Patent application number | Description | Published |
20120110208 | ROUTING A SESSION INITIATION PROTOCOL (SIP) MESSAGE IN A COMMUNICATION SYSTEM - An approach that provides routing a SIP message to a proxy server of a called party in a communication network is provided. In one embodiment, there is a routing tool that assists in routing a session initiation protocol (SIP) message to a called party. The routing tool, including a receiving component, receives a SIP message of a user making a call in the network. The routing tool further includes a parsing component configured to parse the message to determine the domain of the called party and performs a table lookup using the domain of the called party in order to: retrieve a destination code; embed the destination code into the message; and route the message based on the destination code. | 05-03-2012 |
20120117149 | REDUCING CARBON FOOTPRINT AND PROVIDING POWER SAVINGS IN SESSION INITIATED PROTOCOL CONFERENCING - A method includes determining a first subset of a plurality of links to be set to a first power state and a second subset of the plurality of links to be set to a second power state, different from the first power state, based on estimated data transmission. The method also includes instructing at least one network apparatus to set the first subset of the plurality of links to the first power state and to set the second subset of the plurality of links to the second power state different from the first power state. | 05-10-2012 |
20120123984 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Embodiments of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a datasize of a defined retrieval pattern is larger than a permissible memory resource threshold. | 05-17-2012 |
20120124135 | DELIVERY IN SESSION INITIATED PROTOCOL (SIP) CONFERENCING - A method includes determining conference data associated with a conference and determining an optimum congestion control technique for a call leg of the conference based on the conference data. The determining the conference data includes obtaining or receiving the conference data from at least one of: a Home Subscriber Service (HSS), a presence server, and a conference object. The conference is a Session Initiated Protocol (SIP) conference | 05-17-2012 |
20120131159 | METHOD AND SYSTEM FOR REDUCING MESSAGE PASSING FOR CONTENTION DETECTION IN DISTRIBUTED SIP SERVER ENVIRONMENTS - A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed SIP server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. The programming instructions are further operable to determine that a third site is waiting for a second object locked by the first site, and to send a first probe to the second site to determine whether the second site is waiting. A second probe is received and indicates that a site is waiting for an object locked by the first site. The second probe further indicates a deadlock in a distributed server environment to be resolved. | 05-24-2012 |
20120253859 | METRICS BASED DESIGN METHOD AND SYSTEM - A metrics based design method and system is disclosed. The method includes receiving by a computer processor, an informational model comprising data objects, attributes, and relationships associated with a service. The data objects comprise sub-objects. The computer processor receives business affinity (BA) band data associated with the data objects, threshold levels associated with the business affinity (BA) band data, business affinity (BA) levels associated with the business affinity (BA) band data, and service interface operation parameters. The computer processor computes a business affinity (BA) for the informational model based on the business affinity (BA) band data, the threshold levels, the business affinity (BA) levels, and the service interface operation parameters. The computer processor computes a data variation percentage and a reusability count. The computer processor performs: a nested level computation for service valency, a factorization process for computing service valency, and a data element count. | 10-04-2012 |
20130019245 | SPECIFYING ON THE FLY SEQUENTIAL ASSEMBLY IN SOA ENVIRONMENTSAANM Jalaldeen; AhamedAACI KarnatakaAACO INAAGP Jalaldeen; Ahamed Karnataka INAANM Purohit; Siddharth N.AACI AllenAAST TXAACO USAAGP Purohit; Siddharth N. Allen TX USAANM Sharma; ManishaAACI New DelhiAACO INAAGP Sharma; Manisha New Delhi INAANM Sivakumar; GandhiAACI VictoriaAACO AUAAGP Sivakumar; Gandhi Victoria AUAANM Viswanathan; RamAACI PlanoAAST TXAACO USAAGP Viswanathan; Ram Plano TX US - A method and system for defining an interface of a service in a service-oriented architecture environment. Definitions of atomic tasks of a request or response operation included in a service are received. Unique identifiers corresponding to the atomic tasks are assigned. A sequence map required to implement the service is received. The sequence map is populated with a sequence of the assigned unique identifiers corresponding to a sequence of the atomic tasks of the operation. At runtime, an interface of the service is automatically and dynamically generated to define the service by reading the sequence of unique identifiers in the populated sequence map and assembling the sequence of the atomic tasks based on the read sequence of unique identifiers. | 01-17-2013 |
20130055193 | SPECIFYING DATA OCCURRENCE IN SOA BASED ENVIRONMENTS - A method and system for specifying a data occurrence in a service-oriented architecture based environment. After a service specification phase of a service, a service interface is received and a service implementation is created. During a service realization phase, a data element of the service is determined to be sourced or not sourced by the service implementation. If the data element is sourced, then the data element is determined to be optional. If the data element is not sourced, then the data element is determined to be mandatory. The data occurrence including an indication of whether the data element is optional or mandatory is displayed. The service specification phase is repeated and the service interface is modified based on the displayed data occurrence. | 02-28-2013 |
20130103372 | SPECIFYING REUSABLE PROCESS MODELS - A method and system for specifying a reusable process model. Sub-processes of a base process are identified as having a potential to be modified. By filling in values in a configurable pattern applied to each identified sub-process, dynamic categories are mapped to the identified sub-processes, thereby allowing the sub-processes to be reusable. A change to business requirements occurs, where the base process is based on the business requirements. Based on the change to the business requirements, a change to the values in the configurable pattern applied to a sub-process is received. The change to the values in the configurable pattern does not require a change to the base process. | 04-25-2013 |
20130205041 | ROUTING A SESSION INITIATION PROTOCOL (SIP) MESSAGE IN A COMMUNICATION SYSTEM - An approach that provides routing a SIP message to a proxy server of a called party in a communication network is provided. In one embodiment, there is a routing tool that assists in routing a session initiation protocol (SIP) message to a called party. The routing tool, including a receiving component, receives a SIP message of a user making a call in the network. The routing tool further includes a parsing component configured to parse the message to determine the domain of the called party and performs a table lookup using the domain of the called party in order to: retrieve a destination code; embed the destination code into the message; and route the message based on the destination code. | 08-08-2013 |
20130238672 | SPECIFYING DATA IN A STANDARDS STYLE PATTERN OF SERVICE-ORIENTED ARCHITECTURE (SOA) ENVIRONMENTS - An approach for specifying data in a standards style pattern of Service-Oriented Architecture (SOA) environments is provided. The approach implemented in a computer infrastructure, includes defining an interface including one or more local data elements and one or more references to one or more common data elements, of a service, the one or more common data elements being defined in a library for a plurality of services. The approach further includes configuring a data definition file (DDF) which indicates whether each of the one or more local data elements and the one or more common data elements is mandatory for the service. The approach further includes validating one or more data elements from a consumer as mandatory for the service based on the configured DDF. | 09-12-2013 |
20130263242 | TENANT DRIVEN SECURITY IN A STORAGE CLOUD - Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider. The method further includes allowing the tenant to have access to the hard disk after determining that the tenant has placed the physical key into the slot. | 10-03-2013 |
20130283289 | ENVIRONMENTALLY AWARE LOAD-BALANCING - A method and associated systems for the environmentally aware load-balancing of components of a multi-component power-consuming system. The environmentally aware load-balancer receives continually updated values from at least two environmental sensors that monitor and report the values of environmental metrics that characterize components of the power-consuming system and the environments within which those components are located. When the load-balancer receives a task request directed to the power-consuming system, the load-balancer selects a balanced workload allocation as a function of the values of the received environmental metrics and communicates that balanced workload allocation to a routing mechanism. The routing mechanism then uses the communicated balanced workload allocation to determine which component or components of the power-consuming system should receive the task request. | 10-24-2013 |
20130290500 | DIFFERENTIATED SERVICE IDENTIFICATION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for differentiated service identification/exposure in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, input model criteria will be generated. Such criteria may (among other things): identify service categories based on contextual bindings and domain centric functions; identify inter-service dependencies for a given business model (BPM); and/or provide dynamic validation of services to be exposed/identified. Embodiments of the present invention may further analyze service exposure criteria to provide efficient and accurate service exposure decisions as well as validation of the service exposure. This approach allows for consistent service exposure determinations based on decision histories of similarly (2-dimensional) aligned services in the past. This approach further allows for a validation assessment that is based on actual metrics of service usage verses an estimated usage at the time of service implementation. | 10-31-2013 |
20130290599 | LEVERAGING A HYBRID INFRASTRUCTURE FOR DYNAMIC MEMORY ALLOCATION AND PERSISTENT FILE STORAGE - Dynamic allocation of memory in a hybrid system is provided. In particular, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. The method includes dynamically allocating a file or its part or to cache a file or its part between different storage technologies and respective memory technologies in a hybrid infrastructure. | 10-31-2013 |
20130339279 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by determining whether data loaded for data retrieval points is dependent upon a query result from another query process and automatically selecting an eager fetch setting if dependent upon a query result from another query process, or a lazy fetch setting if not. Usage of the data retrieval points is monitored with respect to defined units of work to define retrieval patterns and automatically update the fetch settings, including by revising selected eager fetch settings to lazy fetch settings if a data size of a defined retrieval pattern is larger than a permissible memory resource threshold. | 12-19-2013 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 01-09-2014 |
20140026191 | SECURITY MODEL FOR A MEMORY OF A NETWORK INFORMATION SYSTEM - Systems and methods for providing information services are disclosed. A method includes passing an instance an object, invoked by a user, to a memory device at a hardware layer of a network information system, the object being hosted for a tenant of a network information service. The method further includes determining by a processing unit of the memory device that storage of the object is not authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes preventing storage of the instance in the memory device based on the result of the determining. | 01-23-2014 |
20140122827 | MANAGEMENT OF MEMORY USAGE USING USAGE ANALYTICS - An approach for managing memory usage in cloud and traditional environments using usage analytics is disclosed. The approach may be implemented in a computer infrastructure including a combination of hardware and software. The approach includes determining that space is available within one or more tables which have schema definitions with string fields having a predefined length. The approach further includes creating a virtual table and mapping the available space to the virtual table for population by one or more records. | 05-01-2014 |
20140223240 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 08-07-2014 |
20140283111 | SPATIAL SECURITY FOR STORED DATA - Systems and methods of providing spatial security of data stored on a hard disk drive. A method includes associating a user with at least one track and/or sector of the hard disk drive. The method also includes locking the at least one track and/or sector as a default setting. The method additionally includes determining the user has moved into a predefined area. The method further includes unlocking the at least one track and/or sector based on the determining the user has moved into the predefined area. | 09-18-2014 |
20140325616 | FILE SYSTEM LEVEL DATA PROTECTION DURING POTENTIAL SECURITY BREACH - Immediately upon identifying a potential breach to a file system, a read-only snapshot of one or more file sets of data stored on a storage volume of the file system is created, and one or more file system protection commands are invoked that restrict access to the snapshot of the file set. Generating the snapshot and restricting access to the snapshot data may include immediately opening an administrative shell for the file-system in response to identifying a potential breach, and executing administrative shell commands that invoke creation of snapshot and limit access of the snapshot data to an administrator or super user. | 10-30-2014 |
20150032678 | OPTIMAL PERSISTENCE OF A BUSINESS PROCESS - Aspects of the invention provide for automatically selecting optimal fetch settings for business processes as a function of database query load and relational context by monitoring usage of a data retrieval point with respect to a defined unit of work. A multilayer feed-forward neural network is used to predict, as a function of training sets composed of historical data generated by the monitored usage of the data retrieval point, a future value of a data size of results from an eager fetch setting for the data retrieval point. The eager fetch is automatically revised to a lazy fetch setting in response to determining that the future data size value of the eager fetch setting results is larger than a permissible memory resource threshold. | 01-29-2015 |
20150046597 | SPATIAL SECURITY IN A SESSION INITIATION PROTOCOL (SIP) CONFERENCE - In a method for securing a session initiation protocol (SIP) conference session, first location information of a SIP conference session invitee attempting to connect to a SIP conference session is received. The computer determines that the received first location information at least partially matches a location requirement assigned to the invitee attempting to connect to the SIP conference session. The computer causes the invitee to be connected to the SIP conference session. | 02-12-2015 |
20150067065 | TRANSMISSION OF MESSAGES AND NOTIFICATIONS IN VIRTUALIZED WIRELESS MOBILE COMPUTING DEVICES - A method for transmitting short message service (SMS) messages and notifications within a virtualized wireless device is provided. In one embodiment, a hypervisor detects an incoming SMS message directed to a virtualized wireless device that comprises at least two virtual operating systems. The hypervisor further transmits the incoming SMS message to a first virtual operating system of the virtualized wireless device. In addition, the hypervisor notifies a second virtual operating system of the virtualized wireless device of the incoming SMS message. | 03-05-2015 |
20150074174 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074175 | SERVICE AGREEMENT PERFORMANCE VALIDATION IN A CLOUD HOSTED ENVIRONMENT - Service agreement performance validation includes receiving a request for access to an application from a client system. The application is hosted by a data center in a network-hosted computing environment. The service agreement performance validation also includes querying a global positioning system receiver for geographic location information of the data center, receiving the geographic location information from the global positioning system receiver, transmitting the geographic location information to the client system, and providing access to the application. | 03-12-2015 |
20150074368 | THIN PROVISIONING STORAGE DEVICES IN CONNECTION WITH SECURE DELETE OPERATIONS - A method for improving thin provisioning storage devices in connection with secure delete operations is provided. The method may include receiving at a physical storage device a first indicator to initiate writing a secure delete pattern to a plurality of physical storage locations. The secure delete pattern is written to a plurality of allocated physical storage locations based on the received first indicator. When a second indicator is set, the end of the secure delete pattern is reached. The thin provisioning storage device, upon receiving the second indicator, securely erases the plurality of storage device metadata regions where the mapping of virtual storage locations to allocated physical storage locations is stored. Requests to write a secure delete pattern for virtual storage locations without corresponding allocated physical storage locations are ignored. | 03-12-2015 |