Patent application number | Description | Published |
20120106546 | Content based VLAN classification and framework for ethernet network to support content based bridging - The preferred methodology for classifying VLANs based on the content of a packet arriving at the edge switch involves receiving a policy that defines content based classification of VLANs for packets from a network management station; assigning a VLAN to the packet received from a node based on inspection of a content of the packet and the policy received from the network management station; and sending the packet with the assigned VLAN to other nodes in the network for operations based on the assigned VLAN. | 05-03-2012 |
20120170462 | TRAFFIC FLOW CONTROL BASED ON VLAN AND PRIORITY - A method for controlling traffic flow at a traffic routing device of a network comprises a plurality of operations. An operation is performed for determining an instance of traffic flow congestion for traffic of a particular VLAN (virtual local area network) flow control group and having a particular priority. The particular VLAN flow control group and the particular priority jointly define a particular prioritized VLAN flow control group. An operation is performed for issuing traffic flow instructions for causing flow of the traffic of the particular prioritized VLAN flow control group to be temporarily inhibited. Thereafter, an operation is performed for inhibiting transmission of traffic for the particular prioritized VLAN flow control group at a particular traffic routing device in response to the particular traffic routing device receiving the traffic flow instructions. | 07-05-2012 |
20120170465 | VALIDATING ETHERNET VIRTUAL CONNECTION SERVICE - A network element in an Ethernet network comprises circuitry configured for providing a plurality of different functionalities. A first portion of the circuitry is configured for providing traffic generator functionality is provided. A second portion of the circuitry is configured for providing traffic analyzer functionality. A third portion of the circuitry is providing traffic loop-back functionality. The various portion of the circuitry (i.e., the circuitries) are operable for selectively enabling the network element to support a unidirectional test mode and a bi-directional test mode and for enabling the network element to be selectively operated as a local network element and a remote network element. | 07-05-2012 |
20140022886 | PROXY MAINTENANCE ENDPOINT AT PROVIDER EDGE SWITCH - A proxy maintenance endpoint is configured within a provider edge switch in a service provider network. Maintenance endpoints within customer premises equipment register with the proxy maintenance endpoint and transmit Connectivity Fault Management (CFM) frames to the proxy maintenance endpoint. The proxy maintenance endpoint encapsulates the CFM frames into a CFM report and transmits the CFM report to remote proxy maintenance endpoints for subsequent distribution to maintenance endpoints within remote customer premises equipment. | 01-23-2014 |
20140071831 | SYSTEM AND METHOD FOR CONGESTION NOTIFICATION IN AN ETHERNET OAM NETWORK - A network element in an Ethernet OAM network is operable to detect congestion associated with an OAM domain and generate a congestion notification to MEPs in the OAM domain using a modified Ethernet OAM protocol. When a network element detects congestion in one or more queues associated with an MEP in an OAM domain, it triggers a congestion state. The MEP transmits a congestion notification to other MEPs in the OAM domain. The notifying MEP, as well as other MEPs receiving the congestion notification, initiate a network management protocol message to a network management system for the OAM domain. The MEPs in the OAM domain may also propagate the congestion notification to MEPs in higher maintenance level OAM domains. | 03-13-2014 |
20140177428 | SERVICE LEVEL MIRRORING IN ETHERNET NETWORK - A mirror maintenance endpoint (MEP) is hosted on a provider edge switch within an Ethernet network to perform service level mirroring to a network management device of the Ethernet network. The mirror MEP is configured by the network management device to receive all mirrored frames from provider edge switches in a service provider network and to switch the mirrored frames to the network management device. The mirrored frames are mirrored by the provider edge switches to the mirror MEP during mirror sessions initiated by the network management device. | 06-26-2014 |
20140185622 | Method And Apparatus For Network Security - A method of securely routing data traffic between communication networks. In an integrated security device, a host router supports a virtual router that peers with VRF (virtual routing and forwarding) instances associated with participating networks on the host router. Each VRF instance preferably runs its own dynamic routing protocol and determines when received data traffic may be directly forwarded from one network to another and when it must be forwarded to an OE (offload engine) for enforcement of security policies or NAT (network address translation) processing. | 07-03-2014 |
20140286345 | Layered Third Party Application Software Redundancy in a Non-Homogenous Virtual Chassis - Layered third-party (enhanced) application software redundancy is provided in a non-homogeneous virtual chassis including two or more switches coupled via a virtual fabric link. A virtual chassis management module within at least one of the switches discovers the other switches within the virtual chassis, determines a base master switch from all of the switches in the virtual chassis, detects an enhanced application installed on at least one enhanced switch and determines an enhanced master switch from the enhanced switches. | 09-25-2014 |
20150365911 | SYSTEM AND METHOD FOR A DISTRIBUTED WIRELESS NETWORK - WLAN controllers in a same mobility domain are able to dynamically discover other WLAN controllers in the same mobility domain across one or more layer 2 or layer 3 network boundaries. A WLAN controller in the mobility domain determines an address of at least one seed WLAN controller in the mobility domain from a configuration server. The WLAN controller registers with the at least one seed WLAN controller in the mobility domain and receives information for other WLAN controllers in the mobility domain from the at least one seed WLAN controller. The WLAN controller also receives synchronized wireless device information that allows a wireless device to roam from one AP adopted by the WLAN controller in a first access network to another AP adopted by another WLAN controller in a second different access network in the same mobility domain. | 12-17-2015 |
Patent application number | Description | Published |
20090287666 | PARTITIONING OF MEASURES OF AN OLAP CUBE USING STATIC AND DYNAMIC CRITERIA - Methods and apparatus, including computer program products, implementing and using techniques for partitioning measures of an OLAP cube into one or more measure sets. One or more static partitioning criteria are applied to each measure in the OLAP cube. One or more dynamic partitioning criteria are applied to each measure in the OLAP cube. The measures are grouped into measure sets based on the applied static and dynamic partitioning criteria. | 11-19-2009 |
20110035368 | System And Method For Processing Database Queries - A system and/or method are implemented to process queries to a database. In particular, the processing of queries to the database is enhanced by enhancing the determination of join orders of tables implicated in queries. Join orders between relatively large numbers of tables are determined by dividing the set of tables to be ordered into a plurality of subsets of tables, and ordering the individual subsets of tables. | 02-10-2011 |
20120278307 | SYSTEM AND METHOD FOR PROCESSING DATABASE QUERIES - A system and/or method are implemented to process queries to a database. In particular, the processing of queries to the database is enhanced by enhancing the determination of join orders of tables implicated in queries. Join orders between relatively large numbers of tables are determined by dividing the set of tables to be ordered into a plurality of subsets of tables, and ordering the individual subsets of tables. | 11-01-2012 |
20140089291 | System and Method for Processing Database Queries - A system and/or method are implemented to process queries to a database. In particular, the processing of queries to the database is enhanced by enhancing the determination of join orders of tables implicated in queries. Join orders between relatively large numbers of tables are determined by dividing the set of tables to be ordered into a plurality of subsets of tables, and ordering the individual subsets of tables. | 03-27-2014 |
20150149435 | Limiting Plan Choices For Database Queries Using Plan Constraints - A database system allows users to specify plan constraint specification that limit choices of execution plans considered by an optimizer of the database system for optimizing database queries. The plan constraint specification specifies attributes of execution plans. The plan constraint specification may identify tables/intermediate results that the plan constraint is applicable to using table names or aliases. The database system applies the plan constraint specification to database queries that match the tables/aliases specified in the plan constraint specification. The database system limits the choice of execution plans evaluated for a database query to execution plans satisfying the attributes specified in an applicable plan constraint specification. The plan constraint specification may specify distribution of a table, a join order for tables, the join mechanism, cardinality of a table or intermediate result, and so on. | 05-28-2015 |
20150149436 | Rewrite Constraints For Database Queries - A database system rewrites database queries based on rewrite constraints specification. The rewrite constraints specification provides directives to the database system to generate temporary tables for storing intermediate results of database queries and rewrite the corresponding database queries in terms of the temporary tables. The subqueries for matching the rewrite constraints specification may be specified in various ways. For example, the rewrite constraints specification may identify the subqueries by using one or more aliases. The rewrite constraints specification may specify a list of tables such that all database queries that join the database tables specified in the rewrite constraints specification are determined to match. The optimizer is able to optimize the rewritten database queries better by getting a better estimate for the statistics describing the temporary tables. | 05-28-2015 |
Patent application number | Description | Published |
20110167474 | SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT - The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate. | 07-07-2011 |
20120227104 | SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF - The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for different senders and with slight differences within the message body. In an exemplary embodiment, an incoming message body (m) is converted to a sequence of successive word lengths (S | 09-06-2012 |
20120240183 | CLOUD BASED MOBILE DEVICE SECURITY AND POLICY ENFORCEMENT - The present disclosure relates to cloud based mobile device security and policy systems and methods to use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like. | 09-20-2012 |
20130291087 | SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS - A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is disposed behind the security; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located in the enterprise network behind the security, the external service bridge is configured to securely communicate with the cloud system to receive the log data and to communicate with the internal management system to provide the log data thereto. | 10-31-2013 |
20140026179 | DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS - A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained. | 01-23-2014 |
20150163199 | SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS - Systems and methods of integrating log data from a cloud system with an internal management system are described, wherein the cloud system is located externally from a secure network which contains the internal management system. The systems and methods include receiving log data from a cloud system through a secure connection between the secure network and the cloud system; buffering the received log data; filtering the buffered, received log data; and transmitting the filtered, buffered, received log data to the internal management system in a format associated with the internal management system. | 06-11-2015 |
20150244741 | CLOUD BASED MOBILE DEVICE MANAGEMENT SYSTEMS AND METHODS - The present disclosure relates to cloud based mobile device management (MDM) systems and methods to use the “cloud” to pervasively manage mobile devices. The cloud based MDM systems and methods provide an ability to manage mobile devices with or without MDM clients while no requiring an MDM appliance or service at the enterprise. This provides a “no hardware, no software” deployment. In an exemplary embodiment, a client-less implementation leverages the ActiveSync protocol proxied through distributed cloud nodes to enforce mobile policies. In another exemplary embodiment, a client-based implementation uses a platform specific application and associated application programming interfaces (API) to connect managed mobile devices and provide MDM features through the cloud. Advantageously, the cloud based MDM systems and methods provide reliability and resiliency, elasticity, lower cost, mobility, integration of management and security, and agility over conventional MDM based solutions. | 08-27-2015 |
20150326613 | DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS - A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained. | 11-12-2015 |
20150326615 | CLOUD BASED MOBILE DEVICE SECURITY AND POLICY ENFORCEMENT - Cloud based mobile device security and policy systems and methods use the “cloud” to pervasively enforce security and policy on mobile devices. The cloud based mobile device security and policy systems and methods provide uniformity in securing mobile devices for small to large organizations. The cloud based mobile device security and policy systems and methods may enforce one or more policies for users wherever and whenever the users are connected across a plurality of different devices including mobile devices. This solution ensures protection across different types, brands, operating systems, etc. for smartphones, tablets, netbooks, mobile computers, and the like. | 11-12-2015 |
Patent application number | Description | Published |
20100098634 | Imaging Agents Useful for Identifying AD Pathology - Provided herein are compounds and compositions which comprise the formulae as disclosed herein, wherein the compound is an amyloid binding compound. An amyloid binding compound according to the invention may be administered to a patient in amounts suitable for in vivo imaging of amyloid deposits, and distinguish between neurological tissue with amyloid deposits and normal neurological tissue. Amyloid probes of the invention may be used to detect and quantitate amyloid deposits in diseases including, for example, Down's syndrome, familial Alzheimer's Disease. In another embodiment, the compounds may be used in the treatment or prophylaxis of neurodegenerative disorders. Also provided herein are methods of allowing the compound to distribute into the brain tissue, and imaging the brain tissue, wherein an increase in binding of the compound to the brain tissue compared to a normal control level of binding indicates that the mammal is suffering from or is at risk of developing a neurodegenerative disease. | 04-22-2010 |
20100239496 | Imaging agents for detecting neurological disorders - Imaging agents of formula (I) and methods for detecting neurological disorders comprising administering to a patient in need compounds of formula (I) capable of binding to tau proteins and β-amyloid peptides are presented herein. The invention also relates to methods of imaging Aβ and tau aggregates comprising introducing a detectable quantity of pharmaceutical formulation comprising a radiolabeled compound of formula (I) and detecting the labeled compound associated with amyloid deposits and/or tau proteins in a patient. These methods and compositions enable preclinical diagnosis and monitoring progression of AD and other neurological disorders. | 09-23-2010 |
20110046378 | Novel Imaging Agents for Detecting Neurological Dysfunction - Disclosed here in are compounds and methods of diagnosing Alzheimer's Disease or a predisposition thereto in a mammal, the method comprising administering to the mammal a diagnostically effective amount of a radiolabeled compound, wherein the compound is selected from the group consisting of radiolabeled flavones, coumarins, carbazoles, quinolinones, chromenones, imidazoles and triazoles derivatives, allowing the compound to distribute into the brain tissue, and imaging the brain tissue, wherein an increase in binding of the compound to the brain tissue compared to a normal control level of binding indicates that the mammal is suffering from or is at risk of developing Alzheimer's Disease | 02-24-2011 |
20110091382 | NOVEL IMAGING AGENTS FOR DETECTING NEUROLOGICAL DYSFUNCTION - Disclosed here in are compounds and methods of diagnosing Alzheimer's Disease or a predisposition thereto in a mammal, the method comprising administering to the mammal a diagnostically effective amount of a radiolabeled compound, wherein the compound is selected from the group consisting of radiolabeled flavones, coumarins, carbazoles, quinolinones, chromenones, imidazoles and triazoles derivatives, allowing the compound to distribute into the brain tissue, and imaging the brain tissue, wherein an increase in binding of the compound to the brain tissue compared to a normal control level of binding indicates that the mammal is suffering from or is at risk of developing Alzheimer's Disease. | 04-21-2011 |
20110182812 | Imaging Agents for Detecting Neurological Disorders - Imaging agents of formulas (I)-(V) and methods for detecting neurological disorders comprising administering to a patient in need compounds of formulas (I)-(V) capable of binding to tau proteins and β-amyloid peptides are presented herein. The invention also relates to methods of imaging Aβ and tau aggregates comprising introducing a detectable quantity of pharmaceutical formulation comprising a radiolabeled compound of formulas (I)-(V) and detecting the labeled compound associated with amyloid deposits and/or tau proteins in a patient. These methods and compositions enable preclinical diagnosis and monitoring progression of AD and other neurological disorders. | 07-28-2011 |
20120302755 | Imaging Agents for Detecting Neurological Dysfunction - Disclosed here in are compounds and methods of diagnosing Alzheimer's Disease or a predisposition thereto in a mammal, the method comprising administering to the mammal a diagnostically effective amount of a radiolabeled compound, wherein the compound is selected from the group consisting of radiolabeled carbazoles and derivatives thereof and triazoles derivatives, allowing the compound to distribute into the brain tissue, and imaging the brain tissue, wherein an increase in binding of the compound to the brain tissue compared to a normal control level of binding indicates that the mammal is suffering from or is at risk of developing Alzheimer's Disease. | 11-29-2012 |
20130217887 | Compounds With Matrix-Metalloproteinase Inhibitory Activity and Imaging Agents Thereof - Novel compounds and pharmaceutical compositions having MMP inhibitory activity are disclosed, which have been found to be particularly useful in the prevention, treatment and diagnostic imaging of diseases associated with an unpaired activity of MMP, amongst others MMP-2, MMP-8, MMP-9 and/or MMP-13 to name a few. The compounds of the present invention are useful for the prevention, the treatment and the in vivo diagnostic imaging of a range of disease states (inflammatory, malignant and degenerative diseases) where specific matrix metalloproteinases are known to be involved. | 08-22-2013 |
20130302248 | Imaging Agents for Detecting Neurological Disorders - Imaging agents of formula (I) and methods for detecting neurological disorders comprising administering to a patient in need compounds of formula (I) capable of binding to tau proteins and β-amyloid peptides are presented herein. The invention also relates to methods of imaging Aβ and tau aggregates comprising introducing a detectable quantity of pharmaceutical formulation comprising a radiolabeled compound of formula (I) and detecting the labeled compound associated with amyloid deposits and/or tau proteins in a patient. These methods and compositions enable preclinical diagnosis and monitoring progression of AD and other neurological disorders. | 11-14-2013 |
Patent application number | Description | Published |
20090164886 | NON-LINEAR SLIDER SYSTEMS AND METHODS - Systems and methods disclosed herein accept a user-selected adjustment position associated with a value-selection display screen widget. A non-linear calculation is performed on the user-selected adjustment position, a length of the screen widget, a smallest represented value associated with a range of values, a largest represented value associated with a range of values, and/or an adjustment granularity associated with the display screen widget. The non-linear calculation determines a selected value corresponding to the user-selected adjustment position. The selected value is then sent to a physical output device. Additional embodiments are disclosed and claimed. | 06-25-2009 |
20100223244 | TARGETED MULTI-DIMENSION DATA EXTRACTION FOR REAL-TIME ANALYSIS - Methods and systems for extracting targeted data for real-time reporting are discussed. In an example, a system can include a data store, a server, and a denormalized database. The data store can maintain data created by an application. The server can be communicatively coupled to the data store. The server can include a data extraction module and a data compression module. The data extraction module can extract a subset of the data stored in the data store according to an extraction scheme. The data compression module can compress the extracted subset of the data into a set of aggregated key value pairs. The denormalized database can store the aggregated key value pairs. | 09-02-2010 |
20100287030 | SYSTEM AND METHOD FOR PROVIDING COMBINATION PACKAGE BEST OFFER - In various exemplary embodiments, a system and associated method to provide customized combination package best offers is disclosed. The method includes receiving a selection of a plurality of items from a potential buyer, the selection of the plurality of items creating a customized combination package. A determination is made as to whether the potential buyer is qualified to make the best offer. Available price history associated with the customized combination package is provided to a qualified buyer. A best offer from the qualified buyer is then received and provided to a seller selling the plurality of items. | 11-11-2010 |
20110238615 | SYSTEMS AND METHODS FOR TREND AWARE SELF-CORRECTING ENTITY RELATIONSHIP EXTRACTION - Methods and systems for trend aware self-correcting entity relationship extraction are disclosed. For example, a method can include receiving a selected entity, determining a plurality of entities related to the selected entity, determining a plurality of most probable entities, calculating relevance scores, and displaying a subset of the plurality of most probable entities. The selected entity can be received on a network-based transaction system. The plurality of entities related to the selected entity can be determined based on a relationship score. The relationship score can represent navigation transitions, aggregated over time, between the selected entity and each of the plurality of entities. The plurality of most probable entities can be determined based on probabilities. Relevance scores can be calculated for each of the plurality of most probable entities. Finally, the subset of the plurality of most probable entities to be displayed can be determined according to the relevance scores. | 09-29-2011 |
20120173553 | SYSTEMS AND METHODS FOR ATTRIBUTE-BASED SEARCH FILTERING - A method and a system filter search results according to attributes of current results. A plurality of content elements is tagged so each content element is associated with a plurality of tags. Each tag describes an attribute of at least one of the plurality of content elements. A first listing of results is provided to a user. Each of the results in the first listing includes a content element and the plurality of tags associated with the content element. A first selection of a first tag in a first result of the first listing received from a user. A second selection of a second tag is received from the user. The second tag may be in the first result or in a second result of the first listing of results. A second listing of results is provided to the user where each of the results of the second listing includes at least the first tag and the second tag. | 07-05-2012 |
20120215664 | EPURCHASE MODEL - In various example embodiments, a system and associated method to enhance a user experience in an online environment is provided. In one embodiment, the method includes receiving a request over a network from a user where the request includes keywords to be used in a search for one or more items; the results from the search being displayed in a webpage. A determination is made whether to track metrics related to user activities associated with the results from the search. Based on a determination that the user activities are to be tracked, determining factors based on the tracked metrics related to the user activities, calculating a predictive model using one or more processors based on the determined factors, and displaying an enhanced webpage where components in the enhanced webpage are based on the predictive model. | 08-23-2012 |
20130013449 | SYSTEM AND METHOD FOR PROVIDING COMBINATION PACKAGES - In various exemplary embodiments, a system and method to provide customized combination packages is disclosed. The method includes receiving a selection of a plurality of items from a potential buyer, the selection of the plurality of items creating a customized combination package. Available transaction history for past transactions of similar items to the items of the customized combination package is provided to the potential buyer. An offer from the potential buyer is then received and provided to a seller selling the plurality of items for consideration. | 01-10-2013 |
20130339289 | SYSTEMS AND METHODS FOR TREND AWARE SELF-CORRECTING ENTITY RELATIONSHIP EXTRACTION - Methods and systems for trend aware self-correcting entity relationship extraction are disclosed. For example, a method can include receiving a selected entity, determining a plurality of entities related to the selected entity, determining a plurality of most probable entities, calculating relevance scores, and displaying a subset of the plurality of most probable entities. The selected entity can be received on a network-based transaction system. The plurality of entities related to the selected entity can be determined based on a relationship score. The relationship score can represent navigation transitions, aggregated over time, between the selected entity and each of the plurality of entities. The plurality of most probable entities can be determined based on probabilities. Relevance scores can be calculated for each of the plurality of most probable entities. Finally, the subset of the plurality of most probable entities to be displayed can be determined according to the relevance scores. | 12-19-2013 |
20140244436 | SYSTEM AND METHOD FOR PROVIDING COMBINATION PACKAGES - In various exemplary embodiments, a system and method to provide customized combination packages is disclosed. The method includes receiving a selection of a plurality of items from a potential buyer, the selection of the plurality of items creating a customized combination package. Available transaction history for past transactions of similar items to the items of the customized combination package is provided to the potential buyer. An offer from the potential buyer is then received and provided to a seller selling the plurality of items for consideration. | 08-28-2014 |
20150356194 | SYSTEMS AND METHODS FOR TREND AWARE SELF-CORRECTING ENTITY RELATIONSHIP EXTRACTION - Methods and systems for trend aware self-correcting entity relationship extraction are disclosed. For example, a method can include receiving a selected entity, determining a plurality of entities related to the selected entity, determining a plurality of most probable entities, calculating relevance scores, and displaying a subset of the plurality of most probable entities. The selected entity can be received on a network-based transaction system. The plurality of entities related to the selected entity can be determined based on a relationship score. The relationship score can represent navigation transitions, aggregated over time, between the selected entity and each of the plurality of entities. The plurality of most probable entities can be determined based on probabilities. Relevance scores can be calculated for each of the plurality of most probable entities. Finally, the subset of the plurality of most probable entities to be displayed can be determined according to the relevance scores. | 12-10-2015 |
Patent application number | Description | Published |
20080243865 | Maintaining global state of distributed transaction managed by an external transaction manager for clustered database systems - In accordance with an embodiment of the present invention, a transaction tracking mechanism is provided by a database server cluster to keep track of a global state of a distributed transaction. The global state of the distributed transaction comprises one or more statuses that are associated with one or more transaction branches that are part of the distributed transaction. The global state may be associated with a global lock. Through using the global state in association with the global lock, problems such as partial commits, data inconsistency, access contentions and deadlocks may be avoided when the database server cluster processes the distributed transaction. | 10-02-2008 |
20100030781 | METHOD AND APPARATUS FOR AUTOMATICALLY CLASSIFYING DATA - One embodiment of the present invention provides a system for automatically classifying data in a database. During operation, the system receives and executes a database operation. Next, the system automatically determines if any data was modified as a result of executing the database operation. If so, for each data item that was modified, the system automatically determines if the data item is associated with a classification-rule. If so, the system automatically reclassifies the data item according to the classification-rule. If not, the system leaves a classification of the data item unchanged. | 02-04-2010 |
20100036803 | ADAPTIVE FILTER INDEX FOR DETERMINING QUERIES AFFECTED BY A DML OPERATION - Techniques are disclosed for creating and using a filter index in order to identify registered queries whose result sets are likely to have been changed by changes made to tables. The filter index entries are based on filter conditions. The filter conditions are created based on predicates contained in the registered queries. The filter conditions may include exclusive predicates and join predicates. Join predicates that join a table T | 02-11-2010 |
20100036831 | GENERATING CONTINUOUS QUERY NOTIFICATIONS - Techniques are described to allow a query to be registered as a persistent stored entity within the database, and to generate notifications as and when the query result changes continuously as long as the query continues to be registered with the database. According to one aspect, for a table referenced in a query, a filter condition is generated based, at least in part, on a predicate of the query. Then, the database server determines whether the filter condition is satisfied by either a before image of a row, or an after image of the row, that was modified by a transaction. If the filter condition is satisfied by either the before image or the after image, then the query is added to a first set of queries whose result sets may have been affected by the transaction. From among the first set of queries, a second set of queries that have result sets that were actually affected by the transaction is determined. Notifications are then sent based on the second set of queries. | 02-11-2010 |
20110302205 | METHOD AND MECHANISM FOR DETERMINING LIFE INTERVALS FOR A KEY IN AN INDEX - Disclosed is a mechanism, system, interface, and process to determine one or more life intervals when given a key. In addition, one or more life intervals can be determined for each key within a range of keys. This type of process is useful for auditing purposes or if it is desire to implement a query upon past versions when a key or range of keys is specified for the data for which past versions is desired. This facilitates algorithms, mechanisms, and processes to implement a query upon past versions. | 12-08-2011 |
Patent application number | Description | Published |
20110283232 | USER INTERFACE FOR PUBLIC AND PERSONAL CONTENT BROWSING AND SELECTION IN A CONTENT SYSTEM - A computer-implemented system and method providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to a plurality of content items from a plurality of content sources via a data network, the plurality of content sources including a public content source and a personal content source; processing the content information, using a processor, to provide digital representations of the plurality of content items, the digital representations including a digital representation of a public content item from the public content source and a digital representation of a personal content item from the personal content source; and displaying available content information related to the selected content item in response to receiving a selection of the content item, the available content information including at least one user-selectable command option for obtaining an additional level of detailed information related to the selected content item. | 11-17-2011 |
20110289067 | USER INTERFACE FOR CONTENT BROWSING AND SELECTION IN A SEARCH PORTAL OF A CONTENT SYSTEM - A computer-implemented system and method for providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to particular content items from at least one source of a plurality of content sources via a data network; presenting, using a processor, a user interface including a search portal, the search portal being configured to receive a search query from a user platform; comparing the search query with the content information to identify matching content items; providing a digital representation of each of the matching content items; receiving a selection of one or more of the matching content items, the selection being in response to a user action performed on the digital representation corresponding to the one or more matching content items; and displaying an expanded dimension of information associated with the selected one or more matching content items in response to receiving the selection of the one or more matching content items, the expanded dimension of information including at least one user-selectable command option to obtain an additional level of detailed information related to the selected one or more matching content items. | 11-24-2011 |
20110289421 | USER INTERFACE FOR CONTENT BROWSING AND SELECTION IN A CONTENT SYSTEM - A computer-implemented system and method for providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to particular items of content from at least one source of a plurality of content sources; processing the content information to provide a digital representation of a content item; receiving a selection of the content item, the selection being in response to a user action performed on the digital representation corresponding to the content item; and displaying an expanded dimension of information associated with the selected content item in response to receiving the selection of the content item, the expanded dimension of information including at least one user-selectable display object to obtain an additional level of detailed information related to the selected content item. | 11-24-2011 |
20110289452 | USER INTERFACE FOR CONTENT BROWSING AND SELECTION IN A CONTENT SYSTEM - A computer-implemented system and method for providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to particular items of content from at least one source of a plurality of content sources; processing the content information to provide a digital representation of a content item; receiving a selection of the content item, the selection being in response to a user action performed on the digital representation corresponding to the content item; and displaying an expanded dimension of information associated with the selected content item in response to receiving the selection of the content item, the expanded dimension of information including at least one user-selectable command option to obtain an additional level of detailed information related to the selected content item. | 11-24-2011 |
20110289529 | USER INTERFACE FOR CONTENT BROWSING AND SELECTION IN A TELEVISION PORTAL OF A CONTENT SYSTEM - A computer-implemented system and method for providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to a plurality of content items from a plurality of content sources via a data network, the plurality of content items including television content items from at least two different content sources; processing the content information, using a processor, to provide digital representations of the television content items in a television portal; receiving a selection of at least one of the television content items in the television portal, the selection being in response to a user action performed on the digital representation corresponding to the selected television content item; and displaying available content information related to the selected television content item in response to receiving the selection of the television content item, the displayed available content information including a first user-selectable command option for obtaining an additional level of detailed information related to the selected television content item, the displayed available content information including a second user-selectable command option for requesting a rendering of the selected television content item. | 11-24-2011 |
20110289534 | USER INTERFACE FOR CONTENT BROWSING AND SELECTION IN A MOVIE PORTAL OF A CONTENT SYSTEM - A computer-implemented system and method for providing a user interface for content browsing and selection in a content system. Embodiments include: gathering available content information related to a plurality of content items from a plurality of content sources via a data network, the plurality of content items including movie content items from at least two different content sources; processing the content information, using a processor, to provide digital representations of the movie content items in a movie portal; receiving a selection of at least one of the movie content items in the movie portal, the selection being in response to a user action performed on the digital representation corresponding to the selected movie content item; and displaying available content information related to the selected movie content item in response to receiving the selection of the movie content item, the displayed available content information including a first user-selectable command option for obtaining an additional level of detailed information related to the selected movie content item, the displayed available content information including a second user-selectable command option for requesting a rendering of the selected movie content item. | 11-24-2011 |
Patent application number | Description | Published |
20110172982 | SITE BASED QUANTIFICATION OF SUBSTRATE TOPOGRAPHY AND ITS RELATION TO LITHOGRAPHY DEFOCUS AND OVERLAY - A method and system for modeling and analyzing wafer nanotopography data utilizes a nonlinear contact finite element model. Inputs to the model include lithography chuck parameters and site-based geometry data. Outputs from the model include in-plane distortions and out-of-plane distortions, from which defocus and overlay can be derived. | 07-14-2011 |
20110218762 | SYSTEMS AND METHODS FOR WAFER EDGE FEATURE DETECTION AND QUANTIFICATION - Disclosed herein is a method to enhance detection and quantification of features in the wafer edge/wafer roll off regions. Modifications and improvements have been made to earlier methods which enable improved accuracy and increased scope of feature detection. | 09-08-2011 |
20120177282 | METHODS AND SYSTEMS FOR IMPROVED LOCALIZED FEATURE QUANTIFICATION IN SURFACE METROLOGY TOOLS - A method for enabling more accurate measurements of localized features on wafers is disclosed. The method includes:
| 07-12-2012 |
20130236085 | Systems and Methods of Advanced Site-Based Nanotopography for Wafer Surface Metrology - Systems and methods for providing micro defect inspection capabilities for optical systems are disclosed. Each given wafer image is filtered, treated and normalized prior to performing surface feature detection and quantification. A partitioning scheme is utilized to partition the wafer image into a plurality of measurement sites and metric values are calculated for each of the plurality of measurement sites. Furthermore, transformation steps may also be utilized to extract additional process relevant metric values for analysis purposes. | 09-12-2013 |
20140107998 | System and Method to Emulate Finite Element Model Based Prediction of In-Plane Distortions Due to Semiconductor Wafer Chucking - Systems and methods for prediction of in-plane distortions (IPD) due to wafer shape in semiconductor wafer chucking process is disclosed. A process to emulate the non-linear finite element (FE) contact mechanics model based IPD prediction is utilized in accordance with one embodiment of the present disclosure. The emulated FE model based prediction process is substantially more efficient and provides accuracy comparable to the FE model based IPD prediction that utilizes full-scale 3-D wafer and chuck geometry information and requires computation intensive simulations. Furthermore, an enhanced HOS IPD/OPD prediction process based on a series of Zernike basis wafer shape images is also disclosed. | 04-17-2014 |
20140114597 | Systems, Methods and Metrics for Wafer High Order Shape Characterization and Wafer Classification Using Wafer Dimensional Geometry Tool - Systems and methods for improving results of wafer higher order shape (HOS) characterization and wafer classification are disclosed. The systems and methods in accordance with the present disclosure are based on localized shapes. A wafer map is partitioned into a plurality of measurement sites to improve the completeness of wafer shape representation. Various site based HOS metric values may be calculated for wafer characterization and/or classification purposes, and may also be utilized as control input for a downstream application. In addition, polar grid partitioning schemes are provided. Such polar grid partitioning schemes may be utilized to partition a wafer surface into measurement sites having uniform site areas while providing good wafer edge region coverage. | 04-24-2014 |
20140268172 | Enhanced Inspection and Metrology Techniques And Systems Using Bright-Field Differential Interference Contrast - A method of providing high accuracy inspection or metrology in a bright-field differential interference contrast (BF-DIC) system is described. This method can include creating first and second beams from a first light beam. The first and second beams have round cross-sections, and form first partially overlapping scanning spots radially displaced on a substrate. Third and fourth beams are created from the first light beam or a second light beam. The third and fourth beams have elliptical cross-sections, and form second partially overlapping scanning spots tangentially displaced on the substrate. At least one portion of the substrate can be scanned using the first and second partially overlapping scanning spots as the substrate is rotated. Radial and tangential slopes can be determined using measurements obtained from the scanning using the first and second partially overlapping scanning spots. These slopes can be used to determine wafer shape or any localized topography feature. | 09-18-2014 |
20140353527 | Using Wafer Geometry to Improve Scanner Correction Effectiveness for Overlay Control - Systems and methods for providing improved scanner corrections are disclosed. Scanner corrections provided in accordance with the present disclosure may be referred to as wafer geometry aware scanner corrections. More specifically, wafer geometry and/or wafer shape signature information are utilized to improve scanner corrections. By removing the wafer geometry as one of the error sources that may affect the overlay accuracy, better scanner corrections can be obtained because one less contributing factor needs to be modeled. | 12-04-2014 |
20150120216 | Process-Induced Distortion Prediction and Feedforward and Feedback Correction of Overlay Errors - Systems and methods for prediction and measurement of overlay errors are disclosed. Process-induced overlay errors may be predicted or measured utilizing film force based computational mechanics models. More specifically, information with respect to the distribution of film force is provided to a finite element (FE) model to provide more accurate point-by-point predictions in cases where complex stress patterns are present. Enhanced prediction and measurement of wafer geometry induced overlay errors are also disclosed. | 04-30-2015 |
20150212429 | Using Wafer Geometry to Improve Scanner Correction Effectiveness for Overlay Control - Systems and methods for providing improved scanner corrections are disclosed. Scanner corrections provided in accordance with the present disclosure may be referred to as wafer geometry aware scanner corrections. More specifically, wafer geometry and/or wafer shape signature information are utilized to improve scanner corrections. By removing the wafer geometry as one of the error sources that may affect the overlay accuracy, better scanner corrections can be obtained because one less contributing factor needs to be modeled. | 07-30-2015 |
20150298282 | Patterned Wafer Geometry Measurements for Semiconductor Process Controls - Wafer geometry measurement tools and methods for providing improved wafer geometry measurements are disclosed. Wafer front side, backside and flatness measurements are taken into consideration for semiconductor process control. The measurement tools and methods in accordance with embodiments of the present disclosure are suitable for handling any types of wafers, including patterned wafers, without the shortcomings of conventional metrology systems. | 10-22-2015 |
20150302312 | Predictive Modeling Based Focus Error Prediction - Predictive modeling based focus error prediction method and system are disclosed. The method includes obtaining wafer geometry measurements of a plurality of training wafers and grouping the plurality of training wafers to provide at least one training group based on relative homogeneity of wafer geometry measurements among the plurality of training wafers. For each particular training group of the at least one training group, a predictive model is develop utilizing non-linear predictive modeling. The predictive model establishes correlations between wafer geometry parameters and focus error measurements obtained for each wafer within that particular training group, and the predictive model can be utilized to provide focus error prediction for an incoming wafer belonging to that particular training group. | 10-22-2015 |
Patent application number | Description | Published |
20110144943 | Localized Substrate Geometry Characterization - A system for evaluating the metrological characteristics of a surface of a substrate, the system including an optical substrate measurement system, a data analyzing system for analyzing data in an evaluation area on the substrate, applying feature-specific filters to characterize the surface of the substrate, and produce surface-specific metrics for characterizing and quantifying a feature of interest, the surface-specific metrics including a range metric for quantifying maximum and minimum deviations in the evaluation area, a deviation metric for quantifying a point deviation having a largest magnitude in a set of point deviations, where the point deviations are an amount of deviation from a reference plane fit to the evaluation area, and a root mean square metric calculated from power spectral density. | 06-16-2011 |
20120179419 | METHODS AND SYSTEMS OF OBJECT BASED METROLOGY FOR ADVANCED WAFER SURFACE NANOTOPOGRAPHY - Disclosed herein is a system and method for enhanced and expanded localized geometry characterization. Objects of interest are classified according to user-defined parameters, and this enables enhanced contrast and more accurate feature detection, as well as more accurately defined feature object regions. | 07-12-2012 |
20130089935 | OVERLAY AND SEMICONDUCTOR PROCESS CONTROL USING A WAFER GEOMETRY METRIC - The present invention may include acquiring a wafer shape value at a plurality of points of a wafer surface at a first and second process level, generating a wafer shape change value at each of the points, generating a set of slope of shape change values at each of the points, calculating a set of process tool correctables utilizing the generated set of slope of shape change values, generating a set of slope shape change residuals (SSCRs) by calculating a slope of shape change residual value at each of the points utilizing the set of process tool correctables, defining a plurality of metric analysis regions distributed across the surface, and then generating one or more residual slope shape change metrics for each metric analysis region based on one or more SSCRs within each metric analysis region. | 04-11-2013 |
20130304399 | SYSTEMS AND METHODS FOR WAFER SURFACE FEATURE DETECTION, CLASSIFICATION AND QUANTIFICATION WITH WAFER GEOMETRY METROLOGY TOOLS - Systems and methods for providing micro defect inspection capabilities for optical systems such as wafer metrology tools and interferometer systems are disclosed. The systems and methods in accordance with the present disclosure may detect, classify and quantify wafer surface features, wherein the detected defects are classified and the important defect metrology information of height/depth, area and volume is reported. The systems and methods in accordance with the present disclosure therefore provide more values for quantifying the negative effect of these defects on the wafer quality. | 11-14-2013 |
20130310966 | METHOD AND DEVICE FOR USING SUBSTRATE GEOMETRY TO DETERMINE OPTIMUM SUBSTRATE ANALYSIS SAMPLING - A method and apparatus for process control in the processing of a substrate is disclosed in the present invention. Embodiments of the present invention utilize a first analysis tool to determine changes in a substrate's geometry. The substrate geometry data is used to generate sampling plan that will be used to check areas of the substrate that are likely to have errors after processing. The sampling plan is fed forwards to a second analysis tool that samples the substrate after it has been processed. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 11-21-2013 |
Patent application number | Description | Published |
20120124588 | Generating Hardware Accelerators and Processor Offloads - System and method for generating hardware accelerators and processor offloads. System for hardware acceleration. System and method for implementing an asynchronous offload. Method of automatically creating a hardware accelerator. Computerized method for automatically creating a test harness for a hardware accelerator from a software program. System and method for interconnecting hardware accelerators and processors. System and method for interconnecting a processor and a hardware accelerator. Computer implemented method of generating a hardware circuit logic block design for a hardware accelerator automatically from software. Computer program and computer program product stored on tangible media implementing the methods and procedures of the invention. | 05-17-2012 |
20140181343 | Structured Block Transfer Module, System Architecture, and Method for Transferring - Structured block transfer module, system architecture, and method for transferring content or data. Circuit allowing content in one memory to be shifted, moved, or copied to another memory with no direction from a host, the circuit comprising: a connection manager, at least one copy engine, and a connection between the connection manager and the copy engine. Method for transferring the contents of one of a number of blocks of source memory to one of a number of possible destination memories comprising: selecting source memory; selecting available destination memory; marking the selected destination as no longer available; copying contents of selected source memory into selected destination memory; and marking selected source as available. | 06-26-2014 |
20140181447 | Structured Block Transfer Module, System Architecture, and Method for Transferring - Structured block transfer module, system architecture, and method for transferring content or data. Circuit allowing content in one memory to be shifted, moved, or copied to another memory with no direction from a host, the circuit comprising: a connection manager, at least one copy engine, and a connection between the connection manager and the copy engine. Method for transferring the contents of one of a number of blocks of source memory to one of a number of possible destination memories comprising: selecting source memory; selecting available destination memory; marking the selected destination as no longer available; copying contents of selected source memory into selected destination memory; and marking selected source as available. | 06-26-2014 |
20150178136 | Generating Hardware Accelerators and Processor Offloads - System and method for generating hardware accelerators and processor offloads. System for hardware acceleration. System and method for implementing an asynchronous offload. Method of automatically creating a hardware accelerator. Computerized method for automatically creating a test harness for a hardware accelerator from a software program. System and method for interconnecting hardware accelerators and processors. System and method for interconnecting a processor and a hardware accelerator. Computer implemented method of generating a hardware circuit logic block design for a hardware accelerator automatically from software. Computer program and computer program product stored on tangible media implementing the methods and procedures of the invention. | 06-25-2015 |
Patent application number | Description | Published |
20100312696 | VIRTUAL SHARED ACCOUNT - Methods and systems according to one or more embodiments are provided for establishing and managing a virtual shared account. According to an embodiment, a method for a virtual shared account comprises setting up an n-member virtual shared account for achieving a goal over a network; adding members to the virtual shared account and contributing funds to the virtual shared account. The method may also comprise achieving the goal of the virtual shared account, and once the goal of the virtual account is achieved, the virtual shared account may be closed. | 12-09-2010 |
20110313898 | SYSTEMS AND METHODS FOR FACITIATING CARD VERIFICATION OVER A NETWORK - A system and method for facilitating electronic commerce over a network, according to one or more embodiments, includes communicating with a user via a user device and an issuer of payment media via an issuer device over the network, the payment media being issued to the user by the issuer, receiving user instruction over the network to link the payment media to a user account related to the user, prompting the user over the network to input a secure password known only by the issuer and the user, receiving the secure password from the user over the network, verifying that the payment media is owned by the user over the network via a secure protocol, returning a response to the user related to verification of the payment media, and storing payment media verification information. | 12-22-2011 |
20120166311 | DEFERRED PAYMENT AND SELECTIVE FUNDING AND PAYMENTS - A user is able to change one or more payment options after payment has already been made to a merchant. A payment provider processes a payment request during a transaction with the merchant with default or selected payment options. After the transaction with the merchant is completed and the merchant has been paid, the user may change one or more of the payment options, such as funding source(s) and terms/conditions of payment (e.g., deferment period, installment period/amount, etc.). During the transaction, the user may make a purchase through the payment provider even if the user does not have an account with the payment provider by providing user information, such as name, address, phone number, email address, and date of birth, but not a social security number or funding source information. | 06-28-2012 |
Patent application number | Description | Published |
20110320841 | Method for power management of data buses in electronic devices - Provided are systems and methods for execution by a core of a peripheral component to provide power management for a data bus in a electronic device, suhc as a mobile electronic device. One method comprises determining whether a device in the peripheral component is inactive, transmitting a request for deactivation of at least one data channel to the device, receiving a command to deactivate the at least one data channel, determining whether any remaining devices in the peripheral component are active, and placing the peripheral component in a first low power mode wherein the core remains active in order to monitor a data bus clock. | 12-29-2011 |
20120327829 | Method and System for Allocating Bandwidth for Data Transmissions Between High-Speed Wireless Devices - According to one disclosed embodiment, a method for allocating bandwidth for data transmission time between high-speed wireless devices includes providing beacon intervals to accommodate allocation of data transmissions, each beacon interval including a data transmission time (DTT) interval, dividing all DTT intervals into timeslots of substantially uniform duration, and allocating an integer multiple of the timeslots to each of a plurality of service periods for timed data transmission. Such a method may further include allocating each service period of an isochronous traffic stream to begin the same number of timeslots from the beginning of its beacon interval, dividing the allocation of an asynchronous traffic stream over its allocation period by allocating an equal number of timeslots to a service period in each beacon interval within the allocation period, and de-allocating one or more service periods by marking as unallocated timeslots previously allocated to those service periods. | 12-27-2012 |
20130003662 | Method and system for reliable service period allocation in 60 GHz MAC - A technique to send service period allocation from a network control point to a plurality of stations using an Announce frame of a 60 GHz DBand specification. The use of the Announce frame ensures that the control point receives confirmation of the service period allocation assigned to the stations before data transfer is permitted between the stations. | 01-03-2013 |
20130095768 | System and Method for Scanning Wireless Channels - System and method for active scanning of wireless channels is described. An example method may include transmitting, by a first wireless device, a request to enter a sleep mode and a sleep mode schedule to a second wireless device, the sleep mode schedule specifying a sleep period for the first wireless device going to sleep, and scanning one or more wireless channels, by the first wireless device after transmitting the sleep mode schedule and during the sleep period, to find a third wireless device for communication with the first wireless device. The method may also include communicating, by the first wireless device, during the sleep period, with the third wireless device. Such a scan may be a passive scan or an active scan. | 04-18-2013 |
20130329576 | NOVEL METHODS FOR EFFICIENT POWER MANAGEMENT IN 60GHZ DEVICES - A device and method for managing power in a wireless telecommunication system. A telecommunication device operates in a power saving mode during a sleep interval whenever possible to minimize power drain. The telecommunication device monitors various device, channel and network parameters and dynamically adjusts the duration of the sleep interval based on the monitored parameters in order to optimize power savings. | 12-12-2013 |
20140369330 | Assisted Device Discovery - An electronic device may communicate according to a first communication standard and a second communication standard. The first communication standard may have a longer communication range than the second communication standard. The electronic device may send a capability indication through the first communication standard. The capability indication may indicate the electronic device is capable of communicating according to the second communication standard with a shorter communication range than the first communication standard. The electronic device may discover a second electronic device capable of communicating according to the second communication standard and positioned outside of a non-extended communication range of the second communication standard. Upon discovery, the electronic device may communicate with the second electronic device at an extended range of the second communication standard even though the second electronic device is positioned outside the non-extended communication range of the first electronic | 12-18-2014 |
20150082064 | Power Management in a Configurable Bus - A system includes a bus and a component interconnected via the bus. The component may enter a sleep mode during a period of no data transmission involving the component. | 03-19-2015 |
20150103756 | Efficient Beacon Transmission and Reception - A control point, such as a laptop, phone, wireless access point, or other device, transmits beacons to receiving stations in a wireless network. The control point may reduce power and bandwidth consumption by transmitting beacons with smaller payloads and/or less frequently to sectors with no associated stations. The stations, which may include laptops, phones, or other devices may reduce power consumption be powering on their antennas when beacons may be transmitted to their sectors. | 04-16-2015 |
20150358805 | Assisted Device Discovery - An electronic device may communicate according to a first communication standard and a second communication standard. The first communication standard may have a longer communication range than the second communication standard. The electronic device may send a capability indication through the first communication standard. The capability indication may indicate the electronic device is capable of communicating according to the second communication standard with a shorter communication range than the first communication standard. The electronic device may discover a second electronic device capable of communicating according to the second communication standard and positioned outside of a non-extended communication range of the second communication standard. Upon discovery, the electronic device may communicate with the second electronic device at an extended range of the second communication standard even though the second electronic device is positioned outside the non-extended communication range of the first electronic | 12-10-2015 |
Patent application number | Description | Published |
20080222363 | SYSTEMS AND METHODS OF MAINTAINING FRESHNESS OF A CACHED OBJECT BASED ON DEMAND AND EXPIRATION TIME - A device that implements a method for performing integrated caching in a data communication network. The device is configured to receive a packet from a client over the data communication network, wherein the packet includes a request for an object. At the operating system/kernel level of the device, one or more of decryption processing of the packet, authentication and/or authorization of the client, and decompression of the request occurs prior to and integrated with caching operations. The caching operations include determining if the object resides within a cache, serving the request from the cache in response to a determination that the object is stored within the cache, and sending the request to a server in response to a determination that the object is not stored within the cache. | 09-11-2008 |
20100023582 | Systems and Methods for Accelerating Delivery of a Computing Environment to a Remote User - The present invention is directed towards a method and system for accelerating delivery of a computing environment to a remote client. The computing environment may include a plurality of files comprising an application program and may be streamed to a remote client from a server. Responsive to a determination of whether transmission of the application may be accelerated, an appliance, intercepting the plurality of files, may accelerate transmission of the application program by applying one or more transport layer transmission acceleration techniques to the plurality of files. | 01-28-2010 |
20100121975 | Systems and Methods For Application Fluency Policies - The present solution is directed towards embodiments of a feature generally referred to as Application Templates or AppTemplates, which allows a administrator of an intermediary, such as an appliance, to configure and manage settings per application on a basis of a subset of application network traffic. Once configured, the application settings can be exported in a file called the Application Template, and imported into other intermediary systems. The Application Template includes the settings for the application as configured via the intermediary. | 05-13-2010 |
20100281217 | SYSTEM AND METHOD FOR PERFORMING ENTITY TAG AND CACHE CONTROL OF A DYNAMICALLY GENERATED OBJECT NOT IDENTIFIED AS CACHEABLE IN A NETWORK - The present invention is directed towards a method and system for modifying by a cache responses from a server that do not identify a dynamically generated object as cacheable to identify the dynamically generated object to a client as cacheable in the response. In some embodiments, such as an embodiment handling HTTP requests and responses for objects, the techniques of the present invention insert an entity tag, or “etag” into the response to provide cache control for objects provided without entity tags and/or cache control information from an originating server. This technique of the present invention provides an increase in cache hit rates by inserting information, such as entity tag and cache control information for an object, in a response to a client to enable the cache to check for a hit in a subsequent request. | 11-04-2010 |
20100284411 | SYSTEMS AND METHODS FOR PROVIDING A MULTI-CORE ARCHITECTURE FOR AN ACCELERATION APPLIANCE - The present solution is related to a method for distributing flows of network traffic across a plurality of packet processing engines executing on a corresponding core of a multi-core device. The method includes receiving, by a multi-core device intermediary to clients and servers, a packet of a first flow of network traffic between a client and server. The method also includes assigning, by a flow distributor of the multi-core device, the first flow of network traffic to a first core executing a packet processing engine and distributing the packet to this core. The flow distributor may distribute packets of another or second flow of traffic between another client and server to a second core executing a second packet processing engine. When a packet for the flow of traffic assigned to the first core is received, such as a third packet, the flow distributor distributes this packet to the first core. | 11-11-2010 |
20110060840 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR GUARANTEED CONTENT DELIVERY INCORPORATING PUTTING A CLIENT ON-HOLD BASED ON RESPONSE TIME - An apparatus, method and computer program product for guaranteeing network client-server response time while providing a way of putting the client on-hold when the response time temporarily prohibits access to the requested server. The apparatus is implemented within an interface unit connecting a plurality of servers and an on-hold server to the Internet, which is connected to a plurality of clients. According to one aspect of the invention, the method includes the steps of opening a connection between a client and the interface unit; determining which server the client desires a page from; determining the current response time of the requested server; if the response time is acceptable then opening a connection between the interface unit and the requested server if no free connection is open between the interface unit and the requested server; allowing the client to access information on the requested server-via the connections; and closing the connection between the client and the interface unit while keeping open the connection between the interface unit and the requested server. Alternatively, if the response time is not acceptable, then putting the client on-hold by redirecting the client to an on-hold server until the response time of the requested server becomes acceptable. According to a “on-hold distribution” aspect of the invention, the interface unit determines the on-hold preference of the client and selects the server hosting that on-hold preference. According to another aspect of the invention, instead of utilizing the interface unit, each server has the intelligence to put the client on-hold when applicable. | 03-10-2011 |
20110066718 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENTLY POOLING CONNECTIONS BETWEEN CLIENTS AND SERVERS - An apparatus, method and computer program product for efficiently pooling network client-server connections. The apparatus is implemented within an interface unit connecting a plurality of servers to the Internet, which is in turn connected to a plurality of clients. The method includes the steps of opening a connection between a first client and the interface unit; determining whether a connection between the interface unit and a server is finished being utilized by the first client; opening a connection between a second client and the interface unit; if no free connection is open between the interface unit and the server, then allowing the second client to access information on the server via the same connection utilized by the first client without waiting for the first client to initiate closing the connection; and delinking the connections between the first and second clients and the interface unit while keeping open the connection between the interface unit and the server. | 03-17-2011 |
20110145330 | SYSTEM AND METHOD FOR PERFORMING FLASH CROWD CACHING OF DYNAMICALLY GENERATED OBJECTS IN A DATA COMMUNICATION NETWORK - The present invention is directed towards a “flash crowd” technique for handling situations where the cache receives additional requests, e.g., nearly simultaneous requests, for the same object during the time the server is processing and returning the response object for a first requestor. Once all such nearly simultaneous requests are responded to by the cache, the object is flushed from the cache, with no additional expiry time or invalidation action needed. This technique of the present invention enables data to be cached and served for very small amounts of time for objects that would otherwise be considered non-cacheable. As such, this technique yields a significant improvement in applications that serve fast changing data to a large volume of concurrent users, such, for example, as real time stock quotes, or a fast evolving news story. | 06-16-2011 |
20110277027 | Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application - The present disclosure is directed to methods and systems of providing a user-selectable list of disparately hosted applications. A device intermediary to a client and one or more servers may receive a user request to access a list of applications published to the user. The device may communicate to the client the list of published applications available to the user, the list comprising graphical icons corresponding to disparately hosted applications, at least one graphical icon corresponding to a third-party hosted application of the disparately hosted applications, the third party hosted application served by a remote third-party server. The device may receive a selection from the user of the at least one graphical icon. The device may communicate, from the remote third party server to the client of the user, execution of the third party hosted application responsive to the selection by the user. | 11-10-2011 |
20120290646 | SYSTEM AND METHOD FOR PERFORMING FLASH CACHING OF DYNAMICALLY GENERATED OBJECTS IN A DATA COMMUNICATION NETWORK - The present invention is directed towards a method and system for providing a technique referred to as flash caching to respond to requests for an object, such as a dynamically generated object, from multiple clients. This technique of the present invention uses a dynamically generated object stored in a buffer for transmission to a client, for example in response to a request from the client, to also respond to additional requests for the dynamically generated object from other clients while the object is stored in the buffer. Using this technique, the present invention is able to increase cache hit rates for extremely fast changing dynamically generated objects that may not otherwise be cacheable. | 11-15-2012 |
20130132472 | METHOD AND DEVICE FOR PERFORMING CACHING OF DYNAMICALLY GENERATED OBJECTS IN A DATA COMMUNICATION NETWORK - A method for maintaining a cache of dynamically generated objects. The method includes storing in the cache dynamically generated objects previously served from an originating server to a client. A communication between the client and server is intercepted by the cache. The cache parses the communication to identify an object determinant and to determine whether the object determinant indicates whether a change has occurred or will occur in an object at the originating server. The cache marks the object stored in the cache as invalid if the object determinant so indicates. If the object has been marked as invalid, the cache retrieves the object from the originating server. | 05-23-2013 |
20130286839 | SYSTEMS AND METHODS FOR PROVIDING A MULTI-CORE ARCHITECTURE FOR AN ACCELERATION APPLIANCE - The present solution is related to a method for distributing flows of network traffic across a plurality of packet processing engines executing on a corresponding core of a multi-core device. The method includes receiving, by a multi-core device intermediary to clients and servers, a packet of a first flow of network traffic between a client and server. The method also includes assigning, by a flow distributor of the multi-core device, the first flow of network traffic to a first core executing a packet processing engine and distributing the packet to this core. The flow distributor may distribute packets of another or second flow of traffic between another client and server to a second core executing a second packet processing engine. When a packet for the flow of traffic assigned to the first core is received, such as a third packet, the flow distributor distributes this packet to the first core. | 10-31-2013 |
20140108513 | APPARATUS, METHOD AND COMPUTER PROGRAM PRODUCT FOR EFFICIENTLY POOLING CONNECTIONS BETWEEN CLIENTS AND SERVERS - An apparatus, method and computer program product for efficiently pooling network client-server connections. The apparatus is implemented within an interface unit connecting a plurality of servers to the Internet, which is in turn connected to a plurality of clients. The method includes the steps of opening a connection between a first client and the interface unit; determining whether a connection between the interface unit and a server is finished being utilized by the first client; opening a connection between a second client and the interface unit; if no free connection is open between the interface unit and the server, then allowing the second client to access information on the server via the same connection utilized by the first client without waiting for the first client to initiate closing the connection; and delinking the connections between the first and second clients and the interface unit while keeping open the connection between the interface unit and the server. | 04-17-2014 |
Patent application number | Description | Published |
20110110232 | BACK PRESSURE REMEDIATION - Back pressure is mapped within a network, and primary bottlenecks are distinguished from dependent bottlenecks. Further, the presently disclosed technology is capable of performing network healing operations designed to reduce the data load on primary bottlenecks while ignoring dependent bottlenecks. Still further, the presently disclosed technology teaches identifying and/or suggesting a switch port for adding a node to the network. More specifically, various implementations analyze traffic load and back pressure in a network, identify primary and dependent bottlenecks, resolve the primary bottlenecks, collect new node parameters, and/or select a switch port for the new node. Further, a command can be sent to a selected switch to activate an indicator on the selected port. New node parameters may include new node type, maximum load, minimum load, time of maximum load, time of minimum load and type of data associated with the new node. | 05-12-2011 |
20110110241 | PRESENTATION OF A SELECTED PORT - Back pressure is mapped within a network, and primary bottlenecks are distinguished from dependent bottlenecks. Further, the presently disclosed technology is capable of performing network healing operations designed to reduce the data load on primary bottlenecks while ignoring dependent bottlenecks. Still further, the presently disclosed technology teaches identifying and/or suggesting a switch port for adding a node to the network. More specifically, various implementations analyze traffic load and back pressure in a network, identify primary and dependent bottlenecks, resolve the primary bottlenecks, collect new node parameters, and/or select a switch port for the new node. Further, a command can be sent to a selected switch to activate an indicator on the selected port. New node parameters may include new node type, maximum load, minimum load, time of maximum load, time of minimum load and type of data associated with the new node. | 05-12-2011 |
20110110381 | AUTOMATIC SWITCH PORT SELECTION - Back pressure is mapped within a network, and primary bottlenecks are distinguished from dependent bottlenecks. Further, the presently disclosed technology is capable of performing network healing operations designed to reduce the data load on primary bottlenecks while ignoring dependent bottlenecks. Still further, the presently disclosed technology teaches identifying and/or suggesting a switch port for adding a node to the network. More specifically, various implementations analyze traffic load and back pressure in a network, identify primary and dependent bottlenecks, resolve the primary bottlenecks, collect new node parameters, and/or select a switch port for the new node. Further, a command can be sent to a selected switch to activate an indicator on the selected port. New node parameters may include new node type, maximum load, minimum load, time of maximum load, time of minimum load and type of data associated with the new node. | 05-12-2011 |
20120063304 | Manageability Tools for Lossless Networks - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, while hold times on edge ASICs to be different from hold times encore ASICs, and mitigate severe latency bottlenecks. | 03-15-2012 |
20120063329 | Manageability Tools for Lossless Networks - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, while hold times on edge ASICs to be different from hold times encore ASICs, and mitigate severe latency bottlenecks. | 03-15-2012 |
20120063333 | Manageability Tools for Lossless Networks - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, while hold times on edge ASICs to be different from hold times encore ASICs, and mitigate severe latency bottlenecks. | 03-15-2012 |
20130286858 | MANAGEABILITY TOOLS FOR LOSSLESS NETWORKS - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, while hold times on edge ASICs to be different from hold times encore ASICs, and mitigate severe latency bottlenecks. | 10-31-2013 |
20140029466 | MANAGEABILITY TOOLS FOR LOSSLESS NETWORKS - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, configure hold times on edge switches to be different from hold times on core switches, and mitigate severe latency bottlenecks. | 01-30-2014 |
20140056147 | MANAGEABILITY TOOLS FOR LOSSLESS NETWORKS - Manageability tools are provided for allowing an administrator to have better control over switches in a lossless network of switches. These tools provide the ability to detect slow drain and congestion bottlenecks, detect stuck virtual channels and loss of credits, while hold times on edge ASICs to be different from hold times on core ASICs, and mitigate severe latency bottlenecks. | 02-27-2014 |
Patent application number | Description | Published |
20080301755 | Flexible Access Control Policy Enforcement - A method and system for applying access-control policies. In particular implementations, a method includes determining one or more policies, and a prioritization order for the determined policies, based on the one or more parameters; accessing an indirection table to create an entry for the client, wherein the entry indicates the prioritization order of the determined policies; and creating one or more entries in one or more policy data structures for the one or more determined policies. | 12-04-2008 |
20080304485 | CENTRALLY CONTROLLED ROUTING WITH TAGGED PACKET FORWARDING IN A WIRELESS MESH NETWORK - Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. One method includes tagging packets and forwarding packets in a wireless mesh network using stored forwarding information for the tag, wherein the forwarding information is according to a centrally determined routing method and tag distribution method. | 12-11-2008 |
20090109846 | Priority-aware hierarchical communication traffic scheduling - Priority-aware hierarchical communication traffic scheduling methods and apparatus are disclosed. Communication traffic is scheduled by schedulers. Each scheduler supports a multiple priority scheduling function to schedule communication traffic having any of multiple priorities. The communication traffic scheduled by the schedulers is further scheduled based on the priorities of the communication traffic scheduled by each of the schedulers. Traffic shaping may also be integrated into a hierarchical scheduler. The priority-aware further scheduling and the optional shaping may be implemented, for example, using multiple Active lists, one per traffic priority, and a Pending list to which a scheduler can be added if it has communication traffic to schedule but is not allowed to schedule that traffic due to the shaping. | 04-30-2009 |
20120166794 | Dual Cryptographic Keying - A dual cryptographic keying system. In particular implementations, a method includes responsive to an initial session key negotiation, storing security association information for a tunnel in a security association memory; responsive to a session key renegotiation, storing security association information for the tunnel in a cache; decrypting received packets associated with the tunnel conditionally using the security association information in the cache or the security association information in the security association memory; and upon an expiration condition, overwriting the security association information, for the tunnel, in the security association memory with the security association information, for the tunnel, copied from the cache. | 06-28-2012 |
20120191998 | DYNAMIC POWER MANAGEMENT IN A COMMUNICATIONS DEVICE - A method and system to dynamically manager power in a communication system are provided herein. The method comprises the steps of monitoring a transmit data queue once every first pre-determined period of time and determining whether the transmit data queue is empty for a pre-determined number of times. The method further includes the step of generating a transition state signal to stop de-queuing of data from the transmit queue if the transmit data queue is empty for the pre-determined number of times and selectively operating portions of a Physical Layer (PHY) that are used for functions other than transmitting and receiving an idle signal in a low power mode. | 07-26-2012 |
20130003755 | PRIORITY-AWARE HIERARCHICAL COMMUNICATION TRAFFIC SCHEDULING - Priority-aware hierarchical communication traffic scheduling methods and apparatus are disclosed. Communication traffic is scheduled by schedulers. Each scheduler supports a multiple priority scheduling function to schedule communication traffic having any of multiple priorities. The communication traffic scheduled by the schedulers is further scheduled based on the priorities of the communication traffic scheduled by each of the schedulers. Traffic shaping may also be integrated into a hierarchical scheduler. The priority-aware further scheduling and the optional shaping may be implemented, for example, using multiple Active lists, one per traffic priority, and a Pending list to which a scheduler can be added if it has communication traffic to schedule but is not allowed to schedule that traffic due to the shaping. | 01-03-2013 |
20150244629 | END TO END FLOW CONTROL - A network device implementing the subject system for end to end flow control may include at least one processor circuit that may be configured to detect that congestion is being experienced by at least one queue of a port and identify another network device that is transmitting downstream traffic being queued at the at least one queue of the port that is at least partially causing the congestion. The at least one processor circuit may be further configured to generate an end to end flow control message that comprises an identifier of the port, the end to end flow control message indicating that the downstream traffic should be flow controlled at the another network device. The at least one processor circuit may be further configured to transmit, out-of-band and through at least one intermediary network device, the end to end flow control message to the another network device. | 08-27-2015 |
Patent application number | Description | Published |
20110320608 | METHOD AND APPARATUS FOR ALLOCATING BUNDLES OF SESSIONS IN A NETWORK ELEMENT - A session bundle allocation capability is disclosed. The session bundle allocation capability enables dynamic allocation of bundles of sessions being handled by a network element to modules of the network element (e.g., modules such as processing modules configured to perform one or more of traffic processing, traffic switching, and like functions). A bundle of sessions may be allocated by associating a plurality of sessions to form thereby a bundle of sessions, and assigning the bundle of sessions to a processing module group including one or more processing modules configured for processing traffic for the sessions of the bundle of sessions. A bundle of sessions may have a bundle identifier associated therewith, and a bundle of sessions may be migrated from a first processing module group to a second processing module group by changing a mapping of the bundle identifier from being associated with the first processing module group to being associated with the second processing module group. | 12-29-2011 |
20120236708 | SYSTEM AND METHOD FOR SESSION RESILIANCY AT GEO-REDUNDANT GATEWAYS - A method, system and apparatus for managing a backup service gateway (SGW) associated with a primary SGW, the backup SGW periodically receiving from the primary SGW at least a portion of corresponding UE session state information and in response to a failure of the primary SGW, assuming management of IP addresses and paths associated with the primary SGW, and in response to receiving control or data plane traffic associated with a UE, generating a Downlink Data Notification (DDN) message adapted to inform an MME that the UE is in a live state. | 09-20-2012 |
20120236823 | SYSTEM AND METHOD FOR FAILOVER HANDLING AT GEO-REDUNDANT GATEWAYS - A method, system and apparatus for reversion of UE sessions from a backup SGW or protect node to an operationally restored primary SGW or working node. | 09-20-2012 |
20120239966 | SYSTEM AND METHOD FOR SESSION RESTORATION AT GEO-REDUNDANT GATEWAYS - A method and system for managing a backup service gateway (SGW) associated with a primary SGW, comprising periodically receiving from the primary SGW at least a portion of corresponding UE session state information, the received portion of session state information being sufficient to enable the secondary SGW to indicate to an inquiring management entity that all user sessions associated with a group of mobile devices supported by the primary SGW are in a live state; and in response to a failure of the primary SGW, assuming management of IP addresses and paths associated with the primary SGW and causing each UE supported by the failed primary SGW to reauthorize itself to the network. | 09-20-2012 |
20140071985 | METHOD AND APPARATUS FOR OPTIMIZING USAGE OF TERNARY CONTENT ADDRESSABLE MEMORY (TCAN) - Various embodiments provide a method and apparatus for processing incoming packets in an efficient manner. A service ID bitmap indicating available services associated with the user is established. The available services are grouped into service set. Common service set having common set of rules is determined. A user associated with common service set and incoming traffic is identified. The incoming traffic is processed according to the common set of rules indicated by the service ID bitmap. The efficient use of Ternary Content Addressable Memory (TCAM) results in faster search result, lower power consumption and chip footprint among others. | 03-13-2014 |
20150124590 | VIRTUAL PORT CHANNEL BOUNCE IN OVERLAY NETWORK - Aspects of the subject disclosure relate to methods for detecting a link failure between the first network device and a destination node, receiving a data packet addressed to the destination node, and rewriting encapsulation information of the first data packet. Subsequent to rewriting the encapsulation information of the first data packet, the first data packet is forwarded to a second network device (e.g., using updated address information in the packet header), wherein the second network device is paired with the first network device in the virtual port channel. In certain aspects, systems and computer readable media are also provided. | 05-07-2015 |
20150124631 | NETWORKING APPARATUSES AND PACKET STATISTIC DETERMINATION METHODS EMPLOYING ATOMIC COUNTERS - Disclosed herein are methods and related apparatuses for determining statistics descriptive of packets received at a particular location on a network out of a set of packets transmitted on the network, which include transmitting first and second groups of packets on the network, the packets in the first and second groups labeled with first and second labels, respectively (the packets in the second group not in the first group), incrementing first and second packet counters associated with the particular network location in response to packet(s) in the first and second groups, respectively, being received at the network location until all packets in the first and second groups have drained from the network, and using values read from the first and second packet counters to determine a statistic descriptive of the packets received at the particular network location out of those in the first and second groups transmitted on the network. | 05-07-2015 |
20150124805 | METHOD FOR SCALING ADDRESS LOOKUPS USING SYNTHETIC ADDRESSES - Various examples of the present disclosure provide methods for unifying various types of end-point identifiers, such as IPv4 (e.g., Internet protocol version 4 represented by a VRF and an IPv4 address), IPv6 (e.g., Internet protocol version 6 represented by a VRF and an IPv6 address) and L2 (e.g., Layer-2 represented by a bridge domain (BD) and a media access control (MAC) address), by mapping end-point identifiers to a uniform space (e.g., a synthetic IPv4 address and a synthetic VRF) and allowing different forms of lookups to be uniformly handled. In some examples, a lookup database residing on a switch device can be sharded into a plurality of lookup table subsets, each of which resides on a different one of multiple switch chipsets (e.g., Tridents) in the switch device. | 05-07-2015 |
20150124820 | METHOD FOR SHARDING ADDRESS LOOKUPS - Various embodiments of the present disclosure provide methods for randomly mapping entries in a suitable lookup table across multiple switch devices and/or multiple switch chipsets in each of the multiple switch devices by using two or more independent hash functions. In some embodiments, the number of entries in the lookup table is equal to be the least common multiple of all possible M (i.e., a number of switch devices) choosing R values (i.e., a desired redundancy level). | 05-07-2015 |
20150124821 | SOURCE ADDRESS TRANSLATION IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for translating source addresses in an overlay network. An access switch in an overlay network, such as a VXLAN, may receive an encapsulated packet from a tunnel endpoint in the overlay network. The encapsulated packet may originate from a host associated with the tunnel endpoint and be encapsulated at the tunnel endpoint with a first source tunnel endpoint address and a destination tunnel endpoint address. The access switch may replace the first source tunnel endpoint address in the encapsulated packet with a second source tunnel endpoint address of the access switch to yield a translated packet. The access switch may then transmit the translated packet towards the destination tunnel endpoint address. | 05-07-2015 |
20150124822 | MANAGING ROUTING INFORMATION FOR TUNNEL ENDPOINTS IN OVERLAY NETWORKS - Systems, methods, and non-transitory computer-readable storage media for managing routing information in overlay networks. A first tunnel endpoint in an overlay network may receive an encapsulated packet from a second tunnel endpoint. The encapsulated packet may have been encapsulated at the second tunnel endpoint based on another packet originating from a source host that is associated with the second tunnel endpoint. The encapsulated packet can include a source host address for the source host and a source tunnel endpoint address for the second tunnel endpoint. The first tunnel endpoint can then update a lookup table based on an association between the source host address and the source tunnel endpoint address. | 05-07-2015 |
20150124826 | NETWORK FABRIC OVERLAY - Disclosed herein are methods of forwarding packets on a network, such as a leaf-spine network having leaf devices and spine devices. The methods may include receiving a packet at an ingress leaf device, and determining based, at least in part, on a header of the packet whether the packet is to be transmitted to a spine device. The methods may further include ascertaining based, at least in part, on a header of the packet whether to perform encapsulation on the packet, encapsulating the packet according to a result of the ascertaining, and then transmitting the packet to a spine device according to a result of the determining. Also disclosed herein are network apparatuses which include a processor and a memory, at least one of the processor or the memory being configured to perform some or all of the foregoing described methods. | 05-07-2015 |
20150127701 | MULTICAST MULTIPATHING IN AN IP OVERLAY NETWORK - The subject technology addresses the need in the art for improving utilization of network bandwidth in a multicast network environment. More specifically, the disclosed technology addresses the need in the art for extending multipathing to tenant multicast traffic in an IP overlay network, which enables the network to fully utilize available bandwidth for multicast traffic. In some examples, nodes in the overlay network may be connected by virtual or logical links, each of which corresponds to a path, perhaps through many physical links, in the underlying network. | 05-07-2015 |
Patent application number | Description | Published |
20090144840 | Beta-secretase enzyme compositions and methods - Disclosed are various forms of an active, isolated β-secretase enzyme in purified and recombinant form. This enzyme is implicated in the production of amyloid plaque components which accumulate in the brains of individuals afflicted with Alzheimer's disease. Recombinant cells that produce this enzyme either alone or in combination with some of its natural substrates (β-APPwt and β-APPsw) are also disclosed, as are antibodies directed to such proteins. These compositions are useful for use in methods of selecting compounds that modulate β-secretase. Inhibitors of β-secretase are implicated as therapeutics in the treatment of neurodegenerative diseases, such as Alzheimer's disease. | 06-04-2009 |
20090215080 | METHODS FOR IDENTIFICATION OF INHIBITORS OF ENZYME ACTIVITY - The invention discloses compositions and methods of synthesis to create novel ligands and drugs and identifying such compounds as inhibitors of enzyme targets for use in the treatment of clinical disorders, including cancer, infectious diseases, parasitic infestations, neurological disorders, reproductive disorders, inflammatory disorders, circulatory disorders, and metabolic disorders. | 08-27-2009 |
20090286281 | Glycosylation Variants of BACE - Human BACE polypeptides having modifications to the N-linked glycosylation sites including one or more of the following amino acid substitutions: S174I, N223A, N153Q and N354S. DNA sequences, vectors, and host cells for producing the polypeptides. Crystalline protein compositions formed from the purified polypeptides. Methods of screening for compounds that inhibit Aβ using the polypeptides. | 11-19-2009 |
20100130563 | INHIBITORS OF PLASMA KALLIKREIN - The present invention provides compounds that inhibit the activity of plasma kallikrein (PK) and methods of preventing and treating the formation of thrombin during or after a PK dependent disease or condition, for example, after fibrinolysis treatment. | 05-27-2010 |
20110065757 | METHODS FOR TREATMENT OF KALLIKREIN-RELATED DISORDERS - We have identified classes of kallikrein inhibitors as compounds that are useful in the reduction of vascular permeability (e.g., retinal vascular permeability and cerebral vascular permeability) and astrocyte activation. Diseases and conditions associated with increased vascular permeability include diabetic retinopathy, hemorrhagic stroke, and macular edema. Diseases and conditions associated with astrocyte activation include Alzheimer's disease, multiple sclerosis, Parkinson's disease, amyotrophic lateral sclerosis, Creutzfeldt-Jakob disease, stroke, epilepsy, and brain trauma. | 03-17-2011 |
20110152533 | PRODRUGS OF INHIBITORS OF PLASMA KALLIKRIEN - The present invention provides prodrugs of compounds that inhibit the activity of plasma kallikrein (PK) and methods of preventing and treating plasma kallikrein dependent diseases or conditions, for example, diabetic macular edema, with the prodrugs having the formula: | 06-23-2011 |
20110281752 | BETA-SECRETASE ENZYME COMPOSITIONS AND METHODS - Disclosed are various forms of an active, isolated β-secretase enzyme in purified and recombinant form. This enzyme is implicated in the production of amyloid plaque components which accumulate in the brains of individuals afflicted with Alzheimer's disease. Recombinant cells that produce this enzyme either alone or in combination with some of its natural substrates (β-APPwt and β-APPsw) are also disclosed, as are antibodies directed to such proteins. These compositions are useful for use in methods of selecting compounds that modulate β-secretase. Inhibitors of β-secretase are implicated as therapeutics in the treatment of neurodegenerative diseases, such as Alzheimer's disease. | 11-17-2011 |
20110301215 | INHIBITORS OF PLASMA KALLIKREIN - The present invention provides compounds that inhibit the activity of plasma kallikrein (PK) and methods of preventing and treating the formation of thrombin during or after a PK dependent disease or condition, for example, after fibrinolysis treatment. | 12-08-2011 |
20120264798 | PRODRUGS OF INHIBITORS OF PLASMA KALLIKREIN - This invention provides new pharmaceutically useful compounds that are prodrugs of inhibitors of plasma kallikrein and methods and compositions for preventing or treating plasma kallikrein dependent diseases or conditions, such as diabetic macular edema or hemorrhagic stroke, by administering prodrugs of the formula: | 10-18-2012 |
20140128436 | PRODRUGS OF INHIBITORS OF PLASMA KALLIKREIN - The present invention provides prodrugs of compounds that inhibit the activity of plasma kallikrein (PK) and methods of preventing and treating plasma kallikrein dependent diseases or conditions, for example, diabetic macular edema, with the prodrugs having the formula: | 05-08-2014 |
Patent application number | Description | Published |
20080254036 | COMBINATION ANTICOAGULANT THERAPY WITH A COMPOUND THAT ACTS AS A FACTOR XA INHIBITOR - The present invention is directed to methods of using combination therapies containing [2-({4-[(dimethylamino)iminomethyl]phenyl}carbonylamino)-5-methoxyphenyl]-N-(5-chloro(2-pyridyl))carboxamide for the treatment of thrombotic disease(s) and pharmaceutical compositions thereof. | 10-16-2008 |
20080279845 | COMBINATION THERAPY WITH A COMPOUND ACTING AS A PLATELET ADP RECEPTOR INHIBITOR - The present invention is directed to pharmaceutical compositions and methods of using combination therapies containing [4-(6-fluoro-7-methylamino-2,4-dioxo-1,4-dihydro-2H-quinazolin-3-yl)-phenyl]-5-chloro-thiophen-2-yl-sulfonylurea, or a pharmaceutically acceptable salt thereof, for the treatment of thrombosis diseases. | 11-13-2008 |
20090098119 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 04-16-2009 |
20100125052 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME IN COMBINATION WITH BLOOD COAGULATING AGENTS - The present invention relates to antidotes of anticoagulants targeting factor Xa which antidotes are used in combination with blood coagulating agents or other heparin antidotes to prevent or reduce bleeding in a subject. The antidotes described herein have reduced or no intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is or will be undergoing anticoagulant therapy with a factor Xa inhibitor. | 05-20-2010 |
20100255000 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor X and factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of reversing anticoagulation, stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 10-07-2010 |
20110015128 | UNIT DOSE FORMULATION OF ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates unit dose formulations of antidotes to anticoagulants targeting factor Xa. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 01-20-2011 |
20110033459 | COMBINATION THERAPY WITH A COMPOUND ACTING AS A PLATELET ADP RECEPTOR INHIBITOR - The present invention is directed to pharmaceutical compositions and methods of using combination therapies containing [4-(6-fluoro-7-methylamino-2,4-dioxo-1,4-dihydro-2H-quinazolin-3-yl)-phenyl]-5-chloro-thiophen-2-yl-sulfonylurea, or a pharmaceutically acceptable salt thereof, for the treatment of thrombosis diseases. | 02-10-2011 |
20120046230 | Combination Anticoagulant Therapy With A Compound That Acts As A Factor Xa Inhibitor - The present invention is directed to methods of using combination therapies containing [2-({4-[(dimethylamino)iminomethyl]phenyl}carbonylamino)-5-methoxyphenyl]-N-(5-chloro(2-pyridyl))carboxamide for the treatment of thrombotic disease(s) and pharmaceutical compositions thereof. | 02-23-2012 |
20120095019 | METHODS AND FORMULATIONS OF TREATING THROMBOSIS WITH BETRIXABAN AND A P-GLYCOPROTEIN INHIBITOR - This invention is directed to methods of inhibiting coagulation or treating thrombosis using a factor Xa inhibitor and a P-glycoprotein (Pgp) inhibitor. The invention is also directed to formulations used in the methods. | 04-19-2012 |
20120269788 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 10-25-2012 |
20130129693 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor X and factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of reversing anticoagulation, stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 05-23-2013 |
20130230901 | PROCESS FOR MAKING RECOMBINANT ANTIDOTE TO FACTOR XA INHIBITOR - Disclosed are methods and isolated cells useful for the improved production of function fXa derivative protein that acts as a fXa inhibitor antidote. One aspect relates to an isolated cell comprising the r-Antidote polynucleotide and Furin polynucleotide. Another aspect relates to a method for preparing the cleaved two-chain r-Antidote by expressing, in a cell, the pre-processed r-Antidote polypeptide and a Furin polypeptide. | 09-05-2013 |
20130237493 | COMBINATION THERAPY OF 4-(CYCLOPROPYLAMINO)-2-(4-(4-(ETHYLSULFONYL)PIPERAZIN-1-YL)PHENYLAMINO)PY- RIMIDINE-5-CARBOXAMIDE AND FLUDARABINE - The present invention is directed to pharmaceutical compositions and methods of using combination therapies containing 4-(cyclopropylamino)-2-(4-(4-(ethylsulfonyl)piperazin-1-yl)phenylamino)pyrimidine-5-carboxamide, or a pharmaceutically acceptable salt thereof, and fludarabine for the treatment of cell proliferative disorders, such as undesired acute myeloid leukemia (AML), chronic lymphocytic leukemia (CLL), non-Hodgkin lymphoma (NHL), including diffuse large B cell lymphoma (DLBCL); mantle cell lymphoma, acute lymphocytic leukemia (ALL), follicular lymphoma, Burkitt's lymphoma, small Lymphocytic Lymphoma (SLL) and multiple myeloma. | 09-12-2013 |
20130244963 | COMBINATION THERAPY WITH 4-(3-(2H-1,2,3-TRIAZOL-2-YL)PHENYLAMINO)-2-((1R,2S)-2-AMINOCYCLOHEXYLAMIN- O)PYRIMIDINE-5-CARBOXAMIDE - The present invention is directed to pharmaceutical compositions and methods of using combination therapies containing a SYK inhibitor, or a pharmaceutically acceptable salt thereof, and a antineoplastic or antiinflammatory agent for the treatment of inflammatory, autoimmune and cell proliferative diseases, such as allergic reaction, transplant rejection, rheumatoid arthritis (RA), lupus, multiple sclerosis (MS) or psoriasis undesired acute myeloid leukemia (AML), chronic lymphocytic leukemia (CLL), non-Hodgkin lymphoma (NHL) (including diffuse large B cell lymphoma (DLBCL)), mantle cell lymphoma, acute lymphocytic leukemia (ALL), follicular lymphoma, Burkitt's lymphoma, small Lymphocytic (SLL), Lymphoma, multiple myeloma, asthma, vasculitis, Idiopathic thrombocytopenic purpura (ITP), Heparin Induced Thrombocytopenia (HIT) and hemolytic anemia. | 09-19-2013 |
20130252917 | COMBINATION THERAPY OF 4-(3-(2H-1,2,3-TRIAZO-2-YL)PHENYLAMINO)-2-((1R,2S)-2-AMINOCYCLOHEXYLAMINO- )PYRIMIDINE-5-CARBOXAMIDE AND FLUDARABINE - The present invention is directed to pharmaceutical compositions and methods of using combination therapies containing 4-(3-(2H-1,2,3-triazol-2-yl)phenylamino)-2-(1R,2S)-2-aminocyclohexylamino)pyrimidine-5-carboxamide, or a pharmaceutically acceptable salt thereof, and fludarabine for the treatment of cell proliferative disorders, such as undesired acute myeloid leukemia (AML), chronic lymphocytic leukemia (CLL), non-Hodgkin lymphoma (NHL), including diffuse large B cell lymphoma (DLBCL); mantle cell lymphoma, acute lymphocytic leukemia (ALL), follicular lymphoma, Burkitt's lymphoma, small Lymphocytic Lymphoma (SLL) and multiple myeloma. | 09-26-2013 |
20130315897 | Combination Anticoagulant Therapy With A Compound That Acts As A Factor Xa Inhibitor - The present invention is directed to methods of using combination therapies containing [2-({4-[(dimethylamino)iminomethyl]phenyl}carbonylamino)-5-methoxyphenyl]-N-(5-chloro(2-pyridyl))carboxamide for the treatment of thrombotic disease(s) and pharmaceutical compositions thereof. | 11-28-2013 |
20140044773 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 02-13-2014 |
20140079684 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 03-20-2014 |
20140134151 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME IN COMBINATION WITH BLOOD COAGULATING AGENTS - The present invention relates to antidotes of anticoagulants targeting factor Xa which antidotes are used in combination with blood coagulating agents or other heparin antidotes to prevent or reduce bleeding in a subject. The antidotes described herein have reduced or no intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is or will be undergoing anticoagulant therapy with a factor Xa inhibitor. | 05-15-2014 |
20140323497 | METHODS AND FORMULATIONS OF TREATING THROMBOSIS WITH BETRIXABAN AND A P-GLYCOPROTEIN INHIBITOR - This invention is directed to methods of inhibiting coagulation or treating thrombosis using a factor Xa inhibitor and a P-glycoprotein (Pgp) inhibitor. The invention is also directed to formulations used in the methods. | 10-30-2014 |
20150025011 | UNIT DOSE FORMULATION OF ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates unit dose formulations of antidotes to anticoagulants targeting factor Xa. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 01-22-2015 |
20150057228 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidoes are factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 02-26-2015 |
20150224091 | PREVENTION AND TREATMENT OF THROMBOSIS IN MEDICALLY ILL PATIENTS - Provided herein are methods for preventing and treating thrombosis in medically ill patients by administering to the patient a therapeutically effective amount of betrixaban. | 08-13-2015 |
20150239929 | METHOD FOR PURIFICATION OF RECOMBINANT FACTOR XA DERIVATIVES - Disclosed herein are methods and kits for purifying a serine protease. The methods entail loading the serine protease to a soybean trypsin inhibitor (STI) based affinity chromatograph, and eluting the serine protease with an elution buffer comprising an agent that disrupts interaction between the STI and the serine protease. | 08-27-2015 |
20150352194 | INHIBITION OF TISSUE FACTOR PATHWAY INHIBITOR WITH FACTOR XA DERIVATIVES - The present disclosure relates to compositions and methods for the treatment of bleeding disorders, such as hemophilia A, hemophilia B, von Willebrand (vWF) disease, and factor XII deficiency, by reducing the circulating concentration of tissue factor pathway inhibitor (TFPI), with a factor Xa derivative. | 12-10-2015 |
20150376592 | PROCESS FOR MAKING RECOMBINANT ANTIDOTE TO FACTOR XA INHIBITOR - Disclosed are methods and isolated cells useful for the improved production of function fXa derivative protein that acts as a fXa inhibitor antidote. One aspect relates to an isolated cell comprising the r-Antidote polynucleotide and Furin polynucleotide. Another aspect relates to a method for preparing the cleaved two-chain r-Antidote by expressing, in a cell, the pre-processed r-Antidote polypeptide and a Furin polypeptide. | 12-31-2015 |
20160002617 | ANTIDOTES FOR FACTOR XA INHIBITORS AND METHODS OF USING THE SAME - The present invention relates antidotes to anticoagulants targeting factor Xa. The antidotes are factor X and factor Xa protein derivatives that bind to the factor Xa inhibitors thereby substantially neutralizing them but do not assemble into the prothrombinase complex. The derivatives describe herein lack or have reduced intrinsic coagulant activity. Disclosed herein are methods of reversing anticoagulation, stopping or preventing bleeding in a patient that is currently undergoing anticoagulant therapy with a factor Xa inhibitor. | 01-07-2016 |