output the first metric value.12-08-2011
20110302302ADAPTIVE MOBILE CLOUD SYSTEM USING PRIVATE VIRTUAL INTANCE AND CONSTRUCTION METHOD THEREOF - An adaptive mobile cloud system using a private virtual instance (PVI) includes: a PVI automatic provisioning for generating a PVI by providing a hardware resource, an operating system and an application which are requested by a user terminal; a PVI image manager for storing and managing an image of an execution state of the PVI by checking a state of the PVI; a mobile interface adaptor that is adaptively operated according to an input/output device and resources of the user terminal; and an adaptive application manager for executing an application by adaptive cooperation between the user terminal and the PVI according to the resource of the user terminal.12-08-2011
20110302304SERVICE PROVIDER OPTIMIZATION OF CONTENT MANAGEMENT - A system and method for monitoring the performance associated with fulfilling resource requests and determining optimizations for improving such performance are provided. A processing device obtains and processes performance metric information associated with processing a request for an original resource and any embedded resource. The processing device uses the processed performance metric information to determine a set of service providers for alternatively hosting, processing, and/or transmitting at least a portion of the original resource and/or any embedded resources. In some embodiments, in making such a determination, the processing device assesses performance metric information collected and associated with subsequent resource requests for the original resource and any embedded resources using each of a variety of alternative set(s) of service providers. The processing device may also consider service provider selection criteria obtained from the original content provider. Aspects of systems and methods for generating recommendations associated with monitoring the operation and performance of service providers with respect to specific resource requests are also provided.12-08-2011
20110302303System & Method for Managing Transfers of Digital Assets Over a Network - Digital media assets are managed within an electronic network distribution system. A management computing system coupled to the network prepares a digital asset for transfer over the network in accordance with a set of distribution rules. A modified version of the digital asset includes a unique identification number associated with a first instantiation of the digital asset. The management computing system tracks transfers of the digital asset based on separate instantiations of the asset created for each transfer occurring over the network.12-08-2011
20110302298METHOD AND SYSTEM FOR TESTING MULTIPLE COMPONENTS OF A MULTI-TENANT, MULTI-DOMAIN, MULTI-TIERED WEBSITE - Embodiments are described for a system and method for testing a plurality of web resources, such as web sites and/or web servers in a distributed client-server computer network. Embodiments include a method of configuring a proxy server to forward incoming HTTP requests back to a fixed port on the IP address of the sender of the incoming HTTP request to effectively remove the requirement of domain name resolution from the test environment. A reflective proxy server reflects requests from a source IP address back to that same IP address on a specific port on the testing computer to permit the testing of arbitrary web site domain names without performing DNS resolution at any step in the process, thus removing the need to modify the testing computer's host's file.12-08-2011
20110302299SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DETERMINING A RATE AT WHICH AN ENTITY IS POLLED - In accordance with embodiments, there are provided mechanisms and methods for determining a rate at which an entity is polled. These mechanisms and methods for determining a rate at which an entity is polled can enable decreased overall server load, improved efficiency, an increased perception of responsiveness, etc.12-08-2011
20110302296METHOD AND SYSTEM FOR PROVIDING SECURE TRANSACTIONS VIA A BROADBAND GATEWAY - A broadband gateway may be used to authorize transactions associated with one or more accounts, which may be associated with a user of the broadband gateway. The transaction may be handled by the broadband gateway. The authorizations may be performed based on information associated with the accounts, whose storage may be controlled by the broadband gateway. The broadband gateway may block and/or terminate transactions failing authentication and/or validation, which may be performed based on the stored information. The transactions may be initiated within a network serviced by the broadband gateway. The transactions may also be initiated outside the serviced network. The stored information may comprise a user profile, which may comprise a plurality of settings for controlling and/or managing authorization performed by the broadband gateway. The user profiles may be configurable by users, wherein configuration may comprise initializing and/or modifying one or more of the transaction related settings.12-08-2011
20110302294SERVICE QUALITY EVALUATOR HAVING ADAPTIVE EVALUATION CRITERIA - An improved method is provided for evaluating service quality of a software application residing in a computing environment. The method includes: monitoring first and second metrics indicative of performance of the software application; evaluating the first metric in relation to a first evaluation criterion; evaluating the second metric in relation to a second evaluation criterion different than the first evaluation criterion; and determining the state of service for the software application based in part on the evaluation of the second metric. Over time, the second evaluation criterion is adapted based on the outcome of the evaluation of the first metric.12-08-2011
20110302295SYSTEM AND METHOD FOR MODELING INTERDEPENDENCIES IN A NETWORK DATACENTER - The system and method described herein may include a discovery engine that scans a network datacenter to inventory resources in the datacenter and populate a configuration management database with the resource inventory. One or more destination listeners created from the resource inventory may then selectively sample monitored flows in the datacenter to model interdependencies between the inventoried resources. For example, any monitored flows originating outside the datacenter or failing to correlate with the inventoried resources may be dropped, whereby the interdependencies may be modeled from a deliberately reduced sample of the monitored flows that have information relevant to modeling relationships between resources within the datacenter. Furthermore, directionalities for the monitored flows may be determined, wherein the directionalities provide further information relevant to modeling the relationships between the resources within the datacenter.12-08-2011
20110302293RECOGNITION SYSTEM FOR SHARING INFORMATION - A system and method for sharing information between users based on recognition of the users and their associated processing devices in a scene. Interactions can be physical, verbal or a combination of physical and verbal gestures. Movements of the user and other users are tracked and interactions detected between them. User processing devices are connected by detecting users within view of a capture device, the capture device detecting motion tracking data for the user, such as a skeletal model. Information sharing may be controlled by the processing devices directly, by an intermediary server, or by a combination of the processing device and an intermediary server.12-08-2011
20110302291METHODS AND SYSTEMS FOR PRIORITIZING NETWORK ASSETS - Methods and systems for restoring networks to normal behavior are disclosed. For example, in various embodiments an apparatus for addressing device abnormalities in a network may include node monitoring circuitry configured to monitor device abnormalities in the network, and ranking circuitry that may receive information from the node monitoring device and, upon receiving information from the monitoring circuitry that multiple devices in the network are compromised, may provide ranking information as to which of the multiple compromised devices in the network is to be attended to first.12-08-2011
20090106414Digital Living Network Alliance (DLNA) Enabled Portable Electronic Devices, DLNA Management Consoles and Related Methods of Operating DLNA Enabled Portable Electronic Devices - Digital living network alliance (DLNA) enabled portable electronic devices are provided that include a DLNA device circuit and a DLNA management console circuit. The DLNA device circuit is configured to attach the portable electronic device to an existing DLNA network having at least one existing DLNA management console so as to allow the portable electronic device to be a source for data on the existing DLNA network. The DLNA management console circuit is configured to enable the portable electronic device to operate as a portable management console for the existing and/or a new DLNA network. Related management consoles and methods of operating DLNA enabled portable electronic devices are also provided.04-23-2009
20110167155BREAK BEFORE MAKE FORWARDING INFORMATION BASE (FIB) POPULATION FOR MULTICAST - A method of installing forwarding state in a link state protocol controlled network node having a topology database representing a known topology of the network, and at least two ports for communication with corresponding peers of the network node. A unicast path is computed from the node to a second node in the network, using the topology database, and unicast forwarding state associated with the computed unicast path installed in a filtering database (FDB) of the node. Multicast forwarding state is removed for multicast trees originating at the second node if an unsafe condition is detected. Subsequently, a “safe” indication signal is advertised to each of the peers of the network node. The “safe” indication signal comprises a digest of the topology database. A multicast path is then computed from the network node to at least one destination node of a multicast tree originating at the second node. Finally, multicast forwarding state associated with the computed multicast path is installed in the filtering database (FDB) of the network node, when predetermined safe condition is satisfied.07-07-2011
20110289213TRACKING LOCALLY BROADCAST ELECTRONIC WORKS - A method, system, and program for tracking locally broadcast electronic works are provided. According to one aspect of the invention, a sending player locally broadcasts an electronic work. In particular, the local broadcast may be a wireless broadcast creating an ad-hoc radio system. At least one recipient player receives the localized broadcast of the electronic work and accepts a distribution cookie for tracking distribution of the electronic work. The at least one recipient player updates the distribution cookie with tracking information about the broadcast of the electronic work, including ratings by users at the second player and purchase of the broadcast electronic work. Each of the at least one recipient players may in turn become a sending player that broadcasts the electronic work to other recipient players and requires the other recipient players to accept a copy of the distribution cookie updated by the second player. Then, responsive to detecting a network connection to a statistics server, the at least one recipient player provides the distribution cookie to the statistics server, such that localized broadcast distribution of the electronic work is tracked.11-24-2011
20110289211MONITORING NETWORK USAGE - A method of determining whether a user has complied with a service level agreement (SLA) with a network operator, comprising collecting a set of data values representative of the user's service usage and comparing the set of data values to the service level agreement. The data values collected provide the operator with sufficient information so that it can determine whether a SLA is being complied with and to plan provision of network services. A method of monitoring a user's usage of a network service and a service usage indicator is also disclosed.11-24-2011
20110289209Method For Monitoring And Providing Information Over A Peer To Peer Network - The present invention relates to a pseudonode used for deployment on a peer to peer network which pseudonode comprises an IP address and client ID that is changeable upon the occurrence of a preselected event and includes a list containing at least one searchable data object. The pseudonode is programmed for monitoring the network to receive search requests therefrom and to compare each said received search with said list of data objects and to respond to such request. The invention also provides a method for monitoring search requests for selected objects by nodes on a peer to peer network. The method includes interposing the pseudonodes on the network in which it is configured to provide at least one IP address and optionally at least one client ID. The pseudonode has at least one stored object corresponding to a request object stored at said pseudonode; and monitors the network to detect requests matching at least one of the stored objects and acquires a unique ID generated by any network node requesting the object matching that stored object on the pseudonode and responding to substantially each node representing an acquired ID.11-24-2011
20110289203SIP MONITORING AND CONTROL ANCHOR POINTS - The concept of anchor points is introduced. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be shared by any application. The use of an anchor point allows for applications to become aware of and control a communication late or cease monitoring and controlling a communication session early without disrupting the session or introducing a significant amount of control or media delay.11-24-2011
20110289214Content delivery network map generation using passive measurement data - A routing method operative in a content delivery network (CDN) where the CDN includes a request routing mechanism for routing clients to subsets of edge servers within the CDN. According to the routing method, TCP connection data statistics are collected are edge servers located within a CDN region. The TCP connection data statistics are collected as connections are established between requesting clients and the CDN region and requests are serviced by those edge servers. Periodically, e.g., daily, the connection data statistics are provided from the edge servers in a region back to the request routing mechanism. The TCP connection data statistics are then used by the request routing mechanism in subsequent routing decisions and, in particular, in the map generation processes. Thus, for example, the TCP connection data may be used to determine whether a given quality of service is being obtained by routing requesting clients to the CDN region. If not, the request routing mechanism generates a map that directs requesting clients away from the CDN region for a given time period or until the quality of service improves.11-24-2011
20110289210CONNECTING PORTS OF ONE OR MORE ELECTRONIC DEVICES TO DIFFERENT SUBSETS OF NETWORKS BASED ON DIFFERENT OPERATING MODES - A connection apparatus includes at least one module to connect network ports of one or more electronic devices to network ports that are connected to respective networks, and a manager to create at least one profile for a particular one of the one or more electronic devices. The at least one profile specifies that the particular electronic device is to be connected to different subsets of the networks for corresponding different modes of operation of the particular electronic device.11-24-2011
20110289208SESSION TERMINAL APPARATUS AND NETWORK SESSION SYSTEM - A session terminal apparatus constitutes a network session system together with another session terminal apparatus. In the session terminal apparatus, a back performance instruction part instructs reproduction of back performance information. A back performance control part transmits the back performance information, when the reproduction thereof is instructed by the back performance instruction part, to another session terminal apparatus, and controls a performance reproduction part to start reproducing the back performance information when a monitor delay time corresponding to a communication delay time between the session terminal apparatus and another session terminal apparatus has elapsed after the reproduction of the back performance information was instructed.11-24-2011
20110289207METHOD AND APPARATUS FOR PROCESSING NETWORK VISUALIZATION - A method, system and computer program product for processing network visualization. The network visualization processing method includes: obtaining main-information-dimension-based topological data of an analytic object in a network; performing visualization processing to the main-information-dimension-based topological data of the analytic object so as to reveal change of a relationship between an analytic node and a neighboring node in the analytic object along the main information dimension. The network visualization processing method and apparatus according to the present invention can display dynamic change of the network based on main information dimension within a single view, and provide a better graphical resolution, so as to facilitate a user to perform analysis to the network and to reduce comprehension overhead of the user.11-24-2011
20110289206AUTOMATIC ENTERPRISE SERVICE BUS DEPLOYMENT AT THE LEVEL OF INDIVIDUAL SERVICES - A method and system for automatic ESB deployment at the level of individual services is described.11-24-2011
20110289205Migrating Virtual Machines Among Networked Servers Upon Detection Of Degrading Network Link Operation - Migrating virtual machines among networked servers, the servers coupled for data communications with a data communications network that includes a networking device, where migrating includes: establishing, by a virtual machine management module (‘VMMM’), one or more virtual machines on a particular server; querying, by the VMMM, the networking device for link statistics of a link coupling the network device to the particular server for data communications; determining, by the VMMM in dependence upon the link statistics, whether the link coupling the network device to the particular server is degrading; and if the link coupling the network device to the particular server is degrading, migrating a virtual machine executing on the particular server to a destination server. In some embodiments, migrating occurs is carried out only if non-degrading link is available. If no non-degrading links are available, the network device, rather than the link, may be failing.11-24-2011
20110289204Virtual Machine Management Among Networked Servers - Virtual machine management among networked servers coupled for data communications with a data communications network that includes a network device and a Virtual Machine Management Module (‘VMMM’), where VM management includes: monitoring, by the network device, network traffic of applications executing in virtual machines of the servers; determining, in dependence upon the monitored network traffic, whether a particular application's network traffic exceeds a predetermined threshold, the particular application executing in a particular virtual machine of a particular server; if the particular application's network traffic exceeds the predetermined threshold, allocating, by the VMMM, an additional virtual machine in a different server; and instantiating, by the VMMM, in the additional virtual machine at least one application.11-24-2011
20090282145NETWORK DEVICE, METHOD FOR SPECIFYING INSTALLATION POSITION OF NETWORK DEVICE, AND NOTIFICATION DEVICE - A network device, method for specifying installation position of network device, and notification device are provided. The network device includes: a loop detecting unit configured to detect a loop caused by the network device; and a location notifying unit configured to allow the network device itself to indicate a location of the network device in response to a detection of the loop.11-12-2009
20110296001Privileged Activity Monitoring through Privileged User Password Management and Log Management Systems - A system and method is provided for allowing seamless auditing compliance and investigations of privileged account access and activities. Account access information and privileged activity information may be stored in a central data repository. The central data repository may be queried to determine who was granted access to a privileged account, the timeframe that the access was granted, and/or what actions were performed by the user who was granted access.12-01-2011
20120016985MONITORING SYSTEM AND METHOD FOR CONNECTING A MONITORING DEVICE TO A SERVICE SERVER - A method for connecting a monitoring device to a service server includes retrieving an address relating to a control server from a memory of the monitoring device and, sending a connection message from the monitoring device to the address relating to a control server in response to a connecting event. At the control server, an identifier is extracted from the communication between the monitoring device and the control server, a service server associated with the extracted identifier is identified and an address relating to the identified service server is sent from the control server to the monitoring device. A connection message from the monitoring device is sent to the identified service server in response to the receipt of the address related to the identified service server. A service connection is established between the monitoring device and the identified server.01-19-2012
20120016984FACILITATING NETWORK COMMUNICATIONS WITH CONTROL SERVER, HOSTING SERVER, AND DEVICES UTILIZING VIRTUAL NETWORK CONNECTIONS - A method includes communicating network connection information from a control server to each of a first subset of devices for enabling an open network connection between each of the devices of the first subset; spawning, by each of a plurality of devices, a plurality of virtual machines for network connections that virtualize network capabilities of the device; establishing, by each of the devices, a respective open network connection with each of the other devices using a respective spawned virtual machine and network connection information received from a control server; receiving, by each device, data from a hosting server and data from one or more of the open network connections that are established with that device; processing, by each device, the received data; and providing a user experience, by each device, based on the processed data.01-19-2012
20080270605Distributing and Geographically Load Balancing Location Aware Communication Device Client-Proxy Applications - A method and system for balancing server work load for cellular phone client-proxy applications in an environment where the clients change position within a given geographic area is disclosed. The method comprises the steps of mapping, monitoring, automatically re-mapping the system when required, updating a map address book, and updating a client address book. The system has a mapping system and a communication system connected to a plurality of servers, proxy servers and applications by an internal network. The proxy servers are connected to a plurality of clients by the Internet. If a threshold is exceeded, the monitoring program sends a message to a mapping program. Upon receipt of the message, the mapping program uses a rules engine to calculate a new map graph to remove load from an overloaded server (or servers) and to adjust communication requirements for data by reconfiguring partitions.10-30-2008
20110296003USER ACCOUNT BEHAVIOR TECHNIQUES - User account behavior techniques are described. In implementations, a determination is made as to whether interaction with a service provider via a user account deviates from a model. The model is based on behavior that was previously observed as corresponding to the user account. Responsive to a determination that the interaction deviates from the model, the user account is flagged as being potentially compromised by a malicious party.12-01-2011
20110296011SHARED HEARTBEAT SERVICE FOR MANAGED DEVICES - Systems, methods, and apparatuses for facilitating communication between remote services and applications installed on a device are described. In accordance with embodiments, each of a plurality of remote services generates an application-specific message intended for processing by a corresponding application installed on a device and transmits the application-specific message to a device management system (DMS) server, where it is queued. A DMS client installed on the device sends heartbeat messages to the DMS server indicating that the device is available to receive messages. In response to receiving the heartbeat messages, the DMS server transmits the application-specific messages to the DMS client. The DMS client then publishes each application-specific message to the particular application that the application-specific message was intended for.12-01-2011
20110296013SYSTEM AND METHOD FOR PROVIDING HYBRID ON DEMAND SERVICES TO A WORK UNIT - The present document describes a method and system for providing Hybrid On Demand (HOD) software and/or data to a plurality of normal nodes associated with a work unit. The normal nodes are serviced via two or more parent nodes using different communication networks. Normal nodes, which are connected to the Local Area Network (LAN) of the work unit, may receive software and/or data services from a local node via the LAN, and normal nodes which are outside of the LAN may receive software and/or data services from a SUPR node via a Wide Area Network (WAN) such as the internet. After synchronization with one the normal nodes, the parent nodes synchronize the updated data with each other, and then they push the updated data to all the normal nodes associated with the work unit to mirror the same data on all the normal nodes. Frequencies of synchronization and provision of software and/or data services and/or updates is governed by a set of synchronization rules that are embedded in the business layer of the nodes. This scenario may also be used for synchronizing data in a cache cloud manner between the different nodes of the wide and the local networks.12-01-2011
20110296004METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO RANK USERS IN AN ONLINE SOCIAL NETWORK - Methods, apparatus, and articles of manufacture to rank users in an online social network are described. An example method to rank in an online social network includes determining a connectedness of a user on a social networking site based on a number of contacts of the user, determining a number of first interactions directed from the user to at least one of the contacts, determining a number of second interactions associated with the first interaction and at least one of the contacts, and ranking the user with other users on the social networking site based on the connectedness, the first interactions, and the second interactions.12-01-2011
20110296010FILE TRANSFER APPARATUS AND CONTROL METHOD THEREOF - In one embodiment, a file transfer apparatus includes a storing device, a determination unit, and a notification unit. The storing unit stores transfer information between the file transfer apparatus and a second file transfer apparatus. The determination unit determines an insufficient state when the latest value of a numerical value which varies depending on a use situation of the region meets a predetermined condition. The notification unit notifies, as a response to the determination of the insufficient state by the determination unit, the gist thereof to a user.12-01-2011
20110296009SYSTEM AND METHOD FOR WAVELETS-BASED ADAPTIVE MOBILE ADVERTISING FRAUD DETECTION - In accordance with embodiments, there are provided mechanisms for methods and systems for the detection of fraudulent advertisement views of advertiser supported content on mobile devices through the analysis of data and of data exchange between groups of mobile devices and an advertising server. The data analysis is carried out by comparing statistical data spectra of different mobile device groups to detect unusual levels of advertisement views within a mobile device group. The data analysis provides a high guarantee of fraud detection of illegitimate advertisement views for sponsoring advertisers. Embodiments detect non-meaningful ad display requests or clickthroughs, identify bots among application users and provide an estimate of the number bots.12-01-2011
20110296008IMAGE PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, AND METHOD THEREFOR - An image processing apparatus capable of requesting a service providing apparatus via an external network to perform processing and communicating with an information processing apparatus via an internal network includes an activation unit configured to activate a check unit configured to check a status of the processing acquired by the information processing apparatus, a stopping unit configured to stop the check unit if the check unit activated by the activation unit recognizes that the status of the processing is not a stopped state, and a request unit configured to request the service providing apparatus to perform the processing if the check unit is stopped.12-01-2011
20110296007METHOD AND DEVICE FOR IDENTIFYING AN SCTP PACKET - A method for identifying a Stream Control Transmission Protocol (SCTP) packet is provided, which includes: acquiring a feature tuple of a received SCTP packet, in which the feature tuple includes at least one piece of the following information: a source Internet Protocol (IP) address, a destination IP address, and a verification tag (V_tag); matching the acquired feature tuple of the SCTP packet with a SCTP tuple identification table, in which the SCTP tuple identification table includes a mapping relation between a feature set tuple and an SCTP association, and the feature set tuple includes at least one piece of the following information: a source IP address set, a destination IP address set, and the V_tag; and acquiring an SCTP association to which the SCTP packet belongs, if the acquired feature tuple of the SCTP packet matches one or more records of the SCTP tuple identification table. Correspondingly, a device for identifying an SCTP packet, a system for identifying an SCTP packet, and a method for establishing an SCTP tuple identification table are further provided, capable of reducing missed identification of an SCTP stream.12-01-2011
20110296006COOPERATIVE BANDWIDTH AGGREGATION USING MULTIPATH TRANSPORT - A method of wireless communication includes communicating with a server through a first MPTP path using a first IP address; communicating with the server through a second MPTP path using a second IP address, the communication with the server through the second MPTP path being through a wireless node at the second IP address; and communicating with the wireless node through peer-to-peer communication.12-01-2011
20110296005Method and system for monitoring control signal traffic over a computer network - A system and method is provided for detecting, tracking and/or blocking control signal attacks, which can occur between local computer systems and/or between remote computer systems, network links, and/or routing systems over a computer network. The system includes a router monitor adapted to receive a plurality of control signals and related information from the computer network and to process the plurality of control signals and related information to detect one or more control signal anomalies. The router monitor is further adapted to generate a plurality of alert signals representing the one or more control signal anomalies. The system further includes a controller that is coupled to the router monitor and is adapted to receive the plurality of alert signals from the router monitor. The controller is constructed and arranged to respond to the plurality of alert signals by tracking attributes related to the one or more control signal anomalies to at least one source, and to block the one or more control signal anomalies using a filtering mechanism executed in close proximity to the at least one source.12-01-2011
20110295994METHOD AND DEVICE FOR OPERATING A GROUP SERVICE IN A COMMUNICATIONS NETWORK - A method operates a group service or several group services in a communications network. The method involves detecting specific group service and/or specific group event-related data items in an event-recording unit, transmitting at least a part of specific group service and/or specific group event-related data items from the event-recording unit to a group lists-generating unit, evaluating said specific group service and/or specific group event-related data items and generating specific group lists by said group lists-generating unit, wherein said specific group lists indicate the current participation state of the group participants to the group service or to each group service.12-01-2011
20110296002Stateful Flow Information Table Method and System for Packet Inspection System - A packet processing system comprises two packet inspection systems for tracking packet flows between a first network and a second network. A memory is accessible by each of the packet inspection systems for storing flow entries. Each of the flow entries includes a flow key characterizing a packet flow associated with flow entry, a flow identifier. State information is further maintained indicating ownership of the flow identifiers among the two packet inspection systems. Using stateful identifiers ensures that two packet processing systems do not become incoherent and properly indicate the status of free flow identifiers.12-01-2011
20110296000SYSTEMS AND METHODS FOR EXPORTING USAGE HISTORY DATA AS INPUT TO A MANAGEMENT PLATFORM OF A TARGET CLOUD-BASED NETWORK - Embodiments relate to systems and methods for exporting usage history data as input to a management platform of a target cloud-based network. A usage export service can be abstracted and provided external to a host cloud-based network, which can capture the usage history of software or resources by one or more users in the host cloud-based network. Those user(s) or others may wish to export some or all of the usage history to a target cloud or clouds, to perform management or configuration actions in the target cloud(s). The selective subset of the usage history can be transmitted to the cloud management system of the target cloud-based network. The selective subset can be used for management actions in the target cloud(s), such as for instance, to instantiate or configure a set of virtual machines for failover or re-clouding purposes, or to aggregate usage history from the host and target cloud(s).12-01-2011
20110295997PRESENTING CONTENT PACKAGES BASED ON AUDIENCE RETARGETING - A present technology intelligently retargets invitational content to a user by maintaining a user profile that includes data descriptive of the user's interaction with invitational content previously presented to the user and making decisions regarding retargeting based on an analysis of the user profile. The information in the user profile is not limited to whether or not the user completed a conversion action associated with invitational content presented. Rather, the profile is expanded to include such information as where on the conversion continuum the user abandoned the process and details of how the invitational content was presented to the user, e.g. colors used, situation, and message. When presented with a request for invitational content, the system uses the profile information to influence which content is selected and how it is presented to the user. This enables the system to re-present invitational content in a form and/or situation where the user is more likely to complete the conversion action.12-01-2011
20110295999METHODS AND SYSTEMS FOR CLOUD DEPLOYMENT ANALYSIS FEATURING RELATIVE CLOUD RESOURCE IMPORTANCE - A decision system and methods for providing customized deployment architectures that take into account the importance of various cloud resources. The decision system can monitor the applications and processes executed in the cloud, and collect utilization information identifying the cloud resources used, the amount of usage, and trends in usage. Resource importance data can then be obtained from the utilization information and/or from other sources, such as a system user. The decision system can then generate customized deployment architectures based on the collected utilization information and the resource importance data.12-01-2011
20110295996METHODS TO IMPROVE OVERLOAD PROTECTION FOR A HOME SUBSCRIBER SERVER (HSS) - A system and methodology that facilitates improving performance of a Home Subscriber Server (HSS) during overload conditions, by embedding a unique Application Session Identifier (app session ID) within multiple requests associated with a single call processing session is provided. Moreover, the system includes an overload protection component that identifies whether an incoming request is associated with previously processed requests based in part of the app session ID embedded within the incoming request. When the HSS is overloaded, the incoming requests that initiate a new call processing session and are not associated with previously processed requests are rejected/dropped before incoming requests that are associated with requests that have been previously processed.12-01-2011
20110295995METHOD AND APPARATUS FOR CONTROLLING LOAD ADMISSION RATE OF AN APPLICATION SERVER - A method and system for controlling load admission rate of an application server is provided. In the method, actual heap utilization and load admission rate of the application server in current control cycle are detected; based on the detected actual heap utilization and load admission rate, load characteristics variation parameters of the application server are estimated; and control gain of a feedback controller is calculated based on the load characteristics variation parameters; the feedback controller calculates desired load admission rate of the application server in next control cycle by using the calculated control gain. The load admission rate of the application server can be adaptively controlled by tracking changes in workload characteristics of the application server, such that the actual heap utilization of the application server is maintained at or close to target heap utilization.12-01-2011
20090077224METHOD AND APPARATUS FOR PROPAGATING ACCELERATED EVENTS IN A NETWORK MANAGEMENT SYSTEM - This invention relates to a method, system and computer program product for a network management system comprising:03-19-2009
20110296015EVENT SOURCE MANAGEMENT USING A METADATA-DRIVEN FRAMEWORK - The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.12-01-2011
20110296016RESOURCE STATE MONITORING METHOD, DEVICE AND COMMUNICATION NETWORK - A resource state monitoring method, device and communication network are provided. The method includes: acquiring network event state information of a node in a network running process, detecting a data plane resource state of the node and a control plane resource state of the node when it determines that the network event state information of the node meets a resource state detection triggering condition, and reporting a detection result to a management plane of the node. The device includes an acquiring unit, a checking unit, a triggering unit, a detecting unit and a reporting unit. The network includes several nodes, a communication control device and a resource state monitoring device.12-01-2011
20110296014COMPUTER PROGRAM PRODUCT AND METHOD FOR ESTIMATING INTERNET TRAFFIC - Site metrics are presented in association with search results. The site metrics are derived from site analytics that uses clickstream data collected from a panel of internet users to generate and present internet activity metrics. Data collected from a community of internet users may be augmented by clickstream data store content, third party content, search results, and other sources to form estimates of internet activity, such as traffic, that is structured and analyzed to produce metrics of nearly any internet web site or domain. The data may be further augmented with ratings, such as web site trust ratings, retail deals, and analysis of web site content to form a comprehensive set of data that is mined to formulate various metrics of internet activity about web sites. Metrics of internet activity, a.k.a. site analytics, provides analysis that represents aspects of internet user access to a web site. Such aspects may include activity related to visitors, engagement, growth, trust, deals, and the like.12-01-2011
20110302292SYSTEMS AND METHODS FOR SERVICE ASSURANCE USING VIRTUALIZED FEDERATED PRESENCE INFRASTRUCTURE - Systems, methods, apparatuses and program products configured to provide a topology-service tool are described. A presence-federation solution asset is leveraged to address topology-federation problems. A network topology tool takes as input network endpoints, for example caller and callee telephone numbers, determines a network service flow used to connect the network endpoints, and develops a network topology view of the service flow along with associated network device related information.12-08-2011
20130219048Quantifying User Quality of Experience by Passive Monitoring - A method is implemented in a network element to generate quality of experience (QoE) metrics for hypertext transfer protocol (HTTP) sessions over a network between a user device and an HTTP server. The QoE metrics are based on detecting premature termination of a download process that indicate low QoE. This QoE metric data can then be utilized by network administrators or service providers to adjust network characteristics to improve the QoE or to offer changes in services to a customer that would improve the QoE.08-22-2013
20080288628METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MONITORING COMMUNICATIONS AND TAKING A RESPONSIVE ACTION - Exemplary embodiments include a device for monitoring communications and taking a responsive action including: a receiver operable for receiving an input signal from a user; a transmitter operable for transmitting an output signal to a communications network and a command signal to a secondary device; and a processor in operable communication with the receiver and the transmitter. The processor is operable for monitoring the input signal for an event and responsively instructing the transmitter to transmit the command to the secondary device.11-20-2008
20080313327COLLECTING INDIVIDUALIZED NETWORK USAGE DATA - A method for collecting individualized network usage data includes routing Internet communications between a plurality of local clients and a plurality of remote servers over a common data link between a router device and the Internet. For each of the plurality of clients, characteristics of that client's communications routed over the data link are monitored at the router device. A collection of statistics reflecting the monitored characteristics are maintained. From the router device, the collection of statistics are periodically communicated over the data link to an interested server.12-18-2008
20100064041Linear assets inspection system - The invention provides a graphical user interface implemented on a computer including an information area for displaying to a user at the computer inspection status information in connection with one or more components of a linear asset infrastructure. The graphical user interface also includes a control component operable by the user at the computer to cause the graphical user interface to display additional information on the one or more components of the linear asset infrastructure.03-11-2010
20120191850Networked Probe System - A networked probe system for a communications network (07-26-2012
20120089723PROVIDING A MONITORING SERVICE IN A CLOUD-BASED COMPUTING ENVIRONMENT - Technologies are described herein for providing a monitoring service in a cloud-based computing environment. A request is received from a user to subscribe to the monitoring service. The monitor workflow may correspond to the monitoring service. A first call to a finder application is executed over a communications network to retrieve data points according to the monitor workflow. A second call to an analyzer application is executed over the communications network to identify a relevant data point in the data points. A third call to a notifier application is executed over the communications network to notify the user of the relevant data point.04-12-2012
20100023614SERVER LOCATION MAPPING - Embodiments of a method for determining locations of computers in a group of computers, which may be performed by a system, are described. During operation, the system receives a location of a first computer in the group of computers. Then, the system determines locations of one or more additional computers in the group of computers relative to the first computer based on vibration spectra associated with the first computer and the one or more additional computers.01-28-2010
20110219117Group Management in a Communication Network - A method of performing group management in a communication network. A network node receives from a requesting node a request to monitor a group that contains a plurality of group members. The request also includes at least one criterion to be monitored. The network node determines which group members fulfil the criterion, and sends to the requesting node a notification message including an identity of at least one group member fulfilling the criterion. The notification message also includes further criterion fulfilment information, the further criterion information including an identity of the criterion fulfilled.09-08-2011
20110219116SYSTEM AND METHOD FOR NETWORK MANAGEMENT - A part of the elements discovered in a network are chosen to be monitored, and a user such as a network administrator is allowed to appropriately monitor desired elements. A network management server collects information on elements in the network, and displays collected information on a GUI screen. The user is allowed to choose an element based on the information displayed on the screen, and the element chosen by the user is then registered as an object to be monitored. Information is collected including elements which are not registered, and displayed on the screen along with a result of comparison to the registered elements.09-08-2011
20110264795Communication network managment system, method and program, and management computer - A communication network management system has: a communication network including a plurality of nodes and a plurality of links connecting between the plurality of nodes; and a management computer connected to the plurality of nodes. A loop-shape communication route in the communication network is a loop route. The management computer transmits a frame to one node on the loop route. When receiving the frame, each node on the loop route forwards the received frame to a subsequent node along the loop route and, if a predetermined condition is satisfied, returns a response back to the management computer. The management computer determines whether or not a failure is occurring, based on reception state of the response.10-27-2011
20090282147System And Method For Harmonizing Changes In User Activities, Device Capabilities And Presence Information - A method and system utilizes presence information for a device. The method and system comprise receiving a communication indicating a change to a user activity from a first device operated by a user. The existing presence status of the user to the presence status associated with the user activity for the user of a second device is automatically changed in response to the received change to the user activity. The second device is informed of the changing of the existing presence status for the second device to automatically alter a capability of the second device based on the changing of the existing presence status and based on a stored indication from the user on how the capability is to be altered.11-12-2009
20110219112DETECTION OF END-TO-END TRANSPORT QUALITY - In various embodiments, methods and systems are disclosed for the real time detection of network conditions in conjunction with a remote presentation protocol. The link quality may represent the quality of the end-to-end connection between client and server with upper and lower bounds on the injection of additional traffic used for measurement. In some embodiments, the measurement technique may be selected based on the type of measurement that is desired. Accuracy may be maintained by selecting the type of measurement used based on current and previous network conditions. In one embodiment, a state model is used to determine the frequency of measurement and to determine when the measurements have produced a stable estimate of the link quality.09-08-2011
20110219110System and Method for Managing the Delivery of Targeted Content - A system and method for managing the delivery of targeted content. When a user desires to opt-out of receiving targeted content, the user registers with a do-not-target (DNT) registry and is issued a DNT cookie. The DNT cookie is a domain cookie that is stored on a user network access device. A provider of targeted content may look for the DNT cookie stored on the user's network access device. When the DNT cookie is not found, then the provider may deliver targeted content to the user. When the DNT cookie is found, then the provider may not deliver targeted content to the user. A Web site may offer the user an “override” cookie that allows that Web site to provide targeted content, or selected targeted content, even when the user has a DNT cookie. Alternatively, a DNT header can be added to a Web page request that indicates that the user does not want to receive targeted content. The DNT header may be overridden by an override cookie.09-08-2011
20100268815LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) COLLISION DETECTION MECHANISM AND METHOD - A LDAP collision detection mechanism and a method are described herein that allow a LDAP client to detect and avoid an update operation collision on an entry within a LDAP directory. The method includes the steps of: (a) reading data from the entry in the directory; (b) processing the retrieved data; (c) sending a request to modify the data in the entry in the directory, wherein the client is assured that the requested modification will not be performed by the directory if another client had previously performed a modification on the data within the entry that was originally read by the client. There are several different embodiments of the LDAP collision detection mechanism and the method described herein.10-21-2010
20110191471System and Method for Sharing Web Performance Monitoring Data - A monitoring system is provided that allows owners of monitoring accounts to share web monitoring data collected under the direction of the monitoring account. Account owners are able to interact with the monitoring system to identify recipient accounts for shared web monitoring data and apply permissions at a granular level so that portions of monitored data can be shared with varying permission levels. Grouping can also be employed by an account owner to facilitate efficient sharing of monitoring data to many recipient accounts. The monitoring system also provides analysis utilities that can be used by a recipient account to aggregate shared with owned data and generate related reports as desired.08-04-2011
20110191467Lawful Interception of NAT/PAT - The present invention relates to methods and arrangements for monitoring translation activities in an intermediate node NAT/PAT between a local network and a public network in a communication system. The intermediate node NAT/PAT rewrites addresses related to traffic sent between the networks. The method comprises steps of configuring the intermediate node NAT/PAT to operate as Intercepting Control Element ICE or Data Retention source, and steps of requesting translation information, and reporting translation information to a requesting authority.08-04-2011
20110191466AUTONOMIC SERVICE ROUTING USING OBSERVED RESOURCE REQUIREMENT FOR SELF-OPTIMIZATION - A service request routing system and method includes a model table configured to store resource models. A monitor is coupled to the model table and programmed both to model resource consumption in a service providing infrastructure, and also to store the modeled resource consumption in the model table. A router is coupled to the model table, and the router is programmed to route each service request to a corresponding service instance disposed in an associated service host having a service providing infrastructure. The associated service host includes a grid host in a grid computing system.08-04-2011
20110191464IMAGE FORMING APPARATUS AND CONTROL METHOD THEREFOR - When a document, printing of which is designated, does not have a printable file format, an image forming apparatus determines whether a document management server which manages the document exists on the same network as that of the image forming apparatus. When it is determined that the document management server does not exist on the same network, the image forming apparatus acquires a file format printable by another image forming apparatus present on the same network, and transmits it to the document management server. The document management server receives the file format printable by the other image forming apparatus, and notifies the image forming apparatus of a list of an image forming apparatus or apparatuses capable of printing the document. Upon receiving the notification, the image forming apparatus instructs an image forming apparatus capable of printing the document about substitute printing. The instructed image forming apparatus substitute-prints the document.08-04-2011
20110191462Method and system for operating an E-Commerce service provider - A method for operating a commissioned e-commerce service provider provides services to businesses on a computerized network such as the Internet in exchange for a small commission on the commercial transactions generated using those services. Unlike most ISPs that provide services to individuals and businesses, the e-commerce service provider preferably provides Internet services for businesses operating web sites based on the amount of service utilized by the individual or business. Instead of paying a monthly fee for the Internet services required to host a web site or operate and e-commerce site, the business contracts with the e-commerce service provider to provide these services based on usage of these services. Preferably, the usage rate is tiered in accordance with the amount of traffic at the site to provide a nominal level of service at a lower rate, yet allow for an exceptional volume of traffic to be accommodated by the site at a higher rate without having the site fail or the service become overwhelmed.08-04-2011
20110191461SYSTEMS AND METHODS FOR USING WORKLOAD CHARACTERISTICS FOR SIZING AND PLACEMENT FOR POWER-AWARE CONSOLIDATION - Embodiments of the invention provide power savings via performing application workload consolidation to servers using off-peak values for application workload demand. Embodiments of the invention are designed to achieve significant power savings while containing performance risk associated with server consolidation.08-04-2011
20110191460System and a Method Relating to Network Management - The present invention relates to a node supporting networking and communication with other nodes by means of a layered communication protocol and group communication with other nodes controlled via a grouping protocol adapted to interact with said communication protocol. The node comprises a policy engine which is arranged separately from, but in communication with said grouping protocol. The policy engine is adapted to establish current and/or changing node, group and network related information and to use one or more grouping policies to automatically and dynamically control grouping related actions and adapt the grouping. The invention also relates to a system comprising a number of such nodes and a method of controlling grouping.08-04-2011
20090182864Method and apparatus for fingerprinting systems and operating systems in a network - A system and method for identifying the number of computer hosts and types of operating systems behind a network address translation is provided. The method includes processing an internet protocol packet associated with the host computer system. The process may involve capturing the internet protocol packet and extracting key fields from the internet protocol packet to produce a fingerprint. The method continues with analyzing the fields in order to determine if a network address translator is connected between the host computer and a public network (e.g. the internet). If there is a network address translator connected, fields may be analyzed in order to determine the number of computers using the network address translator. The fields may also be analyzing in order to determine with a level of probability that the fingerprint identifies the correct operating system running the host computers. Generally, the internet protocol packet that is analyzing will be captured from an aggregation point in the carrier network.07-16-2009
20100115091METHOD, SYSTEM AND RECORDING MEDIUM FOR COLLECTING CONTENTS USAGE INFORMATION - Disclosed is a method, a system, and a recording medium for collecting content usage information. The method includes the steps of transmitting a usage tracking report message from a DCD client of the terminal to the DCD server; and receiving the usage tracking report message in the DCD server. The usage tracking report message includes first information for identifying a corresponding session, second information including a transaction identifier, third information for identifying a corresponding application, and fourth information including content usage information. Advantageously, the DCD server collects content usage information so that users are provided with highly-preferred contents. The fact that the DCD server collects content usage information and transmits no contents unnecessary to users avoids wasting the network bandwidth and improves content delivery efficiency of the terminals, CP, and DCD server.05-06-2010
20100077077Arrangement and a Method Relating to Performance Monitoring - The present invention relates to an arrangement for monitoring performance in a network comprising a number of network devices or nodes, services and users, in real-time. The arrangement comprising information collecting means, generating means for generating performance KPI indicators depending on a number of definition performance parameters for one or more of said network nodes. The generating means comprise or communicate with decision graph generating means adapted to generate decision graph structures representing respective KPI values and combination probabilities in dependence of KPI definition performance parameters and in dependence of additional or correlation parameters. The generating means comprise decision graph content updating means adapted to update the decision graph structure or structures using said collected information to enable prediction of KPI status/behavior and message sending means are provided which are adapted to send out messages or notifications relating to one or more prediction results.03-25-2010
20090187655Secure platform management device - A platform management device configured to control the functionality of a provisioned electronic device is disclosed. The platform management device includes a processor operative to execute commands. A memory maintains a series of instructions that when executed by the processor, causes the processor to: (07-23-2009
20100115089Identifying Participants in a Conference - A method of obtaining data about all the participants in a Binary Floor Control Protocol (BFCP) conference is provided. The method comprises sending a query message from a floor participant or floor chair to a floor control server, the query message requesting information about all of the participants in the conference, and sending at least one status message from the floor control server to the floor participant, the at least one status message including information about all of the participants in the conference. These operations are performed within BFCP.05-06-2010
20100115093MONITORING APPARATUS AND SYSTEM - An individual signal unit; each said individual signal unit including: (i) a transceiver module, (j) a power supply, (k) a logic circuit, (l) at least one of a number of external event sensors, and wherein a signal from a said individual signal unit to a central control facility causes said central control facility to execute one or more predefined steps; at least some of said predefined steps configured or reconfigurable by an owner of said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties. Also provided is a monitoring system including an individual signal unit; said individual signal unit communicating with a central control facility when an event sensor activates said individual signal unit; said central control facility executing a number of predefined steps on receipt of a communication from said individual signal unit; at least some of said predefined steps configured or reconfigurable by an owner of, said individual signal unit; at least some of the predefined steps provided by one or more independent parties; at least some predetermined steps configured or reconfigurable by said independent parties.05-06-2010
20110270966DYNAMIC PERFORMANCE MONITORING - A management server uses one or more performance monitoring data collectors to generate SNMP queries. Each collector can be configured to specify one or more performance parameters. Using each configured collector, the management server can collect performance parameter data for managed devices in a network. When the management server receives performance data, the management server traverses through each response to look for performance values associated with each performance parameter. The management server can dynamically create and destroy performance monitoring instances supported by each collector to accommodate components added to or removed from the devices in the managed network.11-03-2011
20090150537Data communication method for a set of hard-real time applications within a network - A data communication method for a set of hard real-time applications with an associated set of predefined network requirements (PNR) is provided. The method comprises configuring the physical layer of the network with a set of static modulation parameters (SMPs) to guarantee the PNRs are met at worst-case operating conditions for the network. The method further comprises measuring the current network performance within the network based on a given network performance monitoring schedule and, whenever the current network performance exceeds the PNRs by predefined amounts, adjusting the physical layer of the network by selecting a set of dynamic modulation parameters (DMP's) to increase the bandwidth availability within the network. Advantageously, the invention further allows for the allocation of the excess bandwidth to a set of non-hard real-time applications, whenever the current network performance exceeds the PNR.06-11-2009
20100268820USER DATA SERVER SYSTEM, METHOD AND APPARATUS - A user data server system includes: a data storage node, which stores user data, registers the user data in a Distributed Hash Table (DHT) network by using a key, and receives and processes user data operation requests; a DHT index node, which creates and maintains DHT routing information according to a DHT algorithm and stores information of data storage nodes where user data is stored according to the key and searches for information of a data storage node where target user data is stored according to the key; a DHT super maintenance node, which manages and optimizes the DHT network; and a front end node capable of protocol processing and service processing, which obtains a key associated with a target user and obtains information of a data storage node where the target user data is stored by querying the DHT index node via the DHT network according to the key, and performs operations on the user data stored in the data storage node where the target user data is stored. With the technical solution provided by the present invention, a user data server is not centralized and is highly scalable and highly reliable with a high cost-effectiveness.10-21-2010
20100268816PERFORMANCE MONITORING SYSTEM, BOTTLENECK DETECTION METHOD AND MANAGEMENT SERVER FOR VIRTUAL MACHINE SYSTEM - A performance monitoring system, comprising: a server; a storage system; and a management server, the management server the management server is configured to: obtain the gathered time-sequential data from the server; judge whether at least one bottleneck has occurred in the logical resource of a specified one of the plurality of virtual machines at each time of the obtained time-sequential data, judge whether at least one bottleneck causing large influence on the specified one of the plurality of virtual machines has occurred; and notify that at least one large bottleneck has occurred in the specified one of the plurality of virtual machines.10-21-2010
20100268813SYSTEM AND METHOD FOR HANDLING REMOTE DRAWING COMMANDS - Examples of systems and methods are provided for handling remote drawing commands. A system may comprise a buffer module configured to receive, at the system from a remote server system over a remote access connection between the system and the remote server system during a remote connection session, remote drawing commands, according to a drawing command rate, of a remote application running on the remote server system. The buffer module may be configured to store the remote drawing commands. The system may comprise a timer module configured to facilitate sending at least some of the remote drawing commands in the buffer module to a graphics module according to a refresh rate that is less than the drawing command rate. The timer module may be application agnostic.10-21-2010
20090100174Method and system for automatic polling of multiple device types - A common poller polls multiple network devices of a communication network regardless of device type. A device personality service associates information corresponding to each of the devices with unique identifiers thereof. The common poller provides information resulting from polling the devices to network management systems (“NMS”) that request status and health information thereof. A poller client interface isolates the NMS from a common datastore coupled to the common poller and processes the information between the datastore and the NMS so the datastore is not directly exposed to the NMS. A scheduled poller causes the common poller to poll each network device according to a predetermined schedule. An on-demand poller may poll the devices between scheduled polling events. If a predetermined period as not passed since previous scheduled polling, the poller client interface forwards previously stored information from the common datastore to an NMS requesting status for a given device.04-16-2009
20110196962Method for Obtaining Information from a Local Terminal Environment - The present invention relates to obtaining information (I08-11-2011
20090144416METHOD AND SYSTEM FOR DETERMINING AN OPTIMALLY LOCATED STORAGE NODE IN A COMMUNICATIONS NETWORK - A method for locating an optimum storage node for serving a data file request received via a communications network, includes: receiving a file request from a user device coupled to the communications network; determining a geocode value based on a communications network address associated with the user device, wherein the geocode value is indicative of a geographic location of the user device; selecting a storage node from a plurality of storage nodes coupled to the communications network to serve the file request, wherein the storage node is selected based at least in part on the geocode value; and redirecting the file request to the selected storage node for handling.06-04-2009
20130191528AUTOMATICALLY SELECTING APPROPRIATE PLATFORM TO RUN APPLICATION IN CLOUD COMPUTING ENVIRONMENT - A method, system and computer program product for selecting an appropriate platform to run an application deployed in a cloud computing environment. The appropriate platform is selected by employing a two phase process, where the first phase occurs prior to the deployment of the application and the second phase occurs after the application has been deployed. In the first phase, the cloud computing node selects a platform using various factors, such as application binaries, application metadata and artifacts, and qualities of service and application requirements. In the second phase, the cloud computing node determines whether an alternative platform needs to be implemented for subsequent deployments of the application using various factors, such as application runtime metrics and garbage collection metrics. In this manner, an appropriate platform is automatically selected thereby removing the requirement for the user to indicate the type of platform for the target environment.07-25-2013
20090150546Protecting Encrypted Files Transmitted over a Network - An improved system and approaches for protecting secured files when being used by an application (e.g., network browser) that potentially transmits the files over a network to unknown external locations are disclosed. According to one aspect, access to secured files is restricted so that unsecured versions of the secured files are not able to be transmitted over a network (e.g., the Internet) to unauthorized destinations. In one embodiment, processes operating on a computer system are monitored to determine destination locations, if any, of said processes, and then using such destination locations to determine whether to permit the processes to open files in a secure or unsecured manner.06-11-2009
20090150544INFORMATION PROCESSING DEVICE AND INFORMATION PROCESSING METHOD - An information processing device and an information processing method are provided which can provide services to all clients (users) at a certain service level while preventing a server from being overloaded by reducing concentration of access from some clients without requiring special processing on the client side. The server monitors requests sent from clients and does not execute business logic as an error when receiving intervals of requests do not exceed a threshold. Also, timing of a request being resent from a client next time is controlled by controlling return timing when an error response is returned to the client.06-11-2009
20090150538Method and system for monitoring virtual wires - In general, the invention relates to a method for monitoring virtual wires. The method includes selecting a first virtual wire to monitor, wherein the first virtual wire connects a first virtual network interface card (VNIC) located on a first computer to a second VNIC located on a second computer, where the first computer and the second computer are connected to a chassis, and where the first virtual wire is implemented by the chassis. The method further includes collecting usage statistics associated with the first virtual wire, and performing a first action using the collected usage statistics associated with the first virtual wire.06-11-2009
20090150545AUTOMATIC COLLECTION AND UPDATING OF APPLICATION USAGE - A method and system providing automatic collection and updating of application usage on a large number of electronic devices without user intervention. The electronic devices may be a palm-sized computer systems, personal digital assistants (PDAs), or wireless telephones. On an electronic device, application usage statistics, for example, the number of times a user uses an application, are gathered and stored. Once gathered and stored, the usage statistics are transferred to a host computer, and subsequently to a server (alternatively, the electronic device can send the gathered statistics directly to a server). The server tabulates usage statistics gathered from a plurality of electronic devices and publishes the results. The users of the electronic devices that gather usage statistics can be compensated in a variety of ways (e.g., monetary, chances in a raffle, discounts on purchases etc.).06-11-2009
20090150543Communication System and Communication Device - A communication system includes a communication device and a communication network configured to communicate with the communication device. The communication network includes a storage unit configured to store first communication information related to a communication to the communication device that is generated when communications with the communication device are unattainable; and a notifying unit configured to send the first communication information stored in the storage unit to the communication device when communications with the communication device become attainable. The communication device is configured to receive the first communication information sent from the notifying unit, and includes a restraining unit configured to restrain function of a local device based on the first communication information.06-11-2009
20090150540Method for identifying components in a network - A method of identifying components in a network path by defining a role for a component from a rule governing another component or the network path, and identifying an instance of such first component from a data base listing instances of the component and associations of such component with other components in the path.06-11-2009
20090150536Application layer congestion control - A method of managing congestion within a request-response system is disclosed. The method includes determining a response time that is directly or indirectly indicative of how long it takes a back end system to process a request received from a front end system and return a corresponding response. The response time is compared to a threshold criterion. A determination is made, based at least in part on the comparison, that the back end system is becoming congested with requests from the front end system. The front end system is adjusted so as to at least temporarily reduce the number of requests provided to the back end system by the front end system.06-11-2009
20100030890Provisioning Artifacts For Policy Enforcement Of Service-Oriented Architecture (SOA) Deployments - A system provisions artifacts for policy enforcement of service-oriented architecture (SOA) deployments. The system comprises a computer-executed program code that creates a model of a SOA deployment by collecting information about SOA artifacts and mapping between business-centric applications and underlying SOA artifacts. The system further comprises a computer-executed program code that converts the model into actionable artifacts which are provisioned to SOA policy enforcement points.02-04-2010
20100121947System and Method for Managing the Offload Type for Offload Protocol Processing - A method for determining the offload type for the processing of the protocol of a network connection is disclosed. An offload policy manager in a server node determines the offload type on the basis of a number of factors, including the application type of the network connection, the traffic priority of the network connection, and the port of the network connection. After the offload policy manager selects the offload type of the network connection, the offload policy manager identifies the offload type to the offload engine, which processes the protocol of the network connection according to the offload type selected by the offload policy manager. The offload policy manager is able to access a number of application-specific tables. The offload policy manager selects an offload type by cross-referencing on an application-specific table the traffic priority of the network connection against the port of the network connection.05-13-2010
20080250139FACILITATING MONITORING AND SIMULTANEOUSLY ANALYZING OF NETWORK EVENTS OF MULTIPLE HOSTS VIA A SINGLE NETWORK INTERFACE - The substantially simultaneous tracing/monitoring of a plurality of sets of events via a single network interface. The plurality of events can be traced and/or monitored for one host or for a plurality of hosts coupled via the same network interface. The sets of events to be traced/monitored for a host are defined by the host and maintained in one or more configuration files. The configuration files may be dynamically updated.10-09-2008
20110238824Wireless Local Area Network Hotspot Registration - A wireless local area network ‘WLAN’ client device that has just connected to a WLAN detects that the WLAN is offered by a hotspot, where access to a public network is provided by the WLAN via a gateway. A browser application of the WLAN client device is launched, either automatically or in response to receiving an indication via a user input element of the WLAN client device to register at the hotspot. The browser application is launched with an Internet Protocol address that ought to trigger an Internet Protocol filtering rule of the gateway.09-29-2011
20110238825APPLICATION DATA FLOW MANAGEMENT IN AN IP NETWORK - Disclosed herein is a two-level, network-based application control (NBAC) architecture for monitoring services provided via a packet-based network. The NBAC architecture includes a Network Trigger System provided at a network level to analyze data flows relating to services to be monitored to detect occurrence of configurable events, and to generate and send event reports; and a Usage Status Engine provided at a control level to configure the Network Trigger System to detect occurrence of events of interest, and to receive and process the event reports from the Network Trigger System to monitor the services.09-29-2011
20120110174SYSTEM AND METHOD FOR A SCANNING API - Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided.05-03-2012
20120110171APPLICATION AND NETWORK-BASED LONG POLL REQUEST DETECTION AND CACHEABILITY ASSESSMENT THEREFOR - Systems and methods for application and network-based long poll request detection and cacheability assessment therefore are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a distributed proxy and cache system, including, determining relative timings between a first request initiated by the application, a response received responsive to the first request, and a second request initiated subsequent to the first request also by the application, and/or using the relative timings to determine whether requests generated by the application are long poll requests. The relative timings can be used to determine whether the second request is immediately or near-immediately re-requested after the response to the first request is received. The relative timings can also be compared to request-response timing characteristics for other applications to determine whether the requests of the application are long poll requests.05-03-2012
20120110170MALICIOUS CALL DETECTION APPARATUS, MALICIOUS CALL DETECTING METHOD AND COMPUTER PROGRAM FOR DETECTING MALICIOUS CALLS - To improve detection accuracy of SPIT, first, an identification information gathering apparatus receives various identification information from an IP phone terminal which has transmitted an INVITE message. A PUCI server generates bind identification information by binding or associating various identification information received from an identification information gathering apparatus via an SIP server and registers the bind identification information to a gray list stored in a list storing portion. A SPIT determination portion evaluates the bind identification information in reference to the gray list and determines whether or not the session start request from the IP phone terminal is allowed.05-03-2012
20120110168ANALYZING WEBPAGE USERS' WEB ACCESS ACTIONS BY USING A DEFINED FOCAL REGION - A method, system and computer program product for web access analytics. Date related to the users' access to page elements is received. The page elements accessed by the users which are capable of being mapped to a defined webpage focal region are determined. The users' access to the webpage focal region is analyzed based on the determined page elements capable of being mapped to the webpage focal region.05-03-2012
20120110167DEVICE WITH VIDEO BUFFER MODELING AND METHODS FOR USE THEREWITH - A device includes a frame data analyzer that generates buffer increment data based on frame data sent from the media server to the media client and further based on acknowledgement data sent from the media client to the media server. A playback data generator generates playback data based on frame data buffer contents and further based on player state data. A frame buffer model generator generates a buffer fullness indicator and the frame data buffer contents, based on the buffer increment data and the playback data. A player state generator generates the player state data, based on the buffer fullness indicator and further based on media client data, media server data and player command data.05-03-2012
20120110166METHOD AND APPARATUS FOR GENERATING TRAFFIC - A method and apparatus for generating traffic generation is provided. The method for generating traffic may include: analyzing and modeling traffic generated between a server and a client and generating a packet and an inter-departure time (IDT) based on the analysis; and combining the generated packet with the generated inter-departure time by synchronization, storing the combined packet and inter-departure time in a memory, and transmitting the packet based on the inter-departure time. Therefore, it is possible to accurately model the traffic in various patterns using a method with low complexity, and thus it is possible to accurately test the server by a simpler method than the existing server testing methods.05-03-2012
20120110165EVALUATION OF DNS PRE-REGISTRATION DATA TO PREDICT FUTURE DNS TRAFFIC - Methods and systems analyze historical NXD traffic to predict future DNS traffic. In one embodiment, a system may count NXD responses generated by an Authoritative DNS server during a particular time period and calculate the variance in NXD traffic for domains over time. The system may then generate a coefficient of variance (CoV) value for each domain observed. Finally, the system may predict positive domain traffic based upon the calculated CoV data. In other embodiments, the system may also base the prediction on the classification of domains as “original” domains or “re-registered” domains. In another embodiment, the system may also base the prediction on the “size” of name servers. Additionally, or alternatively, the system may determine the number of unique name servers for a domain and base the prediction on the number of unique name servers for a particular domain name.05-03-2012
20120110164MANAGING A WORKLOAD OF A PLURALITY OF VIRTUAL SERVERS OF A COMPUTING ENVIRONMENT - An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.05-03-2012
20120110160SYSTEM AND METHOD FOR DETERMINING TOPOLOGY OF MONITORED ENTITIES - Devices and methods may allow for a first process associated with a probe process to receive a message transmitted across a network from a second process, the message including data and an identifier for the second process. The probe process may transmit identifiers for the first and second process to a server. A server may receive a message from a probe process including entity identifiers, and update a record recording a connection between the entities.05-03-2012
20100115090Ordering Tracing of Wireless Terminal Activities - According to the invention a core network management device (05-06-2010
20100036938WEB BROWSER SECURITY - A web browser security system including a network detector configured to detect when a computer attempts to connect to a computer network, and a data protector configured to move any data predefined as being private data from any private data areas that are accessible to a web browser on the computer to a secure data repository that is not accessible to the web browser, where any of the network detector and the data protector are implemented in either of computer hardware and computer software and embodied in a computer-readable medium.02-11-2010
20100121948REMOTE MONITORING OF USER APPLIANCES - A method for operating a server of a communication system includes at least one user appliance and a monitoring device adapted to perform a remote monitoring of the at least one user appliance through the intermediation of the server, the at least one user appliance being associated with a list of attributes that can take predetermined values. The method includes: 1) receiving the list of attributes associated with the at least one user appliance, and the values that can be taken by each of said attributes; 2) storing at the server the list of attributes with the related values received in 1); and 3) sending said list of attributes with the related values to the monitoring device.05-13-2010
20100125661ARRANGEMENT FOR MONITORING PERFORMANCE OF NETWORK CONNECTION - A method, apparatus, system, and computer program for analyzing properties of an application-specific end-to-end communication connection are presented. In a connection performance analysis apparatus, measurement data messages are received from a plurality of traffic-monitoring nodes arranged at selected intermediate points in a plurality of network segments of the application-specific end-to-end communication connection and from at least one end node of the end-to-end communication connection, wherein a measurement data message comprises information related to a travel time of at least one data packet of the end-to-end communication connection to the traffic-monitoring node or to the end node transmitting the respective measurement data message. Then, the connection performance analysis apparatus analyzes the received measurement data messages in order to determine a bottleneck of the end-to-end communication connection.05-20-2010
20130219049FILE MONITORING - A server receives a first set of file activity data from a first file monitor. The first set of file activity data indicates activity associated with a first set of files accessed at a first compute node in communication with a network. Further, the server receives a second set of file activity data from a second file monitor. The second set of file activity data indicates activity associated with a second set of files accessed at a second compute node in communication with the network. In addition, the server aggregates the first set of file activity data and the second set of file activity data into an aggregated set of network file activity data.08-22-2013
20130219057Relationships Derived from Trace Data - An analysis system may perform network analysis on data gathered from an executing application. The analysis system may identify relationships between code elements and use tracer data to quantify and classify various code elements. In some cases, the analysis system may operate with only data gathered while tracing an application, while other cases may combine static analysis data with tracing data. The network analysis may identify groups of related code elements through cluster analysis, as well as identify bottlenecks from one to many and many to one relationships. The analysis system may generate visualizations showing the interconnections or relationships within the executing code, along with highlighted elements that may be limiting performance.08-22-2013
20120036257DIAMETER SESSION AUDITS - Various exemplary embodiments relate to a method and related network node including one or more of the following: determining by the network device that an S9 session should be audited; determining that the S9 session is a suspect session; transmitting an S9 message to a partner device, wherein the S9 message includes an innocuous instruction; receiving, at the network device, a response message from the partner device; determining, based on the response message, whether the suspect session is orphaned; and if the suspect session is orphaned, removing an S9 session record associated with the suspect session.02-09-2012
20120036254CONNECTION MANAGEMENT SYSTEM, AND A METHOD FOR LINKING CONNECTION MANAGEMENT SERVER IN THIN CLIENT SYSTEM - An exemplary object of the present invention is to suppress the load on each server and network traffic. To achieve this, a plurality of connection management servers are installed so that any of the connection management servers executes acceptance of a connection request from a thin client terminal. Further, the connection management servers manage the states of clients in order to hold the states of the respective clients, and each of the connection management servers searches a client that can be connected by the thin client terminal according to a connection request from this thin client terminal, and replies with the search result to the thin client terminal, and a range of the connection management servers for executing the search of the client is limited for each connection request from the thin client terminal to the thin client server.02-09-2012
20120036253Minimising Network Resource Overhead - A mechanism is provided for minimising network resource overhead consumption by reports from one or more agents distributed in an electronic data network of nodes having a hierarchical reporting structure. Reports are received from other nodes in an electronic network of nodes or one or more agents further from a network root node in the electronic network of nodes. The reports are submitted to another node closer to the network root node in response to another node existing between the node and the network root node. The reports are submitted to the network root node in response to no other node existing between the node and the network root node. The node is adapted to only report variations in the expected report flow associated with the received reports.02-09-2012
20100121950SYSTEM AND METHOD FOR IDENTIFYING REAL USERS BEHIND APPLICATION SERVERS - The present invention provides a monitoring device and method for identifying the identity of users requesting database accesses. The data request from application servers to an application server are monitored and parsed. The SQL statements associated with the data request from the application server are also monitored and parsed, so are the SQL responses from the database server. The SQL responses are sent back to the user as data responses. The data responses are also monitored and parsed. The monitoring device matches the parsed data request with the parsed SQL statements, the parsed SQL responses, and the parsed data responses. By matching the string portion of these parsed data, the monitoring device can then identity the identity of the user making such data base quest.05-13-2010
20100088408STATUS REPORTING APPARATUS, IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM STORING CONTROL PROGRAM - A status reporting apparatus for reporting a status of an image processing apparatus operating in connection with a network includes a status detector, a status report destination information obtainer, and a status reporting unit. The status detector detects a status of the image processing apparatus. The status report destination information obtainer obtains information on at least one report destination to which the status detected by the status detector is to be reported in accordance with status report destination information in which the status of the image processing apparatus is associated with the information on the at least one report destination. The status reporting unit reports the status detected by the status detector to the at least one report destination on which the information is obtained by the status report destination information obtainer.04-08-2010
20100088407INFORMATION DISTRIBUTION SYSTEM, INFORMATION DISTRIBUTION METHOD, AND INFORMATION DISTRIBUTION PROGRAM - An information distribution system includes a visit determination unit (04-08-2010
20090307345AUTOMATED DIGITAL MEDIA CONTENT FILTRATION BASED ON RELATIONSHIP MONITORING - An apparatus, system, and method are disclosed for automated digital media content filtration based on relationship monitoring. The method determines a plurality of user relationships based at least in part on an online association between a user and a content producer. The method monitors each user relationship with each content producer for a relationship interaction between the user and the content producer. Furthermore, the method also identifies digital media content published by a content producer having a relationship with the user. A determined relevancy may be based on a strength factor derived at least in part on monitored relationship interactions between the user and the content producer that published the digital media content. The digital media content is presented to the user, with that having a greater relevancy weight having a higher priority than other digital media content available to the user from other content producers.12-10-2009
20100138533METHOD OF IDENTIFYING A ROOT CAUSE OF A NETWORK EVENT - A method of identifying a root cause of an event in a network of linked entities. The method comprises: defining a plurality of signatures, each signature comprising one or more classes, the classes being categorized by a taxonomy of classes; receiving a first message from the network; assigning one or more of the signatures to the first message; establishing a set of one or more hypotheses, each hypothesis identifying:a respective root cause; and one of the signatures assigned to the first message; receiving one or more subsequent messages from the network; determining whether each subsequent message matches a signature identified by a previously hypothesis; and generating an output based on the determination.06-03-2010
20090094360Multi-Source Broadcasting in Peer-to-Peer Network - A computer-implemented method for broadcasting over a network using peer-to-peer technology including commencing a broadcast over a peer-to-peer network, wherein a control computer selects at least one of multiple computers in the peer-to-peer network as an originating source of the broadcast; and changing the originating source of the broadcast, during the broadcast and as indicated by the control computer, from the at least one of the multiple computers to at least another of the multiple computers.04-09-2009
20090094361SESSION INITIATION PROTOCOL REGISTRATION WITH PING - Systems and methodologies are described that facilitate improving session initiation protocol based registration of a mobile device and an IP multimedia subsystem in wireless communications. The mobile device discovers one or more SIP servers (e.g., proxy call session control functions) that are available. The mobile device issues a ping message to each discovered server in parallel to determine reachability. Based at least in part on measured round trip times associated with the ping messages, the mobile device initiates registration procedures with at least one server.04-09-2009
20090240800REMOTE MONITORING OF USER INPUT DEVICES - A precision data capture recorder/security device non-intrusively and precisely captures and records information from computerized input devices (e.g., computer keyboards and mouses). Information collected by a data capture recorder co-located with a client can be precisely date and time tag user input to a user interface (e.g., keyboard) and transmitted to a base collection station for archiving and analysis. Archived information provides accurate history logs for regulatory audit compliance, data security, and system administrative troubleshooting. Analysis can help determine whether user data input patterns at the user interface are authorized.09-24-2009
20120066376MANAGEMENT METHOD OF COMPUTER SYSTEM AND MANAGEMENT SYSTEM - To provide a fault analysis result classification function capable of reducing the time required to eliminate a fault in a monitoring target apparatus. The fault analysis results (fault cause candidates) obtained during the fault analysis processing are classified for the influence range of each of the fault cause candidates by analyzing which of the other fault cause candidates relate to the fault events of the apparatus abnormal state, which are used as the basis to derive the each of the fault cause candidates. Further, the classification results are displayed on a GUI.03-15-2012
20120198047METHOD AND SYSTEM FOR DETERMINING RESPONSE TIME OF A SERVER - A method for determining a response time of a server may include monitoring communications to and from the server to detect a client request to the server. The method may also include detecting in the monitored communications at least one trigger signal associated with the client request. The method may further include determining a response time of the server to be the time difference between a time at which said at least one trigger signal was fully received and a beginning time of transmission of a final server response from the server, disregarding transmission periods and periods during which the client request is not processed by the server. A computer readable medium and system for determining a response time of a server are also disclosed.08-02-2012
20110119370MEASURING NETWORK PERFORMANCE FOR CLOUD SERVICES - Described is a technology by which a content server downloads an active content measuring tool object to a client request for a page. When loaded, the measuring tool object makes network measurements, including by direct socket access, and return measurement results. As part of its operations, the measuring tool object may request measurement assignments from a central controller, and/or return those results to the central controller. Measurement assignments may be directed towards determining a round trip time/latency, measuring throughput, packet loss rate, detecting in-fight modification of content and/or detecting the presence of a middle box, including the presence of a caching proxy server middle box. The measurement results may be used to evaluate hypothetical deployment of a number of servers and/or geographic locations for those servers.05-19-2011
20100082809Network system, information processing device, information processing method, and recording medium - A network system is provided in which a plurality of information processing devices are mutually connected through a network.04-01-2010
20100082801METHOD AND APPARATUS FOR NETWORK TO RECOMMEND BEST MODE FOR USER COMMUNICATION - The present disclosure generally provides techniques and apparatuses for producing, for an initiating end user, a recommended mode of communication corresponding to a targeted end user in a network environment, based on a plurality of network accessible or determinable inputs. For example, the identity of an initiating end user, the identity of a targeted end user, the current activity of the targeted end user, the communication preferences of the targeted end user, information from available databases, and other available or determinable data may be used by a contact liaison to produce a recommended mode of communication.04-01-2010
20100082799METHODS AND SYSTEMS FOR MANAGING NETWORK CONNECTIONS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can manage network connections in the software provisioning environment. The provisioning server can maintain a network record of network configurations for the networks served by the provisioning server. The network record can include information describing the structure, hardware, software, and configuration of the networks served by the provisioning server. The provisioning server can manage and configure existing networks and instantiate new networks or sub-networks associated with the provisioning server. The network configuration module can retrieve the network configurations maintained in the network record to manage, configure, and instantiate existing or new networks.04-01-2010
20100088405Determining Network Delay and CDN Deployment - Charting a content distribution system (CDN) involves identifying a set of DNS servers that may be used as vantage points to test delay performance to a CDNs content server. As provided herein, to identify potential vantage point DNS servers, a set of authoritative name servers is identified and, from that set, those authoritative name servers that respond to a DNS query are identified as responsive authoritative name servers. Identifying a CDN content server that serves a particular vantage point DNS server involves retrieving an IP address for the CDN content server from a DNS query to the DNS server corresponding to the vantage point. The delay performance between the vantage point DNS server and the CDN content server can then be determined. Further, one can determine locations to deploy new data centers for a CDN based on delay performance, A delay from one or more vantage points to an existing CDN's DNS servers can be measured, and desired rank of locations can be generated. A location of a new data center can be selected based on a desired delay performance ranking.04-08-2010
20100088409MANAGEMENT SYSTEM, MANAGING METHOD AND CONTROL PROGRAM - Disclosed is a management system, which makes it possible to securely maintain the communication between the managing apparatus (host) and the managed apparatus (device) even when a certain malfunction has occurred in the network or the server. When the device cannot receive the request sent from the host, the device changes the communication mode from the bilateral communication mode to the unilateral communication mode, and then, when it becomes possible to receive the request, the device changes the communication mode from the unilateral communication mode to the bilateral communication mode to transmit the response to the host. Further, when the host cannot transmit the request to the device, or when the host cannot receive the response to the request, the host suspends an operation for transmitting the request, and then, when it becomes possible to receive the response to the request, the host resumes the operation for transmitting the request.04-08-2010
20100088410Wireless Broadband Network Management - This invention concerns the management of wireless broadband networks. In particular the invention concerns a wireless broadband network management system comprising a data collection engine to collect data concerning traffic levels through the network base transceiver stations (BTSs), and the BTSs to which particular customer premise equipment (CPE) can connect; and a processor to correlate the data collected; to monitor overall network performance; to aggregate performance of one or more CPEs and BTSs; to detect underperforming BTSs and CPEs; and to automate CPE connections and disconnections to improve network performance in real time. In another aspect, the invention is a method for managing broadband networks. In further aspect, the invention is a software to implement the method.04-08-2010
20090204704SYSTEM AND METHOD FOR TRACKING UNIQUE VISITORS TO A WEBSITE - A system and method for analyzing traffic to a website is provided that is based on log files and that uses both server-side and client-side information channeled through one source to create a more complete picture of activity to a website. In one preferred embodiment, a sensor code is embedded in a requested web page, and sends information back to the web server where the website resides. This additional information is logged along with normal requests.08-13-2009
20090070456PROTOCOL FOR ENABLING DYNAMIC AND SCALABLE FEDERATION OF ENTERPRISE SERVICE BUSES - In a method and system for creating a federation of a plurality of enterprise service buses (ESBs), a plurality of ESB nodes provide connectivity to one or more services. According to a protocol, at least a portion of the ESB nodes transmit policy-based service advertisement messages to other ESB nodes, wherein the policy-based service advertisement messages include service state information. In response to receiving the policy-based service advertisement messages, each of the ESB nodes stores the service state information received from other ESB nodes in respective distributed registries to create a local view of routable service endpoints in the federation. Each of the ESB nodes then uses its respective distributed registry to make routing decisions when routing service requests.03-12-2009
20100100618Differentiating a User from Multiple Users Based on a Determined Pattern of Network Usage - In one embodiment, a method comprises detecting, by an apparatus, first network activity within a time interval on at least a first user device at a user premises, the first user device usable by first and second users; determining from the first network activity a first pattern of network usage associated with the first user and a second pattern of network usage associated with the second user, the second pattern distinct from the first pattern; detecting, by the apparatus, second network activity on the first user device at the user premises following the time interval; and selectively identifying the second network activity as performed by the first user based on a determined correlation between the second network activity and the first pattern of network usage.04-22-2010
20100100623SYSTEM AND METHOD FOR MONITORING A MOBILE COMPUTING PRODUCT/ARRANGEMENT - Described is a system and method for monitoring a mobile computing Arrangement. The arrangement may include a sensor and a processor. The sensor detects first data of an event including a directional orientation and a motion of the arrangement. The processor compares the first data to second data to determine if at least one predetermined procedure is to be executed. The second data may include a predetermined threshold range of changes in the directional orientation and the motion. If the predetermined procedure is to be executed, the processor selects the predetermined procedure which corresponds to the event as a function of the first data. Subsequently, the predetermined procedures is executed.04-22-2010
20100082807CONTINUITY CHECK METHOD, MAINTENANCE END POINT AND SYSTEM THEREOF - A continuity check method includes the following steps. A maintenance domain (MD) group is maintained in a network, in which the MD group includes a plurality of maintenance end points (MEPs) in the network, and an MD group information base is configured, and the MD group information base stores information about the plurality of MEPs. According to the information stored in the MD group information base, a continuity check message is initiated, and then, the continuity in the network is determined according to information returned from the plurality of MEPs in the MD. An MEP network system is further provided. Through the method and the system, no mis-check of the continuity will occur when the MEPs in the MD group initiate the continuity check.04-01-2010
20100082800CLASSIFICATION AND CLUSTER ANALYSIS SPAM DETECTION AND REDUCTION - Multiple features of email traffic are analyzed and extracted. Feature vectors comprising the multiple features are created and cluster analysis is utilized to track spam generation even from dynamically changing or aliased IP addresses.04-01-2010
20100082798VIRTUAL UNIVERSE AVATAR ACTIVITIES REVIEW - Methods, services, program products and devices are provided for tracking avatar activities within a virtual universe domain. A proximity threshold of an avatar is defined with respect to proximity to an artifact located within a virtual universe domain. Activity by the avatar within the virtual universe domain is tracked, with activity data generated from the tracking. The activity data is analyzed to determine proximity of the avatar to the artifact within the proximity threshold, and a report is generated from the analyzing, the report noting a determined proximity of the avatar to the artifact within the proximity threshold. In one aspect, the report is provided to a supervisory entity.04-01-2010
20110173315Network physical layer security - A data processing device is connectable to a communication network and operable to receive data associated with at least one physical layer characteristic of a cable communication subsystem, the subsystem comprising a transmitter and/or receiver coupled to at least one cable, and to initiate a security procedure responsive to the received data. A tangible computer readable medium and a method of applying physical layer security in a communication network are also disclosed.07-14-2011
20090259746NETWORK MANAGEMENT APPARATUS, NETWORK MANAGEMENT METHOD, AND MONITORING SYSTEM - A network management apparatus includes: an information acquisition section obtaining path information and link quality information from a plurality of wireless terminals operating in an ad hoc mode; and a display-information generation section generating a network configuration diagram showing a link state between the wireless terminals from the obtained path information, and changing an attribute of a display showing an established link in accordance with the link quality information.10-15-2009
20090083416METHODS TO VERIFY WIRELESS NODE PLACEMENT FOR RELIABLE COMMUNICATION IN WIRELESS SENSOR CONTROL NETWORKS - In one exemplary embodiment, a method of verifying placement of automation components configured for use within a building automation system is disclosed. The method includes determining a wireless communication channel for use within a building automation system, polling a plurality of automation components deployed within the building automation system, wherein each of the plurality of automation components utilizes the wireless communication channel for communication, determining communication parameters associated with each of the plurality of automation components, and adjusting the deployment of at least one of the plurality of automation components in response to the determined communication parameters.03-26-2009
20090287817Network Device - A network device to be connected to a server via a network comprises: a cable connecting unit connected to a network cable for connection to the network; a network controller for sending/receiving signals to/from the cable connecting unit and for detecting whether the network cable is connected to the cable connecting unit; a CPU for recognizing a server connected to the network; and a signal transmission line for transmission of a detection signal indicating that the network cable is connected to the cable connecting unit. When the CPU receives an interrupt signal from the network controller, the CPU performs a process to recognize the server connected to the network. This makes it possible for the CPU (hence the network device) to automatically recognize the server immediately after the network cable is connected to the cable connecting unit without requiring a user to spend time and labor for the server recognition.11-19-2009
20120271938Socket Application Program Interface (API) Extension - Embodiments contemplate one or more socket application program interface (API) extensions that may provide one or more Internet Protocol Address lists. Embodiments may include determining a state (or status) of one or more available Internet Protocol (IP) addresses. Further, embodiments may include communicating the state (or status) of the available Internet addresses to a Multi Connection Transport Protocol.10-25-2012
20120271937AUTOMATED TOPOLOGY CHANGE DETECTION AND POLICY BASED PROVISIONING AND REMEDIATION IN INFORMATION TECHNOLOGY SYSTEMS - Aspects of the present disclosure involve systems, methods, computer program products, and the like, that provide automated topology change detection and policy based provisioning and remediation in information technology systems, among other functions and advantages.10-25-2012
20120271936TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service.10-25-2012
20120271935COORDINATING DATA CENTER COMPUTE AND THERMAL LOAD BASED ON ENVIRONMENTAL DATA FORECASTS - The present disclosure describes techniques evaluating compute and/or thermal loads (among other things) to aid in managing a collection of one or more containerized or modular data centers. For example, forecasts (or real-time measurements) of environmental factors (as well as projected computing demands) may be used to tailor the compute loads, cooling strategies or other metric of data center operations for a network of containerized or modular data centers. Doing so allows an operator of such a data center network to manage specific operational goals in real time.10-25-2012
20120290712Account Compromise Detection - Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection.11-15-2012
20100125663SYSTEMS, METHODS, AND DEVICES FOR DETECTING SECURITY VULNERABILITIES IN IP NETWORKS - This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.05-20-2010
20100125657System for Collecting Computer Application Usage Data from a Plurality of Client Devices - A system and method for collecting computer application usage data from a plurality of client devices. The system may include a monitoring program executable on each of the plurality of client devices. The monitoring program may be configured to receive from a server via a computer network monitoring data including one or more application identifiers, and to identify one or more target application programs executed on the client device as matching one of the identifiers. The monitoring program may further be configured to gather usage data for the target application program over a period of time, and send a message back to the server including the usage data. Reports may be generated based on the usage data.05-20-2010
20100100619METHOD AND APPARATUS FOR VISUALIZING NETWORK SECURITY STATE - There are provided a network security state visualization device and method, the device including: a security event collector collecting original security event information from network security apparatuses; a security event analyzer analyzing the original security event information collected by the security event collector and extracting characteristic data corresponding to a security event; and a three-dimensional visualization display unit visualizing a correlation between the characteristic data extracted by the security event analyzer as a three-dimensional screen to be displayed.04-22-2010
20100094994NETWORK STRUCTURE INFORMATION ACQUIRING METHOD AND DEVICE - A method for acquiring information about connection relationships in a network as a tree structure having a predetermined network device as a root node, includes the steps of acquiring information about the ports held by each of the network devices, and the network devices connected to each of the ports from each of the network devices; and determining connection relationships in the network, based on the fact that an arbitrary partial tree in the tree structure is smaller than an upstream partial tree containing the arbitrary partial tree.04-15-2010
20090055526Information terminal, server apparatus, and information processing method - An information terminal that reduces the effort of presence input is provided. The information terminal is connected via a network to a server for disclosing a presence that is a present state of each user or each object, and includes: a display unit for displaying a presence input screen that is a screen for inputting the presence; a storage unit storing a terminal identifier that differs from one user terminal to another and information on the presence input screen; and a control unit that causes the presence input screen to be displayed on the display unit upon receiving a presence input request signal that is a signal for requesting input of the presence from another information terminal via the network, and when the presence is inputted via an operating unit, transmits the terminal identifier together with the presence to the server.02-26-2009
20100281158ENVIRONMENTAL FOOTPRINT MONITOR FOR COMPUTER NETWORKS - A system and method for obtaining an environmental footprint of a website are presented. The system includes a website embedded with a unique identifying tag, a user terminal to view the website, an environmental footprint server which identifies the unique identifying tag of the website, and a processor to calculate the environmental footprint of the website based upon time data and the average emissions emitted by a user terminal, the server hosting the website and a network connecting the user terminal and the server.11-04-2010
20110173323SYSTEM FOR DELIVERING AND PRESENTING A MESSAGE WITHIN A NETWORK - A system for delivering and displaying messages in a display device part of a network comprising: a set of display devices (07-14-2011
20110173318Method, Device and Gateway Server for Detecting Proxy at the Gateway - The present invention provides a method for detecting proxy at the gateway, comprising decomposing the access request from the IP need to be proxy-monitored into an access request to original address and an access request to gateway-specified address to access the original address and the gateway-specified separately; determining whether a specific cookie information is included in said access request to gateway-specified address or not to obtain a second determining result; responding to the access request to said gateway-specified address and embedding the cookie information with the time stamp into the client PC by the gateway when said second determining result is no, and reading said cookie information when said second determining result is yes; determining whether said IP is using proxy or not on the basis of said cookie information. Accordingly, the present invention also provides a device and gateway server for detecting proxy at the gateway. It can be detected accurately and secretly in the intranet whether a certain IP is using common proxy or nat proxy.07-14-2011
20110173322Distributed User Validation and Profile Management System - A distributed user validation and profile management system operates to automatically validate and update user profiles, such as those stored within an organizational security database, to properly reflect the actual positions and rights of various users within the organization to the various organizational assets, such as computer implemented applications. The user validation and profile management system periodically sends validation e-mails to various users within the organization to initiate the process of updating and verifying user profile information. The individual users may respond to the validation e-mails to verify their position and status within the organization as well as the position or status of one or more closely associated users, such as a manager or a subordinate. Failure of the user to respond to the validation e-mail causes the user validation and profile management system to determine that the user profile is invalid when the user attempts to access an application.07-14-2011
20110173321OVER-THE-AIR DELIVERY OF METERING CERTIFICATES AND DATA - Metering is enabled through an arrangement in which a metering certificate is communicated to a mobile device using an over-the-air protocol. A metering trigger provides the metering certificate that includes a location to which metering data is posted by the mobile device and a public key of a public-private key pair, or alternatively provides a link to such metering certificate. A metering helper passes the metering certificate to a DRM system on the mobile device which collects metering data associated with the metering ID and uses the public key to encrypt the metering data into a metering challenge. The metering helper posts the metering challenge to the location. The metering service extracts the metering data from the metering challenge using a private key and generates a metering response that is received by the metering helper which prompts the DRM system to reset at least a portion of a data store in which the metering data is stored.07-14-2011
20110173320NETWORK-SPECIFIC ESTIMATION IN NETWORK NODE DISCOVERY - Network node discovery is implemented using parameters reflecting network-specific characteristics. Estimates of the number of active nodes in a network are computed based on the presence of dead time (e.g., due to clock latency, device driver delays, etc.), network topology, packet size, network capacity, a tolerable network overload threshold, and other characteristics. A network node enumeration process is therefore parameterized to incorporate consideration of such characteristics. A damping factor that incorporates dead time to set a lower bound for an estimate of remaining active nodes in a network is one example of a network-specific parameter.07-14-2011
20110173319APPARATUS AND METHOD FOR OPERATING SERVER USING VIRTUALIZATION TECHNIQUE - An apparatus for operating a server using a virtualization technique includes: a system managing unit for registering a virtual server performing a service, assigning and cancelling physical hardware resources in response to a command of a manager, and managing resource assigning policies to be applied depending on services; and a virtual resource managing unit for managing information on physical hardware and a virtual operating system. The apparatus further includes a virtual server managing unit for executing the virtual operating system using physical hardware resources, assigning a virtual server processing a service to the virtual operating system, and executing the virtual server to monitor resource assignment to the operated virtual server, when a designated service is requested over a network.07-14-2011
20110173317PERFORMANCE MEASUREMENT AND SERVICE QUALITY MONITORING SERVER USING A COMMAND LINE INTERFACE - A performance measurement and service quality monitoring server capable of collecting performance information within a set of equipment over a communication network, the server integrating a generic performance model comprising high-level indicators, a performance model dedicated to each type of equipment and provided with equipment-oriented indicators and an SNMP model to sample equipment as well as an interfacing model, known as a CLI model to sample equipment according to a CLI (Command Line Interface) mechanism.07-14-2011
20110173316RELATIONSHIP BASED REPRESENTATION OF PARTICIPANTS IN SHARED ONLINE SPACE - One or more techniques and/or systems are disclosed for presenting members of a shared online space to a user of the shared online space. A relationship value is determined between the user and a member of the shared online space by: determining an interaction value for the user and member relationship based on the user's and member's co-presence in the shared online space; determining a social network value for the user and member relationship based on a number of social network connections between the user and member; and combining the interaction value and social network value. The relationship value is associated with a specified visual representation of the member used in the shared online space, and two or more visual representations of members are scaled in the user's display in the shared online space in order to fit an available screen space, based on the relationship value.07-14-2011
20110173314Methods and apparatus for optimizing responsiveness of portable documents - A system detects a requirement to obtain a first document by the computer system, the first document having a predefined format. The system identifies a sequence of portions of the first document to obtain based on analysis of the predefined format of the first document, and analysis of current operational parameters of the computer system. The system obtains a first portion of the document from the identified sequence, and then obtains successive portions of the first document in accordance with the identified sequence.07-14-2011
20090259745METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - Methods and apparatus for nonintrusive monitoring of web browser usage are disclosed. An example method for monitoring web browsing disclosed herein comprises obtaining a video signal from a video output of a device implementing a web browser, processing a video image obtained from the video signal to identify a region of the video image displaying at least a portion of the web browser, determining textual information displayed by the web browser in the identified region of the video image, and using the textual information to record usage of the web browser.10-15-2009
20090259744System and Method for Running a Web-Based Application while Offline - A system and a method for executing a web-based application on a client computer system without a network connection to an application server that hosts the web-based application is presented. In these embodiments, the web-based application can provide functionality substantially similar to the functionality of the web-based application when the client computer system has a network connection to the application server. A system and method for synchronizing and resolving conflicts between an online and an offline web-based application is also presented.10-15-2009
20090248851DEPLOYING ANALYTIC FUNCTIONS - A method, system, and computer usable program product for deploying analytic functions are provided in the illustrative embodiments. A resource is identified in an analytic function specification. A set of input time series is identified for the analytic function specification. An analytic function instance corresponding to the analytic function specification is instantiated in relation to an object of the resource. Each input time series in the set of time series is located in relation to the object. The analytic function instance is associated with each input time series in the set of time series. An analysis is performed using the set of input time series and an analytic function described in the analytic function specification. The analytic function instance is instantiated if both the object and the set of data sources are present in an object graph where the analytic function instance is to be instantiated.10-01-2009
20090089419METHOD AND SYSTEM FOR INTELLIGENT REQUEST REFUSAL IN RESPONSE TO A NETWORK DEFICIENCY DETECTION - A system for intelligent request refusal in response to a network deficiency detection, in one example embodiment, comprises an aggregator to aggregate revenue generated by a requesting entity with a revenue generated by requesting entities homogenous to the requesting entity, and a filtering module to filter a response to a service request when an aggregated revenue-to-network-resource-utilization ratio is below a second threshold unless utilization of a plurality of network resources drops below a first threshold.04-02-2009
20090089423INFORMATION PROCESSING DEVICE, AND METHOD AND COMPUTER READABLE MEDIUM FOR THE SAME - There is provided an information processing device comprising: an image processing unit including at least one of an image reading function and a print function; a historical information acquisition unit to acquire a plurality of pieces of historical information, each of the plurality of pieces of historical information concerning execution of at least one of the image reading and print functions; a historical information transmission unit to transmit the historical information to the client device; a request reception unit to receive from the client device a request for data corresponding to a selected piece of historical information selected from the plurality of pieces of historical information through the client device, the data concerning a job executed by at least one of the image reading function and the print function; and a data obtaining unit configured to obtain the data corresponding to the request received by the request reception unit.04-02-2009
20090182867METHOD AND APPARATUS FOR IDENTIFYING A PACKET - A system and method for identifying target packets in a network. The invention identifies packets by computing a hash value over at least a portion of a packet passing through a network device such as a router. The hash value is used as an address, or index, into a memory. The hash value identifies a unique memory address and a flag is set at the respective memory location. When a target packet is detected elsewhere in a network, the network device receives a query message containing a hash value of the target packet. The network device compares the target packet to the hash values in memory. A match between the hash value in memory and the hash value in the query message indicates the target packet was observed by the network device. After a match is detected, the network device makes a reply available to the network.07-16-2009
20090182865SMART COMPONENT MONITORING - One embodiment of the present invention provides a system that automatic discovers and monitors enterprise components. During operation, the system scans an enterprise environment for an item of meta-data. Next, the system analyzes the item of meta-data to determine a monitoring instruction for a corresponding enterprise component. Finally, the system performs the monitoring instruction for the corresponding enterprise component.07-16-2009
20090177766REMOTE ACTIVE WINDOW SENSING AND REPORTING FEATURE - A system and method is provided for remote active window sensing of a display in a computing device and reporting of the same. The system includes a tool comprising a remote monitoring and reporting component configured to monitor active windows of one or more remote devices and provide a report to a presenter as to whether the active windows of the one or more remote devices are associated with a presentation of the presenter.07-09-2009
20100228858METHODS AND APPARATUS FOR DYNAMIC ALLOCATION OF SERVERS TO A PLURALITY OF CUSTOMERS TO MAXIMIZE THE REVENUE OF A SERVER FARM - A method and structure for dynamic allocation of servers to customers in a server farm which supports a flexible contract structure such that the total revenue of the farm is maximized. The invention creates a resource allocation plan based on a long term forecast for the server farm, taking into account traffic, number of servers, customers' contracts and revenue optimization algorithms. The plan is then modified as indicated by short term forecasting using currently monitored load metrics to reallocate to maximize revenue for particular time periods.09-09-2010
20090164622Monitoring Instant Messaging Usage - A method of monitoring instant messaging usage can include identifying an instant messaging session between a plurality of participants, selecting a participant in the instant messaging session, identifying at least one attribute of the instant messaging session, and identifying at least one attribute of the selected participant. The method further can include determining an instant messaging usage metric for the selected participant according to the at least one attribute of the instant messaging session and the at least one attribute of the selected participant and outputting the instant messaging usage metric of the selected participant.06-25-2009
20100125664System, Method, and Software for Integrating Cloud Computing Systems - A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.05-20-2010
20100125656System and Method for Request Routing Optimization - A system includes a monitoring module, a request allocation module, and a request distribution module. The monitoring module is configured to determine a resource utilization of a preferred server and a non-preferred server. The request allocation module is configured to modify an allocation scheme in response to the resource utilization of the preferred server and the non-preferred server. The request distribution module is configured to distribute a plurality of requests from a plurality of users according to the allocation scheme.05-20-2010
20090276525METHOD AND APPARATUS FOR INTEGRATING HETEROGENEOUS SENSOR DATA IN UBIQUITOUS SENSOR NETWORK - Provided is an apparatus and method for integrating heterogeneous sensor data in a ubiquitous sensor network. The method includes steps of receiving an integrated query for heterogeneous sensor networks from a sensor network management system, disintegrating the received integrated query to be suitable for each sensor network and transmitting the disintegrated queries to each corresponding sensor network. The method further includes steps of generating responses as integrated sensor data and storing the integrated sensor data into an integrated database, when receiving responses to respective queries from each of the sensor networks, and converting the integrated sensor data stored in the integrated database into a preset data format and transmitting the converted sensor data to the sensor network management system.11-05-2009
20090276520METHOD AND APPARATUS FOR SERVER ELECTION, DISCOVERY AND SELECTION IN MOBILE AD HOC NETWORKS - A method and apparatus for server election, discovery and selection in mobile ad hoc communication networks is disclosed. The server election method may include a server node that may elect itself as a server in network if the received server capabilities, network server lists and network specific parameters allow its election as a server in the network. A client node may discover and select a server in the network by transmitting a server discovery request to a plurality of nodes in the network, receiving advertisements from one or more servers in the network in response to the server discovery request, and selecting a server based on the received stability and connectivity information for each server from which advertisements are received.11-05-2009
20090276519Method and System for Achieving Better Efficiency in a Client Grid Using Node Resource Usage and Tracking - A system, method and computer program product for distributing task assignments on a computer network comprising a client grid having at least one server coupled to at least one client node and a plurality of client computers coupled to the client node through a plurality of monitoring agents. Each monitoring agent collects data regarding the resources a particular client computer makes available to the grid and transmits the data to the grid server when the client computer requests a grid task. The system generates a resource probability distribution based on the historical computing resource data and employs a scheduling algorithm to distribute grid tasks to the client computers using at least the probability distribution.11-05-2009
20090287813METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR ANALYZING COMMUNICATION RELATIONSHIPS - An apparatus may include a processor configured to store a record of communications with a remote device. The processor may be further configured to calculate one or more values representative of a communication relationship with the remote device over a period of time based at least in part upon the stored record of communications. The processor may be additionally configured to determine a communication relationship pattern based upon the one or more calculated values.11-19-2009
20120297056EXTENSIBLE CENTRALIZED DYNAMIC RESOURCE DISTRIBUTION IN A CLUSTERED DATA GRID - A centralized resource distribution is described where the decision portion of partitioning data among cluster nodes is made centralized while the actual mechanics to implement the partitioning remain a distributed algorithm. A central distribution coordinator is used to create an extensible central strategy that controls how the data will be partitioned across the cluster. The work to implement this strategy is performed by all of the members individually and asynchronously, in accordance with a distributed algorithm. The central strategy can be communicated to all cluster members and each member can perform the partitioning as it relates to itself. For example, in accordance with the distributed algorithm, one node may decide that it needs to obtain a particular partition in light of the central strategy and carry out the necessary steps to obtain that data, while other nodes may be asynchronously performing other individual partition transfers relevant to those particular nodes.11-22-2012
20090089414REPORTING MULTIPLE EVENTS IN A TRAP MESSAGE - A method for reporting events relating to objects of a network element manageable by a network management device, using a network management protocol, and devices, a network, and computer-readable storage medium storing control logic, that operate in accordance with the method. Events for each object are detected, event information is generated for detected events, generated event information for multiple events is packaged into a trap message for each object type, the trap message is communicated from the network element to the network management device, and the event information from the communicated trap message is unpacked at the network management device. In this manner, network congestion and processor overload at the network management device can be reduced.04-02-2009
20090089424DYNAMICALLY UPDATING SUBCOMPONENTS IN A TIERED REMOTE MONITORING SYSTEM - Various approaches for updating system monitoring policy parameters. In one approach, updates to the monitoring policy parameters are transmitted to an event server via an event report. The event server transmits the event report to a subcomponent manager executing on the monitored system. The subcomponent manager determines to which of a plurality of monitoring subcomponents the update is to be applied. The subcomponent manager then suspends the execution thread of the monitoring subcomponents, updates monitoring policy parameters of the subcomponent with data from the event report, and thereafter resumes the execution thread of the subcomponents. The subcomponent then operates with the updated monitoring policy parameters.04-02-2009
20090089420Flash tracking system and method - A system, method and computer readable medium configured to track Internet users as they browse web-sites when cookies are disabled or deleted. One aspect of the present invention includes the realization that cookies are not adequate to track Internet web users as cookies are limited and size, and easily deleted by users. A web-site receives a request for content from the computing-device. After obtaining information about the computing-device, the tracking-server assesses the request for content from the computing-device. If the computing-device has an available flash plug-in, the tracking-server transmits a flash applet to the computing-device. The flash applet is configured to: determine whether a unique flash identifier has been assigned to the computing-device, generate the unique flash identifier if no unique flash identifier has already been assigned to the computing-device, transmit the unique flash identifier to a tracking server, and store the unique flash identifier in local flash storage. The process also stores a cookie at the computing-device when no flash plug-in is available.04-02-2009
20090089418METHOD AND SYSTEM TO DETECT A NETWORK DEFICIENCY - A system to detect a network deficiency, in one example embodiment, comprises a receiving module to receive utilization metrics of at least one network resource, wherein the utilization metrics are collected and made available at a network level, an aggregator to aggregate the utilization metrics of at least one network resource with the utilization metrics of a plurality of the network resources, a processing module to determine a level of aggregated utilization metrics of the network resources, and a detecting module to detect a precursor indicative of a network traffic deterioration based on the level of the aggregated utilization metrics.04-02-2009
20090089415SYSTEM AND METHOD FOR KEYBOARD NAVIGATION IN A SEARCH RESULTS PAGE - The present invention is directed towards systems, methods and computer program products for providing keyboard navigation between components within a content item. The method of the present invention comprises receiving the content item from a server and receiving a signal indicating keyboard utilization by the user to determine a specific key that the user presses. A determination is made as to whether the specific key is from a monitored set of keys and if the specific key is from a monitored set of keys, performing an action associated with the specific key.04-02-2009
20090292805SYSTEM AND METHOD FOR NETWORK MONITORING OF INTERNET PROTOCOL (IP) NETWORKS - A system and method for implementing network monitoring with a unified IPv4+IPv6 address type. IPv4 network traffic and IPv6 network traffic are captured. IPv4 and IPv6 address patterns read from the captured network traffic are then encoded into a unified IPv4+IPv6 address space using a data type encoding.11-26-2009
20100088403DIRECTORY MANAGEMENT SYSTEM AND METHOD - A method and computer program product for defining at least one target system. The at least one target system is accessed to identify one or more web services available via the at least one target system, thus defining one or more available services. Information concerning the one or more available web services is identified. At least a portion of the information concerning the one or more available web services is published within a web services directory.04-08-2010
20080209036INFORMATION PROCESSING CONTROL APPARATUS, METHOD OF DELIVERING INFORMATION THROUGH NETWORK, AND PROGRAM FOR IT - An apparatus including a section acquiring the information as to the information processor of the delivery destination in the second network, a section alternatively providing service to an access from the first network by using the acquired information, a section receiving and delivering the information from the first network by using the alternatively supplied service, a section changing the information processor of the delivery destination in the second network to the service providing state, when the apparatus receives the information including the contents from the first network and the information processor of the delivery destination in the second network is not in the service providing state, it is possible to change the information processor of the delivery destination to the service providing state and deliver information including the contents to the information processor of the delivery destination.08-28-2008
20080209035Communications Device and System for Implementing a Management System Remote From Devices - A communication device for implementing a system for remotely managing at least one item of equipment by a management application able to communicate via a telecommunication network with an application embedded in the item of equipment. The device includes a first communication interface allowing implementation of a local communication link with the embedded application, a second communication interface allowing access to the telecommunication network, and a communication management device configured to communicate with the embedded application via the first interface and with the management application via the second interface, serving as communication relay between the embedded application and the management application, and configured to transmit to one of the two applications a message received from the other application, according to predefined transfer rules and as a function of at least one parameter received with the message.08-28-2008
20080209031Method of collecting and managing computer device information - A method of collecting and managing computer device information is provided to collect, analyze, and manage device information of a plurality of client computers in a network through a server/client application program. The method includes installing and running a client server application program on client computers in a network and installing and running a server management application program on a server in the network; after each of the client computer is booted, selecting a corresponding data acquisition method according to the type of the operating system of the client computer, so as to perform data acquisition on the device information of the computer in real time; analyzing and summarizing the acquired device information and then sequentially assorting and storing the information; monitoring and recording the changes of the information in real time; and sending the stored information and the changes thereof to the server for statistical analysis and tracking management.08-28-2008
20080209030Mining Web Logs to Debug Wide-Area Connectivity Problems - Internet service providers and their clients communicate by transmitting messages across one or more networks and infrastructure components. At various points between the service provider and the clients, inclusively, records may be created of each messages occurrence and status. These records may be read and analyzed to determine the effects of the networks and infrastructure components on the provided quality of service. User-effecting incidents (e.g., failures) occurring at networks may also be identified and described.08-28-2008
20080209029SYSTEM AND METHOD FOR MONITORING BUSINESS PERFORMANCE USING MONITORING ARTIFACTS - A method (and system) of monitoring business performance using a monitoring artifact includes processing an incoming event using the monitoring artifact08-28-2008
20100100621SHARING STATUS INFORMATION ACROSS A PLURALITY OF COMMUNICATION NETWORKS - A method and system for sharing status information across a plurality of communication networks is presented. Such a method and system is adapted to collect and make available network session status information and to collect and make available network user status information.04-22-2010
20090276523EXPRESSION-BASED WEB LOGGER FOR USAGE AND NAVIGATIONAL BEHAVIOR TRACKING - Configurably storing data in a plurality of files based on expressions and conditions associated with the data. Logging software enables tracking of the navigation pattern of users for selected network properties under specified conditions. The logging software is configurable such that most current and future logging specifications may be fulfilled without any code changes to the logging software.11-05-2009
20090276522COOPERATIVE MONITORING OF PEER-TO-PEER NETWORK ACTIVITY - Particular embodiments include cooperative monitoring of peer-to-peer activity on a network including maintaining communication between a local monitoring process and a network monitoring process such that a process can use both network monitoring and local monitoring. The cooperative monitoring includes monitoring a local peer using local monitoring of a point in the network by monitoring packets passing through the point, monitoring the network using network monitoring by a monitoring system or agent coupled to the network, and analyzing the result of network monitoring and local monitoring to determine at least one file transfer association with the local peer.11-05-2009
20090276517DOWNLOAD AND DATA TRANSFER GAMING METHOD - A download and data transfer gaming method utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The method redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This method is much more redundant by eliminating the possibility of a client missing a download broadcast. The method alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience.11-05-2009
20100125658METHOD AND SYSTEM FOR MULTIMEDIA CONTENT CONSUMPTION ANALYSIS - A method and system for analyzing consumption of multimedia content provided by a multimedia content delivery network are disclosed. The multimedia content may be selected by a user using an electronic programming guide on customer premises equipment (CPE). A historical log of content selection events may be recorded. The historical log is analyzed to generate consumption statistics and consumption patterns for the user. The consumption statistics may be generated for different content types. The analysis may be performed locally on CPE or by a remote server. The consumption statistics may be compared with a user subscription for multimedia content. A consumption metric may be generated for recommending a more cost-effective subscription package to the user. Consumption data may be provided to third parties for data mining.05-20-2010
20100138535NETWORK SERVICE ZONE LOCKING - A zone locking system detects unauthorized network usage internal to a firewall. The system determines unauthorized network usage by classifying internal hosts inside a firewall into zones. Certain specified zones are unauthorized to initiate client communications with other selected zones. However, zone override services can be designated for each associated internal zone, and thus, authorizing selected network services. An alarm or other appropriate action is taken upon the detection of unauthorized network06-03-2010
20090282144SYSTEM FOR TARGETING THIRD PARTY CONTENT TO USERS BASED ON SOCIAL NETWORKS - A method and system of providing Internet content to a user utilizing social networks is disclosed. The method comprises providing Internet usage data for a plurality of users, determining which users belong to the same social network, and providing at least one of the users access to Internet usage data for those other users who are in the same social network.11-12-2009
20110270964USING DNS REFLECTION TO MEASURE NETWORK PERFORMANCE - A top level domain name system (DNS) server receives a DNS query from a local DNS resolver, the DNS query requesting a network address corresponding to a domain name. The top level DNS server reflects the local DNS resolver to a reflector DNS server. The reflector DNS server reflects the local DNS resolver to a collector DNS server, which in turn returns the network address to the local DNS resolver. The reflector DNS server and collector DNS server are both in the same data center, and one or more network performance measurements for communications between the local DNS resolver and the data center are determined based on the communications between the local DNS resolver and both the reflector DNS server and the collector DNS server.11-03-2011
20090287818MONITORING APPARATUS AND MONITORING METHOD - A monitoring apparatus for monitoring communication configurations of a plurality of client devices connected to a server, the monitoring apparatus includes: a processor for controlling the communications between the client devices and the server in accordance with a process including: receiving from each of the client devices communication condition information and storing latest communication condition information of each of the client devices; determining at a time interval whether any of client devices became incapable of communication with the server by checking the latest communication condition information of each of client devices; and upon detection of at least one of the client devices for which obsolete communication condition information is stored, issuing a notice indicating that the at least one of the client devices are incapable of communication with the server.11-19-2009
20090287816LINK LAYER THROUGHPUT TESTING - A technique for testing a network path involves making use of feedback enabling parameters. Values for the feedback enabling parameters can be generated from a measurement of path performance. The technique can be implemented for wireless paths. The technique can also be implemented for multi-hop paths.11-19-2009
20090287812Network Connection Switching Unit and Network Station - The invention relates to the field of data transmission in a network of distributed stations. One problem, particularly in a UPnP based network, is that the UPNP devices need to be constantly switched on in order to be available in the network. The invention intervenes at this point and describes ways in which unused network stations can be switched off but continue to be identified as devices in the network. If a device which is switched off is needed, it is automatically switched on. This allows a considerable power saving to be achieved in the network. The invention provides for a network connection switching unit to contain “communication maintenance means” which maintain the communication for an inactivated network station at least to a restricted extent instead of the inactivated network station. A network station matched thereto is also proposed.11-19-2009
20090287815Systems and Methods for Monitoring A Remote Network - One embodiment relates to a method for monitoring a remote network over the Internet. In the method, a monitoring request from a client is received from over the Internet at a server. The server transmits a relayed monitoring request over the Internet to a remote network monitor. The remote network monitor is adapted to passively monitor the remote network based on the monitoring request, thereby detecting whether an unfavorable communication condition is met the remote network.11-19-2009
20090287814VISUALIZATION OF STREAMING REAL-TIME DATA - A system facilitates dynamic data visualizations. The system includes an analysis component that periodically processes one or more incoming data streams to determine a visualization form from a plurality of visualization forms. A visualization component dynamically generates the visualization form based in part on the processing of the incoming data streams.11-19-2009
20090193117SYSTEM AND METHOD FOR PRESENCE SUBSCRIPTION DELEGATION - A system and method for presence subscription delegation in a multi-domain environment in an SIP-based presence system are provided, in which a watcher transmits a presence subscription delegation request to a presence subscription delegation handler of a delegating user, the presence subscription delegation handler performs delegation authorization for the received presence subscription delegation request according to a presence delegation authorization rule of the delegating user being authorization information about presence subscription delegation, and a presence server of a presentity receives the presence subscription delegation request from the presence subscription delegation handler, performs presence authorization according to a presence authorization rule of the presentity, and transmits presence information about the presentity to the watcher via the presence subscription delegation handler.07-30-2009
20110270973METHODS FOR MONITORING AND REPORTING MTC EVENTS - MTC event monitoring methods and the network servers thereof. The MTC event monitoring method comprises configuring, by the network server, a detection sensitivity threshold, determining, by the network server, an MTC event at an MTC device and an associated detection sensitivity parameter, and reporting, by the network server, the MTC event to an MTC server only when the associated detection sensitivity parameter equals to or exceeds the detection sensitivity threshold.11-03-2011
20110270971SYSTEMS FOR AND METHODS OF USER DEMOGRAPHIC REPORTING USABLE FOR IDENTIFYING USERS AND COLLECTING USAGE DATA - Several ways of identifying users and collecting demographic information and market information are disclosed, including branding a browser with a unique identification in each user request, identifying a user by his key strokes or mouse clicks, gathering demographic information using multiple data sets and by monitoring network traffic. Additionally, user requested content is distinguished from other, non-user content, and the performance of a server can be monitor and analyzed from a client a client perspective. Further, an Internet user's Internet data is routed to a known domain on the Internet, from which it is routed on to the intended recipient. The domain includes proxy servers which proxy the user's data requests to the domain, and database servers, which filter and build a database of the user's Internet usage. Particular data concerning certain behaviors of interest, such as purchasing data, is filtered into the database, and can form the basis for numerous market measures.11-03-2011
20110270963SYSTEM AND METHOD FOR EVALUATING APPLICATION SUITABILITY IN EXECUTION ENVIRONMENT - An evaluation system evaluates the suitability of an application in a plurality of types of application execution environments based on the characteristics of this application and the usage of this application by a user. The evaluation system displays information denoting the result of this evaluation.11-03-2011
20110270968DECISION SUPPORT SYSTEM FOR MOVING COMPUTING WORKLOADS TO PUBLIC CLOUDS - An automated approach to analyzing computer workloads and cloud computing environments to support moving and hosting the workloads within the cloud computing environments. A workload may be identified and analyzed based upon business and technical attributes to determine whether the workload is suitable for moving to a cloud computing environment. Similarly, public clouds may be identified and analyzed based upon their business and technical attributes to determine whether the public clouds are suitable for hosting a workload. The analysis of the public clouds may be based on a particular workload, a category of workloads, or irrespective of workloads or workload categories. A best-fit public cloud may be identified for a workload determined to be suitable for moving to a public cloud environment based upon the analyses.11-03-2011
20090300178NETWORK INCLUDING SNOOPING - A computer network including: 12-03-2009
20120297057Hardware-Assisted Integrity Monitor - A hardware-assisted integrity monitor may include one or more target machines and/or monitor machines. A target machine may include one or more processors, which may include one or more system management modes (SMM). A SMM may include one or more register checking modules, which may be configured to determine one or more current CPU register states. A SMM may include one or more acquiring modules, which may be configured to determine one or more current memory states. A SMM may include one or more network modules, which may be configured to direct one or more communications, for example of one or more current CPU register states and/or current memory states, to a monitor machine. A monitor machine may include one or more network modules and/or analysis modules. An analysis module may be configured to determine memory state differences and/or determine CPU register states differences.11-22-2012
20120185587DATA CONSISTENCY IN LONG-RUNNING PROCESSES - Long running computer implemented processes are dynamically adapted to improve data consistency. A range of process steps in a long running computer implemented process is specified. Additionally, each of the computer-implemented process partners that are associated with the execution of the long running process are identified within the range of specified process steps. Monitoring information is also collected with regard to at least one identified process partner. An automatic determination is made as to whether each monitored process partner is available before initiating execution of the specified range of process steps in an instance of the long running computer implemented process and a flow of the long running computer implemented process is transformed based at least in part upon the determination as to whether each monitored process partner is available.07-19-2012
20120185585Adaptive Idle Timeout for TCP Connections in ESTAB State - In various embodiments, a method may be provided comprising: determining a number of established TCP connections to a server; comparing the number of established TCP connections to the server to a upper threshold value; and if the number of established TCP connections to the server is greater than or equal to the upper threshold value, determine an adaptive idle timeout value based on the relationship between the number of established TCP connections to a server and the upper threshold value.07-19-2012
20120185584RECORDING APPLICATION CONSUMPTION DETAILS - A consumption data monitoring method may identify an interface provided by an operating system running on a server. A monitoring module populates an operating system database with information on the identified interface. The monitoring module populates a host database with consumption details received from a host machine, the consumption details comprising one or more interfaces of an operating system on the host machine used by a computer application program running on the host machine. The monitoring module compares the host database to the operating system database to determine if the interface provided by the operating system running on the server matches the one or more interfaces of the operating system on the host machine.07-19-2012
20080275986Method to Update Status on Multiple Voice and Text Systems from a Single Device - A method for updating a message on a plurality of devices from a single device comprising a Configuration Program (CP), an Audio Device Update Program (ADUP), and a Text Device Update Program (TDUP). Using the CP, the user may enable and disable the present invention, add or delete devices, create and save messages, select existing messages to play to callers or display to senders, enable automated status updates, enable multiple message levels, or enable availability updates. The automated status update automatically creates messages from the user's calendar. The multiple message levels are a hierarchy of messages in which the message sent to a caller or sender based on their identity. The availability update communicates the user's next available time to the caller or sender. The ADUP and TDUP select the appropriate message to play or send based on whether automated status updates, multiple message levels, and availability updates are enabled.11-06-2008
20080275985Systems, Methods and Computer Programs for Monitoring Distributed Resources in a Data Processing Environment - Methods, apparatus and computer programs are described for monitoring resources within a data processing network. Monitoring entities can be selected, and a set of active monitoring functions can be modified, based on the requirements of consumers of monitored data. A first method involves monitoring resources on behalf of consumer entities within the network. A description of the consumer entity's monitoring requirements are published by the consumer entity and stored in a repository. The monitoring requirements of the consumer entity are compared with the monitoring capabilities of a plurality of monitoring entities, to identify a monitoring entity capable of satisfying the monitoring requirements of the consumer entity. An identified monitoring entity is selected, and a connection is established between the selected monitoring entity and the consumer entity. A second method involves modifying an active set of monitoring functions in response to changes to monitoring requirements of a currently active set of consumer entities.11-06-2008
20080275983Method and system for network management providing access to application bandwidth usage calculations - A method, system, apparatus, and computer program product is presented for management of a distributed data processing system. The network management framework is able to monitor multiple sources of network packets on various subnets within the distributed data processing system; distributed packet snoopers are deployed from a packet usage manager to monitor the multiple sources of network packets. The system administrator can request packet filtering based upon selected active users or active applications. A bandwidth history database is compiled from bandwidth usage data associated with multiple entities within the data processing system, including users, applications, and/or endpoints within the data processing system. In response to a requested action within the data processing system, bandwidth usage for the requested action can be predicted with reference to the bandwidth history database. The actual and predicted bandwidth usage of requested actions can be displayed to the system administrator in real time.11-06-2008
20080275981CLIENT SERVER SYSTEM AND METHOD FOR EXECUTING AN APPLICATION UTILIZING DISTRIBUTED OBJECTS - A client connected to a communication network performs an access request to an object. An application server performs an application by an actual object according to the client request. An object pool connected to the client and the application server pools a proxy object corresponding to the actual object and holds the actual object management information. The application server notifies the object pool of an event according to the status change of the application. The object pool automatically updates the actual object management information according to the notification of the event from the application server.11-06-2008
20110270977ADAPTATION SYSTEM FOR LAWFUL INTERCEPTION WITHIN DIFFERENT TELECOMMUNICATION NETWORKS - A lawful interception architecture for an operator of communication networks (NWO) comprising sets of interception probes (SON11-03-2011
20120297053UTILIZING SIGNATURES TO DISCOVER AND MANAGE DERELICT ASSETS OF AN INFORMATION TECHNOLOGY ENVIRONMENT - A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets.11-22-2012
20120297060INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - There is provided an information processing device including a device information acquisition unit configured to acquire information on other devices connected via a network, and a setting file creation unit configured to, on the basis of the information on the other devices acquired by the device information acquisition unit, create a setting file by causing the information processing device to describe in the setting file information on content that is managed by the information processing device, the setting file being adapted to be forwarded to the other devices. The setting file creation unit describes in the setting file an order in which the setting file is to be forwarded.11-22-2012
20120297059AUTOMATED CREATION OF MONITORING CONFIGURATION TEMPLATES FOR CLOUD SERVER IMAGES - Monitoring configurations for monitoring systems are automatically created for cloud server instances by polling the cloud controller to detect creation of each new instance, obtaining the image ID for the new instance from the cloud controller, and using a monitoring configuration template associated with the image ID to create the monitoring configuration. If a monitoring configuration template is not available for the image ID, a new template is created, either manually and/or automatically, and added to the template database. Automated template creation can include polling and analyzing instance ports and/or detecting and interrogating embedded monitoring agents such as WMI or SNMP. Monitor packs including detection criteria and interrogation checks can be used to detect monitoring agents and construct appropriate templates. Embodiments further monitor the cloud controller to detect termination of instances, and remove corresponding monitoring configurations from the monitoring to avoid generating false alerts.11-22-2012
20120297055System and method for wireless network offloading - Wireless offloading provides tools to a service provider to encourage or direct a subscriber to offload from a first network, e.g., a cellular network, to a second network, e.g., a Wi-Fi network. The cellular service provider can use network data to determine wireless offloading priorities for cellular subscribers on an individual or group basis. The cellular service provider may use wireless network data it has and/or wireless network data it learns about networks from the wireless devices (which may obtain Wi-Fi network data from beacon frames of Wi-Fi networks or active scanning and which may report to the cellular service provider). Each wireless device can be given scanning assignments to ensure that the reporting task is shared among subscribers or adjusted to fill in gaps in data. With the network data, the cellular service provider is capable of generating useful prioritized network lists for wireless devices, either individually or as a group. Preferences can be encouraged in the form of incentive offers to subscribers to, e.g., offload from the cellular network to a Wi-Fi network. Incentive offers can include offers to lower service costs or provide additional or improved services.11-22-2012
20120297054Monitoring Service in a Distributed Platform - Techniques for enabling monitoring across one or more domains are provided. The techniques include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.11-22-2012
20120297050Collecting Information Regarding Electronic Aging of Products - Monitoring aging information for multiple devices. Aging information of the devices may be received. Statistics regarding the multiple devices may be determined based on the aging information. For at least some of the devices, update information may be determined based on the respective aging information. The update information may include modifications to operating parameters of the devices. For example, the devices may operate according to initial parameters that are above sustainable parameters and the update information may lower the operating parameters based on the aging information.11-22-2012
20090172149REAL-TIME INFORMATION TECHNOLOGY ENVIRONMENTS - Real-time data of business applications of an Information Technology environment is monitored to obtain information to be used in managing the environment. A business application includes processing collectively performed by a plurality of components of the environment. A component includes one or more resources, and therefore, in one example, the real-time data being monitored is associated with those resources.07-02-2009
20100121952COMMUNICATION UNIT, METHOD OF CONTROLLING COMMUNICATION UNIT AND COMPUTER PROGRAM - Conventionally, when a communication unit needed to apply an authentication process to other communication units, a problem arose in that the communication unit could not be quickly connected to a communication unit near a user and to which the user wishes the communication unit to connect. In this invention, a station measures a range to other communication units in the surrounding area and possesses a trigger, which is initiated by a user, for beginning an authentication process; when initiated, the station selects the nearest communication unit based on the result of the measurement and applies the authentication process to it.05-13-2010
20100121951Method and arrangement for diagnosing networks including field bus systems - A method for diagnosing networks including networks of field bus systems utilizes an arrangement for diagnosing the networks. The arrangement includes at least two field bus diagnostic apparatuses with each of the field bus diagnostic apparatuses being assigned to a corresponding field bus. The method is carried out with the steps of: causing each of the field bus diagnostic apparatuses to detect current data traffic of the corresponding one of the field busses as a data record and storing the data record on an allocated storage medium; diagnosing the detected data record in an evaluation unit integrated into the corresponding field bus diagnostic apparatus and storing the diagnosed data record in the storage medium allocated to the corresponding field bus diagnostic apparatus; making the detected, diagnosed and stored data record available in the network via a server integrated into each of the field bus diagnostic apparatuses; causing the field bus diagnostic apparatuses to exchange the data records with each other via the servers thereof and the network and storing the exchanged data records on the storage mediums of corresponding ones of the field bus diagnostic apparatuses so that, on each of the storage mediums, the exchanged data records of all other field bus diagnostic apparatuses are stored in addition to the detected, diagnosed and stored data records of the field bus diagnostic apparatus; and, inspecting the detected, diagnosed and stored data records via at least one output unit with each output unit being connected via a client to the network and the data records being made available in the network by at least one arbitrary server.05-13-2010
20110208856Method for Intermediating Network Operators and Developers - A method for intermediating a plurality of network operators and one or more developers is provided. The method includes the steps of: obtaining, by an obtaining unit, a requirement about a computer program required by each network operator; integrating, by an integration unit, mutually-related requirements among the obtained requirements into one requirement; generating, by a generation unit, information about the necessity for development of a computer program implementing the integrated requirement; and presenting, by a presentation unit, the one or more developers with the integrated requirement and the information about the necessity.08-25-2011
20110208860NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network (08-25-2011
20110208859Method for Lawfully Intercepting Communication IP Packets Exchanged Between Terminals - A method for lawfully intercepting communication IP packets exchanged between terminals is provided. The method involves assigning an IP address associated with a telecommunication service provider to, for example, a sending terminal for use as its IP address in communications with a receiving terminal, the telecommunication service provider providing SIP proxy services for establishing communication between the sending and receiving terminals. The communication IP packets are intercepted in such a way that the terminals are unaware of the interception.08-25-2011
20100131644RESOURCE ALLOCATION METHOD IN WIRELESS NETWORK - Provided is a resource allocation method performed in a wireless network formed of a plurality of nodes, the resource allocation method including the operations of forming clusters and electing cluster heads respectively for the clusters; determining whether a node from among the plurality of nodes forming the wireless network is an edge node; if the node is not the edge node according to a result of the determining, collecting link information related to other nodes in a cluster that comprises the node, and delivering the link information to a cluster head of the cluster; and if the node is the edge node according to a result of the determining, otherwise, obtaining link information and scheduling information from an edge node of another cluster within a communication range with the cluster comprising the edge node, and delivering the link information and scheduling information to the cluster head. The resource allocation method decentralizes a load of calculations to several nodes, wherein the load may be centralized to one node in a large ad-hoc network, so that an energy efficiency of the node may be increased, and since the several nodes sequentially perform simple calculation, a total of the resource allocation time may be reduced.05-27-2010
20100281163METHOD AND APPARATUS FOR MAINTAINING ROUTING INFORMATION - A method and apparatus for maintaining routing information in a Peer-to-Peer (P2P) network are provided. The method includes that: a super maintenance node receives routing update information of an ordinary node in its home area; the super maintenance node sends routing update information to super maintenance nodes in other network areas; the super maintenance nodes in other network areas notify ordinary nodes in their home network areas to update routing information. With the present invention, a node of strong processing capabilities at the network area border is chosen to act as a super maintenance node and other nodes as ordinary nodes; when a node joins or fails, an ordinary node sends detected routing update information only to the super maintenance node in the local network area; the super maintenance node then forwards the update information to super maintenance nodes in other network areas. Each super maintenance node notifies ordinary nodes in its home network area of the received routing update information.11-04-2010
20100281156SYSTEM AND METHOD OF RECORDING AND SHARING MOBILE APPLICATION ACTIVITIES - A method of recording activity at a wireless device is provided. The method includes receiving a record command, determining a user activity at the wireless device, and determining available memory at the wireless device. The method further includes recording the user activity to create a device recording at least partially based on the user activity and the available memory.11-04-2010
20100281155APPLICATION MONITORING - A method and apparatus for monitoring an application executing on a self-service terminal. The method comprises: registering with a services manager (such as an XFS or J/XFS manager) to receive event reports indicative of a change of state being sent to the application; accessing an operating system function to deduce a current status of the application; and communicating a status of the application to the remote management system, without communicating with the application, to enable the remote management system to manage the self-service terminal more effectively.11-04-2010
20120297064METHOD AND APPARATUS FOR AN MTC USER EQUIPMENT TO DETECT AND REPORT A PREDETERMINED EVENT TO AN MTC SERVER - The invention proposes a detecting and reporting method and apparatus in a user equipment of a machine type communication based communication system. The MTC user equipment firstly detects whether a predetermined event occurs; and the MTC user equipment transmits a first report message to one or more servers if the predetermined event occurs. With the technical solution of the invention, the MTC user equipment can detect the occurrence of the predetermined event, for example, the MTC user equipment being stolen, the MTC user equipment being in illegal movement, the MTC user equipment being damaged, the MTC user equipment being powered off or a predetermined data value measured by the MTC user equipment being above or below a predetermined threshold, and notify an MTS server. The MTC server can take the further action upon acquisition of the relevant condition, for example, recover the MTC user equipment, bill the user of the MTC user equipment, charge the user of the MTC user equipment, etc.11-22-2012
20100146103PERFORMANCE MANAGEMENT SYSTEM, INFORMATION PROCESSING SYSTEM, AND INFORMATION COLLECTING METHOD IN PERFORMANCE MANAGEMENT SYSTEM - Provided is a performance management system 06-10-2010
20090006616END-TO-END PERFORMANCE TOOL AND METHOD FOR MONITORING ELECTRONIC-COMMERCE TRANSACTIONS - A method and apparatus for monitoring electronic commerce transactions. A network delay agent, coupled to the access point for the electronic commerce provider's system is operable to send and receive communications to a designated customer's site for measuring network transport latency. Application test latency is also determined. An application monitor agent that is coupled to the electronic commerce provider's access point sends application tests that correspond to tasks performed during a typical electronic commerce transaction, to the electronic commerce provider's system. The time required for the electronic commerce provider's system to perform the indicated tasks and return a response to the application monitor agent is recorded as application test latency. Network transport latency and application test latency are displayed to indicate the delays that are experienced by a user in executing an electronic commerce order.01-01-2009
20080244068COMPUTER PRODUCT, OPERATION MANAGEMENT METHOD, AND OPERATION MANAGEMENT APPARATUS - A resource coordinator manager automatically sets a LAN and a SAN for a server to be add according to an increase in load. An ASCC satellite executes a boot script to boot up a user application on the server. The ASCC satellite executes a stop script to stop a user application executed on a server to be returned to a server pool according to a decrease in load. The resource coordinator manager automatically releases a LAN and a SAN set for the server to be returned.10-02-2008
20080244069METHOD AND APPARATUS FOR DORMANT MODE SUPPORT WITH PAGING - Apparatuses and methods are disclosed herein for implementing dormant mode with paging in a WLAN. Power savings in the computing device and reduction in traffic across the network are achieved by requiring a computing device to inform the WLAN of its location only when it crosses a paging area boundary or is to receive IP traffic. Dormant mode with paging is implemented in a protocol that supports dormant functionality and paging functionality but does not itself provide methods or standards for implementing such functionality, such as the IEEE 802.11. The methods and apparatuses disclosed herein provide the methods needed to implement dormant mode with paging in such a protocol. Generally, the methods and apparatuses for implementing dormant mode with paging basically include (1) establishing paging areas; (2) communicating access group information to a computing device; and (3) locating a computing device.10-02-2008
20080244063Automatically detecting managed servers in a network - A group of managed servers may be monitored by initially querying the network to determine which servers are present. The present servers may be identified by a universal unique identifier and their Internet Protocol address. A table may be maintained to correlate the Internet Protocol address and the universal unique identifier.10-02-2008
20080244065CHRONOLOGY DISPLAY AND FEATURE FOR ONLINE PRESENTATIONS AND WEB PAGES - A chronology display is generated for use with a web presentation or other form of network presentation. The chronology display may include a plurality of intervals, with each interval representative of a period of time. In an embodiment, some of the intervals may indicate a number of content items provided on the network presentation during the time period that corresponds to each particular interval. The indication may be provided by a characteristic, such as for example, a color or shading that represents the number of content items provided on the network presentation.10-02-2008
20080244064VERIFYING METHOD FOR IMPLEMENTING MANAGEMENT SOFTWARE - A verifying method for implementing management software at a client end is provided herein. The management software works for collecting, managing, and analyzing data of a plurality of peripheral hosts. In the verifying method, a management system fitting the requirements of the management software is established at a service end first. The management system includes a management host and a plurality of first peripheral hosts, and the management host is connected to each of the first peripheral hosts through a network, and the management software is installed in the management host. One or more verifying scenarios are provided herein for testing configuration and performance of the management software at a simulated environment of the client end. Each of the scenarios for testing may consider that a request form the client computer is validated through multiple authorization points and finally a valid and complete response to the client's request is returned.10-02-2008
20110270974SYSTEM AND METHOD FOR PROVIDING AUTOMATICALLY UPDATED PRODUCT INSERTS - Systems, apparatuses, and methods can provide parameters of operating results for control products used in biological reactions. For example, automatically updated inserts containing such parameters for clinical quality controls can be provided. A customer can log into a website, provide lot number of quality control products, information about instruments, and tests being performed and then receive updated parameters for the products. The product inserts can be customized for or by a particular customer.11-03-2011
20080275987METHODS AND APPARATUS FOR INTEGRATING SERVICES FOR ACCESSING THE WORLD WIDE WEB - Web pages retrieved by a browser core are translated into user interface component definitions and page information. The definitions and page information are transmitted to a user device which recomposes the definitions and page information into a format for presentation to a user on a user device. Transmitting the definitions and page information includes translation of the definitions and page information into a format appropriate for both the particular communications media on which the information is transmitted, and the device to which the information is transmitted. The device includes a browser client which performs the recomposition. The browser client also receives user input, and may respond by altering the information locally at the user device, and sending information related to the user selection back to the browser core for further processing. The browser core also tracks user sessions, thus allowing a user to access the network from several devices, and capture session information for each access from each device. This allows users to switch devices, and start a new session at the point where a previous session ended.11-06-2008
20080250138Multiple displays of large dynamic alarm windows - A GUI for a Network Management System client is provided. The GUI presents network alarms in more than one alarm window. Each alarm window includes a drop-down menu for selecting an alarm filter and a pause button for halting display of new alarms. Alarm filters may be retrieved from a database accessible from a number of NMS clients, thereby allowing public filters to be created by a supervisor. A method of automatically populating the “additional text” field of alarms in a way specified manually after installation of the NMS, which provides additional means of filtering alarms. The invention provides an improved interface by which network administrators can manage network alarms, the interface being particularly advantageous during floods of large numbers of network alarms.10-09-2008
20100138531REAL TIME PROTOCOL STREAM MIGRATION - A method for monitoring and migrating a primary server transmitting a real time streaming protocol (RTSP) stream is provided. Backup servers monitor at least one primary server to determining whether the primary server is active. Upon determining that a primary server is inactive, the backup servers take over the connection on which the inactive primary server was streaming data and then take over the transmission of the RTSP stream. The backup server can further derive the position in a file of the next data needed to be transmitted.06-03-2010
20130219059Internet-Wide Scheduling of Transactions - A method and system for distributing content on a network through network-wide transactions is disclosed. The method and system monitors the network using triggered measurement of the performance of an element of the network, dynamically computing, based on the monitoring, the regions of the network with available performance capacity for the transaction to proceed at a given time, determining, based on the computing, a scheduled time for the transaction to proceed, and distributing the content according to a schedule related to the scheduled time.08-22-2013
20130219054WORKLOAD MANAGEMENT IN HETEROGENEOUS ENVIRONMENTS - A system for managing a workload in a heterogeneous environment comprising at least one application, an interoperability layer for inter-application communication, and at least one adapter for connecting the at least one application to the interoperability layer, is disclosed. Such a system includes a self-adapting application connector management component which includes the following: a monitoring component for monitoring the performance and workload characteristics of one or more applications and/or one or more adapters; a computing component for computing a configuration change based on the monitored performance and workload characteristics; a change component for changing the configuration of the one or more adapters in accordance with the computed configuration change; and a change component for changing the configuration of the one or more applications in accordance with the computed configuration change.08-22-2013
20130219052DYNAMIC CONFIGURATION OF INTERCONNECTED DEVICES FOR MEASURING PERFORMANCE CHARACTERISTICS IN A NETWORK - Dynamic configuration of interconnected devices for measuring performance characteristics in a network is disclosed. The present invention relates to measurement of performance characteristics and, more particularly, to measurement of performance characteristics of interconnected devices in a network. In existing systems there is no mechanism to dynamically determine the performance characteristics of the network and automate the test process between devices of the network. Disclosed system allows configuring the devices such as provider edge devices dynamically in the network. Further, it is possible to determine the capabilities of the devices under test and accordingly configure the test parameters. Further, the devices may be synchronized and the test may be carried out. The test process is thus automated and hence eliminates manual configuration that is error prone and tedious.08-22-2013
20130219043METHOD AND APPARATUS FOR AUTOMATIC MIGRATION OF APPLICATION SERVICE - A method and apparatus for dynamically migrating a virtual desktop (VD) user from a first data center (DC) to a second DC in response to a determination made using DC management information and communications network management information that a user quality of experience (QoE) is deficient.08-22-2013
20090100173COMMUNICATION MANAGEMENT SYSTEM, COMMUNICATION MANAGEMENT METHOD, AND COMMUNICATION CONTROL DEVICE - The present invention provides a technique for managing P2P communication appropriately.04-16-2009
20080263198Device and method using non-cycle accurate measurements for discovering emulated clients - A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier.10-23-2008
20090037579Page Grouping For Site Traffic Analysis Reports - Website administrators can specify page groups and/or single pages as checkpoint nodes for site analysis reporting purposes, and can configure the system of the invention to provide information as to a particular visitation path through the checkpoints. Any group of pages can be designed as a single checkpoint node for website traffic analysis and reporting purposes. Page groups can be used in place of or in addition to individual web pages in any context where site traffic analysis is being presented or performed.02-05-2009
20090055525System for Remote Configuration, Control, and Monitoring of Devices Over Computer Network Using Central Server - Devices, systems and methods are disclosed that relate to the control of devices over a network from a central controller. A computer server can control, monitor and affect devices which include a controller and a network interface for communicating information between the device and the server. The device and central controller communicate using a predefined communications protocol for either remote configuration, control, or monitoring of the device and the protocol allows the central server to recognize the device as a hierarchical tree of contexts including data elements and metadata describing each said data element.02-26-2009
20080228914System and method for attributing a portion of a response time to an element of a virtual network - A system and method for evaluating a portion of a response time of an application that is attributable to an element on a virtual IP network.09-18-2008
20080228912Enhanced Quality Reporting for Transmission Sessions - This invention relates to methods, computer program products, clients, servers, systems and protocols in the context of reporting a quality of a transmission session according to one or more metrics, inter alia to adapt quality reporting to a switching of content within the transmission session and to allow faster session startup.09-18-2008
20080228913Network response time measurements in an asymmetric routing environment - In one embodiment, a method can include: (i) receiving flow records from a plurality of network devices on asymmetric paths; (ii) reconstructing a network transaction from the received flow records; and (iii) deriving response times using the reconstructed network transaction.09-18-2008
20090265465FOOTPRINT-PROVIDING DEVICE AND FOOTPRINT-PROVIDING SYSTEM - A footprint-providing device which can put footprints on Web pages provided by various Web servers. The footprint-providing device is connected via a network to a client terminal that views a Web page with a browser. The footprint-providing device sends footprint data, which can be written on one part of the Web page that has been received by the browser of client terminal, to the browser receiving the Web page from a Web server as a response to a request that is made asynchronously with a view-request for the Web page by the browser.10-22-2009
20090265464System and method for alerting on open file-share sessions assosciated with a device - A method and system for detecting an active file-share session on a monitored device associated with a client device, alerting the user of the client device, and enabling them to terminate the file-share session, are disclosed. In accordance with the disclosed method and system, when a remote device (e.g., on a network, the internet, etc.) connects to a shared file or folder on a monitored device (e.g., a personal computer, network area storage, a game console, a storage area network, a smart telephone, etc.) the user of the client device receives an immediate, automatic alert with the specifics of the file-sharing session and data affected. The user is then presented with an option of whether to OK the file-sharing session (i.e. allow data access to proceed), or to disconnect the file-share session (i.e. cause the remote user to lose access to the monitored device's shared data).10-22-2009
20090265463METHOD OF NON-INTRUSIVE ANALYSIS OF SECURE AND NON-SECURE WEB APPLICATION TRAFFIC IN REAL-TIME - Provided is a method and system for monitoring and analysis of networked systems, that is non-intrusive and real time. Both secure and non-secure traffic may be analyzed. The provided method involves non-intrusively copying data from a communication medium, reconstructing this data to a higher level of communication, such as the application level, grouping the data into sets, each set representing a session, and organizing the data for chosen sessions in hierarchical fashion which corresponds to the hierarchy of the communicated information. If monitored communications are encrypted, they are non-intrusively decrypted in real time. Hierarchically reconstructed session data is used by one or more plug-in applications, such as alarms, archival applications, visualization applications, script generation applications, abandonment monitoring applications, error detection applications, performance monitoring applications, and others.10-22-2009
20090265462MONITORING APPARATUS AND STORAGE METHOD - A monitoring apparatus receives information about a storage condition of monitoring data from a management apparatus via a network, and acquires at least one of image data and audio data as the monitoring data. The monitoring apparatus detects a communication state with the management apparatus, and performs control to store the monitoring data which is determined to satisfy the storage condition into a storage device that is other than the management apparatus according to the detected communication state.10-22-2009
20090265461METHOD AND SYSTEM FOR CHARACTERIZATION OF ONLINE BEHAVIOR - Data about computer network traffic is collected as user website visit recording sessions. The data captured is analyzed and organized with sufficient level of detail or granularity to determine a single request from a server. Each data request is analyzed to determine if it comes from a server with which an ongoing end user interaction or open site visit is occurring. If not, a new site visit is created as a general proposition. If the data request is part of an open site visit, then the time is compared to the time of the last interaction and if the interval is sufficiently small, the data request is treated as a continuation of the visit. If the interval is large, a new site visit is created.10-22-2009
20090265460SYSTEM AND METHOD FOR TRACKING USER IDENTITY AND/OR ACTIVITY ACROSS MULTIPLE WEBSITES - A method of tracking a user and the user's activities on a telecommunications network. The method includes receiving a notification from a first web server that the user has accessed a first webpage on a first website, wherein the notification is received via a user tracking server operated by a tracking coordinator, setting a session cookie including a user tracking ID on the user's computer and/or web browser to track the user's activities on the network and storing tracking data for the user in a database associated with the user tracking server, receiving an indication from a second web server that the user has accessed a second webpage on a second website, wherein the second webpage comprises a confirmation webpage that includes transaction data for the user, retrieving the user tracking ID from the session cookie and associating the user tracking ID retrieved from the cookie with the transaction data obtained from the second webpage, and reporting the user tracking data to the first web server.10-22-2009
20090265458DYNAMIC SERVER FLOW CONTROL IN A HYBRID PEER-TO-PEER NETWORK - Technologies are described herein for providing dynamic flow control of requests to a server in a hybrid peer-to-peer network. The server collects a number of metrics related to its current stability and the throughput of requests from peer-to-peer devices. These metrics, along with associated trend data, are used by the server to calculate a current stability rating and a current throughput rating. The server then imposes flow control on a proportional number of the peer-to-peer devices based upon the current ratings. This operation is run periodically, with ratings re-calculated from current metrics, and new flow control measures imposed in each cycle.10-22-2009
20090265456Method and system to manage multimedia sessions, allowing control over the set-up of communication channels - Managing multimedia sessions including surveying anomalies representing illicit uses of a determined signalling protocol, determining reactions in relation to the identified anomaly, collecting all requests exchanged between a client terminal and a proxy server, analysing collected requests for detection of anomalies, through the use of a plurality of indicators each associated with one of the identified anomalies, and in the event of the detection of at least one anomaly, triggering by the proxy server of a reaction corresponding to the detected anomaly, the reaction including real-time action during the communication concerned by the message containing the anomaly. The method therefore allows the real-time detection and filtering of hidden channels utilised in a signalling protocol such as SIP.10-22-2009
20080281963DISTRIBUTED REMOTE MANAGEMENT (DRMON) FOR NETWORKS - A method and apparatus for the distributed monitoring of network traffic deploys end system agents to collect traffic statistics at distributed points in the network. These statistics are forwarded to collectors which compile the statistics to create higher level pictures of network performance. A collector may act as a proxy for a prior art standalone network probe and may interact with network management software as though it were a standalone network probe. The invention is designed to work in accordance with a variety of standard network management protocols including SNMP, RMON, and RMON11-13-2008
20080281961NETWORK DELAY ANALYSIS INCLUDING PARALLEL DELAY EFFECTS - A multi-functional graphical user interface facilitates the analysis and assessment of application delays, including delays that occur on multiple paths. A trace file of an application's network events is processed to categorize the causes of delays incurred in the propagation and processing of these events. The system identifies the amount of delay (‘component delay’) that can be eliminated by eliminating each of the components of delay individually, as well as the amount of delay (‘parallel delay’) that can be eliminated by eliminating combinations of the delay components. A user interface displays the amount of reduction that can be achieved by eliminating each component delay individually and the amount of reduction that can be achieved by eliminating combinations of the individual component delays. To facilitate the analysis and assessment of these potential reductions, the interface allows the user to ‘drill down’ to view the individual delay components contained in each combination forming the parallel delays. In this manner, the user is provided a view of each of the delay components that would need to be addressed, either individually or in combination, to improve the overall application delay.11-13-2008
20080281958Unified Console For System and Workload Management - Disclosed are systems and methods for implementing a unified console for managing computing-based devices. Described is a unified management solution to efficiently manage one or more workloads or a plurality of tasks performed by a user for managing the resources of applications in a computer network that includes the computing-based devices. The system can be implemented by providing a combined functionality that includes features of monitoring and update services, in a single console.11-13-2008
20080281959MANAGING ADDITION AND REMOVAL OF NODES IN A NETWORK - Systems and methods for managing a networked computing environment. The method comprising determining a change in status of a first computing system in a network according to status information communicated from the first computing system to a monitor system over a dedicated connection formed between the first computing system and the monitor system, wherein the dedicated connection is independent of network communication lines connecting the first computing system to other computing systems in the network.11-13-2008
20080281964Server discovery, spawning collector threads to collect information from servers, and reporting information - Server discovery, spawning collector threads to collect information from servers, and reporting such information, is disclosed. A method of one embodiment determines a number of servers communicatively coupled to a network. For each server, a collector thread is spawned to collect information regarding the server by sending requests to the server and receiving responses from the server. The collector threads can be spawned by and run on a computing device other than the number of servers, such that no computer-executable code is installed on the servers for collecting the information. Upon completion of the collector thread for each server, the information regarding the server as collected is stored to a database by one or more writer threads. The information may include dynamic load-oriented and function-oriented information regarding the servers, as well as static configuration information, from which server utilization-oriented statistics may be distilled to identify candidate servers for server consolidation.11-13-2008
20080281957DEFERRED INVOCATION OF COMMUNICATION SERVICES - In one embodiment, a network device determines one or more conditions for invoking one or more real applications to the network device for a session. This determination may be made at the initiation of the session, such as when a SIP INVITE message is received. The one or more conditions allow real applications to be invoked when a future event satisfies the condition. When it is determined that a condition is satisfied, a real application associated with the condition is then invoked. Accordingly, conditions may be set for real applications that may be tested against future events that have not yet occurred. This allows deferred invocation of real applications. Accordingly, if real applications are not needed for a session, then they are not invoked. But, when a real application is needed, it can be invoked.11-13-2008
20080288634Real-time monitoring of operations support, business service management and network operations management systems - The invention relates to a system and method for monitoring the availability and performance of an organisation's Business/Operational Support System (B/OSS) and Business Service Management Systems (BSM) which are referred to as a target platform. The invention gathers data from that monitored OSS/BSS/BSM arising from a distinct knowledge of the OSS/BSS/BSM's anatomy including its behaviour, log messages, configuration and public APIs and analyses that data to determine the OSS/BSS/BSM's run and configuration state, and performance, so as to report on these and other system events detected. This will allow the operational impact of the monitored OSS/BSS/BSM to be ascertained.11-20-2008
20080288635System and method for associating a client identity between servers - A client identity is associated between servers by establishing an identity for the client at a first sever utilizing a cookie transmitted to the client by the first server and transmitting to the client by the first server a URL, wherein the URL includes the identity established at the first server and information identifying the first server, and wherein the URL is transmitted by the client to the second server.11-20-2008
20080288632METHOD AND SYSTEM FOR UNDERSTANDING SOCIAL ORGANIZATION IN A DESIGN AND DEVELOPMENT PROCESS - A method and system constructs a socio-technical network representing design and development processes. In one aspect, a network of inter-personal interactions comprising at least a plurality of nodes representing actors in design and development process is established; an artifacts network comprising at least a plurality of nodes representing a plurality of heterogeneous artifact types is established; one or more relationships between the nodes in the network of inter-personal interactions are determined; one or more relationships between the nodes of the artifacts network are determined; and one or more relationships between the nodes in the network of inter-personal interactions and the nodes of the artifacts network are determined.11-20-2008
20080288631STANDARD BASED DETECTION AND LAUNCH OF CLIENT APPLICATIONS - The claimed subject matter provides a system and/or method that detects, installs and launches applications on client machines. The disclosed system can include a component that receives a request to launch or install a client application. The component detects whether an application is present in a client machine by scrutinizing the received request and extracting an agent string associated with the client application. Based at least in part on the agent string, a server in receipt of the request can distribute a formatted document affiliated with the client application and thereafter initiate the application to execute on the client machine through MIME-type association.11-20-2008
20080288629METHODS, MEDIA, AND SYSTEMS FOR TRACKING CONTENT USAGE OVER A NETWORK - A content management system distributes items of media content to groups of users. The media is fingerprinted and tracked for reporting purposes. The system uses an algorithm to compensate for multiple content owners. The system can also be configured to provide content while still providing anonymity for actual use.11-20-2008
20080288633NETWORK DEVICE TRACKING USING A NETWORK DEVICE SERVER - Systems and methods for tracking devices that are connected to physical communication ports of a network device server. In one example embodiment, a method includes detecting the connection of a device to a physical communication port of a device server; determining whether the device has been assigned an NCC; if the device has not been assigned an NCC, assigning an unassigned NCC to the device; and mapping the device's assigned NCC to the physical communication port.11-20-2008
20120297063METHOD AND APPARATUS FOR POPULATING A SOFTWARE CATALOGUE WITH SOFTWARE KNOWLEDGE GATHERING - A method and a corresponding apparatus for inventoring software products on a plurality of computer are proposed. The inventoring system aims at populating a software catalogue without the manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process which gathers information from a potentially very large collection of computers. Any occurrence of a group of identical files across multiple computers is considered a reliable indicator that they belong to the installation footprint of a product.11-22-2012
20080313324REDUNDANT PILE OF INEXPENSIVE DRIVERS (RPID) - The claimed subject matter provides a system and/or method that manages storage media associated with a plurality of disparate devices. The disclosed system can include a network of disparate devices wherein each device in the network can be associated with storage media. Additionally, the disclosed system can also include a component that identifies each device in the network, associates a likelihood that the device will periodically leave or rejoin the network, and utilizes the associated likelihood to construct a logical redundant pile of inexpensive disks comprising the storage media associated with the disparate devices.12-18-2008
20080313325COMPUTER NETWORK SOFTWARE AND HARDWARE ASSET CONFIGURATION AND DISCOVERY SYSTEM AND METHOD - A method, system, and network for interfacing the work-flow monitoring and reporting of a host computer, a local network of information technology devices, a community of network users, and a global information technology community. This includes the processes and system features for initiating an inventory of a plurality of information technology devices associated with the local network of information technology devices. The present disclosure further includes determining needs of the local network of information technology and associating the needs to similar needs of the community of network users, and solution product and services of the global information technology community. The system directs the host computer to research and purchase resources similar in temperament of the needs of the local network of the information technology devices, and drive the global information technology community advertisements of the needs of the local network to the user of the host computer.12-18-2008
20080244061METHOD FOR MANAGING RESOURCES - The present disclosure provides a method for managing resources. According to one exemplary embodiment, the method may include establishing a resources threshold, the resources threshold indicative of a maximum level of recommended resource consumption for a particular client. The method may further include monitoring a level of activity at the client and notifying the client if the level of activity is approaching the resources threshold. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment.10-02-2008
20080281960Traffic supervision system - A method and a computer system for monitoring traffic, the computer system comprising an information handling server (11-13-2008
20120297061METHOD AND SYSTEM FOR COLLECTING AND MANAGING NETWORK DATA - Some embodiments include a method and/or a system for collecting and managing network data. Other embodiments of related methods and systems are disclosed.11-22-2012
20090319655 PRESENCE SYSTEM AND A METHOD FOR PROVIDING A PRESENCE SERVICE - A presence system and method are disclosed. The system comprises, intercommunicated: presentities E12-24-2009
20080215727REMOTE MONITORING SYSTEM - A method for monitoring and reporting information regarding status of a power supply/management device operated by a user comprises detecting the status of the device using a monitoring device having an application interface configured to communicate over a communication network, generating a status update indication using a self-describing computer language and sending the status update indication over the communication network to a remote computer, and associating the user with the status update information for the remote device using the remote computer.09-04-2008
20080235374Electronic device monitoring method, electronic device computer and program thereof - Processing relating to maintenance of a monitoring subject device is performed by detecting by a computer an IP address of an electronic device connected to a LAN, automatically referring to communication protocol specification data indicating a communication protocol with the electronic device indicated in remote maintenance management data provided in advance or obtained from the electronic device, and performing a communication with the electronic device by using said communication protocol and the IP address indicated by the communication protocol specification data.09-25-2008
20080235372METHOD AND SYSTEM FOR MEASURING STATUS AND STATE OF REMOTELY EXECUTING PROGRAMS - A system and method for providing attestation and/or integrity of a server execution environment are described. One or more parts of a server environment are selected for measurement. The one or more parts in a server execution environment are measured, and the measurements result in a unique fingerprint for each respective selected part. The unique fingerprints are aggregated by an aggregation function to create an aggregated value, which is determinative of running programs in the server environment. A measurement parameter may include the unique fingerprints, the aggregated value or a base system value and may be sent over a network interface to indicate the server environment status or state.09-25-2008
20080235371SYSTEM, COMPUTER PRODUCT AND METHOD FOR EVENT MONITORING WITH DATA CENTRE - A system, computer product and method for monitoring and disseminating data form a plurality of electronic devices via the Internet is provided. The plurality of electronic devices, or further electronic devices connected to the plurality of electronic devices, generate signal data. A computer product of the present invention is loaded on the electronic devices such that the signal data is collected via the Internet at a remote web server. The web server stores this data in a database such that a client can monitor its signal data by means of the web server, via the Internet. The present invention also permits the client to disseminate the signal data, including signal data meeting alarm parameters, based on business rules established by the client. A method for deploying the system of the present invention across a plurality of electronic devices, including electronic devices across a plurality of locations is also provided.09-25-2008
20080235370Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares - A method and a system for controlling a network traffic of P2P and instant messenger softwares are disclosed. In accordance with the method and the system, both a header and a payload of a packet generated by an instant messenger software or a P2P software are monitored to terminate a session by transmitting a termination signal to a receiver and a transmitter when required, thereby blocking the exchange of the attached file and storing the content of the conversation.09-25-2008
20080235366METHOD AND SYSTEM FOR MONITORING MESSAGES PASSED OVER A NETWORK - A method for performing a monitoring function for an application that passes messages between two or more endpoints, comprising: receiving a message including transaction data, the transaction data including data relating to transport of the transaction data; storing the message and transaction data in respective message data and transaction data buffers in a data store; storing status and semantic information associated with the message in the data store; receiving a signal selecting one or more module instances to define the monitoring function, each module instance for independently performing a respective aspect of the monitoring function, each module instance having related module instance data stored in a respective module instance data buffer in the data store, each module instance having a respective service access point for accessing the data store, each service access point having related service access point data stored in a respective service access point data buffer in the data store, each module instance independently accessing one or more of the message, transaction, module instance, and service access point data buffers to process data contained therein to perform its aspect of the monitoring function; and, initiating operation of the one or more module instances in accordance with a schedule defined by one or more routing rules, the one or more routing rules for routing a pointer to the message, as stored in the message data buffer, between the one or more module instances to thereby perform the monitoring function.09-25-2008
20080235365AUTOMATIC ROOT CAUSE ANALYSIS OF PERFORMANCE PROBLEMS USING AUTO-BASELINING ON AGGREGATED PERFORMANCE METRICS - Anomalous behavior in a distributed system is automatically detected. Metrics are gathered for transactions, subsystems and/or components of the subsystems. The metrics can identify response times, error counts and/or CPU loads, for instance. Baseline metrics and associated deviation ranges are automatically determined and can be periodically updated. Metrics from specific transactions are compared to the baseline metrics to determine if an anomaly has occurred. A drill down approach can be used so that metrics for a subsystem are not examined unless the metrics for an associated transaction indicate an anomaly. Further, metrics for a component, application which includes one or more components, or process which includes one or more applications, are not examined unless the metrics for an associated subsystem indicate an anomaly. Multiple subsystems can report the metrics to a central manager, which can correlate the metrics to transactions using transaction identifiers or other transaction context data.09-25-2008
20080244060ELECTRONIC DEVICE PROFILE MIGRATION - A network comprising a first electronic device associated with a first profile that uniquely identifies the first electronic device on the network. The network also comprises a second electronic device coupled to the first electronic device. The first profile is migrated to the second electronic device such that the first electronic device is no longer associated with the first profile and such that the first profile uniquely identifies the second electronic device on the network.10-02-2008
20120297062SYSTEM AND METHOD FOR GENERATING AND REPORTING COOKIE VALUES AT A CLIENT NODE - A method and apparatus for tracking and reporting traffic activity on a web site whereby cookie data is compiled at the visitor computer using cookie processing script embedded within the web page downloaded over the Internet and operable on the visitor computer. Data mining code within the downloaded web page is operable on the visitor computer to obtain web browsing data. The cookie processing script operates in consideration of this web browsing data and an old cookie previously stored on the visitor computer and associated with the visited web page to obtain new cookie values. These new cookie values are then stored on the visitor computer and also attached to an image request sent to a data collection server where they are processed and posted for viewing by the web page owner. As cookie processing and writing occurs completely within the visitor computer, cookie-blocking technologies are circumvented.11-22-2012
20080209034Home Network System, Method of Controlling the Same, Method of Setting Residential Gateway For the Same, and Method of Processing Event Protocol For the Same - The present invention relates to a home network system, in which devices constituting a home network can be installed to be provided with home network service, and can be controlled using various terminals, and to a method of controlling the home network system, method of setting a residential gateway and method of processing an event protocol for the home network system. In the home network system, an HNSN (08-28-2008
20110119372MESSAGE MANAGEMENT AND SUPPRESSION IN A MONITORING SYSTEM - A system and method for providing message suppression and management in a monitoring system is provided including a monitoring module including a message listener configured for receiving messages from monitored modules, and a suppression module configured for determining if an incoming message matches any existing message stored in the monitoring system and increasing a Suppression Interval (SI) exponentially for each same incoming message received at an Event Time which is within a time limit.05-19-2011
20100138532Method of operating a network subnet manager - The invention relates to a method of operating a network subnet manager, in particular Infiniband network subnet manager in a subnet of a network.06-03-2010
20110270980WIRELESS COMMUNICATION SYSTEM - Apparatus identification information about wireless access apparatuses judged to be able to communicate with a monitoring apparatus, among multiple wireless access apparatuses, is stored in a neighborhood database. If there is apparatus identification information that is not stored in the neighborhood database, among apparatus identification information stored in a registration database in which apparatus identification information about wireless access apparatuses registered as monitoring targets of the monitoring apparatus is stored, it is judged again for a wireless access apparatus to which the apparatus identification information is given whether communication is possible, after a predetermined time elapses. On the other hand, if there is no such apparatus information, or if the judgment is performed again for a predetermined number of times, the apparatus identification information stored in the neighborhood database is copied to the registration database.11-03-2011
20110270975CONFIGURABLE FRAME WORK FOR TESTING AND ANALYSIS OF CLIENT-SIDE WEB BROWSER PAGE PERFORMANCE - The present invention features methods, computer program products and apparatuses for measuring client-side computer system performance that features identifying one of a plurality of uniform resource locator addresses contained on a server computing system, with each of the uniform resource locator addresses being associated with computing resources. The computing the computing resources associated with any one of the plurality of uniform resource locator addresses being different from the computer resource corresponding to the remaining uniform resource locator addresses. The computing resources are accessible through a web-browser that accesses the same the computing resources associated with the one of the plurality of uniform resource locator addresses. Measured are metrics of the interactions between the web-browser and the computing resources associated with the one of the plurality of uniform resource locator addresses. It is determined whether the metrics satisfy pre-determined operational requirements.11-03-2011
20080201470NETWORK MONITOR PROGRAM EXECUTED IN A COMPUTER OF CLUSTER SYSTEM, INFORMATION PROCESSING METHOD AND COMPUTER - A network monitor program operating in each node included in a cluster system, for causing the node to execute: when a response to an existence confirmation message from a relay apparatus, which relays a business request to the node, could not be received, obtaining status data of other nodes included in the cluster system; when the status data of the other nodes represents that one of the other nodes is in a usable state, confirming whether or not the node in the usable state can communicate with the relay apparatus; and when it is confirmed that the node in the usable state can communicate with the relay apparatus, notifying a cluster manager of an occurrence of a communication failure.08-21-2008
20080209033Event monitoring and management - Described are techniques used in monitoring the performance, security and health of a system used in an industrial application. Agents included in the industrial network report data to an appliance or server. The appliance stores the data and determines when an alarm condition has occurred. Notifications are sent upon detecting an alarm condition. The alarm thresholds may be user defined. A threat thermostat controller determines a threat level used to control the connectivity of a network used in the industrial application.08-28-2008
20090172153HETEROGENEOUS TWO-PHASE COMMIT TEST ENGINE - A computer-implemented method, information processing system, and computer program storage product validate a two-phase commit process. First information is received that indicates a plurality of web services to be tested. Each of the web services are associated with a different resource manager. Second information is received that indicates a plurality of application servers for performing the web services. A global transaction is created that includes a plurality of transactions based on the first information that was received. A two-phase commit process is initiated at one of the application servers for performing the global transaction. After the two-phase commit process has ended, results of the global transaction that include information regarding each of the transactions within the global transaction are displayed.07-02-2009
20080270603METHOD, SYSTEM, AND PROGRAM PRODUCT FOR REMOTELY ATTESTING TO A STATE OF A COMPUTER SYSTEM - A method, system, and program product for remotely attesting to a state of computing system is provided. Specifically, the present invention allows a remote system to establish trust in the properties of the computer system. The properties to be trusted are expanded from the usual system software layers and related configuration files to novel types of data such as static data specific to the computer system, dynamic data determined at system startup, or dynamic data created as the computer system runs applications.10-30-2008
20080270604Timing Module for Regulating Hits by a Spidering Engine - A method and system for retrieving web-site based information by a spider engine at a target bandwidth is described. A target band width is received from the spider engine. A wait time is calculated by a timing module. Data retrieval from a web site is delayed by the calculated wait time so that data is retrieved at the desired target bandwidth.10-30-2008
20080270602Electronic Device Client and Server System and Method - An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers.10-30-2008
20080270599METHOD AND SYSTEM FOR CONFIGURING A PLURALITY OF NETWORK INTERFACES THAT SHARE A PHYSICAL INTERFACE - Certain aspects of a method and system for configuring a plurality of network interfaces that share a physical interface (PHY) may include a system comprising one or more physical network interface controllers (NICs) and two or more virtual NICs. One or more drivers associated with each of the virtual NICs that share one or more Ethernet ports associated with the physical NICs may be synchronized based on controlling one or more parameters associated with one or more Ethernet ports. One or more wake on LAN (WoL) patterns associated with each of the drivers may be detected at one or more Ethernet ports. A wake up signal may be communicated to one or more drivers associated with the detected WoL patterns. One of the drivers may be appointed to be a port master driver. If a failure of the appointed port master driver is detected, another driver may be appointed to be the port master driver.10-30-2008
20080270598Methods and Apparatus for Sampling Usage Information From a Pool of Terminals in a Data Network - Methods and apparatus for sampling usage information from a pool of terminals in a data network. In an aspect, a method is provided that includes determining a designated set of terminals, and transmitting tracking parameters to the designated set of terminals, wherein the tracking parameters identify at least one upload window. In an aspect, an apparatus is provided that includes provisioning logic configured to determine one or more tracking parameters that identify at least one upload window, and targeting logic configured to determine a designated set of terminals, and to transmit tracking parameters to the designated set of terminals. In another aspect, a method is provided for performing usage tracking. The method includes receiving tracking parameters that identify at least one upload window, performing usage tracking according to the tracking parameters to produce a tracking log, and transmitting the tracking log during the at least one upload window.10-30-2008
20080270597End user control configuration system with dynamic user interface - An end user control configuration (EUC) system with dynamic user interface provides a user friendly tool for consumers to self-provision and manage network services such as Voice over Internet Protocol (VoIP) services. The EUC system dynamically generates graphical user interface (GUI) renderings that assist users in the completion of tasks related to provisioning, and managing network services. The EUC system allows telecommunication service providers to effectively hide the complexity of operational support systems (OSS) and the network elements that deliver the network services. The EUC system solves the technical problems of reducing the cycle-time to self-provision network services, assisting users to complete the tasks required to activate, and manage network services, and actually activating and managing the network services.10-30-2008
20080270596System and method for validating directory replication - A distributed information processing system comprising a collection of servers providing a directory service is augmented with the ability to validate whether replication is occurring between these directory servers.10-30-2008
20080270595SYSTEM AND METHOD FOR GENERATING SYNTHETIC WORKLOAD TRACES - A method comprises receiving a pattern of resource demands in a workload trace. The method further comprises identifying a plurality of occurrences of the determined pattern in the workload trace, and analyzing the occurrences to determine a trend of the workload trace. The method further comprises generating at least one synthetic workload trace representative of expected resource demands of the received workload trace accounting for the determined trend.10-30-2008
20110208857METHOD, SYSTEM, AND COMPUTER READABLE MEDIUM FOR GATHERING USAGE STATISTICS - The present disclosure enables remote device management. A programmatic interface is associated with each application plug-in. A web server included with the on-device agent provides access to the programmatic interfaces according to open standards such as HTML or XML. The present disclosure enables access to remote devices through existing infrastructure without the need for proprietary systems. An IT administrator or other administrator may remotely access and update software and hardware, track device data plan usage statistics, provide live support, and track current and historical device locations. The phone and messaging feature enables an administrator to access information regarding data plan and usage statistics of devices. This allows organizations to optimize data plans based on messaging, e-mail, and other data plan statistics. Further, the present disclosure allows access to network connectivity details of devices and logs of emails, text messages, and the like.08-25-2011
20100146109SYSTEM AND METHOD FOR NETWORK VIRTUALIZATION - A context-aware server is provided. The context-aware server includes an integrated interface unit and a virtualization information generating unit. The integrated interface unit receives context information of a terminal, user profile information, and network state information. The virtualization information generating unit generates virtualization information including network resource information allocated by using the network state information and at least one of the context information and the user profile information.06-10-2010
20100146110METHOD FOR COLLECTING HUMAN EXPERIENCE ANALYTICS DATA - A method for collecting human experience analytics data for visitors browsing a Web site and a web analytics data collection engine are disclosed. The method comprises the steps of registering an action performed by a visitor browsing the Web site, categorizing said registered action as a navigation action between web pages of the Web site and/or as an event action within a web page of the Web site. In the case that the registered action is categorized as an event action, the event is associated with a web page of the Web site, and the action is recorded as an event within the associated web page. In the case that the registered action is categorized as a navigation action, the action is either recorded as a navigation from a current web page to a subsequent web page, or recording of the action is cancelled, based on previously defined criteria. Finally, the recorded events and navigations are stored in a data storage facility.06-10-2010
20100146104SYSTEM AND METHOD FOR DETECTING A REMOTE APPARATUS - A system for detecting a remote apparatus includes a host and a remote interface device connected to the host via a network. The remote interface device includes at least one serial port configured for connecting to a serial port apparatus. The remote interface device detects the connection status of the serial port using a filter rule provided by the host. When the connection status is changed, the remote interface device sends an event notification to the host. The host adds or removes virtual port objects, which are used by application software and are configured to control the remote apparatus, according to the received event notification. Using the mechanism described above, the host can have remote plug and play feature on a remote serial port apparatus.06-10-2010
20100146099Network Address Translators (NAT) Type Detection Techniques - Techniques described herein enable peers to determine each peer's NAT type much more efficiently and quickly than when compared with existing techniques. To do so, a peer simultaneously sends multiple test messages to a server. The peer then waits to either receive a response for each of the multiple test messages or may store an indication that no response has been received after a predetermined timeout period. The peer then analyzes the received responses and/or the stored timeout indications to determine the peer's NAT type or to determine that the peer is operating free from concealment by a NAT/firewall device. By simultaneously sending the multiple test messages, the peer may determine the NAT type within a maximum time defined by the predetermined timeout period or a roundtrip time period that is required for communication between the peer and the server. As such, the tools allow for efficient NAT-type detection.06-10-2010
20100138530COMPUTING COMPONENT AND ENVIRONMENT MOBILITY - Methods, services, devices, and programmable code are provided for moving computing processes without loss of service. Powered components supporting a computing infrastructure executing computing processes are monitored for thermal characteristics, each associated with at least one of the deployed components. A thermal characteristic rule set comprising a threshold is applied to the monitored characteristics, and in response to an association with a monitored characteristic correlating with the threshold, a computing process is moved from one powered component to another having a monitored thermal characteristics not correlated with the threshold, the moving in real-time and without causing an interruption of service to an end user using the moved process.06-03-2010
20120096156METHOD AND ARRANGEMENT IN A COMMUNICATION NETWORK - A method and apparatus for providing labelling information to a third party regarding terminal users in a communication network. A labelling unit receives communication related data generated from executed communications of the terminal users, and fetches stored labelling rules which have been configured specifically for the third party. The labelling unit then converts the communication related data into labelling information, where a communication habits vector is determined by applying the fetched labelling rules on the received communication related data, and the labelling information is determined for the terminal user(s) based on the resulting communication habits vector. The determined labelling information is finally delivered to the third party.04-19-2012
20080244067Contents distribution system and information processing method thereof, as well as contents management apparatus and recording medium on which program thereof is recorded - To appropriately adjust a number of contents data which are transmitted and received among terminal apparatus, in a peer-to-peer type contents distribution system including a plurality of terminal apparatus mutually connected via a network.10-02-2008
20090083420Method and Apparatus for Automatically Conducting Hardware Inventories of Computers in a Network - A method, apparatus, and computer instructions for conducting an inventory of a data processing system. When a basic input output system (BIOS) is launched during a boot process for the data processing system, the basic input output system creates a hardware report of the data processing system. This report is sent to a remote data processing system on the network.03-26-2009
20110270972VIRTUAL TOPOLOGY ADAPTATION FOR RESOURCE OPTIMIZATION IN TELECOMMUNICATION NETWORKS - Some embodiments described in this disclosure provide methods and apparatuses for managing a network, e.g., by performing virtual topology adaptation for resource optimization. In some embodiments, a system can monitor traffic on the network to identify heavily loaded and/or lightly loaded links in the network. In response to identifying a lightly loaded link, the system can shift traffic from the lightly loaded link to one or more other links in the network. After the traffic has been shifted, the system can move circuitry associated with the lightly loaded link into a low-power state. In response to identifying a heavily loaded link, the system can activate a new link in the network by moving circuitry associated with the new link from a low-power state into a high-power state. After the new link has been activated, the system can shift traffic from the heavily loaded link to the new link.11-03-2011
20110270970NETWORK DEVICE TESTING SYSTEM AND METHOD - A testing method tests a network device using a testing system by determining whether the network device is turned on via a second port of the network device. When the network device is turned on, the testing system logs onto the network device via the second port. A network service application of the network device is implemented and an IP address of the network device is obtained. Accordingly, a network connection to the network device is established. The testing system implements additional service applications of the network device and tests features of additional applications via a first port of the network device.11-03-2011
20110270965Methods for Web Site Analysis - A specification of a target web site is received. A number of field web sites related to the target web site are identified. Data values are acquired for a set of metrics for the target and each field web site. These data values are processed to evaluate a standing of the target web site relative to the field web sites, while maintaining anonymity of the field web sites. An average web site is determined by respectively averaging data values for the field web sites. A bounding web site is characterized by the best data values from among all field web sites. Target web site data values are compared to average and/or bounding web site data values at a given time. Variations in differences between target web site data values and corresponding average and/or bounding web site data values over time determines improvement and/or success of the target web site.11-03-2011
20090182869VIEWING EFFECT MEASURING SYSTEM, AND MEASURING METHOD AND MEASURING TERMINAL THEREOF - A viewing effect measuring system is provided. A user terminal performs a content output process for receiving content from a content delivery apparatus and outputting the content, a Web site displaying process for accepting a request to access a Web site, while the content are outputted, accessing the Web site via the network, and displaying the Web site in such a manner as available for browsing, and a measurement information sending process for establishing an association between Web site specifying information which identifies the Web site as to which the access is requested, and content specifying information which identifies the content being outputted when the access is performed, and sending information of the association as viewing information to a measuring server. The measuring server receives the viewing information from the user terminal and sends the information to a Web server of the Web site as measurement information.07-16-2009
20090182866Method of setting and managing performance monitoring conditions and computer system using the method - In order to change a policy while alarm-monitoring a production environment, during a production-environment operation, a method of controlling a computer system is provided, in which a policy is temporarily changed, thereby performing setting change. An agent transmits a monitoring result based on a first monitoring condition. A management unit generates a second monitoring condition based on a received change request. The agent transmits a monitoring result based on the second monitoring condition. The management unit holds information for correlating the first and second monitoring conditions with each other. Upon reception of a confirmation request for confirming the second monitoring condition, the management unit specifies the first monitoring condition correlated with the second monitoring condition based on the information. The agent which has received the deletion request stops the transmission of the monitoring result based on the first monitoring condition.07-16-2009
20110208862METHOD AND SYSTEM FOR PROFILING DATA TRAFFIC IN TELECOMMUNICATIONS NETWORKS - A method of profiling communication traffic of users in a data network, comprising: monitoring communication traffic originated by a user of a communication terminal; and assigning to the user of the communication terminal a unique and anonymous user traffic identifier, wherein the user traffic identifier is related to a user address assigned to the communication terminal in the data network. Also, the user traffic identifier is adapted to be included in the communication traffic with respect to that user. The method further includes communicating the unique and anonymous user traffic identifier to the user terminal and having the user communication terminal include the user traffic identifier in the user traffic, upon receipt of communication traffic including the user traffic identifier, obtaining a descriptor of the received communication traffic useful to describe the detected traffic and at least temporarily storing the obtained descriptor; and building an anonymous user profile related to the user's communication activities based on the stored descriptors.08-25-2011
20110208861OBJECT CLASSIFICATION IN A CAPTURE SYSTEM - Objects can be extracted from data flows captured by a capture device. Each captured object can then be classified according to content. In one embodiment, the present invention includes determining whether a captured object is binary or textual in nature, and classifying the captured object as one of a plurality of textual content types based tokens found in the captured object if the captured object is determined to be textual in nature.08-25-2011
20110208855Parameterized Computer Monitoring System - A computer monitoring system uses a set of parameterized models to gather information about monitored devices. The models include scripts for gathering information, as well as type validation and data validation functions. The parameters within the model are used to generate user interface prompts and to populate discovery scripts as well as data validation scripts. In some cases, the models may include localization settings that may customize the user interface and validation output for different languages. A processing engine may generate a user interface from the parameters defined in the models, customize the scripts from the user input, and cause the scripts to be executed. The data gathered by the scripts may be analyzed using type validation and data validation.08-25-2011
20110208854DYNAMIC TRAFFIC CONTROL USING FEEDBACK LOOP - A feedback loop is created between a server and clients that provides the clients with health information of the server to assist in client-server traffic control. Health information is calculated for the server that measures a current health of the server. The health information is automatically provided to a client by the server in response to a request made by the client. The clients can utilize the received health information to determine when to request resources from the server.08-25-2011
20100146102PROVIDING REPORTS OF RECEIVED MULTIMEDIA PROGRAMS - Selections of multimedia programs are monitored and indications of the selections are included in a report if user specified criteria are met. Example criteria include a minimum presentation duration, a report condition, and a maximum retention period. Access to the reports may be limited to administrators.06-10-2010
20090164627DATA TRANSMISSION/RECEPTION APPARATUS AND METHOD FOR INSERTING AND EXTRACTING MAINTENANCE MANAGEMENT DATA - A data transmission/reception apparatus including a network layer device section for performing a process corresponding to a physical layer of an OSI reference model is provided. The apparatus includes a maintenance management data insertion/extraction section for inserting maintenance management data into data to be transmitted, transmitting the data to be transmitted, and extracting the maintenance management data from received data, wherein the maintenance management data insertion/extraction section performs the insertion and extraction of the maintenance management data with respect to the network layer device section.06-25-2009
20090164625METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI.06-25-2009
20090164624Method and Apparatus for Acquiring Content-Based Capital Via A Sharing Technology06-25-2009
20090089421Method and System for Visualizing Distributed Systems - Monitoring distributed systems includes receiving availability parameters for distributed systems. A distributed system corresponds to at least one distributed system group. A status of at least one distributed system is determined according to the availability parameters. Grid map image data is generated that is operable to initiate display of a grid map. The grid map includes one or more areas. An area corresponds to a distributed system group. An area includes one or more cells. A cell has a status indicator indicating the status of at least one distributed system. A cell also has a display size indicating a relative importance of at least one distributed system. The grid map image data is transmitted to a client in order to display the grid map.04-02-2009
20110125897DETECTION OF HOME NETWORK CONFIGURATION PROBLEMS - A diagnostic tool for identifying a configuration of a private network that may disrupt operations involving communication between two devices on the network. The tool, when run on a device in the network, can identify a “double NAT” configuration in which the device may be separated from other devices on the private network by a NAT device. The tool, when run on a computing device, identifies a NAT device, such as a router, to which the device is connected. The tool then identifies a list containing one or more other devices that may be connected to the NAT device. The tool tests whether these other devices also perform NAT functions and are on the private network. Both the NAT device and the devices that may be connected to the NAT device are identified and a determination is made of whether those devices are on the private network by sending requests using one or more protocols that devices on a private network conventionally use but are not conventionally used by devices on other networks.05-26-2011
20110125896SYSTEM AND METHOD FOR ACQUIRING AND ADDING DATA ON THE PLAYING OF ELEMENTS OR MULTIMEDIA FILES - The invention relates to a system and method for acquiring and aggregating information relating to the reproduction of multimedia files or elements in a database, said data including information relating to the number of multimedia file or element reproductions. The inventive system comprises a plurality of digital devices which can access and reproduce multimedia files and an acquisition and storage device which communicates with each of the digital devices in order to receive data from each of the identification/characterization programs, such that said identification/characterization program can count the reproductions at least in a direct and/or weighted manner.05-26-2011
20110125895SYSTEM AND METHOD FOR PROVIDING SCORECARDS TO VISUALIZE SERVICES IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for providing scorecards to visualize services in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for describing services, applications, workloads, in an information technology infrastructure. For example, a discovery engine may reference an identity vault to capture enriched models of an infrastructure, and a management infrastructure may then generate one or more scorecards that can be used to manage the infrastructure. In particular, the scorecards may provide information for tuning or otherwise controlling risk, complexity, cost, availability, and agility versus rigidness in the infrastructure.05-26-2011
20110125892SYSTEMS AND METHODS FOR TRACE FILTERS BY ASSOCIATION OF CLIENT TO VSERVER TO SERVICES - The present disclosure is directed towards systems and methods for tracing packets via an intermediary device. The systems and methods include an intermediary device that establishes connections with clients and connections with servers. The intermediary device links a connection to a server with a connection to a client to provide a client with access to the server. When the client requests a packet trace, the intermediary device applies the trace to linked connections with the client to obtain full trace information for network packets servicing the client.05-26-2011
20090138594COORDINATING THE MONITORING, MANAGEMENT, AND PREDICTION OF UNINTENDED CHANGES WITHIN A GRID ENVIRONMENT - A method, system, and program for coordinating the monitoring, management, and prediction of unintended changes within a grid environment are provided. A grid change controller within a particular grid environment detects an unintended change within that grid environment. In particular, grid change controller monitors potential change indicators received from multiple disparate resource managers across the grid environment, where each resource manage manages a selection of resources within the grid environment. The grid change controller then determines a necessary response to the unintended change within the grid environment and communicates with at least one independent manager within the grid environment to resolve the unintended change, such that the grid change controller facilitates recovery from the unintended change within the grid environment to maintain performance requirements within the grid environment.05-28-2009
20090138592METHOD AND APPARATUS FOR DETECTION OF INFORMATION TRANSMISSION ABNORMALITIES - In one embodiment, a method for securing a network application is described. The method for securing a network application includes receiving network information within a network application and assigning a probability value to an independent aspect of the network information. The probability value is based on a verification of the independent aspect of the information against a profile of acceptable behavior. The method for securing a network application also includes aggregating the probability values of the independent aspects of the network information to determine the probability of the entire network traffic. In addition, the method for securing a network application includes determining whether the probability value of the entire network information is above or below a threshold probability value. The entire network information is screened out based on the probability value of the entire message with respect to the threshold probability value.05-28-2009
20110219111SYSTEM AND METHOD FOR INTELLIGENT SERVICE ASSURANCE IN NETWORK MANAGEMENT - Systems and methods for intelligent service assurance testing provided herein include receiving network infrastructure information relating to a network, receiving one or more service assurance testing parameters, determining a test schedule of one or more service assurance tests for service assurance testing of the network, the test schedule being based at least in part on the network infrastructure information and the one or more service assurance testing parameters, and deploying the one or more service assurance tests on one or more devices of the network according to the test schedule.09-08-2011
20090182871BACKUP PAGING FOR WIRELESS COMMUNICATION - A backup page is provided for a node that misses a page. In some aspects, a first type of access point in a system provides a backup page for an access terminal that is idling on a second of access point in the system in the event the access terminal misses a page by the second of access point in the system. An access point of the first type may page the access terminal according to a first paging schedule while an access point of the second type may page the access terminal according to a second paging schedule. In some aspects an access point of the first type (e.g., a macro node) provides service over a macro coverage area and an access point of the second type (e.g., a femto node) provides service over a smaller coverage area and/or provides restricted service.07-16-2009
20090182863CENTRALIZED SOCIAL NETWORK RESPONSE TRACKING - Embodiments of the present invention address deficiencies of the art in respect to response subscriptions and provide a method, system and computer program product for centralized response tracking across social networks. In one embodiment of the invention, a social networking response tracking method can be provided. The method can include associating subscribers with a user or a group of users based upon a posting by the user or a user in the group of users within a centralized response tracking system, aggregating different postings from the user to correspondingly different forums disposed about a global computer communications network within the centralized response tracking system, and, notifying the subscribers of the aggregated postings from the centralized response tracking system.07-16-2009
20090177772METHOD, SYSTEM AND DEVICE FOR ESTABLISHING A PEER TO PEER CONNECTION IN A P2P NETWORK - A method and system for establishing a peer to peer connection in a P2P network and a peer device in the P2P network, wherein the method comprises of the following: (1) a management node in the P2P network receives a resource request; (2) the management node selects one or more peers which meet the demand from a resource list established previously according to the logon information of the other peers in the P2P network to return it to a resource request peer; (3) the connection is established between the said resource request peer and the said peers which meet the demand.07-09-2009
20090177770DOMAIN MANAGING METHOD, DOMAIN EXTENDING METHOD AND REFERENCE POINT CONTROLLER ELECTING METHOD - A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request for authenticating a reference point controller from a reference point controller candidate; invalidating a membership of the stored reference point controller; generating a unique reference point controller membership for verifying that the reference point controller candidate is a new reference point controller; and transmitting the generated reference point controller membership to the reference point controller candidate. Accordingly, even when an error occurs in the reference point controller, the function of the reference point controller can be rapidly replaced by using the reference point controller candidate.07-09-2009
20090177771METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS - Disclosed is an internet traffic monitoring method. In the method, a first packet, sent from a user client, having a web content request meeting certain monitoring selection criteria is detected. Upon detection of the first packet, a second packet is forwarded to the user client. The second packet has a redirection with a fabricated web content request to a monitoring web page including at least one monitoring implement.07-09-2009
20090164623METHODS AND SYSTEMS FOR TRACKING EVENT LOSS - Systems and methods for tracking event loss are set forth in this disclosure. More specifically, systems and methods for tracking event loss within a first time period and second time period are set forth in this disclosure.06-25-2009
20090164621METHOD AND SYSTEM FOR MONITORING REST WEB SERVICES - Generally, the present invention provides a method and computerized system for monitoring REST web services including generating a REST based web service client call operative to be used for monitoring web service activities. The web service client call is then deployed. The method and computerized system further includes monitoring the web service activities via the call invocation and a response analysis. The method and computerized system further includes receiving a plurality of feedback results from the monitoring of the web service functionality and thereupon adjusting the web service parameters based on the aggregated feedback.06-25-2009
20120072575METHODS AND COMPUTER PROGRAM PRODUCTS FOR AGGREGATING NETWORK APPLICATION PERFORMANCE METRICS BY PROCESS POOL - Provided are methods and computer program products for aggregating and reporting network application performance metrics by process pool. Methods may include mapping ones of a plurality of processes into one of at least one process pool; and aggregating, for each of the process pools, performance metrics generated for each of the plurality of processes mapped into that process pool.03-22-2012
20090077223METHODS AND SYSTEMS INVOLVING MONITORING WEBSITE CONTENT - An exemplary embodiment of a system for monitoring website content, including, a browser client operative to send a first request for content to a first website server, the content stored on a second website server, an intermediate server, operative to receive a URL associated with the content, from the first website sever, the URL comprising an address of the intermediate server, an address of the content, and an address for threshold data stored on the intermediate server associated with the content, the threshold data including a plurality of thresholds, the intermediate server further configured to send a second request for the content to the second website server, receive the content, determine whether the content exceeds the plurality of thresholds associated with the content, deny the first request for content, responsive to determining that the content exceeds one of the plurality thresholds associated with the content.03-19-2009
20090187653SYSTEMS AND PROCESSES OF IDENTIFYING P2P APPLICATIONS BASED ON BEHAVIORAL SIGNATURES - Disclosed are a system and a process for identifying P2P applications and specific P2P software as well from an original mixed packet trace based on behavioral-signatures. The behavioral-signature based system and process according to the invention is mainly to check whether the application has these specific periodic behaviors or not. The process of this invention comprises the steps of filtering out all irrelative packets; translating the filtered packet trace into discrete-time sequences; processing the sequences to obtain frequency-domain characteristics of original packet trace; and analyzing the frequency-domain characteristics and determining the identification.07-23-2009
20090187650Method and system for determining probability for availability in an instant message system - This invention provides a method or a system to track, query, and display an accurate time for the availability of other users in an instant messaging environment. The solution provides an advantage over the known solutions by providing an accurate estimation of the time for the user to be online, thus avoiding waiting for the person to log on during a timeframe where the person typically does not log on. This is a common occurrence where team members are located on the other side of the world.07-23-2009
20090144409METHOD FOR USING DYNAMICALLY SCHEDULED SYNTHETIC TRANSACTIONS TO MONITOR PERFORMANCE AND AVAILABILITY OF E-BUSINESS SYSTEMS - A method and apparatus is provided for monitoring operations of a specified transaction server that has an associated network topology. One embodiment comprises the steps of defining a plurality of zones within the network topology, and assigning one or more monitoring agents to each of the zones, wherein each agent is adapted to selectively run synthetic transactions with the specified server. The method further comprises monitoring results of successive synthetic transactions carried out by the agents, in order to detect any errors associated with the successive transactions. In response to detecting a performance or an availability problem, selectively, that is associated with a particular synthetic transaction run by a particular one of the agents, one or more agents is dynamically scheduled to run synthetic transactions, wherein each scheduled transaction has a specified relationship with the particular transaction.06-04-2009
20090138595TECHNIQUE TO GENERICALLY MANAGE EXTENSIBLE CORRELATION DATA - A technique to generically manage extensible correlation data is provided for correlating a series of events. The technique employs a global unique identifier (GUID) for identifying an event and uses the GUID as a key to associate one or more extensible correlators of correlation data. A transport correlator may be configured to transport the GUID for associating with a GUID of a second event such that a small and fixed amount of data is passed by the communications layer providing the transport, minimally impacting communications. An arbitrary amount of data may be logged and keyed with the GUID, providing optimization and flexibility.05-28-2009
20090138588METHOD OF PERFORMING ETHERNET GATEWAY SWITCH TROUBLE DIAGNOSTICS - A service provider unit automatically diagnoses problems in an Ethernet network that are associated with layers 1, 2, and/or 3 and determines whether there is a problem associated with an Ethernet gateway switch EGS. Further diagnostics can be performed to determine the layer, type, and/or location of the problem(s) based on whether there is a problem with the EGS. The diagnostic process followed depends on the types of problem(s) in the network. Once the problems have been diagnosed, an operator can be notified of the location and/or type of problem.05-28-2009
20090049171SYSTEM AND COMPUTER-READABLE MEDIUM FOR CONTROLLING ACCESS IN A DISTRIBUTED DATA PROCESSING SYSTEM - Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent.02-19-2009
20090282146EQUIPMENT MANAGEMENT DEVICE, EQUIPMENT MANAGEMENT SYSTEM, EQUIPMENT MANAGEMENT METHOD, AND RECORDING MEDIUM - An equipment management device manages one or more pieces of equipment which are connected to the equipment management device via a network. The equipment management device includes a determining unit which determines whether a non-authenticated software item exists in each of the one or more pieces of equipment, and a license management unit which performs license management of one or more software items installed in each of the one or more pieces of equipment, based on a result of the determination by the determining unit.11-12-2009
20090276524THIN CLIENT TERMINAL, OPERATION PROGRAM AND METHOD THEREOF, AND THIN CLIENT SYSTEM - A thin client terminal 11-05-2009
20120198060 NETWORK DELAY ESTIMATION APPARATUS AND A NETWORK DELAY ESTIMATION METHOD - A network delay estimation apparatus capable of creating a metric tree with high accuracy and in a short time. Network delay estimation apparatus (08-02-2012
20090177767Local Web Server Based Controller - A system for monitoring parameters related to a product in a storage tank is provided. The system includes a monitor operably coupled to the storage tank, an internet protocol (IP) enabled electronic device, and an internet protocol enabled controller. The controller is in communication with the monitor and the electronic device. The controller and the electronic device communicate through an internet regarding information observed by the monitor.07-09-2009
20090177769DETERMINING ONLINE STATUS OF A MEDICAL DEVICE - Methods and systems of patient treatment are disclosed. The methods and systems include use of medical device informatics to modify and validate therapies and drugs used in those therapies. In certain embodiments, a medical device, such as a medical infusion pump, interfaces with a server to administer the patient treatments. In one aspect, a method of determining the on-line status of a medical device is disclosed. The method includes expecting communication from the medical device within a predetermined period, and determining whether a message has been received from the medical device within the predetermined period. The method further includes establishing an on-line status for the medical device based on the determining step.07-09-2009
20090327486PROVIDING ACCESS BY A CLIENT APPLICATION PROGRAM OVER AN INTERNET PROTOCOL (IP) NETWORK TO A SERVER APPLICATION PROGRAM INSTANCE - A method, apparatus and software is disclosed in which a temporary IP address is assigned to a selected instance of a server application program so as to provide processing continuity for processing with a client application program.12-31-2009
20090327477MODULAR INTEGRATED COMPUTING AND STORAGE - A modularized computing system includes a plurality of modular components that are coupled together forming a network. Each modular component includes a standard network interface. The system further includes an initialization module, a monitor module, a storage medium, and a management module. As a module unit is coupled to the network, the initialization module automatically configures the component to an operable state. The monitor module monitors network operations including performance parameters of each modular component based on a plurality of system policies. Based on information gathered by the monitor module, the management module actively modifies network structure and resource allocation to optimize network performance.12-31-2009
20090327481ADAPTIVE DATA THROTTLING FOR STORAGE CONTROLLERS - A method for minimizing latency of data transfer between the redundant storage controllers in a network-based storage controller system that utilizes adaptive data throttling. Each redundant storage controller monitors latency for round trip communications between the redundant controllers by calculating a time required to mirror a write to the other controller and receive a write acknowledge. An average latency for round trip communications between the redundant controllers during a fixed monitoring period is calculated, and at the end of each fixed monitoring period, the average latency is compared to a fixed latency to access the average time latency for mirroring writes is good, acceptable or unacceptable. If the average time latency is good, the one controller reduces or disables throttling for data transfers between the one controller and the server, and between the one controller and back-end storage, increasing a number of this type of data transfer that can be executed in parallel. If the average time latency is acceptable, the one controller does not adjust throttling for data transfers between the one controller and the server, and between the one controller and back-end storage. If the average time latency is unacceptable, the one controller increases data throttling for data transfers between the one controller and the server, and between the controller and the back-end storage, decreasing a number of this type of data transfer that can be executed in parallel.12-31-2009
20090327476Dynamic Infrastructure for Monitoring Service Level Agreements - A dynamic infrastructure for monitoring service level agreements (SLAs) is described. In an embodiment, the infrastructure comprises three types of functional elements: probes, metrics and audits and a small number of primitive actions for manipulating these elements. The elements are connected by streams which store data for processing and transport data between functional elements. The primitive actions, which are duplicating and removing functional elements as well as splitting and joining metrics, are arranged such that the functional elements can be optimized dynamically in responses to changes in the service and/or the hardware without losing any data.12-31-2009
20090187652Inferred Discovery Of Devices Of A Data Communications Network - Methods, apparatus, and products for inferred discovery of devices of a data communications network are described. In embodiments of the present invention the data communications network includes a plurality of data communications devices connecting a plurality of routers, each data communications device having a device address, each router having one or more network interfaces. Embodiments of the present invention also include querying each router for connection data, the connection data associating interfaces of the router with device addresses; identifying for each router in dependence upon the connection data an interface of the router connected to a data communications device including identifying a device address associated with the interface; and creating, in dependence upon the identified device addresses for all routers, a representation of the data communications network in a network model.07-23-2009
20090063680Connection Locator in a Power Aggregation System for Distributed Electric Resources - Systems and methods are described for a power aggregation system. In one implementation, a method includes charging an electric resource over a power connection to an electric network, obtaining a unique identifier of a device over the power connection, and determining an electric network location of the electric resource from the unique identifier.03-05-2009
20090063675Internet-based method of and system for monitoring space-time coordinate information - An Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object moving along a course through the space-time continuum. The Internet-based system comprise a wireless GSU-enabled client network device affixed to the body of an animate object. The wireless device includes a global synchronization unit (GSU) for automatically generating time and space (TS) coordinate information corresponding to the time and space coordinate of the animate object with respect to a globally referenced coordinate system, as the animate object moves along a course through the space time continuum. The device also includes biophysiological state sensor affixed to the body of the animate object, for automatically sensing the biophysiological state of the animate object and generating biophysiological state information indicative of the sensed biophysiological state of the animate object along its course. The wireless device also includes a wireless date transmitter for transmitting the TS coordinate information and the biophysiological state information through free-space. A TS-stamping based tracking server receives the TS coordinate information and the biophysiological state information through in a wireless manner, and stores the same as the animate object moves along its course. An Internet information server serves Internet-based documents containing the collected TS coordinate and biophysiological state information. An Internet-enabled client system enables authorized persons to view the served Internet-based documents and monitor the collected TS coordinate and biophysiological state information, for various purposes.03-05-2009
20090063674METHOD AND SYSTEM FOR MONITORING AND INSTANTLY IDENTIFYING FAULTS IN DATA COMMUNICATION CABLES - A method and an associated system for monitoring and instantly identifying faults in a data communication cable are disclosed. A fault monitoring program learns a reference data traffic pattern communicated through the data communication cable by reading inputs from a sensor. The reference data traffic pattern is stored and is used for determining normalcy of data traffic through the data communication cable. The fault monitoring program monitors for a fault in a data traffic, and, if a fault is detected, activates a fault indicator sending out fault signals to notify users of the fault. If the fault is not recovered within a predefined recovery period, the fault monitoring program deactivates the fault indicator and shuts down a power source for later use of the data communication cable.03-05-2009
20090144412METHOD AND APPARATUS FOR THE DELIVERY OF DIGITAL DATA - A method and apparatus for the delivery of digital data to an end user (06-04-2009
20090144420Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information.06-04-2009
20090055529METHOD OF COLLECTING DESCRIPTIONS OF STREAMS PERTAINING TO STREAMS RELATING TO AT LEAST ONE CLIENT NETWORK ATTACHED TO AN INTERCONNECTION NETWORK - A method for collection of flow descriptions for flows relating to at least one client network, the client network being attached to an interconnection network. The method receives flow descriptions for flows coming from the client network, aggregates the flow descriptions for the flows coming from the client network as a function of an aggregation criterion, transmits the aggregated flow descriptions to a collection device, analyzes the flow descriptions for the flows coming from the client network to determine at least one flow characteristic specific to the client network, receives flow descriptions for flows coming from the interconnection network, filters the flow descriptions for the flows coming from the interconnection network, in which the flow descriptions for flows lacking the at least one determined flow characteristic specific to the client network are eliminated, and transmits the filtered flow descriptions to the collection equipment.02-26-2009
20090055527SECTION IDENTIFICATION AND DISTRIBUTION SYSTEM MONITORING SYSTEM, METHOD AND PROGRAM PRODUCT - A system is provided for specifying arbitrary nodes and identifying a section between them on a system diagram of a distribution system. It comprises a system diagram information management portion for managing information on each of nodes and spans constituting the system diagram and ID information given to each of the nodes, an input portion for receiving an input specifying the nodes, a search portion for creating a search condition using the ID information based on the node specification and searching the span between the specified nodes so as to identify the section constituted by the searched span, and an output portion for display-outputting the system diagram visually indicating the section identified by the search portion.02-26-2009
20090144415Detecting automation cheating in online applications - In general, in one aspect, a method is described that includes monitoring data received from input devices. The received data from the input devices associated with an application is copied when the application is active. The data is converted to user commands. Commands used to update the application are received from the application. The converted user commands are compared to the commands from the application. Mismatching commands are reported to a remote server.06-04-2009
20090055523IDENTIFYING AND RECOMMENDING POTENTIAL COMMUNICATION STATES BASED ON PATTERNS OF USE - Techniques for identifying potential communication uses of various systems are disclosed. Identifying potential communication uses of a computing system can improve the manner in which the computing system is used by allowing more intelligent decisions and better choices to be made regarding its communication use. By way of example, communication applications (or tasks or services) that are likely (or more likely) to be used by a person in a particular situation can be identified as potential communication use of a particular device. Such potential uses can, for example, be made more assessable (or more readily available) and/or effectively recommended (or automatically initiated), thereby allowing a person to more conveniently use the device. By way of example, identifying communication applications or tasks that are likely to be used by a person in a particular situation for various reasons (e.g., preferences and/or habits of a person in a particular situation) as potential communication use of a system (e.g., computing and/or communication device) allows making the communications applications, tasks, or services more assessable and/or effectively recommending them for use in a particular situation.02-26-2009
20090144417RESILIENT SERVICE QUALITY IN A MANAGED MULTIMEDIA DELIVERY NETWORK - A managed multimedia delivery network (06-04-2009
20090144413Communications enterprise server monitor - A system includes one or more wireless handheld devices, one or more enterprise servers in communication with the one or more wireless handheld devices, and an enterprise server monitor in communication with the one or more enterprise servers to collect communications performance data from one or more of the one or more enterprise servers in communication with one or more of the one or more wireless handheld devices associated with a select group of users, and to generate one or more alerts if the collected communications performance data match one or more alert conditions, the one or more alert conditions being indicative of one or more levels of potential communication failures.06-04-2009
20090144410MONITORING NETWORK TRAFFIC BY TRACKING DATA PACKETS ON A PER PROCESS BASIS - Methods, apparatus, systems, and articles of manufacture directed to the monitoring and visualizing of network traffic are disclosed. The network monitoring can include tracking data packets on a per process basis. As a data packet traverses a communications interface, it can be correlated with the process responsible for that data packet and a local process address can be logged providing a record of the packet and an associated source, destination, and process identifier. The visualizing can include generating a visual representation of network traffic and packet-process correlations.06-04-2009
20130219058NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated.08-22-2013
20130219055METHOD AND APPARATUS FOR INTERFERENCE REPORTING IN A N-MIMO COMMUNICATION SYSTEM - Systems and methodologies are described herein that facilitate interference measurement and reporting in a network multiple-in-multiple-out (N-MIMO) communication system. As described herein, a network device can measure and report interference corresponding to network nodes outside a designated set of nodes that can cooperatively serve the device. Respective interference reports can additionally identify dominant interfering nodes, correlation between transmit antennas of respective nodes, or the like. Subsequently, respective interference reports can be combined with per-node channel information to manage coordination and scheduling across respective network nodes. As further described herein, interference from a network node can be measured by observing reference and/or synchronization signals from the network node. To aid such observation, respective non-interfering network nodes can define null pilot intervals in which transmission is silenced or otherwise reduced. As additionally described herein, loading information broadcasted by respective interfering network nodes can be identified and utilized in connection with interference calculation.08-22-2013
20130219046DYNAMIC APPLICATION-AWARE ROUTING TOPOLOGIES - In one embodiment, an application flow of traffic may be detected within a computer network, e.g., by a root node, border router, network management server, etc. Thereafter, one or more traffic requirements of the application flow may be determined, and a corresponding routing topology objective function may be established based on the traffic requirements. Accordingly, creation of a specific routing topology based on the objective function may then be initiated for use with the application flow.08-22-2013
20090024737WEBSITE MONITORING AND COOKIE SETTING - A method and apparatus for setting cookies on client devices 01-22-2009
20090024735METHOD AND SYSTEM OF CONTROLLING COMMUNICATIONS DELIVERY TO A USER - A method of controlling communications delivery to a user includes generating an internet protocol address space of internet protocol addresses for each of one or more communications networks operable to transmit marketing communications for delivery to the user; assigning an integrity value to an integrity rating associated with each communications network; assigning a user controllable selection to a set of receiving options associated with the communications networks; and filtering communications received from the communications networks in accordance with respective integrity values and the selection.01-22-2009
20090024734Automatically Adjusting Scheduled Inventory of Switched Fabrics - A mechanism is provided in a storage management application that automatically reconfigures agents and scheduled probes of agents in cases where the agents do not automatically reconfigure themselves to manage a newly formed fabric after fragment segmentation. The solution does not burden the storage administrator to reconfigure agents or to reconfigure regularly scheduled inventory probes through storage management applications.01-22-2009
20110225296AUTONOMOUS MANAGEMENT METHOD FOR PROCESSING UNEXPECTING EVENTS USING INTERACTION BETWEEN NODES IN SENSOR NETWORKS - The present invention relates to a sensor network, and more particularly, to a device and method for managing sensor nodes, in which with respect to predictable events and unpredictable events detected by sensors, the predictable events can be managed as existing policies and the unpredictable events can be managed by receiving policies for the unpredictable events from peripheral sensor nodes or peripheral sensor networks, i.e., both predicted events and unpredicted events can be intelligently managed. According to the method device for managing events detected by sensor nodes according to the present invention the present invention, in the case where unpredictable events are detected, policies for the detected unpredictable events received automatically from peripheral sensor nodes or peripheral sensor networks, so that both predictable and unpredictable events can be managed. Each time unpredictable events are detected, new policies for the detected unpredictable events are automatically generated, so that a manager does not need to update the policies for the unpredictable events every time. In addition, since both predictable and unpredictable events can be managed, the event management method of the present invention can be widely used in a variety of application fields requiring stability and accuracy.09-15-2011
20110225292NETWORK DEVICE AND PACKET TRANSMISSION METHOD - A network device is adapted to be connected to wired and wireless network interface modules for packet transmission therethrough, and includes a network interface selecting module including a connection status monitoring unit and a network interface selecting unit. The connection status monitoring unit transmits an address resolution protocol (ARP) request packet via the wired network interface module for determining a connection status of the wired network interface module through an ARP response packet received by the network device if the network device is configured with a device internet protocol (IP) address and a default IP address belonging to the same subnet, and transmits an internet control message protocol (ICMP) request packet via the wired network interface module for determining the connection status of the wired network interface module through an ICMP response packet received by the network device if otherwise.09-15-2011
20110225294RESOURCE-AWARE SYSTEM, METHOD AND PROGRAM PRODUCT FOR MANAGING REQUEST TRAFFIC BASED ON A MANAGEMENT POLICY - Under the present invention, the performance of a set of system resources is monitored in response to incoming request traffic. When a system resource is approaching an overload condition, a corrective action is identified and implemented. Overload thresholds for each system resource and appropriate corrective actions are contained within a management policy. Based on a performance history of the corrective actions, the management policy can be changed/revised.09-15-2011
20110225293SYSTEM AND METHOD FOR SERVICE BASED SOCIAL NETWORK - A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.09-15-2011
20110225291USING SOCIAL NETWORKING TO HELP USERS PURCHASE MOBILE APPLICATIONS AND DEVICES - A social network helps mobile device users purchase applications for their devices and to purchase new mobile devices. The network utilizes information from a user's friends to effectively “recommend” applications and mobile devices, and in particular recommend mobile devices based on the applications recommended. The phone numbers of a user's contact list may be scanned by the system to identify friends of the user. A friend network database stores the user's information and friends' information throughout the network and supplies the information to an application store where users may download applications or purchase mobile devices. The information supplied by the database includes the applications and the mobile devices of friends or friends of friends. In response to a user inquiry, the store displays the amount and/or identities of friends and/or friends of friends who have downloaded a particular application or own a particular device.09-15-2011
20110225290TARGETING CONTENT CREATION REQUESTS TO CONTENT CONTRIBUTORS - An assignment system and method for generating content creation requests or “assignments” and targeting assignments to content contributors. The assignment system is part of a content distribution system that aggregates, manages, and distributes/syndicates multimedia content that is generated by content contributors. As part of the acquisition of content, the assignment system may compensate the content contributors for the content that they provide to the system. The assignment system generates assignments that are likely to result in content that will be of interest to content consumers. The assignment system targets the generated assignments to content contributors that are well-suited to generate content that will be successful among a target audience. The assignment system notifies those contributors of available assignments and allows contributors to claim assignments to fulfill. The assignment system also manages the flow of content submissions and verifies that submitted content meets the assignment's requirements.09-15-2011
20110225288METHOD AND SYSTEM FOR EFFICIENT STORAGE AND RETRIEVAL OF ANALYTICS DATA - A method and system for efficient storage and retrieval of current and historical analytics data. The method includes reading current event data and historical event data associated with a visitor from an analytics data store and producing one or more metrics based on the current or historical event data. Delta data is generated using the current and historical event data. The delta data is then combined with previously aggregated data to produce new aggregated data. A system includes an analytics data store. The analytics data store includes a plurality of analytics data store entities arranged chronologically in time. Each analytics data store entity includes a plurality of sub bands of data. Each sub band of data is associated with configurable data blocks. The analytics data store entities also include meta data portions for increasing the efficiency of storage and retrieval of information to and from the analytics data store entities.09-15-2011
20110225286REAL-TIME AUTOMATED VIRTUAL PRIVATE NETWORK (VPN) ACCESS MANAGEMENT - Provided is a method for managing virtual private network (VPN) access to a network that is partitioned into a plurality of subnetworks (subnets). The method includes providing first information associated with hardware hosted on one or more subnets of the network; providing second information associated with users for VPN access, where the VPN access for each user is determined by a list of hardware each user has permission to access; detecting a hardware triggering event corresponding to a modification of the first information; and responsive to the detection of the hardware triggering event, automatically updating the second information based on the modification of the first information.09-15-2011
20110225285Minimizing Latency in Live Virtual Server Migration - Techniques are provided to facilitate faster live migration of a virtual server from one physical server to another physical server by pausing TO activity of the virtual server and slowing memory state changes for CPU-bound activity of the virtual server during the live migration.09-15-2011
20090193111METHOD FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.07-30-2009
20090049167PORT MONITORING - The invention is directed to the transparent allocation of a unique per user /tmp file system. A method for monitoring a port in accordance with an embodiment of the present invention includes: obtaining a current uptime of a network switch; obtaining a status of a port of the network switch; in the case that the port of the network switch is idle: comparing the uptime of the network switch to a last used time of the port; and determining that the network switch has been rebooted since the port was last used, in the case that the uptime of the network switch is less than the last used time of the port.02-19-2009
20090198813SERVER APPARATUS AND COMPUTER READABLE RECORDING MEDIUM - Prior to a request from an integrated system 08-06-2009
20090198814Monitoring device, monitoring system, monitoring method, and program - Diverting condition storage unit 08-06-2009
20090083419SYSTEM, APPARATUS AND METHOD FOR MAINTAINING PRESENCE INFORMATION OF PUBLIC GROUP MEMBERS - A system for maintaining presence information of public group members is provided, which includes a presence server and a group list management server, and further includes a presence group server, connected to the presence server and the group list management server and adapted to obtain information of the public group members from the group list management server according to a received subscription request for the presence information of the public group members, subscribe for the presence information of the public group members from the presence server, and save the presence information of the public group members. A presence group server and a method for maintaining presence information of public group members are also provided, which can reduce the stress on a resource list server and a presence server in terms of performance and resource occupation.03-26-2009
20090083415UNOBTRUSIVE METHODS AND SYSTEMS FOR COLLECTING INFORMATION TRANSMITTED OVER A NETWORK - The present invention relates generally to unobtrusive methods and systems for collecting information transmitted over a network utilizing a data collection system residing between an originator system and a responding system. In one embodiment the Originator System can be a web browser and the Responding System can be a web server. In another embodiment the Originator System can be a local computer and the Responding System can be another computer on the network. Both these and other configurations are considered to be within the domain of this invention. The Data Collection System acts in a hybrid peer-to-peer/client-server manner in responding to the Originating System as a Responding System while acting as an Originating System to the Responding System. This configuration enables real-time acquisition and storage of network traffic information in a completely unobtrusive manner without requiring any server- or client-side code.03-26-2009
20090083414Method and System for Monitoring and Analyzing Peer-to-Peer Users' Activities over a Data Network - The present invention relates to a method and system for monitoring peer-to-peer traffic over a data network, comprising (a) file identifier unit (03-26-2009
20090049169Adaptively Processing Client Requests to a Network Server - In a computer network environment, a server protocol is provided to process read requests from clients. Rather than all read requests being processed synchronously or all read requests being processed asynchronously, an attempt is first made to perform a synchronous read. If the synchronous read is unsuccessful, the connection through which the request was received by the server is registered with a monitoring service. When the data is ready to be read, an appropriate callback is called and the data transmitted. An optional delay may be imposed before the synchronous read is attempted to increase the likelihood that the attempt will be successful. A series of delays/read attempts may also be employed in order to increase the likelihood still further that an attempt will be successful.02-19-2009
20090049168Managing a Communication Availability Status - In response to a first user becoming active on a communication device, a first availability status can be automatically established as a current availability of the first user. A first time period can be automatically identified. During the first time period, the first availability status can be maintained as the current availability of the first user to at least a second user. In response to the first time period elapsing, a second availability status can be automatically established as the current availability of the first user to the second user.02-19-2009
20090287811Configuration of network's nodes in a telecommunication system - The idea of the present invention providing a solution for configuration problems of a node is based on the following components. A problem recognition system, which analyses performance indicators and identifies root causes, so that signatures can be attached to a found problems. Furthermore there is a signature based filtering system, which looks for transactions satisfying signatures. A customer identification system labels the transactions with the subscriber identify. A solution feedback system generates feedback event to the end node according to the rule of the signature.11-19-2009
20090063679NETWORK RELAY APPARATUS - A network relay apparatus which conducts data transfer by using a plurality of network LSIS includes a transfer engine unit having at least two network LSIs and a central control unit which controls the operation state of the network relay apparatus. The transfer engine unit includes the network LSIs capable of changing over at least one of a clock and an operation which differ every function block, a load judgment unit for judging a load laid upon each of function blocks in the network LSI, and a frequency voltage control unit for individually changing over at least one of the clock and operation voltage supplied to each function block on the basis of the load judged by the load judgment unit.03-05-2009
20090193112SYSTEM AND COMPUTER PROGRAM PRODUCT FOR MONITORING TRANSACTION INSTANCES - Techniques for monitoring one or more transaction instances in a real-time network are provided. The techniques include obtaining one or more system log files, wherein one or more footprints left by one or more transaction instances are recorded in the one or more system log files, obtaining a transaction model, wherein the transaction model comprises one or more transaction steps and a footprint pattern corresponding with each transaction step, and using the one or more system log files and the transaction model to monitor the one or more transaction instances in a real-time network at least one of an individual level and one or more aggregate levels.07-30-2009
20090063678EQUIPMENT SET GENERATION SUPPORT APPARATUS AND METHOD - An equipment set generation support apparatus (a) acquires, from a plurality of equipments connected to a network, state change event information notifying a state change of each equipment and an occurrence time and date of the state change, (b) sets a detection condition including a start time and an end time of a detection period, (c) selects state change event information whose occurrence time and date of the state change falling within the detection period from the state change event information acquired, and (d) detects, from the plurality of equipments, a set of equipments whose states change in the detection period and a set of state values after the state change of each equipment based on the state change event information selected.03-05-2009
20090063677Systems and Media For Updating An Instant Messaging System - Systems and media for updating an instant messaging system on a network are disclosed. More particularly, hardware and/or software for updating status indicators such as ‘away’ messages of an instant messaging system are disclosed. Embodiments include determining that a change in status of the user has occurred and automatically transmitting an indication of the change in status to instant messenger system manager via a network. Embodiments include determining that a change in status of the user has occurred based oh receiving an indication that the user's status has changed, such as from user input on a keyboard, mouse, etc. Other embodiments, include determining that a change in status has occurred based on determining that the user's status has changed based on an electronic calendar, expiration of a time period, etc.03-05-2009
20090063671METHOD, DEVICE, SOFTWARE FOR DETERMINING A NEED - The present invention relates to a method, a client device (CL) and a computer program product for determining the need for requesting network configuration information from a network. The client device includes memories (M03-05-2009
20090070462SYSTEM AND COMPUTER PROGRAM FOR MONITORING PERFORMANCE OF APPLICATIONS IN A DISTRIBUTED ENVIRONMENT - A system and computer program for monitoring the performance of applications running on a server in a distributed computing environment includes prompting the user to select information for monitoring, monitoring application performance in accordance with the selected information, and making the monitored performance information available to the user.03-12-2009
20090240799INTERACTIVE DNS FOR CONTROLLING PARTY - A Hosting Entity or another entity may provide a framework for collecting DNS Business Information from a Controlling Party of a domain name and entering it into DNS. The framework may include a website, webpage, web service, web resource, software, API, or another technological solution suitable for collecting DNS Business Information from Controlling Party. The website, webpage, web service, or the web resource may be located at URL associated with a Controlling Party's domain name, e.g. an active or a parked page for the domain name. DNS Business Information will be typically available for viewing to everyone along with the traditional DNS information.09-24-2009
20090055530Re-Direction of Streaming Multimedia in Wireless Communication Devices - A wireless communication device (02-26-2009
20090055524NETWORK SYSTEM - A network system suitable for remote monitoring or remote control of equipments is provided. When an execution of a server-side object is requested from a client terminal device to a server, the server requests an execution of an equipment-side object to the equipment(s). The execution request of the server-side object from the client terminal device is performed by use of a first identifier assigned to the server-side object, and the execution request of the equipment-side object is performed by use of a second identifier assigned to the equipment-side object. Since the server has an identifier setting function of setting a correspondence relation between the first identifier and the second identifier, it is possible to reduce burden on the client terminal device, and flexibly cope with cases of exchanging and increasing the equipment(s) in the network system without considering specific identification information of the equipments such as IP address.02-26-2009
20110231543Network management control program, network management control device, and network management control method - A network management control device includes a link information storing unit that stores information about connections between nodes belonging to respective networks that are controlled by different protocols. The network management control device receives an input of the configuration information about each of the networks. The network management control device then generates combined information between different protocols, based on the information stored in the link information storing unit about connections between nodes and the received network configuration information. After that, the network management control device performs provisioning in accordance with the generated combined information between the different protocols.09-22-2011
20090083421Internet Website Traffic Flow Analysis - An Internet-based analysis tool follows, in real-time, the flow of traffic through a website. For every website page requested by a website visitor, the state of the visitor's browser is recorded and data relating to the path visitors take through the website is collected and studied. The state of the visitor's browser path is maintained in a traffic analysis cookie that is passed between a website file server and the visitor browser with every page requested for viewing. The cookie is maintained in a size that can be passed from server to browser and back again without negatively impacting server performance and without negatively impacting browser performance. The data in the cookie can follow the visitor browser through independent file servers, regardless of how the pages of a website might be distributed in storage.03-26-2009
20090083417METHOD AND APPARATUS FOR TRACING USERS OF ONLINE VIDEO WEB SITES - The method and/or apparatus monitors and records the times when a user interacts with a network video player, e.g. a web video player, while watching an online video clip. Specifically, a data collection agent (DCA) is loaded to the player or to a web page that displays the video clip. The DCA collects detailed viewing information and periodically sends this information to a central server. The viewing information is processed by the central server to generate at least one of: a viewership attention span report, a viewership demographics report, and a viewership geographic report.03-26-2009
20090083412ILLUSTRATION SUPPORTED P2P MEDIA CONTENT STREAMING - A system and method for Peer-to-Peer (P2P) media content streaming are provided. In one embodiment, prior to streaming desired original media content, a playback agent of a first peer playback device downloads illustration media content, which is a derivate light-weight version of the original media content. The playback agent then initiates streaming of the original media content from one or more other peer playback devices hosting the original media content or a segment thereof. The playback agent monitors a quality of the network connection to the other peer playback devices streaming the original media content to the playback agent. If the quality of the network connection falls below a defined threshold, the playback agent switches playback to the illustration media content. Once the quality of the network connection improves or a new connection is established, the playback agent switches playback back to the streaming original media content.03-26-2009
20090083418METHOD AND APPARATUS FOR PROVIDING REAL FRIENDS COUNT - A method and apparatus for tracking communications in a network are disclosed. For example, the method receives a subscription from a customer for a service to track at least one variable associated with a plurality of communicants of the customer. The method identifies a plurality of members of a social network of the customer, and gathers communication data associated with the plurality of members for tracking the at least one variable. The method then displays at least one result derived from the communication data to the customer.03-26-2009
20090083413Distributed frequency data collection via DNS - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed.03-26-2009
20100153539ALGORITHM FOR CLASSIFICATION OF BROWSER LINKS - A method or algorithm for classifying downloaded links or URL's based on the reason behind the download. Downloads are classified into categories, for example, a “visited” URL or an “embedded” URL. Categorizing these downloads allows other applications to collect information for storage, upload, or other action. This algorithm uses information from the browser history and packet streams to obtain and categorize the links or URL's for classification.06-17-2010
20120079109SYSTEM AND METHOD OF ANALYSING TRANSFER OF DATA OVER AT LEAST ONE NETWORK - A system and method are disclosed for analysing transfer of data over at least one network, including a device configured to select a subset of users from a user base of at least one network. The system can include a device configured to analyse data relating to potential unlicensed data transfer by the subset of users, and a device configured to generate an estimate of unlicensed data transfer by the user base based on the analysis of data of the subset of users.03-29-2012
20120079108SYSTEM AND METHOD FOR COLLECTING APPLICATION PERFORMANCE DATA - Systems and methods are provided for collecting application performance data. The system (03-29-2012
20120079107System and Method for Interfacing with Heterogeneous Network Data Gathering Tools - A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server invokes the heterogeneous information sources via a uniform communications interface to gather information about the network, and converts the information gathered by the information sources into a normalized data format such as, for example, into XML (Extensible Markup Language). The converted information is then stored in an audit repository for security and regulatory policy assessment, network vulnerability analysis, report generation, and security improvement recommendations.03-29-2012
20120079106System and Method for Interfacing with Heterogeneous Network Data Gathering Tools - A prevention-based network auditing system includes a plurality of heterogeneous information sources gathering information about the network. An audit server invokes the heterogeneous information sources via a uniform communications interface to gather information about the network, and converts the information gathered by the information sources into a normalized data format such as, for example, into XML (Extensible Markup Language). The converted information is then stored in an audit repository for security and regulatory policy assessment, network vulnerability analysis, report generation, and security improvement recommendations.03-29-2012
20120079105Application Processor Apparatus and Method for Monitoring A Wireless Communication Network - An application processor of a distributed architecture for monitoring mobile communication in a wireless communication network is claimed. Systems and methods enable receiving reporting data related to events that occur in a wireless network from the perspective of the wireless device. The data management system is capable of generating a data reporting profile and communicating with a wireless device. The application processor is capable of monitoring and reporting a plurality of conditions within the wireless device and sending and receiving communications from the data management system. The baseband processor is capable of monitoring and reporting plurality of conditions on the wireless network and sending and receiving communications with the application processor. Both the application processor and the baseband processor monitor and report the conditions of the device and the network by applying a series of logical rules found within the data reporting profile.03-29-2012
20120079104SYSTEM AND METHOD OF MIDDLEBOX DETECTION AND CHARACTERIZATION - A computer-implemented system and method to detect and characterize middleboxes is disclosed. Embodiments of the system and method include a middlebox detection engine to provide a plurality of middlebox detection modules, and to use at least one middlebox detection module of the plurality of middlebox detection modules to determine if a middlebox exists on a path between a first communicating entity of a network and a second communicating entity of the network.03-29-2012
20120079102Requester Based Transaction Status Reporting in a System with Multi-Level Memory - A system has memory resources accessible by a central processing unit (CPU). One or more transaction requests are initiated by the CPU for access to one or more of the memory resources. Initiation of transaction requests is ceased for a period of time. The memory resources are monitored to determine when all of the transaction requests initiated by the CPU have been completed. An idle signal accessible by the CPU is provided that is asserted when all of the transaction requests initiated by the CPU have been completed.03-29-2012
20120079101Behavioral Classification of Network Data Flows - Methods, apparatuses and systems facilitating enhanced classification of network traffic based on observed flow-based and/or host-based behaviors.03-29-2012
20120079100ELECTRONIC DEVICE DIAGNOSTIC SYSTEMS AND METHODS - Embodiments of methods of evaluating a wireless communication device using a computing system are provided. The embodiments include establishing a data connection between the wireless communication device and the computing system, and receiving device-specific information associated with the wireless communication device. The device-specific information includes at least one identifier associated with the wireless communication device. The device-specific information is provided to a server over a network, and additional device-specific information associated with evaluating the wireless communication device is received in response to providing the device-specific information to the server. Finally, in response to receiving the additional device-specific information, diagnostic-related information and a representation of the additional device-specific information are displayed on the computing system.03-29-2012
20120079099SYSTEM AND METHOD FOR A CONTEXT-BASED RICH COMMUNICATION LOG - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a context-based rich communication log. A system configured to practice the method performs a context-based analysis of a history of communication sessions over at least two communication modalities, wherein the context-based analysis considers semantic meaning, temporal relationship, and user activities. The system generates associations between the communication sessions based on the context-based analysis, and generates the context-based rich communication log based on the associations. The context-based analysis can be based on time, session participant identifications, ongoing events, and/or on-demand queries of the communication sessions. The system can then present the context-based rich communication log to a user. The context-based rich communication log can be used as part of at least one of a predictive contacts application, a topic analyzer, a conferencing application, and a personal communication assistant, for example.03-29-2012
20120079098Performance Monitoring of a Computer Resource - A method, computer program product, and system for performance monitoring of a computer resource utilized by a user community. The computer resource is monitored, and sets of performance metrics characterizing a state of the computer resource are collected and analyzed to detect performance incidents. External information such as contextual information and user annotations are also collected and analyzed. If a performance incident is detected, its set of performance metrics and associated external information are used to search a data repository of past performance incidents for related incidents, in order to identify critical performance incidents, determine recommended solutions for the performance incidents, and determine performance forecasts for the computer resource.03-29-2012
20120079096NETWORKED DEVICES FOR MONITORING UTILITY USAGE AND METHODS OF USING THE SAME - Systems, methods, and devices are presented herein for monitoring usage of at least one utility by a utility consuming system. One aspect of the present disclosure is directed to a method of managing information in a utility monitoring system that includes a host computer and an array of monitoring devices operatively coupled together on a peer-to-peer network. The array of monitoring devices includes first and second monitoring devices each with a respective memory. The first and second monitoring devices are configured to receive and transmit data. The method includes: storing data received by the first monitoring device in the first memory; storing data received by the second monitoring device in the second memory; responsive to the first memory being below a threshold storage capacity, transferring data received by the second monitoring device to the first monitoring device; and storing the transferred data in the first memory.03-29-2012
20120079095CLOUD-BASED DEVICE SYNCHRONIZATION - A logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices. Such communication enables content such as applications and data to be synchronized between various devices, where the synchronization takes into account the capabilities of each device to provide versions and/or formats of that content that are appropriate for each device. A user purchasing an additional device, for example, can have various applications and other content automatically installed or copied over to the additional device, but with versions or formats that take advantage of, and are appropriate for, the capabilities of that additional device. Further, the intelligent communication via a logically centralized service can enable such devices to interact even though those devices might utilize different protocols and/or formats, and might otherwise not be able to communicate or have ever have been tested together.03-29-2012
20090063676METHOD AND APPARATUS FOR PROVIDING STATUS INFORMATION BY UTILIZING PRESENCE SERVICE AND METHOD AND APPARATUS FOR GENERATING CONTENT STATUS INFORMATION BY UTILIZING PRESENCE SERVICE - A method of and apparatus for providing status information by using presence information data, and a method of and apparatus for generating content status information are provided. The method of providing status information on a second user to a first user terminal which is used by a first user includes: inserting additional data into the status information on the second user requested by the first user terminal; and transmitting the status information on the second user into which the additional data is inserted to the first user terminal.03-05-2009
20120072572Methods for Balancing Brand Perception on Computer Network Information Sources - Method of present invention provides for subscribing subscribers to a brand notification service, monitoring the computer network information sources for the brand mention, determining references located on the computer network information sources and containing the brand mention, scoring the references according to a predetermined scoring approach resulting in a brand mention score, determining whether the brand mention score is within a predetermined score range, and if the score is within the predetermined score range, then notifying the subscribers of the brand mention and supplying the subscribers with links to the references containing the brand mention.03-22-2012
20110231546AUTOMOTIVE TELEMETRY PROTOCOL - Disclosed is a method of conveying vehicle operation data from a vehicle to a remote monitoring recipient, comprising the steps of establishing a data link between the vehicle and the remote monitoring recipient; collecting vehicle operation data from data sources in the vehicle; packaging the vehicle operation data in a data packet using protocol derived from SNMP; and conveying the data packet over the data link.09-22-2011
20080263203METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS - METHOD AND APPARATUS FOR DELEGATING RESPONSES TO CONDITIONS IN COMPUTING SYSTEMS ABSTRACT One embodiment of the present method and apparatus for delegating responses to conditions in computing systems includes acknowledging (e.g., at a systems management component in the computing system) a condition, and delegating responsibility for a strategy for a response to the condition to another component. In further embodiments, the present method and apparatus for delegating responses to conditions in computing systems includes receiving (e.g., at a computing system component) an assignment from another computing system component (e.g., a systems management component), where the assignment assigns responsibility for a strategy for a response to a condition, and determining whether and how to respond to the condition.10-23-2008
20080263202METHOD AND APPARATUS FOR REDUCING SPAM ON PEER-TO-PEER NETWORKS - One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).10-23-2008
20080263201METHOD FOR REAL-TIME MONITORING A REMOTE CONTROL PROCESS BY A THIRD PARTY AND SYSTEM THEREOF - The invention relates to a remote monitor technique. In particular, the present invention relates to a method for real-time monitoring a remote control process by a third party and a system thereof, which are able to third-party monitor a control terminal and a controlled terminal in the remote control process. The method comprises steps of establishing a connection between a control terminal and a third party monitoring terminal; arranging the control terminal, the controlled terminal and the third party monitoring terminal in one and the same session based on the connection; the controlled terminal sending its desktop video to the third party monitoring terminal via a virtual display driver; and the third party monitoring terminal sending a predetermined control strategy to the controlled terminal.10-23-2008
20080263200NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network (10-23-2008
20080263199SYSTEM FOR SEARCHING DEVICE ON NETWORK - There is disclosed a network system in which the position, attribute, and status of a desired device on a network can visually comprehensibly be grasped. A server manages location information indicating information on the device position in a hierarchical manner and attribute information from the device. Each device holds a plurality of status information (icon information) in accordance with various statuses of the device. A client holds map information corresponding to each class of the location information, and overlaps and outputs (display output) device status information obtained by communication by a polling system with the device detected by search in the server, and map information corresponding to the location information of the device.10-23-2008
20080263197Passively attributing anonymous network events to their associated users - Systems, methods, and computer program products for passively attributing anonymous network events to their associated users are provided herein. Embodiments include filtering network events over a pre-determined time interval to generate a filtered event list. In an embodiment, event attribution includes attributing an anonymous network event to a user associated with a nearest-neighbor event relative to the anonymous network event. In another embodiment, event attribution includes attributing an anonymous network event to a user associated with an event in the filtered event list, wherein that user maximizes an event attribution function. In a further embodiment, event attribution includes determining a first potential attribution user for an anonymous network event based on a nearest-neighbor attribution approach; determining a second potential attribution user for the anonymous network event based on an event attribution function approach; and comparing the first and second potential attribution users to determine the attribution of the anonymous event.10-23-2008
20080263196Programming techniques for distributed multi-party networks - Architecture for programming in a distributed computing environment where different components of a system are owned or controlled by different entities and heterogeneous in terms of resource availability and a willingness to share. Multiple devices can be programmed when a task requires human intervention. Method are described for using a tolerance level provided by the application developer to control the execution of the application instructions at multiple devices with varying resources, and for using an involvement level provided by the sensor or computing device owner for the purpose of automatically adapting the execution of application code at multiple devices to suit the individual owner's willingness to share resources, and the capabilities of resources available with that owner. Code distribution allows an application developed by one entity to be distributed to multiple devices owned by multiple entities, where each of the entities has varying connectivity, resource availability, and sharing willingness.10-23-2008
20080263195Performance Monitoring - Real-time data is extracted from a log file for at least one monitored process on each of a plurality of servers. For each monitored process, extracted real-time data is inserted into object variables of an object. The object variable data is processed to generate performance statistics for the monitored processes and to determine whether to trigger an alarm. A database is updated with object variable data and performance statistics when an event associated with a monitored process takes place. Historical performance statistics from the database are compared with current performance statistics to determine a performance trend.10-23-2008
20080263194METHOD AND SYSTEM FOR OPTIMAL BINDING SELECTION FOR SERVICE ORIENTED ARCHITECTURES - A method for selecting a best performing binding for a server and a client in a service-oriented architecture includes: discovering configuration information about the service and the operating environment of the server and the client; selecting the best performing binding between the client and the server based on the discovered information; enabling the selected binding in a binding proxy for communication between the client and the server.10-23-2008
20080263193System and Method for Automatically Providing a Web Resource for a Broken Web Link - A system and method for automatically providing a Web site resource for a broken Web link are provided. Mechanisms are provided for locating Web site resources that have been moved to a new location in a Web site structure in response to receiving a request directed to an old location of the Web site resource, such as via a broken link. Index data structures of Web site structures are used to identify the structure of the Web site at various times. The index data structures are compared to determine how the Web site structure has been changed and these changes are stored as entries in a differences data structure. The differences data structure is then used to locate a moved Web site resource in the event that a request directed to an old location of the Web site resource is received, such as by selection of a broken link.10-23-2008
20110231544Providing a presence service in a communications system - The present solution provides a method in which, in response to receiving, in a first user terminal, presence status information on a second user terminal and a corresponding presence status information identifier, said presence status information and a related command element is displayed on the first user terminal. In response to recognising an act performed by the user of the first user terminal, said act comprising the user entering a presence comment by means of said command element, said presence comment and said presence status information identifier are transmitted from the first user terminal to a network apparatus.09-22-2011
20110231547SEARCH METHODS APPLIED TO A PERSONAL NETWORK GATEWAY IN CONVERGED PERSONAL NETWORK SERVICE SYSTEMS AND RELATED CONVERGED PERSONAL NETWORK SERVICE SYSTEMS AND MOBILE DEVICES - A search method applied to a personal network gateway (PN-GW) in a converged personal network service (CPNS) system is provided. First, a search procedure to search for personal network elements (PNEs) in a specific zone of the CPNS system is periodically performed every search period. Upon expiration of each search period, whether any undetected PNE has entered the specific zone is determined and the search period is adaptively adjusted according to the determination result.09-22-2011
20110231545COMMUNICATION NETWORK MANAGEMENT SYSTEM, METHOD AND PROGRAM, AND MANAGEMENT COMPUTER - A communication network management system has: a communication network including a plurality of nodes and a plurality of links connecting between the plurality of nodes; and a management computer that manages the communication network. The management computer has: a storage means in which a route information indicating a transfer route of frames in the communication network is stored; and a monitoring means configured to perform, based on the route information, transmission and reception of frames to and from the communication network. The monitoring means transmits a frame to the transfer route. Each of the plurality of nodes, when receiving a frame, not only forwards the received frame along the transfer route but also sends a reply to the management computer. The monitoring means identifies a location of failure occurrence on the transfer route, based on reception state of the reply from the plurality of nodes.09-22-2011
20110231541SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer.09-22-2011
20110231542INFORMATION PROCESSING DEVICE, SERVER DEVICE, AND PERIPHERAL DEVICE MANAGEMENT METHOD - A user terminal 09-22-2011
20090100168AUTOMATIC LOCATION DETECTION IN A COMPUTING ENVIRONMENT - Automatic position location detection, such as satellite position information is used along with a computer to enhance an operation over a remote information channel or a network. This may be used over the Internet to enhance an Internet transaction by determining the origin of the transaction and determining if that origin is authorized. It can also be used for determining a person's location and seeing if the person has moved more than a specified amount in the specified time. It can be used for a biometric scan to determine certain characteristics about the person. Another aspect uses automatic position location to detect handwriting. Yet another application is an automatically determining the source of a request for information from a website, and returning information from that website. This system can also be used in chat room environment.04-16-2009
20090100175Location of Unidirectional Handover Relationships - A management system includes a first management device storing information regarding: objects monitored by the first management device, objects monitored by a second management device and relationships between objects monitored by the first management device and objects monitored by the second management device. The first management device requests such information from the second management device. Using the information stored by the first management device and the information requested from the second management device, the first management device ascertains at least one relationship between at least one object monitored by the first management device and at least one object monitored by the second management device and which is stored either just by the first management device or just by the second management device.04-16-2009
20090100172METHOD AND APPARATUS FOR MONITORING WEB SERVICES RESOURCE UTILIZATION - A method for dynamically adjusting resources among a plurality of co-existing applications comprises the steps of: building a relation model between a request number and resource consumption of said plurality of applications; obtaining at multiple sampling moments a request number and resource consumption of each of said plurality of applications; calculating resource consumption ratio of each of said plurality of applications; and analyzing resource consumption of a plurality of currently co-existing applications.04-16-2009
20090100171PROVIDING A USER OF AN INSTANT MESSAGE CLIENT WITH AN OVER-SHOULDER STATUS - In an instant message (IM) method and system, a user of an IM client is provided with an over-shoulder status indicating the user has a visitor. The method and system further include receiving a preference setting for an over-shoulder status for defining an over-shoulder status toggle input. Mouse and keyboard strokes entered into the IM client by the user are then monitored in real-time. In response to any of the mouse and keyboard strokes matching the toggle input, the over-shoulder status is automatically toggled, whereby the over-shoulder status is updated in a contact list of at least one other IM client, such that activation of the over-shoulder status serves as a warning that the user has a visitor.04-16-2009
20090100169NETWORK BOOKMARKING BASED ON NETWORK TRAFFIC - A system comprises a packet data processing element; first network resource tracking logic operable to perform monitoring data packets as the packets pass through the network element; detecting network resource identifiers within the data packets; forming network resource identifier report messages that carry the network resource identifiers; forwarding the network resource identifier report messages to a bookmark processing server; storing records of each of the network resource identifiers carried therein; storing counters that identify numbers of times that associated network resource identifiers were requested; determining interesting network resource identifiers based on the records and decision steps; generating and providing a report of the interesting network resource identifiers. As one result, interesting network resource identifiers can be automatically found in network traffic and provided to a social bookmarking site.04-16-2009
20090210528METHOD FOR DETERMINING METRICS OF A CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK - A method for determining metrics of a content delivery and global traffic management network provides service metric probes that determine the service availability and metric measurements of types of services provided by a content delivery machine. Latency probes are also provided for determining the latency of various servers within a network. Service metric probes consult a configuration file containing each DNS name in its area and the set of services. Each server in the network has a metric test associated with each service supported by the server which the service metric probes periodically performs metric tests on and records the metric test results which are periodically sent to all of the DNS servers in the network. DNS servers use the test result updates to determine the best server to return for a given DNS name. The latency probe calculates the latency from its location to a client's location using the round trip time for sending a packet to the client to obtain the latency value for that client. The latency probe updates the DNS servers with the clients' latency data. The DNS server uses the latency test data updates to determine the closest server to a client.08-20-2009
20090204709System, method and computer program product for monitoring and controlling network connections from a supervisory operating system - A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system.08-13-2009
20090204702SYSTEM AND METHOD FOR NETWORK MANAGEMENT USING SELF-DISCOVERING THIN AGENTS - In one embodiment, a computer-implemented method of managing a computer network includes installing an agent in each of a plurality of network nodes in the network. The agent may be configured to identify one or more types of network resources attached to a particular node with which the agent is associated. One or more roles may be assigned to or by the agent based, at least in part, upon the one or more types of network resources identified by the agent. Functions associated with the identified roles may be executed. Monitoring the status of each agent may also be carried out. In another embodiment, a network management system includes an agent executing within an associated network node of the network. The agent may be configured to operate so as to identify one or more types of resources attached to the network node. The agent may be assigned one or more roles based, at least in part, on an inference based upon the one or more types of attached resources identified by the agent.08-13-2009
20090164628CIRCUIT AND METHOD FOR SETTING DATA AND THEIR APPLICATION TO INTEGRATED CIRCUIT - An integrated circuit is disclosed, including at least one configuration pin, an interface circuit, a detecting circuit, a determining circuit and a storage unit. A physical layer circuit of the invention not only increases the flexibility of setting PHY addresses, but also reduces the number of configuration pins.06-25-2009
20090150541System and method for dynamically generating user interfaces for network client devices - A system and method for dynamically generating user interfaces for client devices in an electronic network includes a network server and a network of client devices. Each of the client devices monitors and compiles client statistics regarding usage characteristics for various elements of corresponding user interfaces. A recommendation engine of the network server accesses and analyzes the client statistics to thereby generate individual user interface recommendations for the various client devices. The client devices may then dynamically update their respective user interfaces in accordance with respective individual user interface recommendations.06-11-2009
20090144414Method for summarizing flow information from network devices - A method for aggregating network flow information within a relational database relates to by maximizing concurrency between insertion and analysis of database records. In particular, data is generally stored according to the network devices associated with the flow records. Then, the flow records for the separate devices may be aggregated at certain time intervals and separately organized. In this way, contention is decreased as analysis can occur on the aggregated flow records, while new flow records are stored. In another embodiment, the aggregated data can be reaggregated again at a second, larger time interval.06-04-2009
20090222557ANALYSIS SYSTEM, INFORMATION PROCESSING APPARATUS, ACTIVITY ANALYSIS METHOD AND PROGRAM PRODUCT - An analysis system, information processing apparatus, activity analysis method, and program for analyzing activities of an information source on a network. The system and apparatus include an attribute extraction block for extracting, an information propagation graph acquisition block for searching action history data, and a characteristic user calculation block for calculating an amount characteristic. The method and program product include the steps of extracting an information characteristic value, searching action history data, registering the information, calculating an amount characteristic, and integrating the amount characteristic.09-03-2009
20090222553Monitoring network performance to identify sources of network performance degradation - A method of measuring, for communication paths between a networked computer and at least one other networked computer connected via a network performance, network information to detect network performance degradation and diagnose source(s) of the performance degradation. The diagnosis may be performed by a progressive elimination of possible sources. Network performance degradation may be attributed to problems at a local network or the Internet. The problem sources on the Internet may comprise, for example, an internet server provider (ISP) or a single remote server in communication with the networked computer. A network performance baseline established and maintained for each path may be employed in diagnosing the network performance degradation.09-03-2009
20090006617System And Method For Transmitting Pollution Information Over An Integrated Wireless Network - A pollution information message system provides a system and method for generating and transmitting pollution information messages. In one embodiment, the pollution information message system employs a transceiver network with a plurality transceivers coupled to monitoring devices. Control room operators receive a pollution information message from an identifiable transceiver. The transceiver, identified by an identification code, indicates a location and the nature of the detected pollution.01-01-2009
20090113047METHOD AND APPARATUS FOR LAST MESSAGE NOTIFICATION - An agent for generating a last message notification in an asynchronous message delivery environment, wherein messages received by a messaging server are routable to a messaging client through an API binding protocol, the agent comprising: a monitoring component for monitoring a message store to determine if there is a message stored for delivery to a message listener; and a message notification component for generating a message indicating that there are no further messages in the message store for routing to the messaging listener, in response to a negative determination by the monitoring component.04-30-2009
20090113043NETWORK LOCATION SERVICE - A method is provided for a network location service in which one or more packet forwarding devices in the network collect and maintain location data for the devices/users currently connected to a network. The data is maintained locally in each packet forwarding device and may be provided on demand to a network/business application, such as emergency 911 services or a location-based security or personalization system. The location data is provided in real-time or near real-time using an in-band channel communication and/or over the Internet using a standard transport protocol, such as HTTP/S and SOAP web services.04-30-2009
20090113041SYSTEM AND METHOD FOR PROVIDING AN INTELLIGENT WIRELESS NETWORK - A system and method is for identifying where an employee is located and which network services node, such as a printer, is near him/her through a access point. The system uses the connection between the access point to identify the location of the user and which printer he/she can use. The main network server transmits the information to the wireless router providing the network access to the user and updates the database with the user and localization.04-30-2009
20110225295METHOD AND SYSTEM FOR MONITORING AND ANALYZING OF IP NETWORKS ELEMENTS - Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network.09-15-2011
20090106413Method and apparatus for detecting click fraud - Detecting click fraud at a user device involves detecting a event targeted to a network service that is rated based on the number of individuals who access the network service. The event is of a type associated with user interface selections. It is determined whether the user device is in a low-power state contemporaneously with the detection of the event. The event is caused to be disregarded for the purposes of rating the network service based on a determination that the user device was in the low power state contemporaneously with the detection of the event.04-23-2009
20090106417Method and apparatus for packet analysis in a network - A method and system for monitoring traffic in a data communication network and for extracting useful statistics and information is disclosed.04-23-2009
20090106420GHOST AGENTS FOR APPLICATION DOMAINS WITHIN A GRID ENVIRONMENT - A method for evaluating system behavior of an application domain within a grid environment can include the step of identifying a host software object within the application domain. A software object can be associated with the host software object. Within the associated software object, host actions can be replicated. Replicated actions can be recorded. The host software object can move from one grid within the grid environment to a different grid. The associated software object can responsively move within the grid environment in accordance with movement of the host software object.04-23-2009
20090106416Shared Groups Rostering System - Information about all current members of a group is stored. Instructions are received from at least one current member to invite at least one prospective member to join the group and the invitation to join the group is sent to the prospective member. In the event that an affirmative response is received, the prospective member is added to the current members of the group and automatically updated services are provided to current members of the group.04-23-2009
20090106415Display of Person Based Information Including Person Notes - Among other disclosures, a method may include collecting historical communication data and personal data relating to a portion of a plurality of communications, a sender of one or more of the communications or one or more recipients of the communications. The method may include generating a profile based on the collected historical communication data and personal data. The method may include receiving user input and incorporating the user input into the profile. The method may include presenting the profile including the user input in response to user behavior.04-23-2009
20090240803METHOD FOR COPYING SESSION INFORMATION, CALL CONTROL SERVER FOR EXECUTING THE SAME, AND COMPUTER PRODUCT - The method is executed by a call control server that establishes a media session for sending and receiving media data between a calling terminal and a called terminal. The method includes exchanging messages with calling terminal and called terminal for establishing the media session, generating a session information necessary for establishing the media session based on the messages exchanged with the calling terminal and/or the called terminal, monitoring a media information included in the messages, the media information containing a definition specifying a way of exchanging the media data, determining, based on the monitoring result, whether the media session has been established, and transferring the session information to at least one other call control server different from the call control server if the media session has been established.09-24-2009
20090204708MANAGING A NETWORKED STORAGE CONFIGURATION - Managing a networked storage system having a host operable to connect through a network fabric to storage apparatus comprises: a configuration component for inputting a configuration change into the networked storage system responsive to change instructions; a monitoring component operable in communication with the host and the network fabric to monitor I/O activity associated with elements of the networked storage system; an activity data storage component responsive to the monitoring component for storing a record of a monitored I/O activity; an analysis component, responsive to the configuration component for inputting configuration changes, for analysing the record of a monitored I/O activity for a recent activity; and an alert component, responsive to the analysis component detecting a recent activity, for alerting the configuration component.08-13-2009
20090204703AUTOMATED DOCUMENT CLASSIFIER TUNING - Subject matter disclosed herein relates to document classification and/or automated document classifier tuning.08-13-2009
20090204701NODE MONITOR CLIENT CACHE SYNCHRONIZATION FOR MOBILE DEVICE MANAGEMENT - A stateful cache layer is created at a mobile device client that tracks the state on both the mobile device and management service. The states are synchronized between the mobile device and the management service on every management session. Through the statefulness of the cache layer, unauthorized changes on the mobile device are detected and accordingly handled such as internal correction or reporting to the management service for actionable instructions. A cache layer on the management server is configured to identify organizational policy changes that affect specific devices and initiate unsolicited immediate management sessions to update the configuration to the specific devices.08-13-2009
20090204700COORDINATED PEER-TO-PEER (P2P) REPLICATED BACKUP AND VERSIONING - Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy.08-13-2009
20090216879ELEMENT MANAGEMENT SYSTEM WITH FUNCTION TO TRANSFER DATABASE - An element management system which allows a client to monitor and control elements on a network through element management servers includes a unit configured to manage a transfer state separately for each element when management information regarding an element accommodated in a first element management server is to be transferred to a second element management server, and a unit configured to cause the management information at the second element management server to reflect a differential between the management information at the first element management server and the management information at the second element management server upon creation of the differential that is created by the client upon controlling an element for which the transfer state indicates uncompleted transfer, wherein an accommodated element is transferred in real time between the first and second element management servers without suspending monitor and control performed by the first and second element management servers.08-27-2009
20080275988Method And System For Lawful Interception In Next Generation Networks - A method and system for lawful interception by Law Enforcement Agency (LEA) in next generation networks. The system includes a Delivery Function 11-06-2008
20080275982SYSTEM AND PROGRAM PRODUCT FOR TRACKING WEB USER SESSIONS - The present invention provides a solution for efficiently tracking web user sessions. Specifically, under the present invention, web user sessions are tracked on an analytics system based upon a unique identifier assigned to a requested web page and a session cookie that identifies a particular web user session. By tracking web user sessions in this manner, web page data transmitted during a particular web user session can be efficiently and accurately correlated for analysis.11-06-2008
20090228579Unified Service Management - The described unified service management system provides a unified console to perform functions of individual management specialists. A unified console facilitates an administrator to perform the complex tasks that were performed by the individual management specialists. The unified console provides a “wizard” based approach to the administrator to design all aspects of the complex tasks including placement of components or computing devices, deciding on policies of the components or computing devices, deciding on health policies of components or computing devices, fixing data protection policies of components or computing devices, etc.09-10-2009
20090222551METHOD AND SYSTEM FOR QUALIFYING USER ENGAGEMENT WITH A WEBSITE - A system and a method of identifying information characterizing use of a website is provided. A plurality of user profiles are analyzed. A user profile includes information associated with an interaction by a user with the website. A plurality of user comments associated with the website are analyzed. Characteristic information associated with use of the website is determined based on the analyzed user profiles and the analyzed user comments. The determined characteristic information is presented to a user.09-03-2009
20090222558Managing Network Data Transfers in a Virtual Computer System - A method for protecting a virtual computer system which may be susceptible to adverse effects from a Denial of Service attack is described. The virtual computer system includes a plurality of VMs. In the method, data that is transferred between the virtual computer system and the computer network is monitored for an indication of a possible Denial of Service attack. If an indication of a possible Denial of Service attack is detected, one or more of the VMs is suspended, to reduce the risk of adverse effects on one or more other VMs.09-03-2009
20090222556Monitoring Network Usage - A method of determining whether a user has complied with a service level agreement (SLA) with a network operator, comprising collecting a set of data values representative of the user's service usage and comparing the set of data values to the service level agreement. The data values collected provide the operator with sufficient information so that it can determine whether a SLA is being complied with and to plan provision of network services. A method of monitoring a user's usage of a network service and a service usage indicator is also disclosed.09-03-2009
20090222552HUMAN-COMPUTER PRODUCTIVITY MANAGEMENT SYSTEM AND METHOD - The invention is a human-computer productivity management system with both processes and data systems designed to monitor the interactions between humans and computer systems, log the interactions, securely transmit the data to a centralized server, archive the data, process the data into highly efficient database, analyze the data to calculate productivity metrics, distill the data into key business intelligence reports and control the use of the computer systems.09-03-2009
20090222550MEASUREMENT OF THE EFFECTIVENESS OF ADVERTISEMENT DISPLAYED ON WEB PAGES - A method to determine user attentiveness to an information item included in a web page comprising: displaying an image representing a first web page that includes a first information item to a first individuals; determining a baseline time that represents a typical amount of time that respective first individuals look at the first information item; sending a first web page over a network to first user devices; and sending a second web page over a network to second user devices; wherein the second web page appears substantially the same as the first web page except with a second information item instead of the first information item; obtaining first time measurements of an amount of time that first users of the first user devices typically spend looking at the first web page; obtaining second time measurements of an amount of time that respective second users of the second user devices typically spend looking at the second web page; determining a comparative time measure that is indicative of a difference in time respective first and second users typically spend looking at the first and second web pages; using the baseline time and the comparative time measure to determine an amount of time that a typical user is likely to spend looking at the second information item included in the second web page.09-03-2009
20090222549CORRELATING PERFORMANCE DATA OF MULTIPLE COMPUTING DEVICES - Systems, products, and methods are disclosed for facilitating the correlation of performance data associated with multiple computing devices. An illustrative method includes referencing a time as indicated by a computer and referencing a start time indication that identifies a time to begin monitoring computer performance. Thereafter, the time indicated by the computer and the start time indication are utilized to determine an initial monitoring delay. Upon determining an initial monitoring delay, an initial monitoring of the computer performance is delayed until the initial monitoring delay has lapsed. In one embodiment, computer performance data collected upon the lapse of the initial monitoring delay can be correlated with performance data associated with other computing devices.09-03-2009
20090216872METHOD AND DEVICE FOR TRANSMITTING FILES VIA A NETWORK - A method for transmitting files via a network is proposed. In a first step, the size of a file to be transmitted is transmitted. Following this, the value of a maximum permitted data traffic is calculated from the size of the file and a factor X. Finally, the transmission process of a file is stopped as soon as the data volume transmitted exceeds the maximum permitted data traffic.08-27-2009
20120198063VIRTUAL SERVER SYSTEM, AUTONOMOUS CONTROL SERVER THEREOF, AND DATA PROCESSING METHOD AND COMPUTER PROGRAM THEREOF - An autonomous control server (08-02-2012
20120198056Techniques for Analyzing Website Content - A scheme for analyzing businesses and generating business leads is disclosed. A list of company websites can be gathered from a plurality of data sources and combined to produce an aggregated list of companies. Content from the websites of the companies in the list is extracted and stored. Contact information may automatically be ascertained from the website content, if available. The stored content extracted from the websites may then be analyzed to detect the presence of particular features. The listing of companies may then be filtered to produce a subset of businesses that represent potential business leads. The business leads may be provided to a company seeking such leads, and may optionally be provided to an automated marketing system, which is configured to generate and transmit commercial advertisements to the businesses identified as leads.08-02-2012
20120198053Web Based Client/Server Notification Engine - Various technologies and techniques improve the updating of client content in a client/server arrangement. A client notification engine of a user interface subscribes to receive notifications from a central server side notification engine. The client notification engine polls the server side notification engine at a specified interval. The server side notification engine receives and aggregates notifications about and/or from one or more sources and aggregates them into a collection of relevant notifications. These notifications are sent to the client where the different subscriptions originated and are then used by the user interface in the client to update part of the content being displayed as appropriate.08-02-2012
20120198052Method for Retrieving the Implemented Data Model from a Device - Presented is an apparatus and methods for collecting the implemented data model and version information from an end user device. The apparatus is communicatively connected to the end user device and uses, for example, the Broadband Forum TR-069 protocol or another protocol for communications. The method interrogates the end user device to determine all parameters and their data types by traversing the end user device's data model level by level and instantiating any objects discovered that are instantiable but not yet instantiated. The method archives the data model and end user device version information for later use with like devices.08-02-2012
20120198050SYSTEM AND METHOD FOR DISTRIBUTED DATA COLLECTION AND HEURISTIC REFINEMENT IN A NETWORK INTERMEDIARY DEVICE - Data useful in analyzing the effectiveness of policies for handling transactions involving client communications is automatically collected at network intermediary devices and delivered to an analysis server as part of feedback communications from the network intermediary devices. The data may be collected according to data collection directives distributed to the network intermediary devices along with updates to policies for handling transactions, those updates being configured to alter actions of the network intermediary devices, for example to accommodate changes in behaviors of content servers from which the network intermediary devices obtain content in connection with the client communications.08-02-2012
20120198048IDENTIFYING REMOTE MACHINE OPERATING SYSTEM - A method for discovering an operating system of a remote machine includes monitoring network communications to detect a plurality of data packets that were generated by the remote machine. The contents of each detected data packet are read so as to extract a packet signature of each detected data packet. Each packet signature is compared with at least one signature of a database of signatures in order to determine a similarity between each packet signature and the signature from the database. A confidence level for at least one candidate operating system is calculated based on the determined similarities. A candidate operating system is selected based on the confidence level for that operating system. Relating computer program product and data processing system are also disclosed.08-02-2012
20090254656METHOD AND APPARATUS FOR CUSTODIAL MONITORING, FILTERING, AND APPROVING OF CONTENT - The system provides a method and apparatus for a parent or other custodian or guardian to monitor, filter, and approve of content to be accessed by a child or children on a network. In one embodiment, the system logs all activity on a network by a child and sends regular historical reports to the parent for review. The parent can set certain triggers that will provide more immediate feedback when certain events occur or when certain types of data are accessed, or an attempt is made by the child for such access. The system allows the parent to control the filters and options from a variety of sources, including via the child's computer, texting, instant messaging, cell phone, other web enabled computers, PDA's, etc.10-08-2009
20090254653Service utilization route output system, management server, service utilization route output method, and service utilization route output program - A service utilization route output system wherein an integrated search system comprises: a search execution history table storing, in a memory part, access information included in a request sent from a client PC to a search system cluster being service providing servers; a utilization route extracting part extracting a service accessed by the client on the basis of the access information and a service utilization route which is the sequence of the concerned service; a statistical information extracting part computing the number of times of extraction of service utilization routes that are the same as the service utilization route extracted with the utilization route extracting part; and a utilization route display data generating part associating the service utilization route and the number of times of extraction, and generating output information.10-08-2009
20090248868Contact Management in a Serverless Peer-to-Peer System - Systems and methods are described that facilitate the management of contact information, at least some of the contact information related to entities in a serverless, peer-to-peer system. A contact store may store information regarding which other entities of a plurality of other entities are authorized to monitor presence of a user entity. Presence of an entity may generally indicate the willingness and/or ability of the entity to communicate and/or collaborate with other entities, for example. The contact store may also store information regarding which other entities of the plurality of other entities the presence of which should be monitored by the system. A user entity may be able to add contacts to and/or delete contacts from the contact store, for example. The user entity may also be able to modify the contact store to modify which other entities are authorized to monitor presence of the user entity and/or which other entities the presence information of which should be monitored by the system, for example.10-01-2009
20090248867NETWORK SYSTEM, DEVICE, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A network system capable of autonomously changing a management configuration of a management device and managed devices in the network system. One of a plurality of devices connected to a network operates as a parent device that collects data from the other devices, and the remaining devices operate as child devices that transmit data to the parent device. When the load of the parent device becomes high, at least one of the child devices is selected and upgraded to a parent device. When the load of the original parent device decreases, the device upgraded to the parent device is automatically returned to the child device.10-01-2009
20090222554Statistics for online advertising - An apparatus and a method for collecting online advertisement statistics is described. In one embodiment, a web browser of a client requests from a server, a web page having an advertisement banner. The web browser receives the web page and a JavaScript program. The browser loads the webpage and the JavaScript program which polls the browser of one or more property of an HTML image object included in the advertisement banner of the web page. The JavaScript program reports out the one or more property of the HTML image object.09-03-2009
20090240805Isolating Local Performance Variation in Website Monitoring - Systems and methods are provided for isolating performance variation in website monitoring. A set of geographically diverse monitoring agents are identified and a subset of baseline agents is selected from these monitoring agents. The baseline agents are those agents that are geographically close to the target website or otherwise enjoy reliable communications with the target website and are therefore less affected by network latencies. The frequency at which a target website is monitored is weighted in favor of the baseline agents in order to get an accurate baseline metric for the target website while also obtaining information regarding global accessibility of the website from the geographically disperse monitoring agents. The variations in sample frequency can be optimized for each particular set of baseline agents. The set of baseline agents can be pre-assigned or dynamically identified based on an analysis of the performance variation from each of the monitoring agents.09-24-2009
20090240798Resource Equalization for Inter- and Intra- Data Center Operations - An exemplary component for managing requests for resources in a data center includes a service request module for receiving requests for resources from a plurality of services and a resource module to monitor resources in a data center and to match received requests to resources. Such a component optionally includes an application programming interface (API) that provides for sending information in response to an API call made by a service. Other methods, devices and systems are also disclosed.09-24-2009
20090240797An On Demand Message Based Financial Network Integration Middleware - The present invention relates to distributed networking, and in particularly to a message-based networking environment. More particularly, it relates to business applications (09-24-2009
20090248864SYSTEM AND METHOD FOR TRACKING PERFORMANCE AND SERVICE LEVEL AGREEMENT COMPLIANCE FOR MULTIPOINT PACKET SERVICES - A system and method for measuring compliance with a service level agreement (SLA) for communications. A committed information rate operable to avoid contention is set. A determination is made that there is frame loss on the network. A determination is made if the CIR is exceeded in response to the determined frame loss. A determination is made that a service is noncompliant with the SLA in response to determining the CIR has not been exceeded. Noncompliance of the service with the SLA is logged.10-01-2009
20090248865LOAD DISTRIBUTION METHOD, LOAD DISTRIBUTION DEVICE, AND SYSTEM INCLUDING LOAD DISTRIBUTION DEVICE - A load distribution device that receives processing requests from terminals and that allocates and transfers the processing requests to at least one of a plurality of servers. The load distribution device includes a monitoring unit, a request receiving unit, an update server determining unit, a distribution ratio setting unit, a load distribution unit, a notification unit and an update completion detecting unit, whereupon receipt of a notification that the update of the server to be updated is completed, the update server determining unit determines that the update to the server to be updated is completed, determines a new server to be updated and a new server to be updated next, and instructs the distribution ratio setting unit to set the distribution ratios.10-01-2009
20090248863ANALYSIS APPARATUS, ANALYSIS METHOD AND RECORDING MEDIUM FOR RECORDING ANALYSIS PROGRAM - An analysis apparatus includes a history analysis part analyzing the trend based on the access log and deriving the latent trait to an access destination, a principal components analysis part analyzing principal components of the frequency distribution of the access, a classification part classifying the correlation of the principal components into plural classes, an event recording part recording the events to induce to the access destination, a first generating part generating a latent trait principal component table; a second generating part generating a class construction ratio table stored the class as the result of classification,a third generating part generating an event classification table stored the class and the contents of the event, and an analysis result recording part recording the latent trait principal component table, the class construction ratio table and the event classification table, as an event feature model of the effect on the execution of the event.10-01-2009
20090248860SYSTEM AND METHOD FOR USING VIRTUAL IP ADDRESSES IN A MULTI-USER SERVER SYSTEM - A method of handling network access in a multi-user server system is disclosed. In the disclose system, a virtual network adapter is created for each user session on the multi-user server system. Each virtual network adapter receives its own independent IP address such that each individual user session appears to be a unique network node to other systems on the computer network.10-01-2009
20090210525Method for Detection of the Activity of a Device In a Network of Distributed Stations, as Well as a Network Station for Carrying Out the Method - The invention relates to the technical field of local data transmission networks, in particular domestic networks. In networks such as these, the network stations log on in connection to the network. On disconnection, the network station which is leaving the network logs off in an appropriate manner. In the situation in which the user disconnects a network station simply by pulling out the network cable from the network, it is physically impossible to transmit the logging-off message. The invention is now concerned with the problem of how reliably an inactive network station can be identified, also taking account of the disconnection of the network station simply by pulling out the network plug. The invention solves the problem by regular transmission of a search request to the stations in the network. If a search request remains unanswered by one network station, an HTTP access is additionally attempted to, for example, the device description of the network station in question, or a control request. The network station is identified as being inactive only if this access/control request also fails. In the case of a UPnP network, the search request is made using the unprotected SSDP protocol, so that the lack of any response to the search request does not in its own right reliably indicate that the network station has logged off. The supposition that the network station which did not respond to the search request is inactive is confirmed by means of the HTTP access, which takes place on an error-protected basis.08-20-2009
20090204706BEHAVIORAL NETWORKING SYSTEMS AND METHODS FOR FACILITATING DELIVERY OF TARGETED CONTENT - A method of providing targeted content includes obtaining behavioral information from client devices or client device users in a networked environment, and causing content (e.g., advertising) to be selected and delivered to a client device based on behavioral information. According to the method, a plurality of service providers each participate in monitoring network activities of client devices that connect to a network through such service providers. Information derived from the network activities is collected and rules are applied to the information to identify a user to receive the targeted content. The targeted content is thereupon provided to a client device associated with the identified user.08-13-2009
20090204705On Demand File Virtualization for Server Configuration Management with Limited Interruption - Inserting a file virtualization appliance into a storage network involves configuring a global namespace of a virtualization appliance to match a global namespace exported by a distributed filesystem (DFS) server and updating the distributed filesystem server to redirect client requests associated with the global namespace to the virtualization appliance. Removing the file virtualization appliance involves sending a global namespace from the virtualization appliance to the distributed filesystem server and configuring the virtualization appliance to not respond to any new client connection requests received by the virtualization appliance.08-13-2009
20090240802METHOD AND APPARATUS FOR SELF TUNING NETWORK STACK - A method and apparatus for tuning a computer network by detecting different workload patterns. One embodiment of the method provides a system configuration analyzer to collect data regarding network configuration and tuning parameters, a workload analyzer to collect and store data relating to tuning such as network traffic information, a system tuner to determine whether there is a change in workload and whether tuning is necessary. Another embodiment of the method provides tuning policies that would instruct the system tuner to perform certain actions if the system tuner determines that tuning is necessary.09-24-2009
20090259743DYNAMICALLY CALCULATING AN INBOUND BLOCKING FACTOR USING OPERATING-SYSTEM-LEVEL CONDITIONS - A current value of a changing operating-system-level condition can be determined, wherein the operating-system level condition is a condition of a host related to an operating system resource utilization or an operating system experienced latency. The operating-system level condition can be a condition of a layer of the OSI model above the Data Link Layer. An inbound blocking factor algorithm can execute that uses the determined current value as a variable. A value for an inbound blocking factor can be generated as a result of executing the inbound blocking factor algorithm. The generated value can be utilized as the inbound blocking factor to determine a manner in which incoming messages are to be conveyed from a network adaptor, through an adaptor interface boundary, to an operating system of the host.10-15-2009
20090259751METHODS AND APPARATUS FOR MONITORING AND/OR CONTROL OF PROCESS CONTROL APPARATUS - A system for process control comprises a server digital data processor and a client digital data processor that are coupled by a network, such as the Internet or an Intranet. The server digital data processor, which is additionally coupled to a control/sensing device and any associated interface equipment (collectively, referred to as “process control apparatus”), includes a command processor that transfers information between the network and the process control apparatus. The client digital data processor includes an information client (e.g., a so-called Internet web browser) capable of requesting and receiving an applet from the server digital data processor. The information client, further, defines a hardware-independent and operating system-independent virtual machine environment within the client digital data processor. The client digital data processor executes, within that virtual machine environment, an applet for configuring the client digital data processor as a “process controller” that establishes communications over the network with the command processor and that monitors and/or controls the process control apparatus via those communications.10-15-2009
20080320132METHOD FOR COMMUNICATION WITH INTERCEPTION OF CONTROL MESSAGES - A connection-oriented communication method between at least two communicating entities, to with a sending entity and a recipient entity connected via a telecommunication network said method comprising the following steps: 12-25-2008
20080320127SECURE PUBLISHING OF DATA TO DMZ USING VIRTUAL HARD DRIVES - A secure DMZ-resident computer that cannot connect to the internal network while allowing data to be transferred to and from the DMZ-resident computer is disclosed. The mechanism may include the transference of virtual hard disk files between the internal network and the DMZ host computer. The DMZ host computer may be configured with two network interface cards (“NICs”). One NIC may be connected to the DMZ network. The other NIC may be connected to the internal network. The virtual machines are connected only to the DMZ NIC. The physical host communicates only with the internal network NIC. When it is necessary to publish data to the DMZ-resident computer, a virtual hard disk file may be copied to the DMZ host over the internal network NIC. The DMZ resident virtual computer simply detects the presence of the new drive and mounts it.12-25-2008
20090265457COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, AND DISPLAY METHOD FOR THE SAME - The device configuration of a communication system capable of wireless data communication between a plurality of terminal apparatuses is confirmed, together with the operating condition of each of the terminal apparatuses and the channel condition of wireless data communication. Whether a service that can be provided as a communication system is executable is identifiably displayed on a display based on the confirmation results.10-22-2009
20100274894Router Method And System - A method and system for operating a virtual router system. A system health index for each of a plurality of physical routers in a virtual router system is determined, and virtual router operation for the physical routers is suspended in response to the system health index.10-28-2010
20100274888GENERATING A SUMMARY OF USERS THAT HAVE ACCESSED A RESOURCE - Information relating to monitored communications between user machines and a resource of a particular machine is received. Group information that identifies groups of the users is received. Based on the monitored communications and the group information, a summary of a subset of users that have accessed the resource is generated.10-28-2010
20120036255Network Centric Structured Communications Network - The present invention is a network centric management and communications system and method enabling users with commitments to communicate, manage, notify, assign, link, and/or collaborate with other users. The system includes a database storing one or more user accounts corresponding to nodes on a network, user accounts connected by interdependencies forming social connections between individual users having responsibilities and structuring communications via dependency links between interdependent users. The system includes a data server, receiving responsibility data comprising requirements data for creating interdependencies, transmitting assigned commitments, and updating responsibility data. The system further includes a communications link to provide status updates and/or notifications of responsibilities to affected users regarding their status that appropriate corrective action may be taken before one or more commitments to requirements are broken, wherein one or more commitments of a responsibility are modified and/or updated. The system can host multiple projects simultaneously in the data server.02-09-2012
20120131178Multimedia Aware Cloud for Mobile Device Computing - Techniques for configuring and operating a multimedia aware cloud, particularly configured for mobile device computing, are described herein. In some instances, clusters of servers are organized for general computing, graphic computing and data storage. A load balancing server may be configured to: identify multimedia types currently being processed within the multimedia edge cloud; determine desired quality of service levels for each identified multimedia type; evaluate individual abilities of devices communicating with the multimedia edge cloud; and assess bandwidth of each network over which the multimedia edge cloud communicates with a mobile device. With that information, multimedia data may be adapted accordingly, to result in an acceptable quality of service level when delivered to a specific mobile device. In one example of the techniques, graphic computing server clusters may be configured to process workload using a configuration that includes elements of both parallel and serial computing.05-24-2012
20090254657Adaptive Bitrate Management for Streaming Media Over Packet Networks - A method including providing pseudo-streaming media data to a terminal; receiving a transport control protocol (TCP) acknowledgement from the terminal; estimating one or more network conditions of a network based at least in part on the TCP acknowledgement; determining an optimal session bitrate based on the estimated one or more network conditions; and providing pseudo-streaming media data to the terminal based on the optimal session bitrate.10-08-2009
20090254652RESOURCE CORRELATION PREDICTION - Embodiments of the present invention address deficiencies of the art in respect to resource mapping in a change configuration and systems monitoring solution and provide a novel and non-obvious method, system and computer program product for predictively mapping automatically discovered resources in a monitored system with a manually specified resource for the monitored system. In an embodiment of the invention, a resource mapping method for application dependency and discovery can be provided. The method can include automatically discovering resources in a monitored system, manually specifying a resource in the monitored system, filtering the automatically discovered resources to a set of resources likely to match the manually specified resource, and mapping the manually specified resource to a resource in the filtered set of resources.10-08-2009
20090254651VERIFYING A LAWFUL INTERCEPTION SYSTEM - Methods, systems, and computer-readable media provide for verifying a lawful interception system. A first file and a second file are received. The first file is formed by recording data traffic at a computer as the data traffic generated at the computer is transmitted from the computer to a remote network via a broadband remote access server (BRAS), saving the recorded data traffic as a first packet capture and flat file export (PCAP) file, and exporting packet summary lines from the first PCAP file. The second file is formed by intercepting the data traffic as the data traffic egresses from a mediation system to a law enforcement agency (LEA) system, saving the intercepted data traffic as a second PCAP file, and exporting packet summary lines from the second PCAP file. The first file is compared with the second file to verify an accuracy of the mediation system10-08-2009
20090254649HIGH AVAILABILITY OF INTERNET PROTOCOL ADDRESSES WITHIN A CLUSTER - A method, information processing system, and computer program storage product manage network layer addresses in a cluster multi-processing environment. Network address assignment in a cluster multi-processing environment is monitored. A network address currently assigned to a first network interface is determined, in response to monitoring network address assignment, to have been assigned to a second network interface. The first network interface is triggered to send an update message to at least one computing node communicatively coupled to the first network interface triggering in response to determining that a network address currently assigned to a first network interface has been assigned to a second network interface. The update message informs the computing node to transmit data associated with the network address to the first network interface.10-08-2009
20090248854METHOD AND SYSTEM FOR ENERGY EFFICIENT ROUTING AND NETWORK SERVICES - A method and system of an embodiment may include identifying a power source used by a network element, determining a carbon footprint of a unit of power usage from the power source, identifying one or more components associated with the network element used for a network operation performed by the network element, determining the power usage of the one or more identified components during the process, and calculating the carbon footprint of the process performed by the network element.10-01-2009
20090248855METHOD FOR MONITORING WEB PAGE STATISTICS - A method includes, at a web server: receiving a request from a web browser for a page; requesting the page from a web application; receiving the requested page from the web application; generating a monitoring script after receiving the request from the web browser for the page, wherein the monitoring script is hardcoded with a reference to the web application; adding the generated monitoring script to the page; sending the page with the script to the web browser, the script executing on a system hosting the web browser for generating statistics; receiving the statistics generated by the script; receiving the reference to the web application with the statistics; and storing the statistics and the reference and an association of the reference with the statistics.10-01-2009
20090265459PROVIDING APPARATUS OF SERVICE INFORMATION AND PROVIDING METHOD THEREOF - A providing apparatus of service information provided over a network collects service information and/or service components provided over a network and is triggered by setting of a scenario (such as content such as a combination of service components or service information) to extract available service components for the scenario from the service information or the service components to generate integrated service information with the use of the service components based on the scenario. A scenario and a policy (selection criteria of service components) are set and the service components conforming to the policy are selected to create the integrated service information based on the scenario.10-22-2009
20090248866CONNECTION CONTROL METHOD AND CONNECTION SYSTEM - A connection control method includes: a transmitting step of transmitting a request for provision of a function by a transmitting unit; a first storing step of storing a task involving information having a disclosure restriction set thereon, and the site of a support device that provides a function to support execution of the task by processing the information, the task being associated with the site of the support device; a first retrieving step of retrieving the site of the support device stored in the first storing step associated with the task to be supported in response to the request; and a controlling step of restricting connections with other devices by controlling the transmitting unit to transmit the request to the support device located at the site retrieved in the first retrieving step and not to transmit the request to the other devices when the request transmitted in the transmitting step is a request for a support for execution of the task.10-01-2009
20090248862Device and Computer Readable Medium - A device and a computer readable medium having a computer program stored thereon are provided. The device includes: a detecting unit configured to detect one or more host computers accessible from the device and operational states of the respective host computers; and a restricting unit configured to restrict a function of the device based on the operational states of the host computers detected by the detecting unit.10-01-2009
20090248857SESSION MANAGEMENT METHOD FOR COMPUTER SYSTEM - There is provided a session management method for a computer system including an initiator, and a storage system coupled to the initiator via a network. The initiator includes an interface coupled to the network, a processor and a memory. The storage system includes an interface coupled to the network, a memory and a processor. The session management method comprising the steps of: executing, by the initiator, health check for diagnosing a status of a session established between the initiator and the storage system in the case of which no data is input/output to/from the storage device for a first predetermined period; and cutting off and re-establishing, by the initiator, the session with the storage system at a timing of executing the health check in the case of which no data is input/output to/from the storage system for a second predetermined period.10-01-2009
20090248861DEVICE MANAGER AND DEVICE MANAGEMENT PROGRAM - A device manager and a computer readable medium storing a device management program are provided. The device manager includes a transmission unit that transmits, to devices connected to a network, a broadcast command which requests management information that is stored in and unique to each device for use in communication using a first communication protocol that enables communication using authenticated and encrypted data; a determination unit that determines whether the devices are devices to be managed, on the basis of the management information received in response to the broadcast command; and an information acquisition unit that transmits, using the first communication protocol, to the devices determined by the determination unit to be devices to be managed among the plurality of devices, read data for reading information about the device in order to acquire information about the device.10-01-2009
20090248859ELECTRONIC DEVICE AND METHOD FOR MONITORING COMMUNICATION WITHIN A NETWORK - The present invention relates to an electronic device (10-01-2009
20090248856Staged Integration Of Distributed System And Publishing Of Remote Services - A method, computer program product, and system for the staged integration of a remote entity and the simultaneous publishing of services is provided. The integration of the distributed remote entities is broken into five stages, with appropriate events published after each stage. Each of the five stages is initiated only if the previous stage completed successfully. The first stage is the initiate discovery phase. The first event is the discovery start event. The second stage is the discovery completed phase. The second event is the discovery completed event. The third stage is the basic software services verified phase. The third event is the basic software verification completed event. The fourth stage is the basic hardware services verified phase. The fourth event is the basic hardware verification completed event. The fifth stage is the extended hardware services verified phase. The fifth event is the full integration of disturbed entity event.10-01-2009
20090248852Evaluating Entities Associations with their Respective Environments - A method comprising representing an association between a first entity and a first environment as a first edge that connects a first node to a second node, wherein the first node and the second node respectively represent said first entity and said first environment; and assigning a first weight value or type to the first edge based on an association level detected between the first entity and the first environment.10-01-2009
20090248858CONTENT MANAGEMENT - A system and method for management and processing of resource requests is provided. A content delivery network service provider determines a class associated with a set of client computing devices and monitors resources requests for the determined class. The content delivery network service provider then identifies at least one cache component for providing additional content, such as advertisement content or other additional content provided in anticipation of future resource requests, to client computing devices as a function of the determined class. In other embodiments, instead of cache components, the content delivery network service provider identifies a second set of client computing devices as a function of the determined class for providing the additional content information.10-01-2009
20090248853REAL TIME CONTROL AND MANAGEMENT OF SECURITY "BUDDY" SYSTEM OVER MSO LAN - An inventive system and method for a buddy security system is presented. The system and method enable the buddy security system in which messages can be exchanged between two distinct security systems. The inventive system is operable on a network having dynamic IP addresses using a centralized database of real time IP addresses. An MSO maintains the centralized database including basic information for connecting the control panels of the security systems to each other. The first and second security systems each have a control panel having a dynamic IP address; the control panel of the second system provides information to and can be controlled by the control panel of the first system. The dynamically IP address of each control panel is obtained from the centralized database.10-01-2009
20090248850WAIT FOR READY STATE - Automation of actions on a server system (e.g., web server, FTP server) is facilitated by a server system that is ready for actions to be performed upon it. Because there are scenarios when a server system is not in a state to be acted upon (e.g., web page changed due to navigation, script execution, asynchronous request through dynamic web extensions), an automated action needs to be synchronized to when then server system is in a ready state for that action to occur. A wait-for-ready state can be initiated that detects when a server system is ready for a next action.10-01-2009
20100161783SOCKET CONNECTION-BASED PRINTER DISCOVERY METHOD USING A THREAD MANAGEMENT SCHEME - A targeted TCP socket connection-based printer discovery method is disclosed. It does not use network broadcasts; rather, single packets are sent to each IP address. A multi-threaded method is implemented so that each child thread attempts a TCP socket connection with one IP address, and multiple child threads executes simultaneously. If a connection is successful, the child thread records the corresponding IP address in a local record table. After all child threads exits, the parent thread examines each IP address in the local record table to determine whether the IP address is a supported printer not already in the discovered printer list, and adds the IP address to the discovered printer list if appropriate. Alternatively, the steps of determining whether the IP address is supported printer not already in the discovered printer list may be performed by the child threads.06-24-2010
20100161795APPARATUS AND METHOD FOR MULTI-USER NAT SESSION IDENTIFICATION AND TRACKING - A method and apparatus are provided for identifying and tracking multiple computer user sessions associated with a network address translation (NAT) device coupled to a computer network. Data packets originating from the NAT device containing a request to a destination server coupled to the computer network are received. A client source address associated with the data packets is determined where the source address associated with the NAT device. One or more session entries associated with the client source address can then be determined, wherein the session entries are stored in system state information. A session signature can then be determined based one or more characteristics defined by the data packet header information and/or request header information in the one or more data packets, the session signature uniquely identifying one of the multiple computer user sessions coupled to the NAT device.06-24-2010
20090276521JUDICIAL MONITORING ON PEER-TO-PEER NETWORKS - The invention relates to a procedure for judicial monitoring in peer-to-peer networks, in which participants to be monitored are marked, and in which furthermore upon setting up a peer-to-peer communication with a marked participant the connection is diverted via a monitoring server and access to the communication data takes place with an appropriate monitoring server service. This realizes the requirement for judicial monitoring in a simple way.11-05-2009
20100153548METHOD AND SYSTEM FOR TRACKING SCREEN ACTIVITIES - Techniques to facilitate a system to capture, process, and archive a series of user interactive events and subsequently retrieve the stored user interactive events are disclosed. The captured information is indexed and stored for future access either on a terminal device or an accessible remote server device.06-17-2010
20080307089COMPUTER NETWORK SOFTWARE AND HARDWARE EVENT MONITORING AND REPORTING SYSTEM AND METHOD - A method, system, and network for providing a method, system, and network, for network and device event monitoring and reporting. The disclosed subject matter associates with a host computer, a local network of information technology devices, a community of network users, and a global information technology community. The present disclosure initiates an inventory of a plurality of information technology devices associated with a local network of information technology devices. The method, system and apparatus determine change in the operational status of the plurality of the information technology devices associated with the local network. Then, the present disclosure monitors for changes in the operational status of the plurality of the information technology devices associated with the local network. The disclosed subject matter then presents to the host computer information relating changes in the operational status of the information technology devices associated with the local network. The present method and system associate changes to the operational status with a plurality of products from a set of product vendors, and those changes to the operational status with a plurality of advertisements presented in association with plurality of products.12-11-2008
20090276516DOWNLOAD AND DATA TRANSFER GAMING SYSTEM - A download and data transfer gaming system utilizes a hybrid peer-to-peer, segmented file distribution protocol to vastly improve the download capabilities of a gaming system by improving the upload cost burdened by the download host. The system redistributes this cost to the download clients by allowing clients on the gaming system to upload pieces of a file to each other. This system is much more redundant by eliminating the possibility of a client missing a download broadcast. The system alleviates this possibility of missing packets and bad data integrity by using SHA-1 verification of the file pieces. The benefits of the improved bandwidth capabilities enable the download of much larger files, thus enhancing the game play experience.11-05-2009
20100161785METHOD AND SYSTEM FOR MINING WEBSITES - One website mining embodiment is for characterizing first time users of a website, collecting user session data of the users visiting the website and identifying first time visitors, determining features of the first time visitors utilizing the user session data, determining rules utilizing the features of the first time visitors, monitoring actions of the first time visitors on the website, updating the rules utilizing the monitored actions of the first time visitors and recommending web content utilizing the rules to the first time visitor.06-24-2010
20100161791SYSTEM AND METHOD FOR SAMPLING NETWORK TRAFFIC - Disclosed herein are systems, computer-implemented methods, and computer-readable media for sampling network traffic. The method includes receiving a plurality of flow records, calculating a hash for each flow record based on one or more invariant part of a respective flow, generating a quasi-random number from the calculated hash for each respective flow record, and sampling flow records having a quasi-random number below a probability P. Invariant parts of flow records include destination IP address, source IP address, TCP/UDP port numbers, TCP flags, and network protocol. A plurality of routers can uniformly calculate hashes for flow records. Each router in a plurality of routers can generate a same quasi-random number for each respective flow record and uses different values for probability P. The probability P can depend on a flow size. The method can divide the quasi-random number by a maximum possible hash value.06-24-2010
20100161794MAINTAINING CLOSED SUBSCRIBER GROUP INFORMATION FOR ACCESS CONTROL - Information is maintained to assist in determining whether an access terminal is allowed to establish communication with an access point associated with a closed subscriber group (CSG). For example, CSG subscription information for visiting access terminals may be maintained at a local server. In this way, a network may use the locally stored CSG subscription information for a given access terminal to determine whether to allow that access terminal to access an access point in the network. In addition, multiple CSG lists may be maintained at an access terminal. For example, an access terminal may maintain a first list that is updateable by an operator and a second list that is updateable by a user. Here, the updating of one list may be based on a change in the other list.06-24-2010
20100161792Alternate media identification/selection based upon rendered media meta-data - A technique to identify and characterize meta-data associated with an original content that is being transferred from a source to a renderer in a home network, in which the original content is to be rendered by the renderer. Instead of making available for rendering the original content, an alternate content for delivery to the renderer is located, wherein the alternate content is identified by associating the alternate content to the original content via characterization of the meta-data. Then, the alternate content is rendered instead of the original content or rendered in addition to the original content.06-24-2010
20100161793METHOD FOR COMPOSING ON-CHIP NETWORK TOPOLOGY - A method for optimizing a binary tree includes: sequentially searching a binary tree having IP modules of an on-chip network as the lowermost child nodes in a direction from the lowermost node to the uppermost node, and checking whether or not a search target node has child nodes; if the search target node does not have a child node, directly obtaining a minimum solution of the search target node, while if the search target node has child nodes, obtaining the minimum solution of the search target node by using the minimum solutions of the child nodes; and if the search target node is an intermediate node, continuously searching the binary tree, and if the search target node is a root node, optimizing the binary tree by merging nodes of the binary tree according to the minimum solution.06-24-2010
20100161788MONITORING USER DEMOGRAPHICS WITHIN A VIRTUAL UNIVERSE - An invention that provides discovery and transfer of assets in a virtual universe is provided. In one embodiment, there is an asset transfer utility, including an inventory component configured to display to a user within a virtual universe an inventory containing a plurality of assets owned by other users within the virtual universe, each of the plurality of assets listed anonymously. A search component is configured to search the inventory containing the plurality of assets. A selection component is configured to select a set of assets from the plurality of assets based on the search. A transfer component is configured to transfer the set of assets between the user and an owner of each of the set of assets.06-24-2010
20100161789TECHNIQUES FOR GAUGING PERFORMANCE OF SERVICES - Techniques for gauging performance of services are provided. A client agent is configured to process on a client. The client agent simulates operations of a transaction as instructed by a server agent. The client agent also gathers metrics for each of the operations as they process on the client and passes the metrics back to the server agent. The server agent analyzes the metrics in accordance with a policy and takes one or more actions in response thereto.06-24-2010
20100161790Lawful Intercept for Multiple Simultaneous Broadband Sessions - Identifying information associated with a user under surveillance is received. A first intercept is provisioned on a first network element to intercept the data traffic according to the identifying information. A database is queried based on a login identifier associated with the user. A query result is received from the database. The query result may include a network element identifier and circuit information associate with the login identifier. A determination is made as to whether the network element identifier contained in the query result is the same as a network element identifier contained in information of record. In response to determining that the network element identifier contained in the query result is different from the network element identifier contained in the information of record, a second intercept is provisioned on a second network element to intercept the data traffic according to the network element identifier contained in the query result.06-24-2010
20130219060REMOTE ACCESS APPLIANCE HAVING MSS FUNCTIONALITY - A remote access appliance is disclosed for facilitating communications between a managed device and a user located remotely from the appliance and from the managed device. The appliance may have a processor adapted to facilitate the communication of keyboard, video and mouse information between the appliance and the managed device. A manageability subsystem may be incorporated for communicating with the managed device and collecting information concerning operation of the managed device, without the need to first transmit the information over a network.08-22-2013
20130219053METHOD FOR IMPROVED HANDLING OF INCIDENTS IN A NETWORK MONITORING SYSTEM - A method for operating a monitored telecommunications network, the telecommunications network management system being monitored by a network management system, the network management system processing alarm messages generated by monitoring components within the telecommunications network, incidents of technical failure or error within the telecommunications network resulting in the generation of the alarm messages by the monitoring components, includes: monitoring the telecommunications network, observed incidents of technical failure or error, and generated alarm messages during a preparatory period of time; determining a scaling parameter per type of alarm message, wherein the scaling parameter is related to the number of incident tickets generated during the preparatory period of time; and suppressing the generated alarm message based on the value of the scaling parameter associated to the type of the generated alarm message.08-22-2013
20130219056System and Method for Optimization of Network Delivery of Streaming Data - A system and method for optimizing network delivery of streaming data is provided. Streaming delivery of data using point-to-point transmitters and broadcast transmitters can be dynamically controlled to maximize the usage of network resources. Current usage of respective systems can be analyzed, as can projected usage be analyzed. Network resources can be reallocated, and connecting devices can be redirected as needed to maintain high efficiency of allocated resources.08-22-2013
20130219050CLOUD SERVICE ACCESS APPARATUS, CLOUD SERVICE ACCESS METHOD, AND CLOUD SERVICE ACCESS SYSTEM - A method for controlling a cloud file includes determining whether a scanning file corresponding to the cloud file is available, obtaining the scanning file from a virtual folder storage unit of a terminal, identifying a cloud plug module (CPM) corresponding to a cloud service in which the cloud file is stored based on the scanning file, and accessing the cloud service through the CPM. A cloud service access apparatus includes a cloud service access unit including a CPM, a virtual folder storage unit to store a scanning file associated with the CPM, and a control unit to determine whether the scanning file corresponds to a cloud file, to obtain the scanning file from a virtual folder storage unit, to identify the CPM corresponding to a cloud service storing the cloud file based on the scanning file, and to access the cloud service through the CPM.08-22-2013
20130219047DESKTOP CONTROL OF TRAFFIC TRANSMITTED TO A USER DEVICE - A system is configured to obtain information that identifies a first rate for first traffic associated with an object within a desktop associated with a user device and a second rate for second traffic associated with another object within the desktop; provide a virtual desktop based on the information; create a first zone, within the desktop, associated with the object; create a second zone, within the desktop, associated with the other object; compare the first rate and the second rate to a threshold; provide, via the virtual desktop, the first zone, having first appearance attributes, based on the first rate being greater than the threshold, and the second zone, having second appearance attributes, based on the second rate not being greater than the threshold; receive selection of the first zone; and output a request to control the first traffic based on the selection of the first zone.08-22-2013
20130219045KEEPALIVE MECHANISM TO MAINTAIN LINKS IN A LOSSY ENVIRONMENT - In one embodiment, a particular device determines a selected link from the particular device toward a root device in a computer network, wherein traffic destined away from the root device via the particular device utilizes the selected link in reverse. By monitoring a link quality of the selected link in reverse based on received traffic over the selected link, the particular device may determine whether the link quality is below a lower threshold. In response to the link quality being below the lower threshold, the particular device activates use of keepalive messages from the particular device over the selected link.08-22-2013
20130219044Correlating Execution Characteristics Across Components Of An Enterprise Application Hosted On Multiple Stacks - An aspect of the present invention provides for monitoring components of an enterprise application distributed across stacks. In an embodiment, a digital processing system receives a monitoring data indicating a first component and a second component of an enterprise application, with the monitoring data further indicating that the first component executes in a first stack and the second component executes in a second stack. The digital processing system collects execution characteristics of the two components and displays the collected execution characteristics of both the components. According to another aspect, the execution characteristics for both the components are displayed on a common user interface for a same time window, such that a user (e.g., an administrator of the enterprise application) is facilitated to correlate the execution characteristics of different components executing across multiple stacks.08-22-2013
20130219042MANAGING CLOUD SERVICES - A system, and computer program product for managing cloud services are provided in the illustrative embodiments. A first set of management functions is instantiated external to a microkernel of a management system for managing a set of cloud services. The management system further includes a second set of management functions executing within the kernel of the management system. A subset of the first set of management functions is associated with a cloud service in the set of cloud services. A management task for the cloud service is handled using the subset of the first set of management functions. A usage information corresponding to the use of the subset of the first set of management functions for handling the management task for the cloud service is reported.08-22-2013
20100185761SERVICE PROVIDER NODE, AND COMPUTER-READABLE RECORDING MEDIUM STORING SERVICE PROVIDER PROGRAM - A computer-readable recording medium storing a verification support program is provided. The computer-readable recording medium storing a service provider program that causes a computer to execute: providing a service through acceptance of a service request; establishing a process-to-process communications by waiting for a process to be a destination of the service; stopping provision of the service corresponding to the service request accepted by the providing after the process-to-process communications is established; transmitting, while the provision of the service is being stopped, information for use by the providing to provide the service, to the process by the process-to-process communications; and ending, after the information is completely transmitted by the transmitting, the acceptance of the service request by the providing.07-22-2010
20100262691INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE DEVICE, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM - An apparatus stores address information of a server and transmits information of an apparatus to the server at a regular interval. The apparatus, when shifting from a normal state to a power-saving state, keeps continued regular transmission, by notifying a network interface device of the stored address information and the information of the apparatus.10-14-2010
20100262689STAR NETWORK AND METHOD FOR PREVENTING A REPEATEDLY TRANSMISSION OF A CONTROL SYMBOL IN SUCH A STAR NETWORK - A star network (10-14-2010
20090055528Method for Providing Status Information to a Device Attached to an Information Infrastructure - A method for providing status information to a device on a computer network is disclosed. Data initiated by a communication initiation device within a computer network are monitored by a device. A determination is made by a device monitoring application within the device whether or not the data includes a message signature. In response to the data includes a message signature, a status message is generated and sent to a system administrator for the computer network.02-26-2009
20090055522WEBSITE LOAD TESTING USING A PLURALITY OF REMOTELY OPERATING AGENTS DISTRIBUTED OVER A WIDE AREA - Website load testing using agents is disclosed. An address of a website and a window of time in which to perform a load test are received. The address and the window of time are distributed to a plurality of remotely operating agents, distributed over a wide area. Each agent in the plurality is to access the website at the received address during the window of time to load test the website. Data from the plurality of agents is received upon passage of the window of time, describing a load placed upon the website by the plurality of agents. The received data describing the load placed upon the website is presented. Alternatively, a script may be used to load test a website, the script a series of commands to be executed across the website as a simulation of a transaction, the script to be executed in the window of time.02-26-2009
20100191848INFORMATION SHARING METHOD BETWEEN NEIGHBORING NODES, NODE AND INFORMATION SHARING PROGRAM - A load caused by an information sharing message in an upper layer is reduced.07-29-2010
20100191846Verifiable service policy inplementation for intermediate networking devices - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, an intermediate networking device acts as a service intermediary or intermediate connection between a network and one or more communications devices; implements a service policy set for assisting control of the intermediate networking device use of a service set on the network, the service policy set including one or more service policies associated with the intermediate networking device or one or more communications devices connected to the intermediate networking device, the service set being one or more network services used by the intermediate networking device or one or more communications devices; and monitors use of the service set based on the first service policy set, in which the implementation of the service policy set is verified.07-29-2010
20120198057METHODS AND APPARATUS FOR IDENTIFYING THE IMPACT OF CHANGES IN COMPUTER NETWORKS - The impact of device configuration changes on operational issues and policy compliance in a computer network can be discerned from a visual data presentation that jointly shows representations of changes, issues, and policy compliance in a common view for a group of network devices. Configuration information is collected from devices in the computer network and processed to determine whether a change has occurred in a configuration of any of the devices, whether any operational issues exist for each of the devices, and whether any of the devices are not in compliance with any applicable operational policies. A display device displays the visual data presentation to allow an operator to see trends and relationships between device configuration changes and operational issues and incidents of policy non-compliance. The visual data presentation can be depicted as a graphical timeline view, a network topology view, or a table view of the information.08-02-2012
20080215730Method and system for providing on-demand content delivery for an origin server - An infrastructure “insurance” mechanism enables a Web site to fail over to a content delivery network (CDN) upon a given occurrence at the site. Upon such occurrence, at least some portion of the site's content is served preferentially from the CDN so that end users that desire the content can still get it, even if the content is not then available from the origin site. In operation, content requests are serviced from the site in the usual manner, e.g., by resolving DNS queries to the site's IP address, until detection of the given occurrence. Thereafter, DNS queries are managed by a CDN dynamic DNS-based request routing mechanism so that such queries are resolved to optimal CDN edge servers. After the event that caused the occurrence has passed, control of the site's DNS may be returned from the CDN back to the origin server's DNS mechanism.09-04-2008
20080215723RELAY SYSTEM, RELAY PROGRAM, AND RELAY METHOD - A technique is provided to dynamically change priority, according to content of communication data, when the communication data is relayed between a client device and a host device. A communication gateway (09-04-2008
20080215721COMMUNICATION MONITORING SYSTEM, COMMUNICATION MONITORING APPARATUS AND COMMUNICATION CONTROL APPARATUS - A communication monitoring apparatus for monitoring communication data which are transmitted among a plurality of nodes on a network, includes a detecting section for detecting whether or not a shellcode is included in communication data transmitted and received between at least two nodes within the plurality of nodes and a storing section for storing communication data transmitted from the two nodes as being starting points during a predetermined time, when the detecting section detected the shellcode in communication data.09-04-2008
20090089417DIALOGUE ANALYZER CONFIGURED TO IDENTIFY PREDATORY BEHAVIOR - A dialogue analyzer configured to identify online communications relating to lewd, predatory, hostile, and/or otherwise inappropriate subject matter is disclosed. Identified communications include those occurring via social networks, instant messaging, online chat rooms, computer in-game chat, email and the like. The communications of a monitored computer user are scanned to identify those communications that match predetermined lexical rules. The rules comprise sets of word-concepts that may be associated based on spelling, sound, meaning, appearance or probability of appearance in a text string, etc. Various numbers and configurations of word concepts may be implemented in a rule in order to more accurately scan the online communication data for a potential match. When a match is found, a copy of the communication, along with contextual information, is presented to a parent or guardian user. This information is presented at a central website and via an email notification to the parent or guardian. Various embodiments are described.04-02-2009
20090300165Message Monitor, Analyzer, Recorder and Viewer in a Publisher-Subscriber Environment - A method of performing a sequence-of-events analysis in a power monitoring system includes the acts of monitoring, receiving, analyzing, and storing. The act of monitoring includes monitoring messages published by multiple power monitors over a peer-to-peer communications network. The messages include electrical power monitoring parameters. The act of receiving includes receiving the published messages in a subscriber intelligent electronic device in the power monitoring system. The act of analyzing includes analyzing at least a portion of the received messages, performing statistical analysis and/or continuously scanning for an event of interest. The act of storing includes storing at least one record including at least one of statistical data or event of interest data.12-03-2009
20100185762ABNORMAL POINT LOCATING APPARATUS, METHOD, AND STORAGE MEDIUM - An abnormal point locating method includes: a link primary abnormality judgment procedure that acquires information on a link through which each observation flow passes, locates a link through which an observation flow observed at an observation point passes, and judges whether the located link is normal or abnormal based on the observation flow; and a link secondary abnormality judgment procedure that judges a probability of abnormality based on a result of the link primary abnormality judgment procedure by using a connection relationship as seen from each observation point.07-22-2010
20100262692Recommendation of network object information to user - Recommending network object information to a user includes, for each of a plurality of network objects, a respective plurality of behavior frequencies by the user is determined; a network object among the plurality of network objects that is of interest to the user is identified, the identification being based at least in part on the respective plurality of behavior frequencies that corresponds to each of the plurality of network objects; and additional information relating to the identified network object is provided to the user.10-14-2010
20100191847Simplified service network architecture - Various embodiments are disclosed for a services policy communication system and method. In some embodiments, a network device collects a plurality of service usage measurements for a communications device use of a service on a network; and compares the plurality of service usage measurements to a device assisted implementation of a service policy to verify the device assisted implementation of the service policy.07-29-2010
20100191845SPECULATIVE VIRTUAL MACHINE RESOURCE SCHEDULING - A speculative virtual machine (“VM”) resource scheduler for a VM that is hosted by a primary host server initiates the creation of at least one duplicate VM on a secondary host server. The VM and the duplicate VM are run substantially in lockstep while the scheduler monitors resources on the primary host server and the secondary host server. The scheduler then determines an advantageous host server among the primary host server and the secondary host server and, based at least in part on the determination, initiates the powering down of either the VM on the primary host server or the duplicate VM on the secondary host server.07-29-2010
20100191844CLUSTER-BASED FRIEND SUGGESTION AGGREGATOR - Techniques are described to generate a list of suggested friends for a client of a social networking service. In an implementation, a cluster of clients is identified from among the clients of the social networking service. The cluster of clients includes the client for which the list of suggested friends is to be generated. The list of suggested friends for the client may then be generated and may include one or more clients of the social networking service selected based on connections with the cluster of clients. The list indicates at least one other client of the social networking service that is suggested as a friend.07-29-2010
20100153545METHOD OF ASSIGNING SERVICE AND INFORMATION PROCESSING APPARATUS FOR IMPLEMENTING THE METHOD - To provide a method for assigning a service wherein power consumption can be reduced, and an information processing apparatus for implementing the method. The method includes: receiving a request of a service provided by a device connected to a network; checking whether or not a device providing the requested service is in a sleep state; selecting a device to be used based on the checked sleep state of the device, a service table that stores a combination of a service provided via the network and a device connected to the network and providing the service, and a power consumption table that stores a device connected to the network and power consumption of the device, under conditions of a time until the service is provided and power consumption; and issuing an instruction of providing the service to the selected device.06-17-2010
20090300166MECHANISM FOR ADAPTIVE PROFILING FOR PERFORMANCE ANALYSIS - Adaptive profiling for performance analysis of a computer system controls one or more agents to monitor a plurality of events occurring in a target computer system based on an adaptive logic. Collected data may be filtered and analyzed to determine one or more contributor events that attribute to performance of the target computer system. One or more patterns are observed or detected in said collected data, behavior of said one or more agents are adjusted based on said detected one or more patterns. The adaptive logic may be further reconfigured based on said detected one or more patterns.12-03-2009
20090300162System and method for performing mobile services, in particular push services in a wireless communication - An intermediate component is intermediate between mobile terminals requesting a service, such as a push service, and a service-providing server, such as an HTTP server. The intermediate component is a connection machine or hub that is able to open a session the first time it receives a request from a mobile terminal, by instantiating a communication channel for performing the communications with the mobile terminal and storing the data regarding the open session in a connection table. Then, the connection hub generates a request to a service-providing server, including connection data, and manages the communication with the service-providing server. The connection data are inserted in every communication between the connection hub and the mobile terminal and between the connection hub and the service-providing server. From that moment on, all the data (messages, requests) exchanged between the terminal and the service-providing server are routed on the instantiated channel, thus in a fast and efficient way.12-03-2009
20090300161Method and system for using feedback in accessing network services - A method and system for providing or utilizing feedback information in accessing network services. In one embodiment, a client requests a set of one or more service locations for service providers from a directory service. The directory service provides the set. The client then selects a service provider and initiates a transaction. Feedback data regarding the transaction is then collected for use in providing or selecting service providers, or in improving the directory service processes.12-03-2009
20100223380Session Monitoring Method, Apparatus, and System Based on Multicast Technologies - A session monitoring method based on multicast technologies is disclosed. The method includes: obtaining information about members of a multicast group that can be joined by a user in a session, wherein the session between a network and a member of the multicast group in the session is in an alive state; and checking whether the information about the members of the multicast group in the session includes user information corresponding to the user; if the member information includes the user information corresponding to the user, determining that the session between the network and the user as the member of the multicast group in the session is alive. A session monitoring apparatus, a session monitoring system, and an Access Node (AN) based on multicast technologies are also disclosed.09-02-2010
20100223376METHODS AND APPARATUS FOR PROCESSING DISCOVERY SIGNALS AND/OR CONTROLLING ALERT GENERATION - Methods and apparatus for processing discovery signals and/or generating alerts based on received discovery signals are described. In at least some embodiments, alert signal generation is performed on a selective basis in response to received discovery signals. In at least some embodiments a user is given at least some control over alert generation with the user being able to indicate types of signals which should not trigger generation of an alert, the minimum permitted frequency of particular alerts or types of alerts and/or time or location constraints which are considered when a device determines whether or not to generate an alert in response to a received discovery signal. While user control of discovery signal processing and alert generation are provided, automatic control or adjustment of discovery signal processing and alert generation may also be implemented or the automatic control may be implemented as an alternative to the user control.09-02-2010
20100217860SYSTEMS AND METHODS FOR SINGLE SESSION MANAGEMENT IN LOAD BALANCED APPLICATION SERVER CLUSTERS - Aspects of the invention pertain to user session management in load balanced clusters. Multiple application servers communicate with a central data server to ensure there is a single session per user ID. The central data server maintains a user session index and a parameter table. Each time a network access is attempted using a given user ID, a load balancer assigns the session to one of the application servers. The assigned application server queries the central data server to determine whether a session status for the user's login ID is inactive or active. If inactive, a new, unique value is assigned as the session number. If active, the session number is evaluated to determine whether multiple sessions exist. In this case, one of the sessions is terminated to ensure a single session per user ID. Preferably, the terminated session is the earlier session.08-26-2010
20100228851Aggregating and Reporting of Performance Data Across Multiple Applications and Networks - This description provides tools and techniques for aggregating and reporting of performance data across multiple applications and networks. These tools may provide apparatus for transforming visible characteristics of a graphical user interface. The graphical user interface may include representations of different physical networks, and may include representations of status indicators, with the representations of the physical networks being associated with one or more corresponding status indicators. These status indicators may represent respective performance levels computed for the different physical networks. More specifically, the performance levels relate to components of the physical networks or applications running on the physical networks. The graphical user interface may also respond to changes in the performance levels that are computed for the physical networks, to transform the status indicators that are associated with the physical networks09-09-2010
20100228853CLUSTER-FREE TECHNIQUES FOR ENABLING A DIRECTORY PROTOCOL-BASED DOMAIN NAME SYSTEM (DNS) SERVICE FOR HIGH AVAILABILITY - Cluster-free techniques for enabling a directory protocol-based Domain Name System (DNS) service for high availability are presented. A DNS service monitors a node for wild-carded IP address that migrate to the node when a primary node fails to service DNS requests for a directory of the network. The DNS service forwards the wild-carded IP address to a distributed directory service for resolution and uses the distributed directory service to dynamically configure the DNS service for directly handling subsequent DNS requests made to the directory over the network while the primary node remains inoperable over the network.09-09-2010
20100250735MONITORING AN ENTERPRISE NETWORK FOR DETERMINING SPECIFIED COMPUTING DEVICE USAGE - Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. More specifically, embodiments relate to monitoring or otherwise “watching” the online and/or offline activity of specified computing devices in an enterprise wide electronic discovery system. By determining when a computing device is online/offline and notifying a requesting party of the online/offline status, the requesting party knows when the specified device is available for electronic discovery functions, such as collecting data from the computing device or the like. The monitoring application of the present invention eliminates the need for the requesting party to wait for prolonged periods of time for a computing device to come online or to randomly attempt to find a computing device on line.09-30-2010
20100217862SUPPLYING NOTIFICATIONS RELATED TO SUPPLY AND CONSUMPTION OF USER CONTEXT DATA - Techniques are described for providing information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a module a request related to the modeling of the current state with the multiple state attributes. In such situations, the providing further includes, without further intervention related to the request by the module, determining that the request cannot currently be satisfied, and indicating to the module that the request cannot currently be satisfied, monitoring at later times after the indicating to determine whether the request can be satisfied, and indicating to the module that the request can be satisfied if it is determined at one of the later times that the request can currently be satisfied.08-26-2010
20100185760Overlay network traffic detection, monitoring, and control - An overlay network traffic detection system deploys traffic measurement units at multiple points on a network, creates profiles of the network traffic measured at each point, and then compiles the traffic profiles obtained at different points. The compiled profile of outbound traffic originating at a node is compared with the compiled profile of inbound traffic addressed to the same node. A strong correlation between the two profiles indicates that the node is relaying overlay network traffic. Further information can be gained by profile screening, by active interference in the traffic flow, by launching known information into the network at known times and observing its effect on the traffic profiles, and by observing keyword distributions in non-encrypted traffic.07-22-2010
20120246291Filtering and Promoting Application Store Applications - Techniques for filtering and promoting application store applications are described that can be employed to provide filtered application information and/or application promotions to client devices. The filtering and promoting can be based at least in part upon system information that describes configurations and capabilities of the client devices. In one or more embodiments, various system information for a client device is detected. The detected system information for the client device is used to filter application data in an application catalog. Page information to be provided to the client device for interaction with the application catalog is then ascertained using the filtered application data. The page information is sufficient to enable the client device to render targeted application store pages having filtered application information and/or promotions that are selected based on the detected system information.09-27-2012
20120246294SYSTEM AND METHOD OF SELECTING DEVICES TO COMMUNICATE WITH A NODE IN A COMMUNICATION NETWORK - The disclosure recites a system and method for selecting a client device for a server device managing communications for a wireless network. The method comprises: identifying a set of wireless devices that are communicating in the network; and identifying a set of client of devices in the set of wireless devices to communicate with the network through the server device by evaluating network communication characteristics of members in the set.09-27-2012
20120246297AGENT BASED MONITORING FOR SAAS IT SERVICE MANAGEMENT - An apparatus for agent based monitoring software-as-a-service information technology service management. Proxy clients are installed on network equipment devices belonging to a customer. Each proxy client includes discovery module(s) to discover network equipment devices on at least one private network of the customer, a discovery reporting module to transmit information identifying the devices discovered by the discovery modules to a server using web services, and monitoring module that monitors network equipment device(s) according to monitoring definition(s) configured by the customer to collect information of those network equipment devices, receives monitored information from monitoring agents installed on different network equipment devices, and transmits the information collected and the received monitored information to the server using web services. Each of the monitoring definitions identifies which of the network equipment devices to monitor and defines parameter(s) of the monitoring.09-27-2012
20120198061User Interest and Identity Control on Internet - The present invention relates to a solution for handling customer activity when connecting to a wireless communication network and in particular for statistics of customer activity using the network. This is provided in a number of aspects such as methods, node, and system for reporting user profile statistics from deep packet inspection of data packets in a packet data network (08-02-2012
20120198059WEB PAGE PERFORMANCE SCORING - A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors.08-02-2012
20120198046MOBILE DEVICE BANDWIDTH THROTTLING - System and methods for managing communications related to telecommunications-based devices are provided. Gateway computing devices corresponding to a radio communication network can modify the policies associated with telecommunications-based devices as a function of the usage of the radio communication network. The modification of the policies corresponds to monitoring of telecommunications-based device data usage and comparing the monitored data usage with data usage thresholds. The modification of the policies can also correspond to monitoring telecommunications-based device data usage and adjusting data usage quotas. The resulting modification can limit the throughput of data, prevent additional data requests, or modify different aspect of the data communications via the radio communication network.08-02-2012
20120246300ANALYZING APPARATUS, METHOD, SYSTEM, AND RECORDING MEDIUM OF PROGRAM - An analyzing apparatus including includes a memory and a processor that executes a procedure, the procedure including controlling the memory to store logs of communication between a first apparatus and a second apparatus, and logs of communication between the second apparatus and a third apparatus, and extracting logs indicating a pair of a first request and a first response corresponding to the first request, communicated between the second apparatus and the third apparatus within a time range from transmission of a second request, transmitted from the first apparatus to the second apparatus, to transmission of a second response corresponding to the second request, transmitted from the second apparatus to the first apparatus, from among the logs stored in the memory.09-27-2012
20120246301APPARATUS AND METHOD FOR MANAGING PEER-TO-PEER CONNECTIONS BETWEEN DIFFERENT SERVICE PROVIDERS - In one embodiment of the invention, service providers generate bloom filters with the user ID codes of registered users and exchange the bloom filters with one another. In response to a request to locate a first user, a first service provider will query its own registration database to determine if the first user is registered with the first service provider. If the first user is not registered with the first service provider, then the first service provider will query its bloom filters to identify other service providers with which the first user may be registered. A positive response from a bloom filter indicates that the first user may or may not be registered with the service provider associated with that bloom filter, and a negative response indicates with certainty that the first user is not registered with the service provider associated with that bloom filter.09-27-2012
20120246303LOG COLLECTION, STRUCTURING AND PROCESSING - Tools for use in obtaining useful information from processed log messages generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). The log messages may be processed by one or more processing engines (e.g., “log managers”) using any appropriate rule base to identify “events” (i.e., log messages of somewhat heightened importance), and one or more “event managers” may analyze the events to determine whether alarms should be generated therefrom. The tools may be accessed via any appropriate user interface of a console that is in communication with the various log managers, event managers, etc., to perform numerous tasks in relation to logs, events and alarms.09-27-2012
20120246305SYSTEM AND METHOD FOR MANAGEMENT OF COTS DEVICES IN MANAGED NETWORKS BASED ON DEVICE AUTO-DETECTION - A system and method for managing COTS devices based on device auto-detection and identification is provided. A network device on a managed network is identified, wherein the network device is identified as a one of a list of one or more network device types supported by the managed network and included in one or more configuration files, and wherein the one or more configuration files further include a list of one or more respective SNMP variables to be monitored for each of the network device types. The respective listing of SNMP variables to be monitored and/or configured is extracted from the one or more configuration files for the identified network device type. A request is then generated to monitor and/or configure the extracted SNMP variables to be monitored for the network device.09-27-2012
20100250738INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD,AND STORAGE MEDIUM - An apparatus configured to perform a search via communications excluding unicast and to use a registration function for searching for and registering a network device includes a re-search unit configured to re-search the registered network device when an actual operation is performed or when a status is acquired. The re-search unit performs the re-search via communication including unicast to re-search for the network device.09-30-2010
20100146106Method For Context Based Discovery And Filtering Of Portable Collaborative Networks - A peer-to-peer collaborative network system is described. The peer-to-peer collaborative network system allows for the existence of a number of collaborative networks. Within the collaborative networks, users can interact in ways such as messaging, file sharing, resource sharing, and the like. The user will query other users on the network to determine which collaborative networks are active. The user can then select an active collaborative network without having to be invited there.06-10-2010
20100146101Method And System For Binding A Watcher Representing A Principal To A Tuple Based On A Matching Criterion - Methods, systems and computer program products are described for dynamically binding a watching principal to a tuple. In one aspect, a system comprises a message router component configured to receive a watcher matching criterion to bind a watcher representing a principal to a tuple, and an attribute manager component configured to receive an attribute of a first principal represented by a first watcher in a publish/subscribe client. The system also includes a matcher component configured to determine whether the first watcher satisfies the watcher matching criterion when an update to a tuple is detected, where the determination is based on an evaluation of the watcher matching criterion and the attribute of the first principal, and a binder component configured to bind the first watcher to the updated tuple by providing at least a portion of the updated tuple information to the first watcher when the matching criterion is satisfied.06-10-2010
20090077233Load Control Device and Method Thereof - The number of response-waiting requests which are already sent to a server (03-19-2009
20090077232REMOTE ACTIVITY MONITORING - A computer readable medium and system for remotely monitoring activity includes generating first server heartbeat information at a first server at a local site, and storing the first server heartbeat information in a first primary site disk at the local site. The method also includes sending the first server heartbeat information from the first primary site disk, to a first secondary site disk at a remote site. The method further includes receiving information from a 10 second secondary site disk at the local site, and determining if the information received from the second secondary site disk includes updated heartbeat information.03-19-2009
20090077231DEVICE INFORMATION MANAGEMENT APPARATUS, DEVICE INFORMATION MANAGEMENT METHOD, AND STORAGE MEDIUM - A device information management apparatus for processing a report from a device management client during a failure of a transaction system is disclosed. The device information management apparatus includes a reception unit configured to receive the report from the device management client; a determining unit configured to determine whether to process the report based on an importance level of the report and a load (workload) level of the device information management apparatus; a processing unit configured to process the report if the determining unit determines to process the report; and a discarding unit configured to discard the report if the determining unit determines not to process the report.03-19-2009
20090077230CALL PROCESSING SYSTEM AND METHOD - A call processing system (03-19-2009
20090077229PROCEDURES AND MODELS FOR DATA COLLECTION AND EVENT REPORTING ON REMOTE DEVICES AND THE CONFIGURATION THEREOF - Systems and methods are disclosed to monitoring a remote object with a remote client to receive a configuration file directing the remote client to capture events of interest specified by one or more rules; a wireless network to communicate events of interest captured by the remote client; and a server coupled to the remote client over the wireless network, the server receiving events of interest from the remote client and generating a report on the events of interest.03-19-2009
20090077228Behavioral classification of communication sessions using active session initiation - A method includes measuring behavioral characteristics of a plurality of communication sessions in a communication network. A subset of the sessions is identified using the behavioral characteristics, such that the sessions in the subset are suspected of using a target communication protocol. A candidate session is selected from the subset. A trial communication session is initiated with a node of the communication network, which participates in the candidate session, using the target communication protocol. Responsively to receiving a positive response from the node to initiation of the trial communication session, it is determined that one or more further sessions in the plurality are using the target communication protocol. The one or more further sessions are controlled responsively to a predetermined control criterion that is applicable to the target communication protocol.03-19-2009
20090077221SYSTEM FOR ANALYZING AND VISUALIZING ACCESS STATISTICS FOR A WEB SITE - A method for monitoring and visualizing user access made to a web site is disclosed. The method comprises: embedding in a web page to be monitored code to request a thumbnail image from a site when the page is loaded into a browser. The embedded code also includes a user-activateable link to a page within the system server. At the system server, the requested thumbnail image is returned to the web browser, and the IP address from which the thumbnail was requested is recorded. For each recorded IP address, the server determines a corresponding geographical location. The server creates and stores an image that is a geographical representation of the geographical distribution of the recorded IP addresses, and a thumbnail representation of that image. Upon activation of the user-activateable link, the linked page within the system server that includes the image previously created is retrieved by the browser. The thumbnail image requested by the embedded code is the thumbnail image created in this step. A number of threshold, updating, clustering, storage and archiving routines are deployed to ensure large scalability.03-19-2009
20090077227System and method for monitoring network communications originating in monitored jurisdictions - A method of monitoring network communications originating in monitored jurisdictions includes a step of identifying a monitored jurisdiction within a computer network based on predetermined criteria. The computer network includes at least one monitored jurisdiction and at least one unmonitored jurisdiction. A database is queried to identify at least one communication identifier associated with the monitored jurisdiction. The method also includes a step of storing a list including the at least one communication identifier. Only network communication having communication identifiers included in the list are monitored.03-19-2009
20090077225METHOD AND APPARATUS FOR DISTRIBUTING AND ACTIVATING SECURITY PARAMETERS - An apparatus and method for distributing and activating a new security parameter in a computer network in a non-disruptive manner includes transmitting a new security parameter to the an element in the network, instructing the element to place the new security element in a pending database of the element and activating the new security parameter. The present invention also determines possible conflicts in the computer network.03-19-2009
20090077220SYSTEM AND METHOD FOR IDENTIFYING MUSIC CONTENT IN A P2P REAL TIME RECOMMENDATION NETWORK - A peer-to-peer (P2P) network for providing real time media recommendations is provided. The media recommendations may be song recommendations or video recommendations. Each time a media presentation is played by a peer device, the peer device provides a recommendation identifying the media presentation to other peer devices in the P2P network. A peer device having received recommendations from the other peer devices in the P2P network then programmatically, or automatically, selects a next media presentation to play from the media presentations recently played by the other peer devices and one or more locally stored media presentations. If the selected media presentation is not stored locally by the peer device, the peer device may obtain the selected media presentation from a subscription based service enabling streaming or download of the selected media presentation, an e-commerce service enabling purchase and download of the selected media presentation, or another peer device.03-19-2009
20100217863Securing An Access Provider - To secure an access provider, communications to/from the access provider are monitored for a partially-completed connection transaction. Detected partially-completed connection transactions are terminated when they remain in existence for a period of time that exceeds a threshold period of time. The monitoring may include detecting partially-completed connection transactions initiated by an access requestor, measuring the period of time that a partially-completed connection transaction remains in existence, comparing the period of time with the threshold period of time, and resetting a communication port located on the access provider.08-26-2010
20100228854NETWORK OPERATION MANAGEMENT - Systems and methods are provided to monitor and control peripheral devices at a remote operational site. A management platform configures a site controller deployed at the operational site, wherein configuration specifies collection of data from the peripheral devices connected to the site controller. Conditions that monitor device status and specify device alarms triggers also can be configured. Commands, which can be part of a script, remotely control peripheral devices functionally coupled to the site controller. Collected data is conveyed through a wired or wireless link to management component, which stores the data for analysis and report generation, and can supply the data to an authorized terminal. Data and reports can be conveyed to one or more systems and mass storage functionally connected to the management component. Analysis includes data trend generation. Reports include features of observed and predicted data, and alarm summaries.09-09-2010
20100223379COORDINATING SERVICE PERFORMANCE AND APPLICATION PLACEMENT MANAGEMENT - Coordinating tasks of performance management and application placement management in a dynamic fashion by: estimating capacity needs for various service classes of service requests; computing desired capacities of at least one application for said service requests; deciding whether the desired capacities are satisfied by a current application placement; making no change to current application placement if the desired capacities are satisfied; determining a new application placement based on the desired capacities and a projected load if the desired capacities are not satisfied; computing corresponding capacity constraints for all pairs of service classes and servers; and computing an optimal allocation of capacities among the service classes so as to optimize a quality of service.09-02-2010
20100217861METHOD AND SYSTEM FOR MULTICAST STATISTIC COLLECTION08-26-2010
20100217859SIMPLIFIED SUPPORT OF AN ISOLATED COMPUTER NETWORK - A method, a device and computer program products product for allowing performance related data to be obtained from an isolated computer network that includes a diagnostics collection function. Selections from a support user of nodes and plug-in modules associated with applications provided in the isolated computer network that are to be diagnosed are received by a autocollector file generating unit, which then provides at least one command file with instructions for the diagnostics collection function, including the user selected nodes and plug-in modules, and saves the provided data as an autocollector file that automatically makes the diagnostics collection function to apply the command file on the nodes and plug in modules when being activated.08-26-2010
20100217858Handling User Identities In The IP Multimedia Subsystem - A method of handling SIP requests received by an IP Multimedia Subsystem network. The method comprises determining whether or not the SIP destination identity is within a range of identities owned by an operator of the network but is currently unallocated to a subscriber or service of the network and, if yes, routing the message to one or more SIP application servers within the network and implementing service logic at the application server(s) specific to a network owned but unallocated SIP identity.08-26-2010
20100241746Method, Program and System for Efficiently Hashing Packet Keys into a Firewall Connection Table - A method for increasing the capacity of a connection table in a firewall accelerator by means of mapping packets in one session with some common security actions into one table entry. For each of five Network Address Translation (NAT) configurations, a hash function is specified. The hash function takes into account which of four possible arrival types a packet at a firewall accelerator may have. When different arrival types of packets in the same session are processed, two or more arrival types may have the same hash value.09-23-2010
20100205296FLOW CONTROL APPARATUS AND FLOW CONTROL METHOD - A flow control apparatus includes a status monitoring unit, a flow control deciding unit, a flow control strategy storing unit and a performing unit. The status monitoring unit is configured to report the current operating status of a service node to the flow control deciding unit. The flow control deciding unit is configured to provide the current operating status of the service node to the flow control strategy storing unit, generate a flow control command based on an evaluating result which is obtained by the flow control strategy storing unit based on one or more flow control algorithms and the current operating status of the service node, and distribute the flow control command. The flow control strategy storing unit is configured to store the one or more flow control algorithms, obtain the evaluating result based on the one or more flow control algorithms and the current operating status of the service node provided by the flow control deciding unit, and provide the evaluating result to the flow control deciding unit. The performing unit is configured to control new services arriving at a service processing system according to the flow control command distributed by the flow control deciding unit. A flow control method is also provided.08-12-2010
20100228857MEDIA MONITORING, MANAGEMENT AND INFORMATION SYSTEM - Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed.09-09-2010
20100228855NETWORK RESOURCE MONITORING AND MEASUREMENT SYSTEM AND METHOD - A method and system for analysing and measuring multiple sources of data over a communications network (09-09-2010
20100228852Detection of Advertising Arbitrage and Click Fraud - This description provides tools and techniques for detecting advertising arbitrage and click fraud. These tools may monitor packet traffic to or from subscribers to website hosting services. These tools may also analyze the packets to determine whether at least a part of the traffic is indicative of suspected click fraud affecting websites managed as part of the website hosting services.09-09-2010
20100228850Method and System for Estimating Unique Visitors for Internet Sites - This invention comprises a method and system for estimating unique visitors for Internet sites that is more accurate than the existing unique cookie/unique address counting methods. The invented method relies on the count of unique user identifiers (such as network addresses or preferably cookies)—I—that can be obtained from an existing cookie tracking/user access logging system. The number of unique visitors U is calculated substantially as a ratio of the count of unique cookies (or unique network addresses) to the number of visits N times the inflation factor X plus constant on that is approximately one (exactly one in the case of cookies). The number of visits is calculated by multiplying the sampling period t to the visitation frequency T09-09-2010
20100250731SYSTEMS AND METHODS FOR APPLICATION IDENTIFICATION - An application identification system includes a network interface, a signature monitor, a rule generator and a packet access controller. The network interface is operable for receiving first and second packets transmitted by a network application. The signature monitor coupled to the network interface is operable for identifying the network application based on a first packet transmitted by the network application and for generating monitoring data indicative of a state of the first packet. The rule generator coupled to the signature monitor is operable for generating a rule according to the monitoring data and according to a state machine indicative of a state transition between the first and second packets transmitted by the network application. The packet access controller coupled to the rule generator is operable for identifying the network application if the second packet contains contents matched to the rule.09-30-2010
20100250730AUTOMATED LICENSE RECONCILIATION FOR DEPLOYED APPLICATIONS - Systems, methods, and computer program products are described that perform automated license reconciliation for deployed applications. The applications may be deployed among a plurality of computers. Agents are deployed on respective computers to determine the deployed applications. The agents further determine licensable software product identifiers corresponding to the respective instances of the applications. A license data source module provides entitlements corresponding to respective license agreement(s). A reconciliation module matches the entitlements to the instances of the applications to determine whether the instances of the applications are in compliance with the license agreement(s).09-30-2010
20100250740METHOD AND APPARATUS FOR TRANSFERRING CONTEXT INFORMATION ON WEB SERVER - A method for transferring context information on a web server that contains a context pool. The method includes: in response to the web server receiving a message, obtaining context information from the message, generating a unique identifier according to a thread for processing the message, associating the context information with the generated unique identifier, and storing the context information and the associated unique identifier in context pool of web server correlatively. In response to a web server obtaining the context information, generating an identifier according to a thread that is executed currently in the web server, and extracting context information for which an associated unique identifier is matched with the generated identifier from the context pool.09-30-2010
20100250739NETWORK MONITORING CONTROL DEVICE AND MONITORING CONTROL METHOD - A monitoring control device monitors a communication device connected through a network through a virtual LAN provided on the network. The monitoring control device includes: a bandwidth learning unit which learns a bandwidth between the communication device and the monitoring control device by a first file transfer; and a file transfer management unit which manages whether or not a second file transfer, which passes through at least one section, is able to be performed based on a section bandwidth of the at least one section of the network, the section bandwidth obtained from the bandwidth learned by the bandwidth learning unit.09-30-2010
20100250742Global load balancing across mirrored data centers - An intelligent traffic redirection system that performs global load balancing can be used in any situation where an end-user requires access to a replicated resource. The method directs end-users to the appropriate replica so that the route to the replica is good from a network standpoint and the replica is not overloaded. The technique preferably uses a Domain Name Service (DNS) to provide IP addresses for the appropriate replica. The most common use is to direct traffic to a mirrored web site.09-30-2010
20100250737DETECTING AND CONTROLLING PEER-TO-PEER TRAFFIC - A method for communication management includes detecting addresses of peer nodes (09-30-2010
20100250732DETERMINING SERVER LOAD CAPACITY - A method, computer program product, and system for determining a number of users corresponding to a server load including simulating one or more virtual users on a test computer system on coupled to network. One or more client requests are sent from each of the one or more virtual users to a server application executed on a server computer system coupled to the network. A metric indicative of a load on the server computer system is measured. The metric is compared to a predetermined value; and the number of the one or more virtual users is changed based on the difference between the metric and the predetermined value until the metric is within a predetermined range of the predetermined value.09-30-2010
20100250741INFORMATION PROCESSING APPARATUS AND ITS METHOD - An information processing apparatus which stores identification information (MAC address) for detection confirmation of a target network device in advance and executes detection of the target network device by comparing the stored identification information and identification information acquired from the network device on a network repeats executing a request by unicast to a part of addresses in a range of addresses to be detection target and then executing a request by broadcast or multicast until the target network device can be detected.09-30-2010
20100250734SERVER REASSIGNMENT SUPPORT SYSTEM AND SERVER REASSIGNMENT SUPPORT METHOD - A server reassignment support system has a storage device, a deallocated state estimation module and an allocation plan generation module. Stored in the storage device are an operation data indicating operation status of a plurality of physical servers and a plurality of virtual servers and a capacity data indicating resource capacity of each of the plurality of physical servers. The deallocated state estimation module refers to the operation data and the capacity data to extract an overloaded server from the plurality of physical servers, load of the overloaded server exceeding a threshold value depending on the resource capacity. Further, the deallocated state estimation module estimates a state in which at least part of virtual servers allocated to the overloaded server is deallocated as a deallocated server among the plurality of virtual servers. The allocation plan generation module generates an allocation plan for the deallocated server based on the estimated state.09-30-2010
20090106419Methods to Test Multimedia Devices on Computer Systems - The described embodiments relate to testing streaming media capture devices and/or computer systems. One exemplary method enumerates and tests multiple streaming media capture device which are operably associated with a computer. The method simultaneously exercises said computer's display and power states.04-23-2009
20100250729Method and System For Providing Access To Metadata Of A Network Accessible Resource - Methods, systems and computer program products are described for providing access to metadata of a network accessible resource, where the system includes a content handler component configured to receive request information identifying a matching condition and identifying a metadata-schema domain in a metadata-schema domain space. The metadata-schema domain includes a network domain of a schema provider node providing access to a metadata-schema defining metadata of a network accessible resource. A message formatter component is configured to generate a metadata access request identifying the metadata-schema domain and identifying the matching condition, and a content manager component is configured to send, based on the identified metadata-schema domain, the metadata access request to a metadata repository node representing a metadata-schema domain at least partially including the metadata-schema domain identified in the request.09-30-2010
20120036258STORAGE NETWORK SYSTEM, MANAGING APPARATUS, MANAGING METHOD AND PROGRAM - A management computer includes a memory storing toplogical information including identifiers of ports of computers, storage apparatuses, and switches. The management computer includes a processor, which is configured to: collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; evaluate that a certain access time among the plurality of access times exceeds a predetermined allowable range; search a first access path to which the certain access time corresponds; search at least one second access path starting from a first computer port on the first access path; and search performance information of certain ports which are on the at least one second access path in order to display the searched performance information.02-09-2012
20120036250System, Method and Program for Detecting Anomalous Events in a Utility Network - A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.02-09-2012
20100235500INFORMATION PROCESSING APPARATUS, NETWORK INTERFACE APPARATUS, METHOD OF CONTROLLING BOTH, AND STORAGE MEDIUM - An apparatus includes a storage unit configured to store information which is acquired by a negotiation with an external apparatus and is for communication via a network, a detection unit configured to detect that conditions are satisfied for switching to a power saving mode in which power consumption is smaller than in a normal power mode while the normal power mode is operating, and a notification unit configured to notify a network interface of the stored information when the conditions for switching to the power saving mode are satisfied.09-16-2010
20100235496Method, System and Apparatus for Collecting Statistics of Characteristic Value with Threshold - A method for collecting statistics of a characteristic value with a threshold includes: determining, according to a total threshold for a characteristic value whose statistic is to be collected, at least one sub-threshold corresponding to at least one application processing apparatus participating in statistic-collection; issuing the at least one sub-threshold respectively to the at least one application processing apparatus, notifying the at least one application processing apparatus to enter into a distributed statistic-collecting state; after receiving from anyone of the at least one application processing apparatus a notification which indicates that a current statistic value of the characteristic value of the application processing apparatus reaches a sub-threshold corresponding to the application processing apparatus, notifying the at least one application processing apparatus to enter into a centralized statistic-collecting state to collect statistics of the characteristic value in a centralized mode.09-16-2010
20100235497INFORMATION PROCESSING APPARATUS AND COMMUNICATION PROCESSING METHOD THEREOF - An information processing apparatus including a first communication interface for individually communicating with a plurality of communication terminals without involvement of a public network and a second communication interface for communicating with involvement of a public network, wherein the apparatus provides services, via the first communication interface or via the first communication interface and the second communication interface, to a plurality of communication terminals that perform communication via the first communication interface, manages information regarding a communication interface used by each service and information regarding the service provided, and controls communication performed with the first and the second communication interfaces based on the managed information. When disconnection of communication performed with either one of the first and the second communication interfaces has been detected, the apparatus performs control relating to disconnection of communication performed with the communication interface in which disconnection was not detected based on the managed information.09-16-2010
20100235492SYSTEM AND METHOD FOR GENERIC APPLICATION OF LOCATION DETERMINATION FOR NETWORK ATTACHED DEVICES - A system and method for determining the location of a target device. A location request may be received for a target device, and a plurality of parameters determined that identify the target device. A most likely path may be selected from a plurality of paths to produce a location of the target device, each path having one or more of the plural determined parameters as an input and one or more measurement results as an output. Measurement information may be collected on the most likely path as a function of one or more of the determined parameters to provide the one or more measurement results. Location information may then be derived for the target device as a function of the one or more measurement results, the derivation utilizing a location determination function that evaluates ones of the plural paths. An estimated location of the target device may then be determined as a function of the respective location information for the selected path.09-16-2010
20100235490Method and Apparatus of Correlating Power Usage With Traffic Flow for a Network Device - A network device including: a power utilization monitor for monitoring and determining the power usage for the network device, the power usage being associated with a predetermined time value when the power usage was monitored; a data traffic monitor for determining the traffic flow of the network device, the traffic flow being associated with a predetermined time value when the traffic flow was measured; and a data correlator for correlating the power usage of the network device to the data traffic of the network device by associating the predetermined time value when the power usage was monitored with the predetermined time value when the data traffic flow measurement was made is described.09-16-2010
20100235502METHOD FOR MANAGING NETWORK COMPONENTS IN A NETWORK, AND A NETWORK COMPONENT - The invention relates to a method for managing network components in a network comprising a request subnet with request network components and a select subnet with select network components as well as to a network component, wherein the requesting network component out of the request network components of the request subnet transmits a registration request to a selected network component out of the select network components of the select subnet and, based on the registration request, the selected network component transmits information concerning the configuration of the select subnet at the time of registration request to the requesting network component, wherein, based on the registration request, the selected network component transmits further information concerning the configuration of the select subnet to the requesting network component at a later point in time which is chronologically following the registration request.09-16-2010
20100235504METHOD AND APPARATUS FOR A POWER-EFFICIENT FRAMEWORK TO MAINTAIN DATA SYNCHRONIZATION OF A MOBILE PERSONAL COMPUTER TO SIMULATE A CONNECTED SCENARIO - An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed.09-16-2010
20090043884Recording Method and Recording System of Log - The present invention provides a recording method and recording system of log, the method comprising the steps of: generating an IP log, the content recorded by the IP log comprising at least an IP address and the operation being performed; finding the IP address in the IP log; replacing the found IP address with a user's information to obtain the ID log. With the present invention, the IP log is converted into ID log, in this way, the true user of the computer may be directly obtained through the ID log, the log information may provide the administrator of the system with very useful information on what is hazardous to the safety, which is significantly advantageous to the secret and security of the network of a company or an enterprise.02-12-2009
20090043881CACHE EXPIRY IN MULTIPLE-SERVER ENVIRONMENT - In a multiple-server or multiple-process environment where each server has a local cache, data in one cache may become obsolete because of changes to a data store performed by another server or entity. The present invention provides techniques for efficiently notifying servers as to cache expiry indications that indicate that their local cache data is out of date and should not be used. A cache expiry manager receives cache expiry indications from servers, and sends cache expiry indications to servers in conjunction with client requests or in response to certain trigger events. The need for broadcasting cache expiry notifications to all servers is eliminated, as servers can be informed of cache expiry indications the next time a server is being given a client request that relates to the cache in question. Extraneous and duplicative cache expiry notifications are reduced or eliminated.02-12-2009
20090043882Systems and methods for consolidated service level agreements - An embodiment relates providing collaborative support for a service portal. The method includes providing a plurality of products on the service portal, where each product is associated with a respective vendor. The method also includes receiving a set of selection of products based on the plurality of products and determining a set of support resources for the set of selection of products. The method further includes applying a single service level agreement to the set of selection of products, where a first product is associated with a first vendor and a second product is associated with a second vendor.02-12-2009
20090292804CONTENT TRANSMISSION APPARATUS, CONTENT RECEPTION APPARATUS, AND CONTENT UPLOAD METHOD - According to one embodiment, a content transmission apparatus includes a data acquisition module configured to get a content item and metadata having a plurality of items for explaining details of the content, a notification module configured to notify an upload destination apparatus for the content of the metadata, a transmission module configured to encode the content and transmits the encoded content as a body of an upload request based on an HTTP POST request to an entry point created by a content reception apparatus on the basis of the metadata, a detection module configured to detect a change in metadata notified to the content reception apparatus relative to metadata newly got by the data acquisition module, and a posterior notification module configured to notify the content reception apparatus of posterior metadata containing at least a changed item in the metadata, when the detection module detects a change in the metadata.11-26-2009
20100228849Deployment of Asynchronous Agentless Agent Functionality in Clustered Environments - A mechanism for the deployment of asynchronous agentless agent functionality in clustered environments. An agentless agent execution node in an agentless agent execution node cluster receives a context message comprising an asynchronous operation request and an execution context from a messaging service. The agent node determines if an entry for the execution context exists in an execution context state table of the agent node. If no entry exists, the agent node creates an execution context entry in the execution context state table of the agent node. The agent node retrieves an asynchronous code module associated with the asynchronous operation from a central repository. The asynchronous code module is then executed on a managed resource to detect asynchronous code events occurring on the managed resource. When asynchronous code events are detected at the managed resource, the agent node sends a message comprising the asynchronous code events to a management server.09-09-2010
20100146105BROADBAND SERVICE DELIVERY - Service is delivered from a service provider to a customer in a network system having a plurality of service providers and a network control and provisioning system through which connection of the customer and service provider is controlled. The service provider is connected to the control and provisioning system via a service manager application which contains predetermined values of conditional data parameters for services to be provided to the customer and the customer's connection to the network is interrogated by the service manager to determine the current values of conditional data parameters. The current values are compared with the predetermined values to determine whether or not conditions for provision of the requested services are met. The results of the comparison are communicated to the service provider.06-10-2010
20100146107Bandwidth Measurement - Methods for testing network bandwidth availability in a non-intrusive manner. By implementing occasional, base-line bandwidth testing, a more accurate indication of actual transfer rate results. When an application dependent upon network bandwidth is first executed, a series of file transfers takes place utilizing a series of different sized pieces of content.06-10-2010
20100146100Flexible Application Classification - A system includes an information storage module and an inspection module. The information storage module is configured to store a plurality of tags. Each tag is associated with a known set of traffic types of a plurality of known sets of traffic types. The inspection module is configured to compare a traffic flow to a set of traffic types to determine a matching set of traffic types, request a tag from the information storage module, and mark the traffic flow with the tag. The tag corresponds to the matching set of traffic types.06-10-2010
20100241744Network Monitoring Apparatus and Network Monitoring Method - According to one embodiment, a network monitoring apparatus includes an unauthorized node determination module, a spoofed address resolution protocol request transmission module, and a spoofed address resolution protocol reply transmission module. The unauthorized node determination module determines whether a sender node which transmits an address resolution protocol request packet is an unauthorized node. The spoofed address resolution protocol request transmission module transmits a spoofed address resolution protocol request packet to a target node corresponding to a target network address in the address resolution protocol request packet if the sender node is an unauthorized node. The spoofed address resolution protocol reply transmission module transmits to the unauthorized node a spoofed address resolution protocol reply packet which includes a predetermined physical address other than the physical address of the target node as a sender physical address and a network address of the target node as a sender network address.09-23-2010
20100241745CHARACTER DIFFERENTIATION BASED ON PATTERN RECOGNITION - A method and apparatus for character differentiation based on pattern recognition is provided. A sequence of events is received that have been generated from a given session or connection and determines if the sequence of events is likely to have come from an existing, known character, or if the events are from a previously unknown character. A character identifier (ID) is tagged onto (i.e. associated with) the event for further processing in another system that can, for example, provide different content based on the identified character and an associated preference profile.09-23-2010
20100241742Collaborative speed determination in distributed systems - The described implementations relate to collaborative speed determination in distributed systems. One method estimates upload speeds of a plurality of hosts. The method sends a first bandwidth probe from a first host to a second host. The method receives, at the first host, a second bandwidth probe sent from the second host. The method determines which of the first and second bandwidth probes was relatively slower. The method designates either of the first or second hosts that sent the relatively slower bandwidth probe as a loser and takes a speed of the bandwidth probe of the loser as a first estimate of the loser's upload speed.09-23-2010
20100211674COMMUNITY GENERATION SUPPORT SYSTEM, COMMUNITY GENERATION SUPPORT METHOD, AND COMMUNITY GENERATION SUPPORT PROGRAM - A community generation support system and a community generation support method. A community generation support device (08-19-2010
20100211672METHOD AND SYSTEM FOR SIMULATING LATENCY BETWEEN LAYERS OF MULTI-TIER APPLICATIONS - A method, system and article of manufacture for simulating latency between software applications. There is provided a middleware component, e.g., a delay driver, within a multi-tier software product, the middleware component driver enables simulation of both latency and bandwidth restrictions experienced by the components in the multi-tier software product. The middleware component determines whether I/O request packets should be delayed, selects the number and types of I/O requests packets to be delayed and the amount of time to delay processing of the packets. Through the use of such a middleware component, a user is able to simulate various conditions experienced by the multi-tier software product.08-19-2010
20100153549METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO A RESOURCE MANAGER - A method, system, and program product for communicating with machines connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if urgent service is needed by the device. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information to the resource administrator using e-mail.06-17-2010
20100153544Content rendering control system and method - A system and method for controlling of rendering of content via electronic networks, whereby content is rendered at a content page only when and to the extent that a pre-defined area of the content page is within the viewer's browser window dimensions and scrolling position, or within a pre-defined distance outside of said browser window dimensions and scrolling position. When a viewer accesses a content page and as the viewer scrolls up or down or left or right on the page, or increases or decreases the dimensions of the viewer's browser window, content that has been designated to render in the content page area corresponding to the viewer's then current browser window dimensions and scrolling position is rendered. Content relating to areas of the content page that are not within (or within such pre-defined distance from) the viewer's browser window dimensions and scrolling position is not rendered unless or until such area is within such browser window dimensions and scrolling position or said pre-defined distance outside of same.06-17-2010
20100153543Method and System for Intelligent Management of Performance Measurements In Communication Networks - A system and method operable to monitor a parameter of a node of a communications network, enable one of a plurality of performance measurements for the node based on an enable threshold of the parameter and disable the one of the performance measurements based on a disable threshold of the parameter.06-17-2010
20100153547COMMUNICATION METHOD, SERVER AND MEDIUM ON NOTIFICATION OF SESSION STATUS - A first server receives the notification of connection ready from each of a plurality of second terminals for executing second communication, notifies the connection ready of each of the second terminals to a second server, detects connection by first communication between a plurality of first terminals, and notifies the detected connection by the first communication to the second server. The second server, upon recognizing the connection ready between the second terminals and the connection by the first communication between the first terminals, provides a service by the second communication between the second terminals.06-17-2010
20100153542TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON BROADCAST INFORMATION - A technique for operating a high performance computing cluster (HPC) having multiple nodes (each of which include multiple processors) includes periodically broadcasting information, related to processor utilization and network utilization at each of the multiple nodes, from each of the multiple nodes to remaining ones of the multiple nodes. Respective local job tables maintained in each of the multiple nodes are updated based on the broadcast information. One or more threads are then moved from one or more of the multiple processors to a different one of the multiple processors (based on the broadcast information in the respective local job tables).06-17-2010
20100153546System and method to publish information from servers to remote monitor devices - To assist in monitoring the intelligent messaging network, a system and method for publishing logging and status information from the servers is provided. A list of available servers accessible for monitoring by persons, devices, and applications via a remote monitor device can be provided. The remote monitor device may forward selected servers from the list of available servers in which they are interested. Also, particular information about the selected servers can be requested. Access to certain servers and information may be restricted to those with authorization. Authorization can be verified by the use of digital certificates. The requested information can then be gathered and provided to authorized persons or devices. Typically, the information includes logging and status information from the servers. The information can be provided as an XML page and viewed using, for example, a standard web browser. Further, if the information is provided to the remote monitor device as an XML page, a standard XML parser may be used to extract particular information from the XML page.06-17-2010
20100153541TECHNIQUES FOR DYNAMICALLY ASSIGNING JOBS TO PROCESSORS IN A CLUSTER BASED ON PROCESSOR WORKLOAD - A technique for operating a high performance computing (HPC) cluster includes monitoring workloads of multiple processors included in the HPC cluster. The HPC cluster includes multiple nodes that each include two or more of the multiple processors. One or more threads assigned to one or more of the multiple processors are moved to a different one of the multiple processors based on the workloads of the multiple processors.06-17-2010
20100153540GEOLOCATION MAPPING OF NETWORK DEVICES - A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a client a list of area landmark servers (ALS) with known geographic locations. The client probes ALSs, measures response delays, and provides results to the coordination server. The coordination server then provides to the client a list of additional city landmark servers (CLS) within the area. The client probes the CLSs and provides results to the coordination server which then determines the geographic location of the client.06-17-2010
20100153538System and Method for Communication Handling and Handoff - A system and method handles communications and handoffs communications. A network component for the communication system comprises a memory and a processor. The memory stores a table of data relating to devices disposed in the communication system. The data includes locations of the devices. The processor is configured to determine a destination for an incoming communication. The processor is further configured to determine a pathway to forward the incoming communication to the destination as a function of the table. The communication system includes a first region in which the network component is configured to manage and a second region in which a further network component is configured to manage.06-17-2010
20100153537METHOD AND APPARATUS FOR PROVIDING DETECTION OF INTERNET PROTOCOL ADDRESS HIJACKING - A method and apparatus for detecting an address hijacking in a network are disclosed. For example, the method sends one or more traceroute packets to a target prefix, wherein the target prefix comprises one or more destination Internet Protocol (IP) addresses, and records traceroute data received for the one or more traceroute packets sent to the target prefix. The method then determines one or more hop count distance measurements for the target prefix, and determines if there are one or more changes in the one or more hop count distance measurements for the target prefix.06-17-2010
20100153536PARTICIPATING WITH AND ACCESSING A CONNECTIVITY EXCHANGE - Methods for integrating with and participating in a connectivity exchange are described herein. Service providers and users access the Internet via the exchange using one or more devices. These devices include user devices for accessing the Internet via the exchange and devices for service providers offering services to users via the exchange.06-17-2010
20100250727SYSTEM AND METHOD FOR VERIFIED PRESENCE TRACKING - A system and method for verified presence tracking. A request for a location is received over a network. The request comprises a request type, a request source and at least one request target. Location data relating to the request targets is retrieved from a plurality of location data sources. The reliability of the retrieved location data is determined. A response is formulated using based on the request type, the retrieved location data, and the determined reliability of the retrieved location data. The response is then transmitted over the network to the request source.09-30-2010
20100250728METHOD FOR CONTROLLING WEB PAGE OPERATION IN BROWSER/SERVER ARCHITECTURE - A method for controlling a web page operation in browser/server architecture is adapted to prevent the same page from being operated by more than one people at the same time. The method includes establishing a status record table for recording a usage status of web page by server; checking usage status of web page in status record table after server receiving a request for operating the web page from a second browser; accepting request and submitting an operation control right of the web page to second browser if the usage status is idle; sending a check message to first browser to check whether first browser is still using the web page or not if usage status in status record table indicates that web page is used by first browser; rejecting request and transmitting usage status of web page to second browser if first browser is still using the web page.09-30-2010
20100250726APPARATUS AND METHOD FOR ANALYZING TEXT IN A LARGE-SCALED FILE - The subject matter discloses a system for analyzing a large-scaled file downloaded to a user's computerized device in segments that comprises a detection module for reviewing at least a portion of the large-scaled file and detects new segments added to the large-scaled file since a previous review of the large-scaled file. The system also comprises a triggering module for triggering the detection module and an analyzing module for analyzing at least the text of the at least one new segment detected by the detection module.09-30-2010
20100235493EXTENDABLE DISTRIBUTED NETWORK MANAGEMENT SYSTEM AND METHOD - An extendable network management system and method is provided to manage a network environment. The system can include a management server with a management application. In addition, the management application is configured to enable a user to manage the network environment. A extension application server can host a plurality of extension modules. The extension modules can supply management functions to the management application for defined network components. Further, a plurality of management engines can be located on the extension application server. The management engines can provide network probing and network event management, while integrating an extension modules' data object model with a management application's data object09-16-2010
20100235494FLEXIBLE LOGGING, SUCH AS FOR A WEB SERVER - A flexible logging system is described herein that operates with a web server to provide activity logging in a way that is customizable to include a variety of data fields, can capture both client and server log information to a single location, and can provide data to an analysis engine directly to provide near real-time reporting. The system captures events within the web server as they occur and can provide reporting before the final response occurs. During request processing in the web server, server extension modules raise log events whenever an event occurs. The system matches the received data to a log definition and writes the data to any log that matches. Thus, the flexible logging system provides a rich, flexible, and fast platform for content providers and administrators to get a real-time view of the state of requests to their web servers.09-16-2010
20100235501Advanced Availability Detection - A method is provided for determining user availability on the basis of the manner in which a person uses (1) a communication terminal or (2) a computing device that is associated with the communication terminal or (3) any combination of (1) and (2). User availability is determined based on: (1) a characteristic of the use of a software application that is running on a computing device, or (2) a characteristic of the use of a feature of software that is running on a communication terminal, or (3) a characteristic of the use of a resource of a computing device, or (4) a characteristic of the use of a resource of a terminal, or (5) a sensor input, or (6) a characteristic of the incoming invitation, or (7) any combination of (1), (2), (3), (4), (5), and (6).09-16-2010
20100235499PROCESSING APPARATUS, CONTROL METHOD THEREOF, AND STORAGE MEDIUM - A processing apparatus capable of making it easy to set a selection condition under which desired packets are acquired. When a desired print job log is selected from a displayed print job history or when a desired transmission job log is selected from a displayed transmission job history, a file creation unit automatically creates, based on address information in the selected print job log or in the selected transmission job log, a filtering condition expression for acquiring desired packets and sets the created expression to a filtering unit.09-16-2010
20100235498INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING THE SAME - In order to enable more of the contents managed by a content server to be provided, an information processing apparatus connected to a communication network includes: a managing unit that manages a content and attribute information; a detecting unit that detects an external processing apparatus connected to the communication network; an acquiring unit that acquires capability information, which indicates a capability that can be provided by the external processing apparatus; a generating unit that generates content list information containing a first list containing a content that is managed by the managing unit and that can be directly provided by the information processing apparatus, and a second list containing a content that can be provided by giving a processing request to the external processing apparatus; and a providing unit that provides the content list information to a client terminal.09-16-2010
20100235495METHODS AND SYSTEMS FOR REDUCING A LOAD ON A MULTI-TENANT DATABASE - Mechanisms and methods for reducing a load on a multi-tenant database are provided. These mechanisms and methods for reducing a load on a multi-tenant database can enable a reduction in the computational effort expended to handle login requests with invalid usernames and the computational effort expended to handle valid login requests that occur at a high rate. The ability to provide a reduction in computational effort expended on login requests can enable a providing of a reliable level of resources to users and tenants of the multi-tenant database.09-16-2010
20100235489Systems and methods for determining electronic relationships - Systems and methods are provided for measuring the level of relative activity (relationship) between two entities (e.g., people, companies, organizations, etc.) in a group as compared with others in that group or in a subset of that group. A group or subset of a group can be defined manually or automatically by the program. Once the activity is measured, it is further analyzed to generate behavioral attributes (e.g., trust, respect, mutually enjoyable company or personal relationship, reciprocity and shared experience) of the relationship. These attributes may be employed to derive characteristics such as the strength of the relationship for each pair of entities. The relationships and characteristic and/or attributes may then be displayed in a simple to understand manner.09-16-2010
20120173712METHOD AND DEVICE FOR IDENTIFYING P2P APPLICATION CONNECTIONS - The present invention relates to a method for identifying P2P application connections, which includes: searching corresponding ports of intranet IPs according to the data package received; and identifying the connection of the data package to be P2P application connection when the counter value of the said port is the preset threshold and represents the number of all simultaneous online UDP connections to the port. When the counter value of the said port is not the preset threshold, and the connection of the data package is a new UDP connection, the counter value of the said port will be added by 1; when the UDP connection of the said port is disconnected, the counter value of the port will be deducted by 1. It is a primary object of the present invention to provide a method and a device for identifying P2P application connections based on the behavioral characteristics of UDP, which have improved the accuracy of P2P application identification.07-05-2012
20120173724Monitoring Information Assets and Information Asset Topologies - According to one embodiment of the present invention, a computer system monitors information assets providing data for constructing a logical entity. The information assets are dependent upon each other for data and form a topology. The computer system receives an event message associated with an information asset. The event message includes information relating to one or more conditions of that information asset. The computer system processes the received event message to determine the presence of a change within the associated information asset that affects the topology. The change is determined based on the information relating to the one or more conditions within the received event message. The computer system further transmits a notification of the change to one or more entities in response to determining the presence of the change. Embodiments of the present invention further include a method and computer program product for monitoring information assets.07-05-2012
20100223378SYSTEM AND METHOD FOR COMPUTER CLOUD MANAGEMENT - A method for auto-scaling the infrastructure capacity of an application in response to client demands includes providing an application configured to run on an application infrastructure comprising a plurality of server nodes and to be accessed by clients via a first network. Next, providing traffic management means directing traffic from the clients to the server nodes of the application infrastructure. Providing monitoring means gathering performance metrics of the application and metrics of the application infrastructure. Providing controlling means configured to change the application infrastructure. Next, monitoring the performance metrics of the application and the metrics of the application infrastructure via the monitoring means thereby obtaining metrics information and then changing the application infrastructure based on the metrics information via the controlling means. Finally directing network traffic targeted to access the application to server nodes of the changed application infrastructure via the traffic management means.09-02-2010
20100211676COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, AND COMMUNICATION METHOD - When communication is performed with the upstream and downstream sides being defined in the order of relay apparatuses, the relay apparatuses each transmit a keepalive message representing that they are effectively performing communication. When no keepalive message can be received from the relay apparatus and an abnormality is detected thereby, the relay apparatus transmits a keepalive message including abnormality information representing that the abnormality is detected. By receiving the keepalive message including the abnormality information, the relay apparatus detects the abnormality on the upstream side, changes a communication path, and transmits a master candidate notification to the relay apparatus on the downstream side in order that the relay apparatus itself becomes a master.08-19-2010
20100211675REAL-TIME NETWORK DATA ANALYSING SYSTEM - An arrangement and method for analysing the data transferred in communications networks. The fact that though the amount of user plane traffic and data is increasing fast, the amount of signalling traffic is hardly increasing at all, is utilised. In the present system the analysis of the user plane and the control plane is done separately in user plane analysis appliance (08-19-2010
20100211671EFFICIENT MAINTENANCE OF A DISTRIBUTED SYSTEM MEMBERSHIP VIEW - A method, system and computer program product are disclosed for maintaining a membership view of a distributed computing system comprising a multitude of members, wherein each of said members sends out a message indicating that said each of the members is available in the system. In one embodiment, the method comprises maintaining a first list of at least some of the members in the distributed system; and over a period of time, when one of the members sends out the message indicating that said one of the members is available in the distributed system, adding said one of the members to a second list. At defined times, the first list is replaced with the second list. In an embodiment, the method further comprises at said defined times, starting a new, empty second list.08-19-2010
20100211670SYSTEM FOR MONITORING PRODUCTION OPERATIONS - A system for monitoring production operations includes an operator box located at a workstation and having a plurality of manual input devices configured for manual activation by an operator, a corresponding plurality of status indicators, each status indicator being configured to provide an indication of the operational status of the workstation, and a communications port configured to facilitate communication between the operator box and a network. The system also includes a computing device coupled to network to receive data from a machine controller coupled to the network and data from the operator box, and to store that data in a database of records reflecting historical performance of the system.08-19-2010
20100211669DATA CENTER CONTROL - Systems and methods for data center control are provided that identify parameters of one or more data centers, where each data center includes a plurality of devices. The systems and methods receive a command to execute an application, and identify a selected data center from the one or more data centers as a location to run the application based at least in part on an evaluation of the parameters.08-19-2010
20100211668OPTIMIZED MIRROR FOR P2P IDENTIFICATION - Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving, by the network node, a packet belonging to an IP flow; when the IP flow is a flow for which content information is to be sent to the content identification device, performing the steps of: determining, using deep packet inspection, that the packet contains a value for at least one field of interest, determining whether all fields of interest needed by the content identification have been seen by the network node among a plurality of packets belonging to the IP flow, and communicating the value of the at least one field of interest to the content identification device.08-19-2010
20100125662Methods, Systems, Devices and Computer Program Products for Protecting a Network by Providing Severable Network Zones - Provided is a computer network that includes computer network devices that are grouped into severable computer network zones and that are operable to detect non-compliant network activity in another of the severable computer network zones. The computer network includes multiple intra-network communication connections that are operable to communicatively couple the severable computer network zones to one another and to be selectively disconnected responsive to the detection of non-compliant network activity in a first zone of the severable computer network zones to isolate the first zone from other of the severable computer network zones.05-20-2010
20100125660RECORDING APPARATUS, METHOD, AND COMPUTER READABLE STORAGE MEDIUM STORING PROGRAM THEREOF - When the communicator sends a communication message for Web access, the monitor suspends the sending process of the communication message in the communicator. The start determiner instructs the operation recorder to start the recording process of data indicative of user operations. The monitor allows the communicator to resume the sending process of the communication message. The operation recorder sets a capture interval to the timer. When the user performs input operations, the operation recorder records the input data. If the remaining time of the timer is 0, the operation recorder captures and records the screen data, and sets the capture interval to the timer. If the end determiner has instructed to end the recording process, the operation recorder closes the file for storing the operation data and stores the file in the operation storage.05-20-2010
20100138534SYSTEMS AND METHODS FOR MONITOR AN ACCESS GATEWAY - The present invention is directed towards systems and methods for monitoring an access gateway. The systems and methods include monitors on appliances that generate and send requests to logon agents or login page services on access gateways. Based on the responses from the logon agents or login page services, the monitors determine whether the logon agents or login page services are available.06-03-2010
20100161796METHOD AND SYSTEM FOR REMOTE DIAGNOSTIC, CONTROL AND INFORMATION COLLECTION BASED ON VARIOUS COMMUNICATION MODES FOR SENDING MESSAGES TO USERS - A method, system, and program product for communicating with machines and end users connected to a network. Information sent to or from the machines is transmitted using electronic mail or a via a direct connection. The electronic mail may be transmitted over the Internet to a service center or from a service center to a resource administrator, but also may remain within a local or wide area network for transmission between a machine and an end user or a resource administrator. E-mail messages may be transmitted from a computer which is attached to a device which is being monitored or controlled and include information regarding the status, usage or capabilities of the attached device. The device may send status messages and usage information of the device by an end user to either a resource administrator or to a service center on the Internet through a firewall. The message may be sent directly to the resource administrator station if an urgent need of the end user is indicated, so that a communication may be sent either directly to the end user or to a device driver so that the device driver may communicate the message to the end user. For example, an end user may have exceeded a predetermined limit of resource usage, and needs to be informed. For routine information, the service center may manage all the resources on an intranet and may send predetermined types of information. such as summary information regarding usage of network resources to the end user using e-mail.06-24-2010
20130219051COMPUTER-BASED COMPARISON OF HUMAN INDIVIDUALS - A test person is compared to a reference person by comparing detailed information regarding the configuration, capabilities and usage of computers—such as installed hardware devices, makes and models and firmware versions of such hardware devices, installed software, versions of installed software, and usage logs—used by the respective individuals. In effect, each person's computer is considered a proxy for the person herself, representing countless purchasing, maintenance, pastime choices in the configuration and use of a thoroughly complex personal and professional tool.08-22-2013
20100057904DEVICE MANAGING APPARATUS, DEVICE MANAGING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM FOR THE DEVICE MANAGING METHOD - A device managing apparatus for monitoring and managing a device connected to a data transmission path includes an obtaining part configured to obtain power consumption status data from the device, the power consumption status data indicating a power consumption status of a communication unit included in the device, a selecting part configured to select a communication method according to the power consumption status data obtained from the obtaining part, and a communicating part configured to perform data communications with the device by using the communication method selected by the selecting part.03-04-2010
20090259747INFORMATION COLLECTING SYSTEM - A method for connecting a storage device to an information generating device includes transferring an identifying message from the storage device to a control server via a computer network. The identifying message includes a unique identifier uniquely identifying the storage device, matching a registered information generating system to the unique identifier, and identifying at least one information generating device included in the matched information generating system. A configuration message is transferred from the control server to the storage device, and the configuration message includes an address to the identified at least one information generating device and instructions of interaction. The instructions of interaction are arranged to define how the transfer of generated information is to be performed.10-15-2009
20110113137BEAM COMBINATION METHODS AND SYSTEMS FOR ADAPTING COMMUNICATION LINKS TO VARYING CHANNEL CONDITIONS - Methods and systems for rectifying deteriorated channel conditions on a communication link are described. In response to the detection of a link deterioration event, a cluster of beams about a currently utilized beam pair can be trialed to determine a suitable, alternate pair of beams on which to establish a communication link. In turn, in the case of a link blockage event, a set of beams having a relatively large azimuthal angle with respect to a currently utilized beam pair can be trialed to determine a suitable beam pair for further communication.05-12-2011
20120246308Interdomain Network Aware Peer-to-Peer Protocol - A method includes receiving network distance information, receiving a request from a client for an identity of a peer providing content, and identifying a first peer and a second peer providing the content. The network distance information includes a compilation of network distance information provided by a plurality of service providers. The method further includes determining that a network distance between the first peer and the client is less than a network distance between the second peer and the client based on the network distance information, and providing the identity of the first peer to the client.09-27-2012
20090327490DATA PROCESSOR, DATA MONITORING METHOD THEREOF, AND RECORDING MEDIUM STORING DATA MONITORING PROGRAM THEREOF - A data processor in which data processing is managed by an administrator and in which data processing including installation of software by a user is enabled. The data processor includes a processing unit to monitor the data processing executed by the user and to generate an execution history of the data processing, and a recording unit to record the execution history of the data processing.12-31-2009
20090327489GLOBAL TRAFFIC MANAGEMENT SYSTEM USING IP ANYCAST ROUTING AND DYNAMIC LOAD-BALANCING - A method and apparatus for serving content requests using global and local load balancing techniques is provided. Web site content is cached using two or more point of presences (POPs), wherein each POP has at least one DNS server. Each DNS server is associated with the same anycast IP address. A domain name resolution request is transmitted to the POP in closest network proximity for resolution based on the anycast IP address. Once the domain name resolution request is received at a particular POP, local load balancing techniques are performed to dynamically select the appropriate Web server at the POP for use in resolving the domain name resolution request. Approaches are described for handling bursts of traffic at a particular POP, security, and recovering from the failure of various components of the system.12-31-2009
20090327483Web services enabled device and browser gadgets coupled with data storage service and web portal - A method of presenting structured information, via software gadgets, based on monitored data in a utility monitoring system. First monitored data is exposed to a network to produce, via a first web service, first structured data. The first monitored data is indicative of utility characteristics measured by a first IED in the utility monitoring system. The first structured data is received over the network and second structured data is received from a network-accessible data storage service. The data storage service has a second web service that exposes second monitored data to produce the second structured data. The first structured data is manipulated, in at least one of the software gadgets, to produce structured information based on the first monitored data, and the structured information is communicated from the at least one software gadget to a web browser for display in a web page by the web browser.12-31-2009
20090327475METHOD FOR MANAGING A COUNTER STATUS ALLOCATED TO A PAIR COMPRISING A COMMUNICATION TERMINAL AND A BASE STATION - A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved.12-31-2009
20100198965NETWORK CONTROL DEVICE, IMAGE DISPLAY DEVICE AND NETWORK CONTROL METHOD - In order to easily ensure service quality by reducing network traffic, a network monitoring section (08-05-2010
20120144033METHOD AND SYSTEM FOR OPTIMIZING PERFORMANCE AND AVAILABILITY OF A DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) SERVICE - A system and computer program product for monitoring and optimizing performance and availability of a Dynamic Host Configuration Protocol (DHCP) service are provided by one or a plurality of DHCP servers in an Internet Protocol (IP) network comprising one or a plurality of IP subnetworks. The system implemented in hardware, comprises a computer infrastructure operable to define one or a plurality of groups of subnetworks, each group of subnetworks comprising one or a plurality of subnetworks. The computer infrastructure is further operable to retrieve information related to resources, in particular IP addresses, allocated within a DHCP server to each group of subnetworks. The computer infrastructure is further operable to transfer the information to a DHCP service monitoring system, the DHCP service monitoring system comprising means for retrieving the information from the one or a plurality of DHCP servers and means for aggregating the information for each group of subnetworks.06-07-2012
20120144031SYSTEM FOR NETWORK DEPLOYMENT AND METHOD FOR MAPPING AND DATA FORWARDING THEREOF - The invention discloses a system for network deployment and a method for mapping and data forwarding thereof. The system for network deployment comprises Distributed Hash Table (DHT) servers and DHT border servers, wherein at least one DHT border server and one DHT server are connected to form a server ring which constitutes a distributed mapping database used for storing a mapping relationship between Endpoint Identifiers (EIDs) and Routing Locators (RLOCs), and the server rings are connected with each other through the DHT border servers, wherein the DHT border server is configured to notify the EID prefix information in a present server ring to other server rings and monitor the DHT messages of the distributed mapping database. By the present invention, the network deployment and cross-domain data forwarding based on the DHT are achieved.06-07-2012
20120144030Probe Election In Failover Configuration - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type.06-07-2012
20120144029NON-INTRUSIVE MONITORING OF SERVICES IN A SERVICES-ORIENTED ARCHITECTURE - A system for monitoring a service provided in a service-oriented architecture may include a computing device configured to submit a subscription request to a plurality of intermediaries in the service-oriented architecture from which to receive monitored data related to the service. An application operating on the computing device may determine which ones of the plurality of intermediaries to rely upon for monitoring the service based at least in part on a probability value associated with each intermediary. The probability value is a function of at least a frequency of messages associated with the service processed by the intermediary and a time period since a last message associated with the service was processed by the intermediary. The system may also include an output device to present the monitored data in response to the monitored data being received by the computing device from the determined ones of the plurality of intermediaries.06-07-2012
20100191851METHOD AND APPLIANCE FOR USING A DYNAMIC RESPONSE TIME TO DETERMINE RESPONSIVENESS OF NETWORK SERVICES - In a method and appliance for determining responsiveness of a service via a particular protocol, a device intermediary to a plurality of clients and a plurality of services determines response times from each of a plurality of services to respond to requests via a first type of protocol of a plurality of protocols. The device calculates an average response time for the first type of protocol from each of the response times of the plurality of services. The device establishes a predetermined threshold for which a response time of a service for the first type of protocol may deviate from the average response time. The device identifies a service as available responsive to determining that a deviation of the response time of the service from the average response falls within the predetermined threshold.07-29-2010
20120144025Method and an Arrangement For Enabling User Traffic Classification Configuration - A method of enabling traffic flow classification on a node, which may be used for controlling the traffic flows on the same node or on another node of a communication network. A first mapping process is configured to manage an operation for linking an application process to a class, and a second mapping process is configured to manage an operation for linking an application process to a unique signature. A third mapping process is configured to manage a record of accumulated linking information, such that a traffic flows associated with an application process may be identified and such that a classification of the respective traffic flow can be recognised. The accumulated classification information may then be used for controlling purposes.06-07-2012
20120144024METHOD AND SYSTEM FOR USER SESSION DISCOVERY IN A MULTI-TENANT ENVIRONMENT - Systems and methods are described to validate user connections to one or more application servers within a multi-tenant application system. A domain-level cookie at the client identifies any active connections for that client. As the client requests a connection to a particular application, the cookie is provided to a validation server that determines if any previously-established sessions with the multi-tenant system exist, and/or if such sessions remain active. If an active session already exists, then the client can be redirected to a particular server to continue the previously-established session. If no valid prior sessions are available, then the client can be validated and a new connection to an appropriate server can be established, as appropriate.06-07-2012
20120144022CONTENT RECOMMENDATION THROUGH CONSUMER-DEFINED AUTHORITIES - A method for recommending content to a consumer in a manner proactively controlled by the consumer. The method is based on subscription to one or more consumer-identified authorities that receive content of potential interest to the consumer. The method comprises identifying an authority that shares an interest of the consumer, and establishing a communication channel through which information about the authority is passed to the consumer. The method further comprises monitoring a consumption activity of the identified authority, and offering one or more content recommendations to the consumer based on such monitoring.06-07-2012
20090259750METHOD OF AND APPARATUS FOR COMMUNICATING DATA STRUCTURES BETWEEN DEVICES IN A NETWORKING ENVIRONMENT - The invention is an architecture, a system and a method for monitoring data structures over an IEEE 1394-1995 serial bus network. The data structures are portions of entries that are posted and stored to a descriptor mechanism. Preferably, the entries are schedule entries posted and stored to an AV/C resource schedule bulletin board subunit. According to the invention, a resource request is submitted by a requesting control device to the AV/C resource schedule bulletin board subunit, where request data is stored and posted as a schedule entry. The requesting control device also submits a corresponding notify command data frame to the AV/C bulletin board subunit. The notify command frame instructs the bulletin board subunit to monitor a specified data structure within the schedule entry. Preferably, the notify command frame also specifies the type of access activity that is monitored. When a competing control device performs the specified type of access activity on the specified data structure, the bulletin board subunit sends a notify response frame to the original requesting control device. The notify response frame provides an alert to the original requesting control device that the specified access activity has been performed on the specified data structure by a competing control device. The original requesting control device can then review that accessing activity performed on the data structure and any modifications made to the data structure to determine whether further scheduling is required. Preferably, the access activity of the competing device and modifications made to the schedule entry are stored within the memory unit of the bulletin board subunit to provide a detailed history of the schedule entry.10-15-2009
20090282143TESTING OPERATION OF PROCESSORS SETUP TO OPERATE IN DIFFERENT MODES - Testing operation of processors setup to operate in different modes. In an embodiment, each tester system includes a processor setup to operate in a corresponding mode. A user sends a test request to a scheduler system indicating the mode of the processor sought to be tested, and the scheduler system forwards the test request to one of the tester systems with a processor setup to test the requested configuration. The scheduler system may maintain configuration information indicating which processors are setup to test which modes of interest, and also status information indicating which tester systems are presently available for testing. The configuration information and status information is used in determining a specific suitable tester system to which a test request is to be forwarded.11-12-2009
20110066723GENERATING STATISTICS OF POPULAR CONTENT - Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics.03-17-2011
20120144019MULTICHANNEL CONNECTIONS IN FILE SYSTEM SESSIONS - A multi-connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound to multiple connections to enable communication over multiple transports. During the initial negotiation of a session, a client and a server determine whether multiple connections are supported between the client and the server within a session. After establishing an initial connection, additional connections can be established and bound to the existing session. The multiple connections can be used for failover and/or load balancing. The multi-connection information system provides a protocol for discovering a capability to establish multiple channels within a session and information about the available connections between two particular resources.06-07-2012
20120144018Dynamic Rate Heartbeating for Inter-Node Status Updating - A scheme for monitoring node operational status according to communications transmits messages periodically according to a heartbeat rate among the nodes. The messages may be gossip messages containing the status of the other nodes in the pairs, are received at the nodes and indications of the communications delays of the received messages are stored, which are used to compute statistics of the stored communications delays. Parameters of the node status monitoring, which are used for determining operational status of the nodes, are adjusted according to the statistics, which may include adjusting the heartbeat rate, the maximum wait time before a message is considered missed, and/or the maximum number of missed messages, e.g., the sequence number deviation, before the node is considered non-operational (down).06-07-2012
20120144017Modeling and Reducing Power Consumption in Large IT Systems - The power consumed by a large IT system may be managed by individual servers calculating a set of predictors of the resources of the large IT system that may be required for a future time period, and weighting factors for those predictors. The predictors and weighting factors may be based on historical data showing actual resources used and past values of the predictors and weighting factors. An estimate of the resources required for the large IT system is then produced based on the predictors and weighting factors and the estimate is then used to determine excess resources of the individual server that may be put into a low power state in the future time period to minimize the power used. If too much resource is excess, the server may enter a soft off state.06-07-2012
20120144016System and Method for Counting Network Users - Embodiments presented herein provide methods, systems and computer program products for determining a count of network users. One method identifies one or more login access requests, from one or more server logs. Each of the one or more login access requests comprises a login cookie, and a user identifier. The method then forms one or more connected components based on the one or more login access requests. Each connected component comprises one or more user identifiers, wherein each of the one or more user identifiers is associated with one or more login cookies. The method finally determines a count of login users based, at least in part, on the user identifiers in the one or more connected components.06-07-2012
20120144013Discovery of on-path services for media flows - In one embodiment, a method includes receiving at a session call manager, service information transmitted from one or more service points on a path for a media flow between a source and a receiver, selecting from the service information, services to apply to the media flow at the service points, and signaling the service points to apply the selected services to the media flow. An apparatus is also disclosed.06-07-2012
20090276518TECHNIQUE FOR REGULATING LINK TRAFFIC - A system which regulates communication with a server is described. During operation, the system determines a retransmission rate of data packets during a first set of conversations between a group of users and the server via a peering link. Next, the system compares the retransmission rate and an historical retransmission rate of data packets during a second set of conversations between a second group of users and the server via the peering link. The system then adjusts a target acceptance rate of the server to requests to initiate conversations with additional users via the peering link based on the comparison of the retransmission rate and the historical retransmission rate. Additionally, the system accepts or rejects a request to initiate a conversation between another user and the server via the peering link based on an actual acceptance rate of the server to requests to initiate the conversations and the target acceptance rate.11-05-2009
20110113138SEMANTICALLY ENHANCED SERVICE SWITCHING - A system for automating service switching in a manner that may be transparent to any actively communicating applications or devices operating in a modular service based system architecture for mobile and embedded devices. An application level entity, such as an application node, may connect to a virtual service, which may be connected to one or more registered services. A switching subsystem may relay communication between the one or more registered services and the application via the virtual service. If a more suitable service becomes available, the switching subsystem may decide to switch from one or more of the registered services to the newly available service via the virtual service.05-12-2011
20090327487METHOD AND SYSTEM FOR DISCOVERING DNS RESOLVERS - A system and method for proactively discovering DNS resolvers in a network, comprising: sending IP addresses in the network to a scanning application; directing the scanning application to query each computer that corresponds to each IP address for information indicating whether each computer is a DNS resolver or a non DNS resolver; and identifying each computer as a DNS resolver or a non DNS resolver based on the information.12-31-2009
20090327482RELIABLE AND ACCURATE USAGE DETECTION OF A SOFTWARE APPLICATION - Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds.12-31-2009
20090327480METHOD AND SYSTEM FOR DISCOVERING MANAGED SYSTEMS IN A NETWORK - A method for discovering managed systems in a network including classifying a first managed system associated with a first active Internet Protocol (IP) address in the network using a plurality of network protocols, identifying a set of drivers using the classification, where the set of drivers are configured to obtain first management information about the managed system, obtaining a first set of drivers, populating a data model with the first management information obtain using at least one of the first set of drivers, and managing the first managed system using the data model.12-31-2009
20110066724SYSTEMS AND METHODS FOR DIRECTION OF COMMUNICATION TRAFFIC - An internet traffic redirection architecture is disclosed that allows for directing of various traffic to specified sites. The system and method allow a controller, such as an ISP, to benefit from unresolved IP Address requests and keyword and hotword queries by capturing this traffic and directing it to participating partners who provide content relevant and/or geographically relevant results. The system and method can decrease lost traffic, irrelevant keyword and hotword search results, and irrelevant redirection by web browsers resident on user's personal computers.03-17-2011
20110066722DEVICE MANAGEMENT APPARATUS, DEVICE MANAGEMENT SYSTEM, DEVICE MANAGEMENT PROGRAM, AND STORAGE MEDIUM - A device management apparatus is connected to one or more devices via a network, and includes: a response request unit that requests a response from the devices via the network; a reception unit that receives the response from the respective devices, a storage unit that stores a record, the record being arranged such that device identification information for identifying the devices is associated with response information indicative of whether the response was received and a date and time at which the response was received; a recording unit that updates the record; and an output control unit that reads on the storage unit and delivers the device identification information indicating that the corresponding response information is indicative of an absence of the response and an elapsed time from the corresponding date and time has exceeded a predetermined period.03-17-2011
20110066721IMAGE PROCESSING APPARATUS, REMOTE MANAGEMENT SYSTEM, LICENSE UPDATE METHOD, AND COMPUTER PROGRAM PRODUCT - An image processing apparatus includes an HDD that stores therein a license file containing an expiration date of a license of an application and a class of the license, a detecting unit that acquires the expiration date from the license file and detects whether the expiration date has passed, a class identifying unit that identifies a class of the license whose expiration date is detected as having passed, based on the license file, an update-process determining unit that determines a method of performing an update process based on the class, a license-file acquiring unit that acquires a license file from the license file management server based on the method of performing the update process, and a replacing unit that replaces the license file stored in the HDD with the license file acquired by the license-file acquiring unit.03-17-2011
20110066720NETWORK CONNECTION STATUS DETECTING SYSTEM AND METHOD THEREOF - A network connection status detecting system is provided for detecting a network connection status of a server, and the detecting system includes a plurality of monitoring servers and a central processing server. Each monitoring server is communicably coupled to the server and continues detecting the network connection status of the server. If the detected network connection status of the server is offline, offline information including an offline starting time will be produced. The central processing server contains a selected time interval and receives the offline information to compute a time difference between the offline starting times. If all time differences are smaller than the selected time interval, then the central processing server determines that the network connection status of the server is an offline status and records the earliest offline starting time as an offline time.03-17-2011
20110066719Automated Applicatin Dependency Mapping - A computer-executed method for network management automatically maps applications to network infrastructure. The method comprises monitoring network activity on one or more managed computers and collecting network activity data on the managed computers. The association of executable files to applications is identified and network activity data and the association of executable files to applications are analyzed. Connections from applications on the managed computers are established according to the analysis.03-17-2011
20110066718APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENTLY POOLING CONNECTIONS BETWEEN CLIENTS AND SERVERS - An apparatus, method and computer program product for efficiently pooling network client-server connections. The apparatus is implemented within an interface unit connecting a plurality of servers to the Internet, which is in turn connected to a plurality of clients. The method includes the steps of opening a connection between a first client and the interface unit; determining whether a connection between the interface unit and a server is finished being utilized by the first client; opening a connection between a second client and the interface unit; if no free connection is open between the interface unit and the server, then allowing the second client to access information on the server via the same connection utilized by the first client without waiting for the first client to initiate closing the connection; and delinking the connections between the first and second clients and the interface unit while keeping open the connection between the interface unit and the server.03-17-2011
20110066717METHOD AND APPARATUS FOR TIME ADAPTATION OF ONLINE SERVICES TO USER BEHAVIOR - An approach is provided for time adaption of online services. Timing information relating to usage by a user of one or more online services is retrieved. A pattern of consistent usage is determined from the timing information. Scheduling information is generated for transmission of a message based on the determined pattern.03-17-2011
20090210527Virtual Machine Management Apparatus, and Virtual Machine Management Method and Program - A virtual machine management apparatus connected to a plurality of server devices via a network generates a new virtual machine on a server device in accordance with a request from a management terminal. At that time, for one or more server devices to which a new virtual machine can be allocated, the virtual machine management apparatus refers to an allocation rule table for storing a score for each of combinations of types of virtual machines. The score indicates appropriateness of a condition that each combination of types of virtual machines is to be allocated to the same server device. Thus, the virtual machine management apparatus computes an index value indicative of appropriateness of a condition that the new virtual machine is to be allocated to the server device. Then the virtual machine management apparatus determines an allocation target for the new virtual machine with reference to the computed index value.08-20-2009
20090259749COMPUTER SYSTEM INPUT/OUTPUT MANAGEMENT - The collection of performance data at multiple servers in a SAN and forwarding that data to a centralized server for analysis is disclosed. Remote agents and a central server application collect specific interesting negative event data to enable a picture of the operational health of the SAN to be determined. The agents are placed in servers having HBAs acting as initiators. The agents interact with the HBAs through a driver stack to collect event data. Because of the initiator function they perform, HBAs have visibility to parts of the network that other entities do not have access to, and thus are ideal locations for gathering event data. A SAN diagnostics manager then pulls the collected data from each agent so that a “picture” of the SAN can be developed. In addition to collecting initiator data, the agents also collect errors and performance data from the OS of the servers.10-15-2009
20090182872Method and Apparatus for Detecting Events Indicative of Inappropriate Activity in an Online Community - A method of detecting events in a computer-implemented online community includes providing a computer-implemented event processor, providing the computer-implemented event processor with a description of at least one event to be detected, automatically analyzing messages of the online community with the computer-implemented event processor to detect the at least one event, and issuing a notification of a detected event. Also an apparatus for carrying out the method.07-16-2009
20090177768SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR EXTRACTING PORT-LEVEL INFORMATION OF WEB SERVICES WITH FLOW-BASED NETWORK MONITORING - Systems, methods, and computer program products for extracting port-level information of Web services with flow-based network monitoring. Exemplary embodiments include a method for extracting port-level information of Web services with flow-based network monitoring, the method including identifying a registry machine, coupling the registry machine to a traffic meter and flow monitor dynamically configuring the traffic meter, including exporting a first n bytes of a traffic payload exporting a sub-second traffic flow start and end times, extracting service provider information from traffic flow exports, including analyzing the exported n bytes of the traffic payload to extract port-level information at the flow monitor, extracting a value of an access point element, mapping a logical service provider address to a physical address and inserting the service into a Web Service Provider Registry within the flow meter, thereby populating the Web Service Provider Registry.07-09-2009
20090319659SOURCE DETECTION DEVICE FOR DETECTING A SOURCE OF SENDING A VIRUS AND/OR A DNS ATTACK LINKED TO AN APPLICATION, METHOD THEREOF, AND PROGRAM THEREOF - An original attacker which has set a computer as a springboard is detected by detecting a source of a virus or a DNS attack linked to an application, which attacks other computers. A source detection device for detecting a source of a virus or a DNS attack captures packets from a network under setting conditions, and extracts required information. The source detection device stores data such as information concerning behaviors and/or features of viruses and/or DNS attacks, and/or logs of respective servers, which are required for an application traceback. Linkage of a virus or a DNS attack is determined from an application traceback processing result stored in a database and from various data, and new conditions are set accordingly. Under the new conditions, source detection is carried out for a virus or a DNS attack. Data is updated and accumulated accordingly, and linkage and a relationship between a behavior of an attack and a virus or a DNS attack is determined, thereby to detect a source of the attack.12-24-2009
20090319657SIP TERMINAL, METHOD AND SYSTEM FOR REPORTING STATUS THEREOF, AND SIP SERVER - A session initiation protocol (SIP) terminal, a method and system for reporting status thereof, and an SIP server are provided. The present invention relates to the field of communications, and is capable of enabling the SIP terminal to initiatively report status information to the SIP server, thereby ensuring a normal connection of an SIP call. The method includes: detecting whether status of the SIP terminal changes; generating status reporting information when the status of the SIP terminal changes; and sending current status of the SIP terminal to the SIP server in the form of the status reporting information. The present invention is mainly applied to the SIP technology.12-24-2009
20090172154METHOD FOR AUTONOMIC DETECTION AND REPAIR OF BROKEN LINKS IN WEB ENVIRONMENTS - A method for implementing autonomic detection and repair of broken links in Web environments includes receiving a request for additional Web content in a server in response to a link present in an originating Web content held on a host server; determining the present state of the received link; wherein the server performs in response to the received link: returns the requested additional Web content to a user; returns a Web content not found notification to a user; returns a Web content has moved notification with a valid link; wherein the notifications are digitally signed by the server; wherein in response to the returned notifications, the user's browser sends the notifications to the host server; and wherein in response to the reception of the notifications the host server notifies a content manager of the link state, stores the notification in a database, and repairs the link.07-02-2009
20100299434SYSTEMS AND METHODS FOR TRACKING WEB ACTIVITY - Systems and methods of tracking activity over networks and, in particular, tracking web activity over the Internet are described. Exemplary systems and methods may include a receiver for receiving a request from a visitor for a data object, a processor for providing a cookie to track the visitor's web activity, and a transmitter for transmitting the cookie to the visitor in response to the request. The cookie may comprise tracking information for a plurality of web sites visited by the visitor.11-25-2010
20090164626METHODS AND APPARATUS FOR PERFORMING NON-INTRUSIVE NETWORK LAYER PERFORMANCE MEASUREMENT IN COMMUNICATION NETWORKS - Methods and apparatus for performing non-intrusive network layer performance measurement in communication networks are disclosed. An example method to measure network layer performance between existing network nodes disclosed herein comprises coupling a first intelligent network interface (INI) to an available access port of a first existing network node providing access to a network, wherein the first INI obtains power and input information only from the access port after being coupled thereto, and exchanging test messages between the first INI and a second INI coupled to a second existing network node during normal operation of the first and second existing network nodes to measure network layer performance, wherein the test messages originate in the first INI and are routed through the first and second existing network nodes using a first network layer address associated with the first INI and a second network layer address associated with the second INI.06-25-2009
20100268818SYSTEMS AND METHODS FOR FORENSIC ANALYSIS OF NETWORK BEHAVIOR - Systems and methods monitor and manage computer network traffic and identify a status of normality or consistency of the traffic on a per user, per interne protocol address or MAC address basis. More specifically, the systems and methods determine, with degrees of significance, the abnormality or inconsistency of network traffic from a user, IP address or MAC address based on a comparison of said network traffic to previous network traffic from the same location. Moreover, the systems and methods monitor and manage the network traffic whereby, after an anomaly has occurred, network traffic is tagged as suspicious and thereafter is flagged for forensic study and placed in storage. In addition, the systems and methods report tagged traffic and alert administrators of a breach or violation in the computer network.10-21-2010
20090144418METHODS AND SYSTEMS FOR ENABLING ANALYSIS OF COMMUNICATION CONTENT WHILE PRESERVING CONFIDENTIALITY - Disclosed are methods and systems for enabling analysis of communication content while preserving confidentiality. In one embodiment, communication content is processed to increase the similarity of superficially dissimilar instances of communication content and/or to increase the distinctiveness of superficially similar instances of communications content. In this embodiment at least part of the processed communication content is hashed to obscure the actual communication content. In one embodiment, social network analysis is performed on the communication content after hashing, and visualization of the social network analysis includes thread graphs and/or circular graphs.06-04-2009
20090138593SYSTEM AND METHOD FOR COLLECTING, REPORTING AND ANALYZING DATA ON APPLICATION-LEVEL ACTIVITY AND OTHER USER INFORMATION ON A MOBILE DATA NETWORK - System and method for collecting and analyzing information on application-level activity and other user information on a mobile data network. A platform non-intrusively and transparently monitors data activity on a mobile data network in real-time so that user-level information can be reported to an operator. The platform comprises a plurality of collectors, a data manager, and a report manager. The collectors communicate with network routers to almost all network data. The collectors inspect the data for IP addresses and correlate them to user mobile phone numbers. The data manager receives the data and augments it with information obtained by querying carrier information. The data manager stores the data and monitors it to see if it satisfies a set of defined real-time reports. The report manager then works with the data manager to develop and test new reports based on operator instructions for a specific report.05-28-2009
20090138591Method for the display of visual sequencing of message communications between application portlets and task page relationship information in a web-base environment - A display portlet is incorporated into a portal page in a web-based environment. This display portlet presents the message communication information between the portlets that are currently running on that portal page. The displayed message communication information indicates the portlet that is the source of a transmitted message and displays one or more portlets that receive the message. The visual representations can be of various formats such as a spacial display or a tree representation. Each communicated message has a stored record identifying the transmitting portlet and any portlet that receives the message.05-28-2009
20090319658METHOD AND SYSTEM TO MONITOR EQUIPMENT OF AN IT INFRASTRUCTURE - The invention relates to a method for monitoring and analyzing IT infrastructures in a telecommunication system, the system comprising a controller node and a plurality of IT infrastructures, the method comprising for the controller node the acts of distributing a monitoring agent to each IT infrastructure through the telecommunication system, the IT agent being adapted to monitor performance parameters of the IT infrastructure and forward performance data corresponding to the performance parameters to the controller node, receiving for at least one of the IT infrastructures the performance data, gathering for at least one performance parameter an IT infrastructure filter and a set of rules, the IT infrastructure filter defining a subset of the performance data, and the set of rules defining computational rules to be applied to the subset of data, and calculating statistics for the at least one performance parameter based on the set of rules applied to the subset of data.12-24-2009
20090319656APPARATUS AND METHOD FOR MANAGING A NETWORK - A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to perform a first query of a network device by way of a wired connection with the network device, perform a second query of the network device by way of a wireless connection with the network device, detect an undesired condition associated with at least one of the network device and the wired connection with the network device based at least in part on the first and second queries, and discern between the undesired condition being associated with the network device and being associated with the wired connection based at least in part on the first and second queries. Other embodiments are disclosed.12-24-2009
20090319654METHOD AND SYSTEM FOR USER BASED NETWORK ANALYSIS AND PLANNING - A system and method are provided for converting individual technical metrics into a single relevant metric understood and accepted by both technical and non-technical components of a business venture. An example system and/or method includes measuring current technical utilizations and capacities, translating those into a supportable users metric, forecasting future utilization levels, translating those into future network component and/or hardware requirements, and expanding/scaling technical capacity based on those values and the predetermined capacity levels of additional components and/or hardware.12-24-2009
20090113050METHOD AND SYSTEM FOR AUTOMATED SESSION RESOURCE CLEAN-UP IN A DISTRIBUTED CLIENT-SERVER ENVIRONMENT - A system and method of automatic session resource clean-up resulting from a client-server session wherein the client has requested use of server resources during the session. During each session, a list of the resources allocated to that session and associated with the client is maintained and, when the session terminates, either naturally or unnaturally, the allocated resources are released or freed up, allowing later use of the same resources by a different session, either with the same client or with a different client. A session may terminate naturally because a program which is using the resource (such as a database) has completed its operation and ended normally. A session may also terminate unnaturally, e.g., because the connection between the client and the server has been broken for some reason or because a program has aborted or become hung in an inoperative state. Because such unnatural terminations do not normally provide a farewell message from the client to the server—only silence, from the lack of further processing messages—there is no way for the server to release the resource and no naturally occurring message to the server that the client is not present. The present invention overcomes these disadvantages by determining when a session has ended and releasing the resources associated with the client.04-30-2009
20100223375SYSTEMS AND METHODS FOR SEARCHING A MANAGED NETWORK FOR SETTING AND CONFIGURATION DATA - A network management server can be configured to search the components of computing systems and devices in a managed network for specified settings and configurations in order to determine if the computing systems or devices contain the specified settings and configurations. The network management server can receive a request containing search parameters. The search parameters can identify specific settings and configurations to search for in the components of the systems and devices of the managed network. The network management server can initiate a search of the components of all the systems and devices in the managed network based on the search parameters.09-02-2010
20110238827System and method for monitoring and displaying radiology image traffic - An embodiment of the present invention includes a system and method for detecting and monitoring confidential and DICOM image traffic on a computing device in a PACS network. Embodiments of the present invention protect patient confidentiality by preventing the simultaneous display of confidential images and patient identification information when measuring and displaying the image data. The system detects and measures the transfer of confidential images and stores and displays information included in only the non-confidential headers of the images. The system monitors and warns (such as via email and/or pagers) PACS administrators of system slowdowns as a result of the data gathered.09-29-2011
20080288636SENSOR NETWORK SYSTEM AND DATA RETRIEVAL METHOD FOR SENSING DATA - A sensor network system, including: a model list that stores preset model names; an event table that stores monitoring conditions of data transmitted from sensor nodes; an event generator that receives data corresponding to the model names from the sensor nodes, and notifies an occurrence of an event when receiving data satisfying the monitoring conditions from the sensor nodes; and an event-action controller including an action executer that executes processing previously specified when the occurrence of an event is indicated from the event generator.11-20-2008
20090113046INFORMATION PROCESSING APPARATUS FOR UPDATING ENVIRONMENT INFORMATION - According to an aspect of an embodiment, a server apparatus connected to a plurality of client apparatuses capable of sending out a message containing environment information to the server apparatus, the server apparatus has a storage for storing environment information in association with each of the client apparatuses and a processor for receiving a message including updated environment information indicative of addition of an interface device connected to the client apparatus from the client apparatus and for updating the environment information in the storage with the updated environment information.04-30-2009
20090113039METHOD AND SYSTEM FOR CONTENT HANDLING - Methods and systems for content handling mapping are described. A client profile may be accessed. The client profile may include a general usage pattern of an access device. A current usage pattern of the access device may be accessed. The current usage pattern may be based on a plurality of interactions between the access device and a network server during a current time period. A determination may be made of whether the current usage pattern is in accordance with the client profile. A throttle instruction may be provided to a networked device to throttle at least one additional interaction of a plurality of additional interactions between the access device and the network server based on the determining. The networked device may be on an access network with the access device and the network server.04-30-2009
20090113038Systems and Methods for Monitoring Performance of Field Assets - A system and method for monitoring performance of field assets are disclosed. A method may include transmitting packets on a shared bus located in a field asset may be captured. The captured packets may be analyzed to determine one or more operational parameters associated with one or more peripheral devices coupled to the shared bus. The one or more operational parameters may be analyzed to determine an operational efficiency of the field asset.04-30-2009
20090113048METHOD AND PROGRAM FOR MANAGING THE QUANTITY OF DATA TRANSMITTED BY A TRANSMISSION DEVICE OVER A TELECOMMUNICATION NETWORK - The invention relates to a method of managing the quantity of data transmitted by a transmission device over a telecommunication network, characterized in that the method comprises the steps, carried out by the transmission device, of: 04-30-2009
20090113044SYSTEM AND METHOD OF CONFIGURING A NETWORK - Methods and systems for configuring a network are provided. A method may include monitoring properties of a connection between a computing device and a network. The method may also include detecting a change in the properties of the connection. The may also include verifying the connection to the network is provided by a service provider when the change in the properties is detected and providing network configuration options based on the change.04-30-2009
20090113040COMMUNITY BASED MODERATION IN ON-LINE SESSIONS - Methods, apparatuses, and techniques for moderating activity in an online community are described. Aspects include a triggering mechanism being activated by a community member in response to inappropriate activity by another community member. Receiving a time based history of community members activity around a time of the triggering mechanism being activated. Recreating the community activity from the time based history. Evaluating activities of the community members to determine if there was inappropriate activity and if there is inappropriate activity by an offending community member taking appropriate action against the offending community member.04-30-2009
20100223377NETWORK MONITORING SYSTEM, SERVER APPARATUS, NETWORK MONITORING METHOD - A network monitoring system includes a server apparatus managing information of an optical transmission device in a network configured in a ring fashion and a client apparatus carrying out at least change of setting of the optical transmission device and check of apparatus condition thereof. A first protocol is used between the server apparatus and the client apparatus while a second protocol is uses between the server apparatus and the optical transmission apparatus. The first protocol and the second protocol are different from each other. The server apparatus includes a conversion portion carrying out mutual conversion between the first protocol and the second protocol.09-02-2010
20080270601SYSTEM METHOD AND APPARATUS FOR SERVICE ATTACK DETECTION ON A NETWORK - Embodiments of the invention are directed to a detection system, method and apparatus that identifies and eradicates fraudulent requests on a network. Embodiments of the detection system comprise at least one router, a server, and an activity monitoring system. The activity monitoring system comprises a route arbiter and a traffic analyzer, wherein the route arbiter monitors the activity on the router. The route arbiter continuously monitors the router and firewall device to determine if abnormal activity or traffic patterns are emerging. If a determination is made that abnormal activity or abnormal traffic patterns exist, the activity monitoring system responds by blocking the activity or redirecting the traffic.10-30-2008
20120198062METHOD FOR MONITORING TRAFFIC IN A NETWORK AND A NETWORK - For providing a simple monitoring mechanism with reduced resource and performance requirements a method for monitoring traffic in a network is claimed, wherein a monitoring activity of at least two monitoring probes of the network is coordinated by a coordinating element, wherein at least two nodes of the network are able to operate as coordinating elements and wherein the responsibility for coordinating the monitoring activity of the monitoring probes is split between the nodes according to a compressed representation of flow parameter keys. Further, an according network is described, preferably for carrying out the above mentioned method.08-02-2012
20120198055SYSTEM AND METHOD FOR USE WITH A DATA GRID CLUSTER TO SUPPORT DEATH DETECTION - A system and method is described for use with a data grid cluster to support death detection. A network ring is formed by connecting a plurality of process nodes in the data grid, wherein each node in the network ring watches another node. A death of a first process node in the network ring can be detected by a second process node, when the second process node notices that its connection to the first process node has closed. The first process node then informs other process cluster nodes in the network ring that the first node is dead. In accordance with an embodiment, machine level death detection can also be supported in the data grid cluster by using an Internet Protocol (IP) monitor.08-02-2012
20120198054Method and apparatus for determining gateway and method and system for sending message - The present disclosure discloses a method for determining a multimedia message gateway, comprising: receiving a message of querying a multimedia message gateway sent by a value-added service server after the value-added service server generates a multimedia message; acquiring the service processing situation or resource occupation situation of each multimedia message gateway, determining the multimedia message gateway with the strongest service processing capacity currently according to the service processing situation, or determining the multimedia message gateway with the most residual resource according to the resource occupation situation; and using the determined multimedia message gateway as the multimedia message gateway for sending the multimedia message. The disclosure further discloses a method for sending a multimedia message, an apparatus for determining a multimedia message gateway and a system for sending a multimedia message. The disclosure can solve the problem of traffic imbalance of each multimedia message gateway caused by presetting multimedia message gateways in the prior art.08-02-2012
20120198051Adaptive Service Discovery in Structured Peer-to-Peer Overlay Networks and Method - An overlay network, node and method for adaptive service discovery. The method uses an adaptive service discovery in the overlay network for finding a peer that provides a desired service; generates a tree structure for current peers that provide the desired service; assign the current peers that provide the desired service to different levels of the tree structure; estimate, when a peer intends to register for the desired service with the adaptive service discovery, a number S of actual peers that provide the desired service; and calculates, based on the estimated number of actual peers providing the desired service, an optimal starting level for the peer to register for the desired service.08-02-2012
20100274895OBJECT ORIENTED COMMUNICATION AMONG PLATFORM INDEPENDENT SYSTEMS OVER NETWORKS USING SOAP - A system for object oriented communication among platform independent systems over networks using SOAP, in which communications can be performed over a network utilizing a single communications protocol. A simple object access communications protocol (SOAP) is utilized for sending messages from one object to another across the network in a platform independent manner. This type of protocol can be utilized to control network elements provided at various locations.10-28-2010
20110060825INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS AND RECORDING MEDIUM RECORDING CONTROL PROGRAM FOR INFORMATION PROCESSING APPARATUS, CAPABLE OF EXECUTING EFFICIENT DATA COMMUNICATION DISPENSING WITH COMMUNICATION WITH ONCE COMMUNICATED PARTNER - An exchange data communication determining unit determines, based on a received reception wireless frame, whether or not a communication partner is an exchange partner with which the exchange data can be exchanged. Receiving a notice that exchange of the exchange data is possible, a data communication control unit executes a process for giving/receiving the exchange data. A machine identification information registration unit stores an MAC address of a portable game machine in an MAC address list saving area. Again, the wireless frame transmitting/receiving unit sets a transmission wireless frame and executes an exchange partner searching process. An exchange data communication determining unit determines whether or not an MAC address included in the received reception wireless frame is registered with the MAC address list saving area, and if it is registered, the data communication is terminated.03-10-2011
20120144014DIRECTING DATA FLOWS IN DATA CENTERS WITH CLUSTERING SERVICES - Techniques are provided for implementing clustering services in a virtual data center or other virtualized infrastructure in a manner that allows packets to be directed to a particular service engine of a service engine cluster.06-07-2012
20120144028MONITORING PROCESSES IN A COMPUTER - A monitoring program is run on a computer to identify a process running on the computer, and, for the identified process, determine whether or not one or more predetermined characteristics of the process complies with respective reference characteristics. This allows the program to automatically distinguish whether the process is likely to be a productive process or a non-productive process. For each characteristic a certainty value is incremented or decremented depending on whether the characteristic complies with the reference characteristic. Examples of characteristics are the time pattern of running of a process and the use of hardware resources by the process. Other characteristics include receiving input from a user and connections to known IP addresses. The monitoring process may be used to control power consumption to detect and run non-productive processes in a low power state.06-07-2012
20120144026Monitoring Connections - Apparatus for processing requests from a plurality of connected clients for data s