Patent application number | Description | Published |
20110035755 | METHOD AND SYSTEM FOR APPLICATION MIGRATION USING PER-APPLICATION PERSISTENT CONFIGURATION DEPENDENCY - A system and method for determining application dependent components includes capturing interactions of an application stored in memory of a first environment with other components at runtime. The interactions are parsed and categorized to determine dependency information. The application is migrated to a new environment using the dependency information to reconfigure the application after migration without application-specific knowledge. | 02-10-2011 |
20110066442 | Influencing Consumer Behavior Modification with Utility Consumption Disaggregation - A method for performing utility consumption disaggregation includes measuring a total utility consumption of a consumer during a specified time period, generating a first disaggregated utility consumption segment and a second disaggregated utility consumption segment, based on the total utility consumption of the consumer, and providing the consumer with disaggregated utility consumption statistics based on at least one of the first and second disaggregated utility consumption segments. | 03-17-2011 |
20110082752 | METHOD AND SYSTEM FOR LOCATION-AWARE USER SPECIFIC ADVERTISEMENTS - A user interface is configured to permit interaction between a user and a location-aware device. A user profile is stored in memory including profile features describing at least one of historic user actions and expected probabilities of user actions. An information server interacts with the user through the user interface, the server being configured to correlate advertisements based on a current location of the user in accordance with the location-aware device and information included in the user profile. | 04-07-2011 |
20120310707 | ESTIMATION OF TRANSIT DEMAND MODELS FOR ENHANCING RIDERSHIP - A method of estimating a transit demand graph includes collecting conditional information that includes at least one condition that when satisfied converts at least one non-rider into a rider, generating a non-rider transit demand graph by satisfying one of the conditions, and generating a normalized transit demand graph from the non-rider transit demand graph and a rider transit demand graph. The riders use public transit and the non-riders do not use public transit. The non-rider transit demand graph shows the demand of the non-riders for a public transit route. The rider transit demand graph shows the demand of riders for the same public transit route. | 12-06-2012 |
20130191539 | SYSTEM AND METHOD FOR SUPPORTING SECURE APPLICATION DEPLOYMENT IN A CLOUD - A method of securely deploying a software application in the Internet cloud including identifying those aspects of a software application that use secure data, and those aspects of the application that use non-secure data, deploying the secure data on one or more secure servers that are not publicly accessible over the Internet, and deploying non-secure data on one or more cloud servers that are publicly available over the Internet, where communication between the secure servers and the cloud servers is managed using secure connections with access only to computation results. | 07-25-2013 |
20130247135 | METHOD AND APPARATUS FOR SECURITY-AWARE ELASTICITY OF APPLICATION AND SERVICES - In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities. | 09-19-2013 |
Patent application number | Description | Published |
20080239947 | METHOD AND APPARATUS FOR FAILURE RESILIENT FORWARDING OF DATA OVER A COMPUTER NETWORK - In one embodiment, the present invention is a method and an apparatus for failure-resilient forwarding of data over a computer network. In one embodiment, a marker is introduced into the data stream, e.g., at the sending node, and allows, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker. | 10-02-2008 |
20080263207 | METHOD AND APPARATUS FOR PROVIDING DYNAMIC GROUP MANAGEMENT FOR DISTRIBUTED INTERACTIVE APPLICATIONS - A method, computer readable media, and apparatus of hierarchical-based communication session and data distribution management that indexes client's communication preferences and network attribute information. Indexing is used to generate dynamic group membership lists that map into communication groups. Indexing is replicated at control nodes in the network overlay to allow distributed management of group membership. Send/receive operations are decoupled through data distribution and the indexing structure. Senders and receivers register their group communication interests to a parent node in the hierarchy. The session control structure aggregates client interest and dynamically updates replicas at control nodes which are selected according to the changes in registered client interest. The indexing structure has self-managing properties for automatic clustering based on client session and data interests, and dynamic partitioning of the session/data interest attribute space. Group membership is managed by querying the indexed session/data distribution management structure and mapping output to communication groups. | 10-23-2008 |
20090175164 | METHOD AND APPARATUS FOR FAILURE RESILIENT FORWARDING OF DATA OVER A COMPUTER NETWORK - In one embodiment, the present invention is a method and an apparatus for failure-resilient forwarding of data over a computer network. In one embodiment, a marker is introduced into the data stream, e.g., at the sending node, and allows, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker. | 07-09-2009 |
20090222564 | Apparatus and Method for Supporting Connection Establishment in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, a mechanism for improving connection establishment in a system utilizing an offload network adapter is provided. The connection establishment mechanism provides the ability to offload connection establishment and maintenance of connection state information to the offload network adapter. As a result of this offloading of connection establishment and state information maintenance, the number of communications needed between the host system and the offload network adapter may be reduced. In addition, offloading of these functions to the offload network adapter permits bulk notification of established connections and state information to the host system rather than piecemeal notifications as is present in known computing systems. | 09-03-2009 |
20100318608 | SYSTEMS AND METHODS FOR EFFICIENT LIVE APPLICATION MIGRATION WITHIN BANDWIDTH CONSTRAINED NETWORKS - A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order. | 12-16-2010 |
20100318990 | METHOD AND APPARATUS FOR SCALABLE MONITORING OF VIRTUAL MACHINE ENVIRONMENTS - A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The monitoring agent monitors performance of the multiple virtual computing devices. The method measures simple operating characteristics of only a base level virtual computing device. The method monitors complex operating characteristics using the monitoring agent by: measuring the complex operating characteristics for each of the multiple virtual computing devices (using each of the multiple virtual computing devices); recording the complex operating characteristics of each of the multiple virtual computing devices on a corresponding memory page of each of the multiple virtual computing devices; and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics and outputs the simple events and the complex events for each of the multiple virtual computing devices. | 12-16-2010 |
20110296177 | METHOD AND SYSTEM FOR MICROLOCKING WEB CONTENT - A method and system for ensuring the authenticity of server returned information displayed at a client browser is provided. The method comprises receiving the server returned information at a client computer; storing a copy of the server returned information at the client computer; inspecting the server returned information for one or more locked objects; allowing the client browser to operate one or more client installed scripts; inspecting the server returned information for any modifications to the one or more locked objects; and in response to determining that the one or more client installed scripts have made modifications to the one or more locked objects, replacing the modified locked objects with unmodified versions of the locked objects from the stored copy of the server returned information. | 12-01-2011 |