Patent application number | Description | Published |
20080256145 | Apparatus for Migrating Data Between Heterogeneous Data Storage Devices - A method for migrating data between heterogeneous data storage devices within a storage area network is disclosed. A first virtualizer presents stored data as a first virtual disk, and then communicates a managed disk representation of the first virtual disk to a second virtualizer. After receiving the managed disk representation, the second virtualizer virtualizes the stored data from the managed disk representation as a second virtual disk. At such point, the stored data can be progressively migrated from the first virtualizer to the second virtualizer. | 10-16-2008 |
20090138522 | APPARATUS AND METHOD FOR MANAGING STORAGE COPY SERVICES SYSTEMS - An apparatus for controlling a storage system having a data replication function, comprises: a storage array component being operable to send notification to a replication engine that a write of data to a primary storage location by a host is subject to data replication; the replication engine being operable to receive the notification and in response to instruct the storage array to copy the data to a secondary storage location; wherein the data is copied to the secondary storage location unmediated by the replication engine. | 05-28-2009 |
20090144499 | Preemptive write-inhibition for thin provisioning storage subsystem - Write requests from host computers are processed in relation to a thin provisioning storage subsystem. A write request is received from a host computer. The write request identifies a first virtual disk that has been previously assigned to the host computer. It is determined whether the first virtual disk has to be allocated additional physical storage locations of the thin provisioning storage subsystem for storing data associated with the write request. In response to determining that the virtual disk has to be allocated additional physical storage locations, the following is performed. First, a quantity of free space remaining unallocated within physical storage locations of the thin provisioning storage subsystem is determined. Second, where the quantity of free space remaining unallocated within the physical storage locations satisfies a policy threshold associated with a second virtual disk, the second virtual disk is write-inhibited. The first and second virtual disks can be different. | 06-04-2009 |
20110246064 | AUGMENTED REALITY SHOPPER ROUTING - A method for guiding a shopper in a store, including: receiving one or more recommended products identified for the shopper based on a set of one or more sought products; calculating a route through the store to a location of each of the sought products based on the store product map; and including a waypoint in the route corresponding to a location of each of the one or more recommended products. The route is then sent to an augmented reality device for presenting the route to the shopper in conjunction with a representation of a current view of the shopper in the store. | 10-06-2011 |
20130054691 | FLEXIBLE RULE BASED MULTI-PROTOCOL PEER-TO-PEER CACHING - Flexible rule based multi-protocol peer-to-peer caching in a wireless environment. A request is received from a requestor for a file from one of a plurality of peer-to-peer networks. The peer-to-peer network the request is directed to is determined in response to receiving the request. Using a generic rule structure, the file that is requested from the peer-to-peer network is identified. The generic rule structure is compatible with all of the plurality of peer-to-peer networks. If the file is stored in a cache it is retrieved from the cache and is transmitted to the requestor. | 02-28-2013 |
20130198313 | USING ENTITY TAGS (ETAGS) IN A HIERARCHICAL HTTP PROXY CACHE TO REDUCE NETWORK TRAFFIC - Disclosed is a program for validating a web cache independent of an origin server. A computer in between a client computer and the origin server computer receives a request for a resource and an entity tag (ETag) corresponding to the request. The computer forwards the request to the origin server and subsequently receives the resource. The computer generates an ETag for the received resource and compares the generated ETag to the ETag corresponding to the request. If the ETags match, the computer sends an indication toward the client computer that the resource has not been modified. | 08-01-2013 |
20130244612 | CACHE HITS VIA A USERS SPEED, DIRECTION OF MOVEMENT, LOCATION, AND BAND WITHIN A CELLULAR NETWORK - A method, system, and computer program product for caching data in a cellular network is provided. Information from a cellular network regarding location, speed, direction of travel, and bandwidth for a user can be used to determine how much data should be cached for the user. More specifically, the time period for how long a user will be in a cell of a cellular network can be calculated using information received from the cellular network. The calculated time period can be used to calculate how much data will be used by a user for the calculated time period with only the amount of data needed for the time period being cached. | 09-19-2013 |
20130244711 | CACHE HITS VIA A USERS SPEED, DIRECTION OF MOVEMENT, LOCATION, AND BAND WITHIN A CELLULAR NETWORK - A method, system, and computer program product for caching data in a cellular network is provided. Information from a cellular network regarding location, speed, direction of travel, and bandwidth for a user can be used to determine how much data should be cached for the user. More specifically, the time period for how long a user will be in a cell of a cellular network can be calculated using information received from the cellular network. The calculated time period can be used to calculate how much data will be used by a user for the calculated time period with only the amount of data needed for the time period being cached. | 09-19-2013 |
20140032360 | AUGMENTED REALITY SHOPPER ROUTING - A store routing system for guiding a shopper in a store comprises a storage storing a store product map comprising location information for products available at the store. The system also comprises an analytics engine for identifying one or more recommended products for the shopper based on a set of one or more sought products. The system also comprises a route calculator for calculating a route through the store to a location of each of the sought products based on the store product map and for including a waypoint in the route corresponding to a location of each of the one or more recommended products. | 01-30-2014 |
20140036674 | SPLIT TRANSPORT CONTROL PROTOCOL (TCP) FLOW CONTROL MANAGEMENT IN A CELLULAR BROADBAND NETWORK - Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection. | 02-06-2014 |
20140064058 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140064141 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140064182 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140067987 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140196108 | SECURITY POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing a security policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, and the security policy identifying at least one valid security standards for communication over the network, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting from the handshake message an identification of a security standard selected for the communication between the first and second endpoints; determining a validity status of the identified security standard based on the security policy; and preventing communication between the first and second endpoints based on a negatively determined validity status of the identified security standard. | 07-10-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140331287 | AUTHENTICATION POLICY ENFORCEMENT - A method of operating a network message interceptor for enforcing an authentication policy for communication over a network between first and second network endpoints, the interceptor being in communication with the network and external to the first and second endpoints, the network including transport layer security, the method comprising the steps of: intercepting a handshake message transmitted over the network between the first and second endpoints; extracting a certificate for an authenticating one of the endpoints from the handshake message; determining a validity status of the certificate for confirming an identity of the authenticating endpoint; and preventing communication between the first and second endpoints based on a negatively determined validity status of the certificate. | 11-06-2014 |
20150032974 | OBJECT CACHING FOR MOBILE DATA COMMUNICATION WITH MOBILITY MANAGEMENT - Method and system are provided for object caching with mobility management for mobile data communication. The method may include: intercepting and snooping data communications at a base station between a user equipment and a content server without terminating communications; implementing object caching at the base station using snooped data communications; implementing object caching at an object cache server in the network, wherein the object cache server proxies communications to the content server from the user equipment; and maintaining synchrony between an object cache at the base station and an object cache at the object cache server. | 01-29-2015 |
20150033072 | MONITORING HIERARCHICAL CONTAINER-BASED SOFTWARE SYSTEMS - A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program. | 01-29-2015 |