35th week of 2009 patent applcation highlights part 59 |
Patent application number | Title | Published |
20090216804 | System and Method for Using Manufacturing States of Vehicle Products for Display of a Manufacturing Process - A system and method of using manufacturing states in a manufacturing process is provided in which manufacturing states for an article of manufacture are defined at different time periods of a manufacturing process for display as manufacturing contexts relating to an installation plan. The manufacturing states for the article of manufacture are stored in a process database as the manufacturing states are defined during the manufacturing process. The manufacturing contexts relating to the installation plan for the article of manufacture are visually displayed with at least one other manufacturing context relating to another installation plan for another article of manufacture. | 2009-08-27 |
20090216805 | Systems, Methods and Computer Program Products for the Creation of Annotations for Media Content to Enable the Selective Management and Playback of Media Content - The exemplary embodiments of the present invention provide a method for generating an annotation for media content, that includes retrieving a media content subset from a media content source, saving the received media content subset at a computing system, and generating an annotation for association with the media content subset using the computing system. The method further includes associating the annotation with media content to facilitate the visualization and navigation of the media content and adding the annotation to at least one annotation repository designed for efficient retrieval of annotation elements. | 2009-08-27 |
20090216806 | DIGITAL ASSETS INTERNET TIMELINE AGGREGATION AND SHARING PLATFORM - Personal digital assets are collected, managed, shared and archived on a social network using a client interface for registering a user and performing tasks. User sources are defined and assets are collected and organized chronologically as eternal Time-lines. Permission level rules are associated with each asset and Time-line and a plurality of subjective groups distinguished by their relation to the user are defined. Chosen assets of the Time-line are tagged with assigned keywords recognized by the social network service, thus sharing them with the tagged entity according to the permission level rules. Authorized members are invited to contribute and share assets with the founder of an established Time-line, and data storage is optimized in a way that every tag added to an assets appears on every instance it has on other Time-lines sharing that asset, such that shared assets are saved to the data storage only once. | 2009-08-27 |
20090216807 | MEDICAL DATA EVALUATION AND DISTRIBUTION - Systems and processes may facilitate evaluating medical data and distributing the results. In particular implementations, systems and processes may guide appraisers through the process of identifying medical articles regarding medical issues (e.g., medical reports on disease and/or treatment topics) for appraisal, and then through the process of critically appraising medical articles on the merits of their scientific evidence. The systems and processes may then take the appraisals and present them in an easy-to-digest format for an end-user. Additionally, the systems and processes may maintain an active link to the original data sources so that users can see what new developments are taking place with respect to the medical issue. | 2009-08-27 |
20090216808 | DATA EXPLORATION SYSTEM - An improved data exploration system and method for analyzing and exploring complex data sets involving multiple data dimensions and multi-variable data presentations. The system can generate visual representations of complex data sets in a map format, in which symbols representing the complex data sets are plotted based on data underlying the various symbols. The positions of a first set of symbols can be plotted in the map format relative to a first axis based on the data underlying each symbol, and index numbers corresponding to a second set of symbols can be plotted in the map format along a second axis orthogonal to the first axis, thereby facilitating visual comparison and comprehension of selected characteristics of the data. | 2009-08-27 |
20090216809 | METHOD FOR UPDATING DATABASES - Techniques for batch-updating batch-updating one or more SQL statements in a database are provided. The techniques include identifying a set of one or more data types, wherein the set comprises one or more columns that are each updated, respectively, by a SQL statement, identifying a set of one or more tables, wherein each of the one or more tables are updated, respectively, by a SQL statement, identifying a set of one or more columns used in a WHERE clause of each of one or more SQL statements, and batch-updating the one or more SQL statements, wherein batch-updating comprises creating a UNION ALL view comprising the set of one or more data types, the set of one or more tables and the set of one or more columns used in a WHERE clause, and wherein each SQL statement is mapped to each set of the UNION ALL view. | 2009-08-27 |
20090216810 | FILE STRUCTURE ANALYZING APPARATUS, FILE STRUCTURE ANALYZING METHOD, AND PROGRAM - The present invention provides a file structure analyzing apparatus for analyzing a file including a group of structured data formed into a tree structure by having a plurality of distinct element packets referenced externally, each of the distinct element packets including a unique identifier for identifying the distinct element packet in question and an external referrer for indicating an external reference destination at which to reference externally another distinct element packet using the unique identifier of the latter packet, the file structure analyzing apparatus including: a distinct element packet input section; an external referrer holding section; a unique identifier holding section; and a reference relationship analysis section. | 2009-08-27 |
20090216811 | DYNAMIC COMPOSITION OF AN EXECUTION ENVIRONMENT FROM MULTIPLE IMMUTABLE FILE SYSTEM IMAGES - A virtual file system is formed configured to enable the dynamic composition of immutable file system images. A file system containing a software distribution is divided into a plurality of mutually exclusive sub-trees. Each sub-tree includes a portion of the software distribution. An immutable file system image is formed for each sub-tree. During the booting of an operating system, a virtualization engine intercedes in the boot process to mount the immutable file system images to independent directories of the root file system. Upon request the virtualization engine, during run-time, combines virtual entries corresponding to immutable file system images so as to resemble the original software distribution. | 2009-08-27 |
20090216812 | METHOD AND SYSTEM FOR UPDATING ANNOUNCEMENT AND PLAYING APPARATUS FOR PLAYING ANNOUNCEMENT - A method for updating includes: using a playing apparatus, downloading a multimedia file to be played from a file server to a local storage location, and playing multimedia based on the old local multimedia file; setting a storage area for new multimedia files on the file server, where a new multimedia file is adapted to update an old multimedia file on the file server; by the playing apparatus, scanning the storage area for new multimedia files on the file server, and after finding the new file for updating the old local multimedia file, downloading the found new file to a new local storage location; and after receiving a request for playing the old multimedia file to be updated, playing multimedia based on the new multimedia file stored in the new local storage location. Embodiments of the present invention may update multimedia files without interrupting the playing of multimedia. | 2009-08-27 |
20090216813 | METHOD AND SYSTEM FOR GENERATING A TRANSACTION-BOUND SEQUENCE OF RECORDS IN A RELATIONAL DATABASE TABLE - A method for generating a transaction-bound sequence of records in a database table is disclosed. In response to a transaction attempting to insert a record to a database table within a relational database, an identification (ID) of the transaction and the name of the associated database table are initially obtained. A determination is then made whether or not the obtained transaction ID and the associated database table name are found in the transaction-bound tracking table. If they are not found in the transaction-bound tracking table, a new entry is generated in the transaction-bound tracking table for the obtained transaction ID and database table name, and a value in a last_order_number column associated with the entry is set to 1; otherwise, a value in the last_order_number column associated with the entry is incremented by 1. The value in the last_order_number column associated with the entry is subsequently copied to the corresponding order tracking field associated with the record entry in the database table. | 2009-08-27 |
20090216814 | IMAGE SCALING ARRANGEMENT - Methods and system for transferring images between devices is disclosed. For example, differently scaled images by a host device may automatically and/or selectively be transferred to a media player for display. In turn, appropriately scaled images may be transferred automatically and/or selectively to another display device for example a TV, camera or printer. The selectivity may occur either at the host level or at the player level. | 2009-08-27 |
20090216815 | Conflict Management During Data Object Synchronization Between Client and Server - A client stores client metadata entries corresponding to a plurality of data objects. During a first phase of a synchronization process, the client sends one or more client metadata entries to a server. Each client metadata entry sent corresponds to a data object for which at least one metadata parameter has changed since a prior execution of the synchronization process. During a second phase of the synchronization process, the client receives from the server one or more server metadata entries, each having at least one parameter that has changed since a prior execution of the synchronization process. The client identifies any received server metadata entry that conflicts with a corresponding client metadata entry, requests a user to select from among a predefined set of conflict resolutions to resolve the conflict, and the performs an action in accordance with the conflict resolution selected by the user. | 2009-08-27 |
20090216816 | METHOD FOR APPLICATION BACKUP IN THE VMWARE CONSOLIDATED BACKUP FRAMEWORK - Systems and methods for backing up applications executing on a virtual machine are provided. The method comprises submitting a first notification to a remote computing system to prepare an application running on a virtual machine for backup, such that application data consistency is maintained during the backup process; receiving a second notification from the remote computing system, indicating that the application is prepared for backup; creating a snapshot of the virtual machine in response to the second notification; and receiving application data from the computing system to process the snapshot and complete an application-specific backup for the virtual machine. | 2009-08-27 |
20090216817 | SYSTEM AND METHOD FOR UTILIZING GENERATIONAL FILE NAMES FOR DIAGNOSTIC DATA FILES - A system and associated method for utilizing file names for diagnostic data files generated by a runtime environment. The method employs a file counter base that defines a predefined maximum number of files permitted in a file system, a generation number that indicates an instance of the runtime environment, and a file counter that comprises a file name. The file counter circulates by a cycle equal to the file counter base such that the file system uses only a limited disk space. The method determines the generation number per instance of the runtime environment by examining file counters of existing files in the file system. The generation number initializes the file counter for creating file names in the instance of the runtime environment. The method guarantees a longest life span of a diagnostic data file in a file system that has a limited number of files. | 2009-08-27 |
20090216818 | METHOD AND APPARATUS FOR MANAGING FOLDER - A method and apparatus for managing a folder is provided. The method includes: setting a drive correspondence table showing a correspondence relation of first location information including location information of an apparent drive allocated to the folder in the operating system and second location information including location information of a target drive to be actually allocated to the folder; and changing, in response to a request for an access to the folder requested by the operating system, location information allocated to the folder from the first location information of the apparent drive allocated to the folder to the second location information of the target drive allocated to the folder in accordance with the drive correspondence table without notifying the operating system of a change of location information of the drive allocated to the folder, whereby enabling the operating system to consequently access the folder in the target drive. | 2009-08-27 |
20090216819 | Stairway dimensions comparative calculator - An electronic spreadsheet or hand user calculator consists of an array of cells some containing formulas some into which a user enters stair dimension values such as total rise and run. After the user has entered such values the formulas proceed to other stair dimension calculations; then results are displayed on the spreadsheet. The system provides a facility not available on conventional electronic stair calculator spreadsheets: the first column provides results corresponding to initial values entered by the user and a second column, next to the first, allows to compare stair dimensions when the user plugs a different number of steps. For example an entered total rise of 111″ and run of 10.5″ will give, in the first column 14 steps each having a rise of 7.4″. Using a second column to compare stair dimension results for 15 steps shows a rise of 6.94″. | 2009-08-27 |
20090216820 | FAST COMPUTATION OF COMPACT POSET ISOMORPHISM CERTIFICATES - Two methods and systems for fast construction of poset isomorphism certificates are provided. Posets (partially-ordered sets) generalize graphs. The invented certificates are number sequences such that two posets are isomorphic if and only if their corresponding certificates coincide. The first method yields the (Omicron,Iota) poset isomorphism certificate. The minimal Phi-isomorphism certificate can be constructed by partitioning vertices of the graphs into Phi-ranked symmetry clusters and constructing a topological Phi-vertex ranking. Thus, symmetries in posets are detectable at low cost. In addition, the Phi-vertex ranking and a poset isomorphism certificate provide a pair of separate one-dimensional keys for poset encoding. Data objects representable as posets, which are commonly used in automated design, safety and security applications, biocomputing, management of semi-structured data, and other fields, can be stored, analyzed, indexed, and accessed using the isomorphism certificates requiring much less storage and computation time. | 2009-08-27 |
20090216821 | Singular Value Decomposition Apparatus and Singular Value Decomposition Method - The present invention provides a singular value decomposition apparatus that can perform processing in parallel at high speed and high accuracy. The singular value decomposition apparatus comprises a matrix dividing portion | 2009-08-27 |
20090216822 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR VERIFYING FLOATING POINT SQUARE ROOT OPERATION RESULTS - A method, system and computer program product for verifying a result of a floating point square root operation is provided. The method includes: receiving a result of a floating point square root operation for an operand; performing a comparison of a magnitude of a least significant bit (LSB) of the operand and a magnitude of a most significant bit (MSB) of a remainder; and determining whether the result is correct based on the comparison. | 2009-08-27 |
20090216823 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR VERIFYING FLOATING POINT DIVIDE OPERATION RESULTS - A method, system and computer program product for verifying a result of a floating point division operation are provided. The method includes: receiving a result of a floating point division operation for a dividend and a divisor; performing a comparison of a magnitude of a least significant bit (LSB) of the dividend and a magnitude of a most significant bit (MSB) of a remainder; and determining whether the result is correct based on the comparison. | 2009-08-27 |
20090216824 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DETERMINING REQUIRED PRECISION IN FIXED-POINT DIVIDE OPERATIONS - A method, computer program product and a system for controlling a fixed point division operation are provided. The method includes: receiving an instruction to perform a division operation for a dividend and a divisor, the operation comprising a maximum number of iterations to produce a quotient having a maximum precision; calculating a magnitude of at least one of the dividend and the divisor; determining a quotient precision based on the magnitude; and computing a required number of iterations needed to produce the quotient precision and performing the number of iterations. | 2009-08-27 |
20090216825 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR DETECTING ERRORS IN FIXED POINT DIVISION OPERATION RESULTS - A method, computer program product and a system for detecting errors in a result of a fixed-point division operation are provided. The method includes: receiving a result of a fixed-point division operation for a dividend and a divisor; performing a first comparison of the divisor and a remainder of the result; performing a second comparison of a sign of the dividend and a sign of the remainder; and determining whether the result is correct based on the first comparison and the second comparison. | 2009-08-27 |
20090216826 | GENERALIZED PROGRAMMABLE COUNTER ARRAYS - A Generalized Programmable Counter Array (GPCA) is a reconfigurable multi-operand adder, which can be reprogrammed to sum a plurality of operands of arbitrary size. The GPCA is configured to compress the input words down to two operands using parallel counters. Resulting operands are then summed using a standard Ripple Carry Adder to produce the final result. The GPCA consists of a linear arrangement of identical compressor slices (CSlice). | 2009-08-27 |
20090216827 | Virtual Sensor - The object of the present invention is to enable to utilize the sensor(s) in the manner that is optimized for the application, as well as easily. According to one aspect of the present invention, the invention provides a computer software configured to receive instructions from another software, collect information from one or a plurality of sensors based on said instructions, determine whether said information satisfies the conditions required by said instruction, and if so, report to that effect to said other software. | 2009-08-27 |
20090216828 | TRANSITIONING FROM DYNAMIC CLUSTER MANAGEMENT TO VIRTUALIZED CLUSTER MANAGEMENT - Methods and apparatus, including computer program products, are provided for transitioning one or more aspect of a dynamic cluster of computers to one or more virtual machines. In one aspect, there is provided a computer-implemented method. The method may include receiving information representative of a dynamic cluster system and receiving information representative of a virtual machine. A controller may initiate, based on the received information representative of the dynamic cluster system and the virtual machine, a transition of one or more aspects of the dynamic cluster system to the virtual machine. Related apparatus, systems, methods, and articles are also described. | 2009-08-27 |
20090216829 | NETWORK EQUIPMENT - A network equipment has a group of first stage computing units that perform first stage processing on a packet, and has a group of second stage computing units that perform second stage processing on a packet after the first stage processing. The network equipment assigns the first stage processing that is to be performed on the packet to a computing unit in the group of first stage computing units; generates control information for determining which computing unit in the group of second stage computing units is to be assigned the second stage processing when the computing unit in the group of first stage computing units performs the first stage processing; and determines which computing unit in the group of second stage computing units is to be assigned the second stage processing on the packet based on the control information. | 2009-08-27 |
20090216830 | Information Distribution System - Disclosed is an information distribution system including: a SIP server; and a plurality of terminals registered to the SIP server, wherein the plurality of terminals are composed of: a distribution source terminal; and a distribution destination terminal, the SIP server includes: a storage section to store terminal information; an obtaining section to obtain terminal information of a distribution destination terminal; a producing section to produce the distribution destination information; and a sending section to send distribution destination information to the distribution source terminal, the distribution source terminal includes: a requesting section to request to send the distribution destination information; and a distributing section to connect to the distribution destination terminal and to distribute the predetermined information by peer-to-peer communication, the requesting section sends the predetermined information to the SIP server, and the sending section sends the distribution destination information and the predetermined information. | 2009-08-27 |
20090216831 | Entity identity management system and associated methods - An entity identity management system is disclosed. The entity identity management system includes an identity manager. The identity manager includes a validated database, a confirmation manager, and an interface. The validated database includes entity-controllable data. | 2009-08-27 |
20090216832 | Array-based distributed storage system with parity - In one general aspect, a data access method is disclosed that includes directing data block write requests from different clients to different data storage servers based on a map. Data blocks referenced in the data block write requests are stored in the data storage servers. Data from the data write requests are also relayed to a parity server, and parity information is derived and stored for the blocks. This method can reduce the need for inter-server communication, and can be scaled across an arbitrary number of servers. It can also employ parity load distribution to improve the performance of file transfers. | 2009-08-27 |
20090216833 | System and method for using a USB device of a client under a client-server architecture - A system and method for using a USB device of a client under a client-server architecture, applying to clients of Thin-Client computers under a client-server architecture. Through information communications between the terminal server and the client, the system and method provide a end-user of a client for indirectly operating the USB device, which is linked to the client, via the terminal server under the client-server architecture. | 2009-08-27 |
20090216834 | METHOD FOR COMMUNICATING WITH SEVERAL USERS, ARRANGEMENT, COMMUNICATION MANAGEMENT SERVER, AND COMMUNICATION TERMINAL - Disclosed is a method for communicating with several users in order to improve the usability of a communication system involving several users. Said method comprises the following steps to record a communication between the several users utilizing several communication services ( | 2009-08-27 |
20090216835 | GROUP MUTE - In an example embodiment, a technique that allows members of a group at multiple locations to have private conversations within members of the group while participating in a conference call. Group members are defined and divided into virtual conference rooms. When a group mute is requested, signals originating from members of the group are distributed to locations where group members are present, while all participants of the conference call, including the members of the muted group, receive un-muted media signals. | 2009-08-27 |
20090216836 | Saving a Draft Message in an Instant Messaging Environment - A system, method, and program product is provided that establishes an first instant messaging session between two users. During the first instant messaging session, the first user composes an instant message. Before the first user can send the composed instant message to the second user, a detection is made that the second user has logged off of the instant messaging session. A draft of the instant message is saved at the first user's computer system onto a nonvolatile storage device. At a later time, a second instant messaging session is established between the two users. In response to the second instant messaging being established, the draft of the instant message saved on the first computer system is identified and retrieved from the nonvolatile storage device. The retrieved draft of the instant messaging is then sent from the first computer system to the second computer system. | 2009-08-27 |
20090216837 | SECURE RESERVATIONLESS CONFERENCING - Techniques are disclosed providing secure reservationless conferencing, allowing an organizer to arrange a meeting while off-line from a conferencing server, with the conferencing server still enforcing security for the meeting. | 2009-08-27 |
20090216838 | Event-based contact list methods - Methods are provided for allowing an organizer of an event (such as a school reunion, a wedding, etc.) to create a site for the event on a server (e.g., an Internet server), and for allowing possible participants in the event to add information to the site and to retrieve information from the site. The methods preferably include fade-in and/or fade-out of certain information associated with the event. As an example of fade-in, a user may gradually be given access to more of another participant's contact information only after that other participant has responded to an initial contact from that user. As an example of fade-out, a user's device may gradually display an icon for the event less prominently if the event information is not being used. | 2009-08-27 |
20090216839 | Electronic Business Card Exchange System and Method - To provide a user with better experience of cooperation between an electronic business card processing program and a communication program when exchanging electronic business cards. Electronic business cards are stored in a DB server, which is one of storages for a communication program, as well as an electronic business card local file. Thus, even if a PC is a company's PC, for example, the electronic business cards can be viewed by accessing the DB server from another PC or the like outside an office. Further, the electronic business card processing program operates with the communication program as back-end, however, the electronic business card processing program may not be installed on a PC in some cases. Even in such a case, the communication program alone can display received electronic business cards that are stored in the communication program local file on the screen of a display. | 2009-08-27 |
20090216840 | METHOD FOR PROVIDING SERVICES TO USER INTERFACES - A method for providing access to a platform independent service involving transmitting a message to a communications device the method including identifying a device category based on at least one parameter from a first group having information extractable from the communications device; mapping the device category to a user interface process, in which the user interface process describes which user interface that currently is associated with the communications device; and transforming the message format of the message from a first message format to a second message format, the second message format being associated with the user interface process, thereby providing access to the platform independent service. | 2009-08-27 |
20090216841 | IDENTIFYING IP ADDRESSES FOR SPAMMERS - Detecting and blocking spam messages using statistical analysis on distributions of message sizes for a given IP address. Mail volumes are examined to model a distribution of volumes to cluster IP addresses. The messages sizes may distributed across ranges of message sizes, which is then used to determine an entropy of message sizes for the given IP address. The entropy of the given IP address may be compared to entropies of known good IP addresses, and if a difference between the entropies is statistically significant, then the given IP address may be determined to be an IP spammer. User feedback may also be employed to further characterize an IP address. For example, a number of messages from the IP address may be sent to intended recipients. User feedback may then be monitored to determine whether to the IP address should be reclassified. | 2009-08-27 |
20090216842 | REPORTING ON SPOOFED E-MAIL - Embodiments are directed towards detecting and reporting use by a domain of a message authentication mechanism, such as DomainKeys (DK), and/or DomainKeys Identified Mail (DKIM), and enabling subsequent blocking of messages based, in part, on its usage. When a message is received by an inbound message server, a message source is determined for the message. In one embodiment, the message source is a domain name associated with the sender of the message. Statistics are recorded about the message, including the message source, whether the message is suspect, includes a forged source identifier, employs DK/DKIM message authentication, and the like. The reports may ten be sent to various message sources to enable them to determine the extent of use of DK/DKIM message authentication, and to selectively block, re-direct, or forward the messages based, in part, on the use of DK/DKIM message authentication mechanism. | 2009-08-27 |
20090216843 | SYSTEM AND METHOD FOR COLLABORATIVE EMAIL REVIEW - A method and computer program product for enabling a user to compose a draft email. The user is enabled to send the draft email as a draft email for review to one or more specified reviewing recipients. A copy of the draft email is saved. The saved copy of the draft email is configured to be sent to one or more additional recipients as an original email. | 2009-08-27 |
20090216844 | Systems And Methods For Instant Communication In A Clinical Setting - Embodiments of the present technology provide a system and method for instant communication in a clinical setting. The system includes a database wherein the database contains clinical data points; at least one bot wherein the bot receives a query and returns a result from the clinical data points; at least two workstations having a clinical instant messaging interface wherein the clinical instant messaging interface displays users that are using the clinical instant messaging interface, allows one of the users to input a message to other users and displays messages from the other users; and a clinical instant messaging network wherein the clinical instant messaging network accommodates messaging between the workstations and also between the workstations and the bots. | 2009-08-27 |
20090216845 | METHOD AND SYSTEM FOR E-MAIL SERVICE IN COMMUNICATION NETWORKS - For downloading e-mails into a mobile node ( | 2009-08-27 |
20090216846 | METHOD AND APPARATUS FOR PERFORMING SESSION INFO QUERY FOR USER PLANE LOCATION - Techniques for querying for information on location sessions in a user plane location architecture are described. In an aspect, a location server may send a query message to a terminal to query for information on active location sessions, e.g., when at least one location session for periodic triggered service or area event triggered service is deemed to be active. The terminal may return a response message containing a list of session identifiers (IDs) for the active location sessions, parameters for the active location sessions, capabilities of the terminal, etc. The location server may compare the information received from the terminal and information stored at the location server. The location server may terminate each location session deemed to be active at only the terminal or only the location server. The location server may restart or terminate each location session having inconsistent parameters at the terminal and the location server. | 2009-08-27 |
20090216847 | METHOD AND SYSTEM FOR MESSAGE VALUE CALCULATION IN A MOBILE ENVIRONMENT - Methods and systems for determining a suitability for a mobile client to display information are disclosed. A particular exemplary method includes generating a first value for a first targeted content message based on at least a first weighted sum of first user profile attributes, a user profile attribute being a numeric quantity relating to at least one of a preference and a demographic of a user of the mobile client, comparing the first value with a stored list of second values related to respective stored messages in a cache memory of the mobile client to produce a comparison result; and updating the cache memory based on the comparison result by storing the first targeted content message in the cache memory if the comparison result indicates a higher desirability of the first targeted content message over at least one stored message. | 2009-08-27 |
20090216848 | ADJUNCT USE OF INSTANT MESSENGER SOFTWARE TO ENABLE COMMUNICATIONS TO OR BETWEEN CHATTERBOTS OR OTHER SOFTWARE AGENTS - A user's chatterbot participates in a chat session with other users and the other users' chatterbots. The originator of an incoming instant message is identified to such a degree that a buddy on a buddy list is able to determine that the instant message was sent by a user's chatterbot (e.g., “Jackie's chatterbot”), and not the user (“Jackie”). The chatterbots can communicate with other chatterbots while the chatterbots' users listen to the chatterbots converse. The chatterbots may respond to messages originated by other chatterbots' messages and buddies' (users') messages. | 2009-08-27 |
20090216849 | METHOD FOR USER-SPECIFIED ERROR CORRECTION IN AN INSTANT MESSAGING SYSTEM - A method and system enter a correction for a previously sent message, determine whether to send a complete corrected message or a message correction specification, and send the selected message to a messaging server. The messaging server receives the message correction specification and a message identifier (ID), and sends the message correction specification and the message ID to a recipient client system if a message with a corresponding message ID has previously been sent to the recipient client system. Then, the recipient client system receives the message correction specification and message ID, retrieves the message with a corresponding message ID from its conversation log, corrects the message, updates the conversation log, and activates an alert to notify a user of an update. If the message has not previously been sent, the messaging server corrects the message and sends the corrected message and the message ID to the recipient client system. | 2009-08-27 |
20090216850 | METHODS AND APPARATUS FOR CATEGORIZING FAILURE MESSAGES THAT RESULT FROM EMAIL MESSAGES - Techniques for classifying failure messages received from email messages that are sent are provided. A plurality of rules are created that are used to classify a plurality of failure types for email messages. Email messages are sent to an email address associated with an Internet service provider. When an email message fails, a failure message is determined. A rule that applies to the failure message is then determined and based on the rule, a failure type associated with the rule is determined. Once a failure type is determined, an action may be performed based on the failure type. For example, the email address associated with the email message may be marked as invalid. | 2009-08-27 |
20090216851 | SYSTEM AND METHOD FOR IMMEDIATE AND DELAYED REAL-TIME COMMUNICATION ACTIVITIES USING AVAILABILITY DATA FROM COMMUNICATION THROUGH AN EXTERNAL INSTANT MESSAGING SYSTEM - A system and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system, that operates to obtain aggregated user online presence information through its own client software, through interception of client-server communications between an external instant messaging client and server, and through other available interfaces to user account information on such external instant messaging systems. The system operates to gather user online presence information in part by intercepting communications between an instant messaging client and the Internet. The aggregate presence data, as well as other information describing the availability of a user, is used to intelligently route real-time communications, such as instant messages and phone calls. The disclosed system further implements a technique for waiting for changes in a user's availability status, and for performing actions on a user's behalf in response to such changes in availability status. | 2009-08-27 |
20090216852 | SYSTEM AND METHOD FOR UPDATING A DYNAMIC DOMAIN NAME SERVER - A system and method for synchronizing a dynamic domain name system (DDNS). Updated domain name information is received at a first datastore and sent to a second datastore. Updated domain name information is also received at the second datastore and sent to the first datastore. Either datastore determines whether the other datastore is available to receive the updated domain name information. If the receiving datastore is not available, the sending datastore waits until the receiving datastore is available. The first datastore is connected to a first master DNS server and the second datastore is connected to a second master DNS server. The first and second master servers share an IP address. When a request for domain name information is received at a router, the request is sent to a master DNS server selected from the first and second master DNS servers using the shared IP address. A master DNS server is selected to respond to the DNS request only if that master server is able to respond to the request. The requested domain name information is retrieved from the datastore connected to the selected DNS server and a response to the request for domain name information is generated. | 2009-08-27 |
20090216853 | SUBNET MANAGEMENT DISCOVERY OF POINT-TO-POINT NETWORK TOPOLOGIES - A computer program product for subnet management discovery of point-to-point network topologies includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes discovering a local portion of a subnet representing the point-to-point network, the discovering facilitated by a coupling subnet manager configured to act as a master subnet manager on the local portion of the subnet, interpreting a state of a physical port associated with the coupling subnet manager, and discovering a remote portion of the subnet physically connected to the physical port based on the interpreting. | 2009-08-27 |
20090216854 | CONTROLLED DEVICE, CONTROL SYSTEM, AND MANAGEMENT DEVICE - An aspect of the invention provides a controlled device that comprises: a directory storing unit comprising: a process entry that indicates a process to be remotely controlled by a control device via a network; and a directory that manages a content associated with the process entry, which represents a response message to a remote control instruction on the process entry; a directory transmitter configured to transmit information on the directory stored in the directory storing unit to the control device via the network; an access request receiver configured to receive a remote control instruction from the control device, the remote control instruction for a specific process entry in the directory and received as an access request for a content associated with the specific process entry; and a controller configured to execute a process of the process entry associated with the access request received by the access request receiver. | 2009-08-27 |
20090216855 | System, method, and computer program for remotely managing a digital device - A system, method, and computer program for remotely managing a digital device is provided. One or more digital devices are monitored. At least one matter associated with the one or more digital devices is identified. A resolution to address the at least one matter is generated. The resolution is then distributed from a remote location. | 2009-08-27 |
20090216856 | METHOD AND COMPUTER-READABLE MEDIUM FOR DELIVERING HYBRID STATIC AND DYNAMIC CONTENT - The present invention relates generally to software functional modules and, in particular, to such modules used for delivering hybrid static and dynamic content. More particularly, there is described a computer-readable storage medium and corresponding method. The storage medium comprises: (a) a repository of static content; and (b) a program element for execution by a computing device to deliver hybrid content via a user interface. The program element comprises: (i) program code means for commanding instantiation of a functional module remote from the computing device; (ii) program code means for receiving dynamic content from the remote functional module; (iii) program code means for accessing the repository of static content; and (iv) program code means for delivering hybrid content on the basis of the static content in the repository and the dynamic content received from the remote functional module. | 2009-08-27 |
20090216857 | METHODS OF PROVIDING PUBLISHED CONTENT - Methods of providing published content are presented. Content providers, including advertisers, can have their network addresses become black listed through no fault of their own. Content providers can utilize one or more intermediary providers each having their own distinct network address, possibly a registered domain name. An advertiser or other content provider can engage members of a distribution channel to disseminate promotional information to consumers where the promotional information comprises a network address of the intermediary provider. Upon a request directed toward the network address, the intermediary transforms published content obtained from the primary provider to make the content appear as though it originated from the intermediary provider. Should a black listing event occur, only the intermediary provider would be affected. An updated or new intermediary provider having a new, distinct network address can be instantiated to replace the black listed provider. | 2009-08-27 |
20090216858 | FLOOR CONVEYOR, WITH REMOTE MAINTENANCE IN PARTICULAR - A floor conveyor, with a device for the capture of operation-related data, a data memory, in which the operation-related data can be stored, and an electronic control unit, which controls the capture and the storage of the operation-related data in the data memory, characterised in that the floor conveyor has a data send/receive unit for the transmission of operation-related data from the data memory of the floor conveyor to an external data memory via a transmission link, the control unit has means for checking the availability of the transmission link, and the control unit is designed for the initiation of the data transmission from the data memory to the external data memory. | 2009-08-27 |
20090216859 | METHOD AND APPARATUS FOR SHARING CONTENT AMONG MULTIPLE USERS - Techniques for sharing content among multiple users are described herein. According to one embodiment, content is received from an owner to be shared among multiple members of one or more communities, where the owner defines the one or more communities. In response to the received content, a privacy level associated with the content to be shared is determined, where the privacy level is assigned by the owner. A trust level associated with each member of the one or more communities is determined, where each member is associated with a trust level assigned by the owner previously to represent a relationship between each member and the owner. The content is shared among selected members of the one or more communities if trust levels of the selected members and the privacy level associated with the content satisfy a predetermined relationship. Other methods and apparatuses are also described. | 2009-08-27 |
20090216860 | SYSTEM AND METHOD FOR DETECTING, COLLECTING, ANALYZING, AND COMMUNICATING EVENT RELATED INFORMATION - A system and method involves detecting operational social disruptive events on a global scale, assigning disease event staging and warnings to express data in more simplistic terms, modeling data in conjunction with linguistics analysis to establish responsive actions, generating visualization and modeling capabilities for communicating information, and modeling disease propagation for containment and forecasting purposes. | 2009-08-27 |
20090216861 | Integrated Software Network Agent - A model for the next generation of software network agents for downloadable software is provided. The software network agent delivers a streamlined user experience that presents the user with options to try or buy. The agent may be co-branded for merchant and affiliate marketing. The agent may be integrated with a number of services, such as ecommerce systems, affiliate marketing network systems, site optimization, web analytics and email marketing systems that enable a merchant to enhance the user experience and improve marketing. A user's actions may be tracked in order to provide OEMs and retailers payout on purchase referrals to the merchant's online store. Code changes and bug fixes can be made at the server and in a timely manner with minimal impact to the various systems supporting the software activation user experience. | 2009-08-27 |
20090216862 | Method for the remote configuration of voice over ip telephone - A method for the remote configuration of a voice over IP device (“voIP device”) on a local TCP/IP network, which can be implemented in software. The method includes a preliminary step of asking a user to select a voIP device from a list of one or more different voIP devices downloaded from a remote database using an Internet connection. The list can be regularly updated as new voIP devices come onto the market. The local TCP/IP network is analyzed to determine one or more network settings. The method then downloads a configuration module specific to the voIP device selected by the user from a remote database using the Internet connection. The configuration module is used to determine one or more configuration parameters for the voIP device. Finally, the one or more network settings and the one or more configuration parameters are used to automatically configure the voIP device for use on the local TCP/IP network. | 2009-08-27 |
20090216863 | Performance Optimization Of Business Processes By Stochastic Environmental Changes - Methods and apparatus, including computer program products, are provided for optimizing applications, such as applications included in a business process. In one aspect, there is provided a computer-implemented method. The method may include receiving information representative of one or more interfaces and aspects of each of the interfaces. The interfaces may be adjustable by a business process supervisor. The business process supervisor may adjust one or more aspects of the one or more interfaces. The results of the adjustment may be received and used to determine optimum settings to the one or more interfaces. Related apparatus, systems, methods, and articles are also described. | 2009-08-27 |
20090216864 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS, FOR AUTOMATICALLY FINDING CONFIGURATION SETTINGS FOR SERVICES - An apparatus may include a processor configured to receive an indication of a service and determine whether configuration settings for the indicated service are previously stored. The processor may be further configured to retrieve stored configuration settings for the indicated service if configuration settings for the indicated service are previously stored and to receive suggested configuration settings for the indicated service if configuration settings for the indicated service are not previously stored. The processor may additionally be configured to verify the stored or suggested configuration settings and to store the verified configuration settings in association with the indicated service. Corresponding methods and computer program products are also provided. | 2009-08-27 |
20090216865 | DEVICE MANAGEMENT SYSTEM, SERVERS,METHOD FOR MANAGING DEVICE, AND COMPUTER READABLE MEDIUM - A device management system includes a first server and a second server that is different from the first server. The first server includes a first management unit configured to update and delete device information of a management target device to be managed by the first server. The second server includes a second management unit configured to update and delete device information of a management target device to be managed by the second server and a display unit configured to display device information of a device which is not to be managed by the second server. | 2009-08-27 |
20090216866 | Diskless computer-to-remote storage server opeating system installation system and method - A diskless computer-to-remote storage server operating system installation system and method, which uses a boot firmware and a network storage driver to establish disk connection with a logic unit space, enabling the operating system installation program to recognize a disk device for installation. The boot firmware is in charge of fetching network parameters. The storage driver is in charge of providing the installation program with network device operating function. The system and method of the invention eliminates the procedure of establishing a physical hard drive for making an operating system image for transmitting to the logic unit space, preventing an operation error due to being unfamiliar with the installation procedure. By means of eliminating image file making procedure, the invention greatly lowers the chance of human error during system establishment. | 2009-08-27 |
20090216867 | VENDOR-INDEPENDENT NETWORK CONFIGURATION TOOL - Techniques are described for managing and configuring network devices from a plurality of vendors with a single network configuration tool. This vendor-independent network configuration tool may extract configuration information stored to devices from disparate vendors, and parse tags from extracted configuration information. Each tag defines a configuration property. The tool may further analyze the tags to determine relationships and present configuration information based primarily on the determined relationship and only secondarily on the devices. The tool may also perform analysis on the tags to detect one or more errors or configuration inconsistencies, as well as, update or change tags, which causes the tool to push any changes to the appropriate device. Furthermore, the tool by automatically share information related to the above described steps with other vendor-independent network configuration tools to more quickly propagate efficient extraction and updating techniques. | 2009-08-27 |
20090216868 | ANTI-SPAM TOOL FOR BROWSER - An anti-spam tool works with a web browser to detect spam webpages locally on a client machine. The anti-spam tool can be implemented either as a plug-in module or an integral part of the browser, and manifested as a toolbar. The tool can perform an anti-spam action whenever a webpage is accessed through the browser, and does not require direct involvement of a search engine. A spam detection module installed on the computing device determines whether a webpage being accessed or whether a link contained in the webpage being accessed is spam, by comparing the URL of the webpage or the link with a spam list. The spam list can be downloaded from a remote search engine server, stored locally and updated from time to time. A two-level indexing technique is also introduced to improve the efficiency of the anti-spam tool's use of the spam list. | 2009-08-27 |
20090216869 | MANAGING SHELL CONFIGURATIONS TO DYNAMICALLY CONTROL USER COMPUTING ENVIRONMENTS - A method for managing a user's computing environment on their computer or workstation. The method includes storing a set of files in a memory device accessible via a communications network. Each file includes data such as environment variable values defining a particular computing environment. The method includes providing an environment management engine in a user's home directory of a computer. A shell runs in the computer device to invoke and run a computing environment management engine within the shell. The engine generates a computing environment in the computer based on the computing environment definition in one of the files that is chosen based on a user-provided or otherwise determined job state (e.g., the user is working on a project or a portion of a project that is associated with a job state). The computing environment includes versions of software applications, path variables, and alias definitions. | 2009-08-27 |
20090216870 | SIGNALING SERVER, DATA COMMUNICATION SYSTEM, SIGNALING PROCESSING PROXY METHOD AND PROGRAM - To provide a data communication system which lightens processing related to changes in the status in signaling processing performed between terminals. A signaling server communicating mutually with a plurality of terminals includes: a transmitting/receiving part for transmitting/receiving a message; a status management part for updating a registered terminal list and status management information; and a signaling processing part for judging a destination and a type of the message received at the transmitting/receiving part. The signaling processing part gives an instruction to the status management part to update the status management information in accordance with contents of the message without transferring the message to a first terminal, when the first terminal requires the signaling processing support and the message is not directly related to starting or stopping of communication with the first terminal. | 2009-08-27 |
20090216871 | MANAGEMENT APPARATUS AND ITS CONTROL METHOD - In a managing device in a communication system including both a first terminal that carries out a control procedure with the managing device and starts data communication, and a second terminal that starts data communication without carrying out the control procedure, the start of data communication by the second terminal is recognized. Then, after recognizing the start of the data communication by the second terminal, when the start of a control procedure is requested from the first terminal, the control procedure is changed. | 2009-08-27 |
20090216872 | METHOD AND DEVICE FOR TRANSMITTING FILES VIA A NETWORK - A method for transmitting files via a network is proposed. In a first step, the size of a file to be transmitted is transmitted. Following this, the value of a maximum permitted data traffic is calculated from the size of the file and a factor X. Finally, the transmission process of a file is stopped as soon as the data volume transmitted exceeds the maximum permitted data traffic. | 2009-08-27 |
20090216873 | Communication of Offline Status Between Computer Systems - A method for communication of offline status between nodes includes detecting an impending deactivation of a physical port and sending a message from a sending node to a receiving node notifying the receiving node of the impending deactivation of the physical port. The method further includes deactivating the report of any error for the physical port and sending a response from the sending node to the receiving node verifying that deactivation of the physical port. | 2009-08-27 |
20090216874 | MONITORING ASYNCHRONOUS TRANSACTIONS WITHIN SERVICE ORIENTED ARCHITECTURE - A monitoring system is used to monitor extended business transactions comprised of asynchronous messages. Each message may be a request or a response of an application transaction request-response pair and may be identified with a unique identifier. The unique identifier may be used to identify two or more asynchronous messages, where each extended business transaction may be associated with one or more unique identifiers to identify messages that comprise the business transaction. The extended business transactions are completed over an extended period of time and implemented over several different machines which may or may not be in communication with each other are monitored. Alerts are generated when messages of the extended business transaction do not satisfy a threshold or other criteria, such as a time period for occurring. A user interface or other mechanism may be used to configure the transactions and provide information regarding the status of the transactions and alerts generated for uncompleted portions of the transaction. | 2009-08-27 |
20090216875 | FILTERING SECURE NETWORK MESSAGES WITHOUT CRYPTOGRAPHIC PROCESSES METHOD - A network filtering system and method without requiring cryptographic processing of secure message transmissions. The method provides for determining target node ID associations corresponding to domain names of filtered node DNS requests and corresponding network address and address duration data determined according to a corresponding DNS responses. The method also provides for comparing a destination address of a current message transmission corresponding to a filtered node with the determined target node ID associations, and conducting filtering processing of the current message transmission. | 2009-08-27 |
20090216876 | SMART ENDPOINT AND SMART MONITORING SYSTEM HAVING THE SAME - A smart endpoint and a smart monitoring system having the smart endpoint are provided. The smart endpoint includes a central processing unit (CPU), an interface module, a digital signal processing unit, and a memory module. The interface module is coupled to the CPU for receiving a plurality of heterogeneous monitoring signals and an identification code. The digital signal processing unit is coupled to the CPU for integrally considering the monitoring signals and the identification code to determine an abnormal event, and generate an abnormal event data thereby. The memory module is coupled to the CPU for recording the abnormal event data. As such, the present invention is adapted to determine an occurrence of an abnormal event, by which the passive monitoring can be upgraded to an active monitoring and analyzing, and thus achieving a smart monitoring. | 2009-08-27 |
20090216877 | Network monitoring system with common storage medium and a method thereof - A network monitoring system with common storage medium includes at least one monitor, a network communication path, a monitoring host, a network memory, and a display screen. The monitoring host assigns a different IP address to each of the monitors. When the network monitoring system is started, the monitoring host controls each of the monitors to obtain the monitor data according to the IP address. Next, the monitoring host uses the data serial stream transmission technology to obtain the monitor data from the monitors via the network communication path. Finally, the monitoring host stores the monitor data and transmits the monitor data to the display screen and display it. Thereby, the resource is shared, and the network monitor is achieved. | 2009-08-27 |
20090216878 | Method and System for Providing A Self-Populating Database for the Network Collection of Meter Data - The invention provides a method and a system for collection of meter readings from the field and for providing a self-populating database for storing and retrieving the meter data. A network data collection computer operating according to a stored computer program reads in data from the receivers and detects the meter reading devices that are sending data through a respective receiver. If not previously detected, the network data collection computer allocates space in the database for the data and stores the meter data and indexes it by the receiver and meter reading device from which it was received, and by the date and time of reception at the network data collection system. This data can then be retrieved and displayed or printed out by these parameters in database reports. | 2009-08-27 |
20090216879 | ELEMENT MANAGEMENT SYSTEM WITH FUNCTION TO TRANSFER DATABASE - An element management system which allows a client to monitor and control elements on a network through element management servers includes a unit configured to manage a transfer state separately for each element when management information regarding an element accommodated in a first element management server is to be transferred to a second element management server, and a unit configured to cause the management information at the second element management server to reflect a differential between the management information at the first element management server and the management information at the second element management server upon creation of the differential that is created by the client upon controlling an element for which the transfer state indicates uncompleted transfer, wherein an accommodated element is transferred in real time between the first and second element management servers without suspending monitor and control performed by the first and second element management servers. | 2009-08-27 |
20090216880 | Methods and Systems for Dynamic Transport Selection Based on Last Mile Network Detection - The present invention relates to systems, apparatus, and methods of dynamic transport selection. The method includes determining link characteristics for a network connection between a client and a server. The link characteristics include a transport type and a connection type. The method further includes, based on the link characteristics, dynamically determining an optimal transport type, changing the transport type to the optimal transport type, and transmitting data between the client and the server using the optimal transport type. | 2009-08-27 |
20090216881 | METHOD AND APPARATUS FOR MAINTAINING THE STATUS OF OBJECTS IN COMPUTER NETWORKS USING VIRTUAL STATE MACHINES - A network appliance for monitoring, diagnosing and documenting problems among a plurality of devices and processes (objects) coupled to a computer network utilizes periodic polling and collection of object-generated trap data to monitor the status of objects on the computer network. The status of a multitude of objects is maintained in memory utilizing virtual state machines which contain a small amount of persistent data but which are modeled after one of a plurality of finite state machines. The memory further maintains dependency data related to each object which identifies parent/child relationships with other objects at the same or different layers of the OSI network protocol model. A decision engine verifies through on-demand polling that a device is down. A root cause analysis module utilizes status and dependency data to locate the highest object in the parent/child relationship tree that is affected to determine the root cause of a problem. Once a problem has been verified, a “case” is opened and notification alerts may be sent out to one or more devices. A user interface allows all objects within the network to be displayed with their respective status and their respective parent/child dependency objects in various formats. | 2009-08-27 |
20090216882 | METHOD AND APPARATUS FOR INTERNET TRAFFIC MONITORING BY THIRD PARTIES USING MONITORING IMPLEMENTS TRANSMITTED VIA PIGGYBACKING HTTP TRANSACTIONS - Disclosed is an internet traffic monitoring method that includes a network service provider analyzing an HTTP transaction involving an internet user client. The network service provider responds to the HTTP transaction by forwarding, to the internet user client, a modified web object including a monitoring implement. After forwarding the modified web object to the internet user client, the network service provider forwards a web object, originally associated with the HTTP transaction, to the internet user client. | 2009-08-27 |
20090216883 | MANAGING ESCALATING RESOURCE NEEDS WITHIN A GRID ENVIRONMENT - A method, system, and program for managing escalating resource needs within a grid environment are provided. A job is submitted into a first selection of resources in a grid environment from among a hierarchy of discrete sets of resources accessible in the grid environment. Discrete sets of resources may include locally accessible resources, enterprise accessible resources, capacity on demand resources, and grid resources. The performance of the first selection of resources is monitored and compared with a required performance level for the job. If the required performance level is not met, then the discrete sets of resources are queried for available resources to meet the required performance level in an order designated by said hierarchy. Available resources in a next discrete set of resource from the hierarchy of discrete sets of resources are added to a virtual organization of resources handling the job within the grid environment. In particular, the virtual organization of resources may include the first selection of resources and the added resources which are distributed across heterogeneous systems. If capacity on demand resources are allocated and added to the virtual organization, then the capacity on demand resources are deallocated when no longer needed. | 2009-08-27 |
20090216884 | SERVICE CREATION METHOD, COMPUTER PROGRAM PRODUCT AND COMPUTER SYSTEM FOR IMPLEMENTING THAT METHOD - The invention discloses a method ( | 2009-08-27 |
20090216885 | Stateless Core Service Transaction Patterns - A connection handler can receive a service request, initiate a temporary proxy state in the connection handler, open a first connection to a service provider from the connection handler to request fulfillment of the service request, and populate the temporary proxy state with a copy of original content received at the connection handler from the service provider in fulfillment of the service request. The populating can include creating a temporary proxy state content. The connection handler can tag the original content object on the service provider with an activity indicator that specifies that the original content has been accessed by the connection handler and then terminate the first connection between the connection handler and the service provider. Related systems, apparatus, methods, and/or articles are also described. | 2009-08-27 |
20090216886 | Method of multi-path accessing remote logic device under linux system - A method of multi-path accessing a remote logic device under a Linux system is used to realize a multi-path access between an initiator and a target in a storage area network (SAN). Firstly, a communication is established between the initiator and the target. Next, the initiator requests to establish at least one link session with the target. Then, the initiator obtains an iSCSI-connected host assigned by the target, and also obtains a message about connected devices corresponding to the iSCSI-connected host through transmitting a report logic unit number (LUN) command. Then, the initiator configures a device mapper, and the device mapper generates information about redundant devices according to the connected devices and the corresponding LUNs, and the redundant connected devices are mapped into a unique mapping device. | 2009-08-27 |
20090216887 | METHOD OF ESTABLISHING A CONNECTION - The invention concerns method of establishing a connection in a peer-to-peer network ( | 2009-08-27 |
20090216888 | DATA TRANSMISSION DEVICE - A data transmission device to transmit a data file to an external device is provided. The data transmission device includes a data file storing unit to store a data file to be transmitted, a communication session establishing unit, which is capable of establishing a plurality of communication sessions between the data transmission device and the external device, a data transmitting unit to transmit data included in the data file and divided in portions concurrently through the plurality of communication sessions to the external device. | 2009-08-27 |
20090216889 | SYSTEM AND METHOD FOR DELIVERING LAST MILE COMPUTING OVER LIGHT FROM A PLURALITY OF NETWORK EDGE LOCATIONS - Last mile computing is a cost effective system and method for delivering subscription based multimedia computing, wherein processing is done at network edge and the computed multimedia information is transported over light to be presented on remote end devices. The network edges can include a campus data center location, a metro data center location, a rural data center location, and a traditional telecommunication central office location. The computed multimedia information can deliver data, voice and video services. The last mile computing system enables subscribers to choose and perform last mile computing in a plurality of operating system environments: the system's native master operating system environment; Microsoft operating systems environments; Apple-Macintosh operating systems environments; Unix and Linux operating systems environments; and in other commercially available Legacy operating systems environments. Last mile computing systems are interconnected in a local domain architecture and local domains in turn are interconnected in an inter domain architecture over optically enabled communication networks. Such interconnected last mile computing domains provides a means for delivering last mile services ubiquitously. Subscribers can request last mile services from a last mile computing system regardless of their home location. | 2009-08-27 |
20090216890 | METHOD FOR THE TRANSMISSION OF INFORMATION WITH IMPROVED PERENNIALITY - A method is provided for the transmissions of information between at least a first and a second communication means. The method includes in saving at least one set of information in an intermediate element. The method also includes defining a plurality of client groups, using an identifier in order to designate at least one group of clients that are authorized to access the information set, and at least one filtering step, which is intended to prevent a user that does not belong to the group from accessing the information. The method enables the integrity of the contained in the intermediate element to be substantially secured, by selecting clients that are authorized to access the information. | 2009-08-27 |
20090216891 | Communication bandwidth control method for a broadcast communication system, a server and a user terminal used in a broadcast communication system, and a program - A method transmitting and receiving data other than voice data and preventing deterioration in quality of communication voice data due to transmission and reception of the other than voice data, and utilizing a limited communication bandwidth when a plurality of users conduct the broadcast communication through common use of the conference room on the network. Upon a user terminal transmitting second data, verifying whether any of a plurality of identified user terminals has a right of transmission of first data. The method further includes that upon a user terminal having the a transmission right of first data, setting a value obtained by subtracting the communication bandwidth required for transmission of the first data from the communication bandwidth which each user terminal can use as the communication bandwidth for transmission of the second data. Upon no user terminal having a transmission right of first data, setting a communication bandwidth that each user terminal can use as the communication bandwidth for transmission of the second data. | 2009-08-27 |
20090216892 | SYSTEM AND METHOD FOR HANDLING DIGITAL CONTENT DELIVERY TO PORTABLE DEVICES - Systems and methods to download digital data files are provided. A particular method includes sending authentication data and a request to download a digital data file from a portable computing device to a remote network device via a first network access point. A first portion of the digital data file is received at the portable computing device. The first portion does not include a remaining portion of the digital data file. Communication is established between the portable computing device and a second network access point after communication is lost between the portable computing device and the first network access point and before the remaining portion of the digital data file is received. The remaining portion of the digital data file is received at the portable computing device without sending a second request related to downloading the digital data file. | 2009-08-27 |
20090216893 | BUFFER DISCOVERY IN A PARRALLEL MULTI-TASKING MULTI-PROCESSOR ENVIRONMENT - A computer program product, apparatus and method for buffer discovery in a multi-tasking multi-processor environment. An exemplary embodiment includes establishing a management connection, confirming that end points of the management connection are connected to respective targets, sending a negotiate counts message, including a number and size of buffers associated with parameters of the management connection and receiving a response to the negotiate counts message, the response including at least one of rejection of the management connection and an acceptance of the management connection, including an agreed number and size of the buffers. | 2009-08-27 |
20090216894 | RELAY APPARATUS FOR USE IN E-MAIL-BASED CHAT SYSTEM - The present invention provides an e-mail-based chat system that is available from a terminal without a push architecture and can be used with an existing server. The invention relates to a relay apparatus to be installed on communication lines between terminals and servers consisting of a transmission server and a retrieval server. The relay apparatus puts on hold data retrieval requests received from the terminals without relaying the data retrieval requests to the retrieval server and withholds responses to the terminals. When the relay apparatus receives chat message data from a terminal, it relays the data to the transmission server. Right after the relaying of the data, the relay apparatus acquires the data from the transmission server via the retrieval server and creates response data from the acquired data, thus responding to the data retrieval requests on hold with the response data. | 2009-08-27 |
20090216895 | COMMUNICATION PROTOCOL CONVERTER AND METHOD OF PROTOCOL CONVERSION - The present invention generally relates to a communication protocol converter to allow a legacy device utilizing IPv4 to operate across the network using IPv6. In a first embodiment of the invention, two modular Ethernet connectors are placed side-by-side. A first modular connector receives IPv4 Ethernet data which is converted to a raw data signal. The data is transmitted from the first modular connector to a second modular connector by a bidirectional data line. The second connector receives the raw data, and a raw data-to-Ethernet conversion is completed providing output at IPv6. The present invention utilizes the form factor structure of the Ethernet connectors, so that the entire electronic circuitry is contained within the connectors to complete the conversion. An alternate embodiment incorporates the connectors into a single housing and the conversion is completed internally by a microprocessor and embedded software. A method of IPv4 to IPv6 conversion is additionally disclosed. | 2009-08-27 |
20090216896 | SYSTEM AND METHOD FOR CONTROLLING SERVICE INVOCATIONS, SERVICE CONTROL APPARATUS, AND SERVICE TRIGGERING APPARATUS - A system for controlling service invocations, applied in a circumstance of a multi-service server, is disclosed, including: a service triggering point, configured to detect a service triggering condition and send a communication event message to a first service control point when the service triggering condition is satisfied; and at least one first service control point, configured to acquire an invocable service indication from the communication event message sent by the service triggering point, and control the execution of the invocable services according to the indication. A method for controlling service invocations, a service control apparatus and a service triggering apparatus are also disclosed. Embodiments ensure requirements on service priority under a circumstance of a multi-service server, and perform a unified triggering control process under a circumstance that the service triggering point connects to a service control point that needs a second trigger, so that triggering process efficiency is increased. | 2009-08-27 |
20090216897 | METHOD AND SYSTEM FOR CONTROLLING STREAMING RATES - A streaming rate control method disclosed herein includes: judging whether it is necessary to adjust the rate of the media stream sent to the UE according to the network state fed back by the UE; if necessary, obtaining the adaptation parameters; adapting the rate of the media stream according to the adaptation parameters; and sending the adapted media stream to the UE. A system and a device for controlling streaming rates are disclosed herein. The rate adaptation server adapts the streaming rate required by the streaming server; on the streaming server, the source needs only to be stored at a single rate, which saves the storage space on the streaming server and simplifies encoding of the streaming source. | 2009-08-27 |
20090216898 | WIRELESS TRANSPORTATION PROTOCOL - A data transportation protocol ( | 2009-08-27 |
20090216899 | REDUCTION OF MESSAGE FLOW BETWEEN BUS-CONNECTED CONSUMERS AND PRODUCERS - A system, method, and computer readable medium for reducing message flow on a message bus are disclosed. The method includes determining if at least one logical operator in a plurality of logical operators requires processing on a given physical processing node in a group of physical nodes. In response to determining that the logical operator requires processing on the given physical processing node, the logical operator is pinned to the given physical processing node. Each logical operator in the plurality of logical operators is assigned to an initial physical processing node in the group of physical processing nodes on a message bus. | 2009-08-27 |
20090216900 | SCALABLE NETWORK APPARATUS FOR CONTENT BASED SWITCHING OR VALIDATION ACCELERATION - A network apparatus is provided that may include one or more security accelerators. The network apparatus also includes a plurality of network units cascaded together. According to one embodiment, the plurality of network units comprise a plurality of content based message directors, each to route or direct received messages to one of a plurality of application servers based upon the application data in the message. According to another embodiment, the plurality of network units comprise a plurality of validation accelerators, each validation accelerator to validate at least a portion of a message before outputting the message. | 2009-08-27 |
20090216901 | Three-way communication protocol - Some embodiments of a three-way communication protocol have been presented. In one embodiment, a message receiver receives a message from a message transmitter. The message may include an idempotent identification (ID). The message receiver records the idempotent ID, and sends a first acknowledgement of the message to the message transmitter in response to receipt of the message. In response to receipt of a second acknowledgement from the message transmitter acknowledging the message transmitter's receipt of the first acknowledgement, the message receiver discards the idempotent ID. | 2009-08-27 |
20090216902 | STORAGE CONTROLLER AND METHOD FOR DETERMINING CLIENT APPROPRIATENESS - A packet priority level is set for a packet configuring a file access request, and a file importance level is set for a file. A storage controller manages, for each client, the amount of information (total amount) in the packets sent and received for each packet priority level, and the amount of information (total amount) in the access-targeted files for each file importance level. The storage controller computes an assessment value for assessing whether a target client is appropriate or inappropriate based on one or more amounts of information corresponding to the target client and one or more packet priority levels, and one or more amounts of information corresponding to one or more file importance levels respectively corresponding to one or more packet priority levels and the target client, and determines whether the target client is appropriate or inappropriate in accordance with whether or not the computed assessment value conforms to a prescribed condition. | 2009-08-27 |
20090216903 | DEFEATING CACHE RESISTANT DOMAIN NAME SYSTEMS - Domain name caching mechanisms are provided to address cache-defeating approaches. Domain name lookup requests are processed and cached information associated with a non-identical domain name returned in response. Cache-defeating behavior including nonce injection can be detected or inferred and employed to map domain name requests to previously cached information thereby exposing the benefits of caching. | 2009-08-27 |