Patent application number | Description | Published |
20090083738 | AUTOMATED DATA OBJECT SET ADMINISTRATION - Modern computer systems may comprise massive sets of data objects of various types, such as data files, application binaries, database objects, proprietary objects managed by applications such as email systems, and system configuration information. Applying complex operations, such as archiving and synchronization operations, to many and varied data objects may be difficult to perform manually or through a script. A more advantageous technique involves applying data object managers to the data object set, where such data object managers are configured to apply various rule comprising a task to be performed on the data object set in furtherance of the operation to various data object types in the data object set. Additionally, the data object set may be modeled as a hierarchical data object set map, to which the rules may be applied through the data object managers in a more uniform manner. | 03-26-2009 |
20100185582 | Web Deployment Functions and Interfaces - Described is a technology in which a destination machine (e.g., a server) is synchronized with source data via an API, including to configure the destination machine. The API includes functions for specifying the source data, the destination machine, and the deployment/synchronization type, along with a function for synchronizing the source data to the destination machine. The API allows combining content, configuration data and/or database data into a single unit (object). The API handles communication with a service/agent on the destination machine that configures that destination machine based on the source data. The API may include functions for packaging web applications, deploying web applications, synchronizing websites, deploying archive data, and/or deploying manifest data. In this manner, deployment/synchronization (including backup operations) may be performed against a group of objects using an API. | 07-22-2010 |
20100185856 | Stateless Agent - Secure and stateless data transfer between a source agent at a first computer system and a destination agent at a second computer system is provided. A first list of labels of content structures is generated at the first computer system. During a first data transfer session, the first list, authentication information, at least one object included in the content structures, and file identifiers for one or more files included in the content structures are transferred from the first computer system to the second computer system. A second list is generated at the second computer system and received at the first computer system. The second list lists at least one requested file identified by the transmitted file identifier(s). During a second data transfer session, authentication information, the first list, the at least one object, and the requested file(s) are transferred from the first computer system to the second computer system. | 07-22-2010 |
20100186009 | Parameterized Installation Packages - An installation package may have metadata concerning optional parameters for a software package to be installed. The metadata may be read by an installation system, and a user interface presented to a user for input on the parameters values. The installation system may store the parameters for later replication of the installation. The installation system may perform the installation on a local device or a remote device, and may further be capable of presenting the user interface on another device. In some embodiments, the metadata may be available to the installation system without having to open the installation package. | 07-22-2010 |
20100186082 | Web Management Authorization and Delegation Framework - Described is a technology in which a non-administrator computer/web user is allowed to perform an administrative-level task within a certain context and/or scope. An authorization store is queried based on information (e.g., a provider, a username, and a path) provided with an authorization request, e.g., from an application via an API. The information in the authorization store, set up by an administrator, determines the administrative action is allowed. If so, a credential store provides credentials that allow the action to be runs before reverting the user to the prior set of credentials. Also described is a pluggable provider model through which the authorization store and/or delegation store are accessed, whereby the data maintained therein can be any format and/or at any location known to the associated provider. | 07-22-2010 |
Patent application number | Description | Published |
20090109995 | AD HOC WIRELESS NETWORKING - A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks. | 04-30-2009 |
20090204725 | WIMAX COMMUNICATION THROUGH WI-FI EMULATION - A computer system with a software framework for supporting Wi-Fi communications that is used for WiMAX communications in a user friendly way. A Wi-Fi emulation component presents a driver interface to the framework that allows Wi-Fi user interfaces and control functions to operate with a WiMAX network card. Functions of the WiMAX card not supported through the framework may be translated within the emulation component to command objects that are passed by the framework to extensibility components. The extensibility components may be supplied in association with the network interface card. The emulation component also presents an interface to a driver for a WiMAX network interface card in a form that may interface directly with the framework, if the framework is modified to support WiMAX communications. | 08-13-2009 |
20110134799 | AD HOC WIRELESS NETWORKING - A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks. | 06-09-2011 |
20110282985 | NETWORK AND INTERFACE SELECTION ON A COMPUTING DEVICE CAPABLE OF ESTABLISHING CONNECTIONS VIA MULTIPLE NETWORK COMMUNICATIONS MEDIA - A system and method for carrying out network and interface selections across multiple media is disclosed. The disclosed system facilitates automated network interface configuration decision-making that spans a set of networks supporting communications via differing media. A set of media specific modules associated with differing communications media acquire network interface status/capabilities information. A rules engine thereafter applies a designated network selection rule(s) to the acquired network interface status/capabilities information, and any other appropriate parameters attributable to either an interface or network, to select one or more networks and interfaces with which to establish/maintain a connection. | 11-17-2011 |
20130183935 | EXTENSIBLE FRAMEWORK FOR WIRELESS NETWORK CONNECTIVITY - An extensible framework for offloading data traffic sent to a mobile computing device over a cellular network to a wireless network comprises software plugins, a plugin host that is typically part of the mobile device operating system, and plugin interfaces through which the plugin host communicates with the plugins. A plugin is associated with one or more mobile operators. The framework can comprise one or more plugins, but typically, only one plugin is active at a time. The framework can automatically detect and connect to wireless networks associated with a mobile operator associated with an active plugin. The plugin can automatically authenticate the mobile device or a mobile device user with the mobile operator over the connected wireless network. The plugins are not allowed access to operating system functions responsible for detecting and connecting and disconnecting to a wireless network, which can improve mobile operating system stability and battery life. | 07-18-2013 |
20130298204 | Automatic Detection of Wireless Network Type - Techniques for facilitating automatic detection of a type of wireless network are described. In accordance with one or more embodiments, wireless network client(s) can automatically detect the “type” of a network (e.g., method of authentication and encryption) without requiring input from the user. In accordance with one or more embodiments, a wireless network detection system having a connection component and a detection component is provided. The connection component facilitates connection of a client system to at least one of a plurality of wireless networks. The detection component identifies a type of an available wireless network. Identification can be based, for example, upon information received in an information element and/or iterative probing of the wireless network beacon. | 11-07-2013 |
20140321320 | Ad Hoc Wireless Networking - A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks. | 10-30-2014 |
20150016406 | SYSTEM AND METHOD FOR OFFLOADING TRAFFIC FROM CELLULAR NETWORKS - An extensible framework for offloading data traffic sent to a mobile computing device over a cellular network to a wireless network comprises software plugins, a plugin host that is typically part of the mobile device operating system, and plugin interfaces through which the plugin host communicates with the plugins. A plugin is associated with one or more mobile operators. The framework can comprise one or more plugins, but typically, only one plugin is active at a time. The framework can automatically detect and connect to wireless networks associated with a mobile operator associated with an active plugin. The plugin can automatically authenticate the mobile device or a mobile device user with the mobile operator over the connected wireless network. The plugins are not allowed access to operating system functions responsible for detecting and connecting and disconnecting to a wireless network, which can improve mobile operating system stability and battery life. | 01-15-2015 |
20150142946 | Applying Sequenced Instructions to Connect Through Captive Portals - Embodiments apply a set of sequenced instructions to connect to a network through a captive portal. A computing device detects a network access point and obtains the instruction set corresponding to the network access point. The instruction set is derived by a cloud service from crowdsourced data describing interactions between mobile computing devices and the network access point. Applying the instruction set includes performing actions such as navigating web pages to accept terms and conditions, provide user or device information, and more. | 05-21-2015 |
Patent application number | Description | Published |
20120303262 | MAP NAVIGATION WITH SUPPRESSION OF OFF-ROUTE FEEDBACK NEAR ROUTE TERMINUS - A terminus buffer area (e.g., an end-of-route buffer area) is provided in a map navigation tool to allow suppression of off-route feedback (e.g., audio or visual warnings or alerts) in some circumstances, such as when a mobile computing device (e.g., a smart phone) that implements the tool enters the buffer area. The map navigation tool can output off-route feedback when the user strays from a route, but also can suppress the off-route feedback when the user is within the buffer area. In addition to suppression of off-route feedback, a map navigation tool also can disable off-route feedback when a user crosses an arrival threshold and enters an arrival area, such that the tool does not output off-route feedback regardless of the user's location or movements once the user has entered the arrival area. The arrival area can be within an end-of-route buffer area. | 11-29-2012 |
20120303263 | OPTIMIZATION OF NAVIGATION TOOLS USING SPATIAL SORTING - Digital map navigation applications for use with a mobile computing device are optimized using a spatial sorting method. Spatial sorting entails partitioning a digital map into tiles and maintaining information that links tiles to points on the route. When a particular map navigation application is invoked, a set of relevance rules are defined for that map application to determine which of the route points to process. This determination is made by extracting from the look-up table a subset of the full set of route points, based on the relevance rules. Because the subset of route points is processed instead of the original full set of route points, the mobile device is capable of efficiently handling a complex route that otherwise would entail considerable expenditure of processor time and use of computer memory to store and retrieve unnecessary data. | 11-29-2012 |
20120303265 | NAVIGATION SYSTEM WITH ASSISTANCE FOR MAKING MULTIPLE TURNS IN A SHORT DISTANCE - Techniques and tools are described for providing navigation assistance when there are multiple turns in succession in a short period of time or distance. In one embodiment, the route information can be reviewed to determine multiple turns in sequence that are less than a predetermined distance apart. These so-called “tight turns” can be handled differently than other turns by announcing the tight turns in a single combination instruction. Additional lane guidance can also be provided. In another embodiment, an audio feedback can be used to indicate that a user completed a successful turn. Such audio feedback can be in combination with the identified tight turns or independently for other turns or events. The audio feedback can also be an indication for the user to tap the display, wherein the tapping results in an immediate indication of the next turn. | 11-29-2012 |
20120303266 | FIRST WAYPOINT DISTANCE - A mobile computing device can determine a first waypoint distance that indicates a distance from the device's location within which a first waypoint of a route cannot be located. This distance can be sent to a server as part of a map data request. The distance can be based on a device velocity, a request latency time, an instruction intake time and an instruction reaction time. The request latency time represents the delay from sending a request to receiving route information in response. The instruction intake time represents the time it takes for a user to read or listen to a first waypoint instruction. The instruction reaction time represents the time it takes a user to react to a first waypoint instruction. Route information contains information identifying a first waypoint that is further away from the device position supplied with the request than the first waypoint distance. | 11-29-2012 |
20120303270 | START-OF-ROUTE MAP NAVIGATION WITH SUPPRESSION OF OFF-ROUTE FEEDBACK - A map navigation tool provides a start-of-route buffer area in which off-route feedback (e.g., audio or visual warnings or alerts) can be suppressed in some circumstances. For example, a mobile computing device implements a map navigation tool that can output off-route feedback when the user strays from a route, but also can suppress off-route feedback when the user is within a start-of-route buffer area. Off-route feedback can continue to be suppressed until some other event, such as the user leaving the start-of-route buffer area, occurs. Off-route feedback can be suppressed even if the user is not within a start-of-route buffer area, such as when the map navigation tool generates a route when the user is at an initial location that is far away from any part of the route and then joins the route later (e.g., at the start location or downstream from the start location). | 11-29-2012 |
Patent application number | Description | Published |
20120072578 | INTEGRATING EXTERNAL AND CLUSTER HEAT MAP DATA - The present invention extends to methods, systems, and computer program products for integrating external and cluster heat map data. Embodiments of the invention include a proxy service that manages (e.g., asynchronous) communication with cloud nodes. The proxy service simulates packets to on-premise services to simplify the integration with an existing heat map infrastructure. The proxy maintains a cache of performance counter mappings and timestamps on the on-premise head node to minimize the impact of latency into heat map infrastructure. In addition, data transfer is minimized by mapping a fixed set of resource based performance counters into a variable set of performance counters compatible with the on premise heat map infrastructure. | 03-22-2012 |
20120072597 | USING TEMPLATES TO CONFIGURE CLOUD RESOURCES - The present invention extends to methods, systems, and computer program products for using templates to configure cloud resources. Embodiments of the invention include encapsulating cloud configuration information in an importable/exportable node template. Node templates can also be used to bind groups of nodes to different cloud subscriptions and cloud service accounts. Accordingly, managing the configuration of cloud based resources can be facilitated through an interface at a (e.g., high performance) computing component. Templates can also specify a schedule for starting/stopping instance running within a resource cloud. | 03-22-2012 |
20120072728 | RETRIEVING AND USING CLOUD BASED STORAGE CREDENTIALS - The present invention extends to methods, systems, and computer program products for retrieving and using cloud based storage credentials. Embodiments of the invention include automatically retrieving cloud based credentials (e.g., storage keys) as needed, such as, for example, on demand. Automatically retrieving credentials reduces administrator workloads and mitigates the potential for human errors. Embodiments of the invention also include using credentials (e.g., storage keys) in the deployment and ongoing operation of services (e.g., computing workers) in a resource cloud. Embodiments of the invention also include propagating credentials (e.g., storage keys) to instances running in the cloud during deployment. | 03-22-2012 |
20120209901 | Multilevel Multipath Widely Distributed Computational Node Scenarios - An application combines on-site and cloud-based calculations. The application selects a cloud computing broker from a list sorted by load. The broker receives computation requests from the application, sends corresponding load-balanced requests to local application service hosts and cloud proxies, receives responses, and sends the responses to the application without identifying the response source as local versus non-local. Each proxy has a logical-physical mapping of cloud-resident worker nodes. A scheduler receives session requests from applications, allocates local and cloud computing resources to a session, and tracks resource usage by session. An application previously run only on-premises can be executed partially on cloud worker nodes without modification. The proxy re-routes unfulfilled requests from a failed worker, undetected by the broker. If all workers assigned to that proxy fail, then the broker reassigns unfulfilled requests to another proxy, undetected by the application. | 08-16-2012 |
20120278461 | Mapping Meaningful Hostnames - A set of interacting devices within a cluster environment may use a secondary naming system to assign and transfer friendly names between devices within the cluster. The cluster may be operated inside, outside, or partially within a cloud computing environment. The secondary naming system may maintain a hosts file within the addressable memory of each member of the cluster, where the hosts file may updated and changes propagated to every member of the cluster so that each member maintains an identical hosts file. | 11-01-2012 |
20130124720 | USAGE REPORTING FROM A CLOUD-HOSTED, DISTRIBUTED SYSTEM - Collecting usage data in a cluster computing environment. A method includes at a tracker service receiving a request from an at least partially cloud based deployment for an interval for the deployment to report usage information in usage reports. The usage information includes information defining how software in a deployment is used. In response to the request from the deployment, the method further includes, the tracker service providing an interval to the deployment. The method further includes at the tracker service, receiving usage reports from the deployment according to the provided interval. | 05-16-2013 |
20130159380 | PROVISIONING HIGH PERFORMANCE COMPUTING CLUSTERS - Provisioning a cloud based high performance computing cluster. The method includes from a cloud based provisioning service deployed in a cloud based computing provider, providing a user interface. The method further includes receiving user input at the cloud based provisioning service from the user interface. The method further includes from the user input, determining a configuration for a cloud based user service for the user. Using the cloud based provisioning service, the method further includes provisioning the cloud based user service for the user, in the cloud, based on the determined configuration. | 06-20-2013 |
20140207859 | PROVISIONING HIGH PERFORMANCE COMPUTING CLUSTERS - Provisioning a cloud based high performance computing cluster. The method includes from a cloud based provisioning service deployed in a cloud based computing provider, providing a user interface. The method further includes receiving user input at the cloud based provisioning service from the user interface. The method further includes from the user input, determining a configuration for a cloud based user service for the user. Using the cloud based provisioning service, the method further includes provisioning the cloud based user service for the user, in the cloud, based on the determined configuration. | 07-24-2014 |
20140317299 | USING TEMPLATES TO CONFIGURE CLOUD RESOURCES - The present invention extends to methods, systems, and computer program products for using templates to configure cloud resources. Embodiments of the invention include encapsulating cloud configuration information in an importable/exportable node template. Node templates can also be used to bind groups of nodes to different cloud subscriptions and cloud service accounts. Accordingly, managing the configuration of cloud based resources can be facilitated through an interface at a (e.g., high performance) computing component. Templates can also specify a schedule for starting/stopping instance running within a resource cloud. | 10-23-2014 |