Patent application number | Description | Published |
20090144420 | Efficient monitoring of heterogeneous applications - A heterogeneous environment having applications and application enablers operating on application servers organized as a cluster is managed. The application servers are managed by a cluster management application. A system management application permits access to computing performance data provided by an operating system and reported to the system management application. Performance data of the applications and application enablers is collected from an application agent through the application servers. Topology information regarding the application servers is collected via the cluster management application. The performance data and the topology information are retrieved and sent to the system management application. Access to the performance data via the system management application is permitted. The system management application links to the computing performance data using the topology information. | 06-04-2009 |
20090276856 | LICENSE MANAGEMENT FACILITY - A method is presented for managing resource licensing. The method may include detecting an installed web server and/or application server to identify a container installation path, and identifying a resource associated with the container installation path. A resource installation path and a licensing structure may be determined for the resource. The method may further include building an application representation associating the resource installation path with the licensing structure, and determining the instances of resource use. The instances of resource use may be compared to the application representation to determine a licensing state for the resource. | 11-05-2009 |
20090320020 | Method and System for Optimising A Virtualisation Environment - A mechanism for advising users on how to optimize their virtualisation infrastructure to minimise their software costs. There are two aspects to solution. The first aspect considers the distribution of software in the virtualised environment. The second aspect determines the proper licence types (e.g., sub-capacity or full capacity) for the virtualised environment, based on the usage of the software products therein. | 12-24-2009 |
20100049559 | METHOD AND SYSTEM FOR FOCUSED AND SCALABLE EVENT ENRICHMENT FOR COMPLEX IMS SERVICE MODELS - A system and method for focused and scalable event enrichment for information management system service models in which a monitoring agent monitors one or more IT components running on one or more end-points. When an event probe is installed, a local metadata cache is primed with metadata stored on a metadata server. After a monitoring agent receives an event from an end-point, the event is enriched with metadata stored in the local metadata cache. The enriched event is then uploaded to an event monitoring server. A business service manager server uses the enriched events stored on the event monitoring server to manage the service model and to quickly determine service status based on service impacting events. | 02-25-2010 |
20100174816 | On-Demand Network Connection - An on-demand network connection for a remote user is provided. Responsive to a failure to receive an electronic communication via an established network connection, a remote user device receives a connection request that indicates that the on-demand network connection is to be established. Responsive to receiving the connection request, the on-demand network connection is established from the remote user device to a network. Then, the electronic communication is received on the remote user device via the on-demand network connection. | 07-08-2010 |
20100235520 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - Communication device capabilities may change during an established multimedia session due to connection of a peripheral device. For example, a user listens to an Internet radio service on a mobile phone through a set of headphones. Later, the user connects the mobile phone to stereo system in a car. The mobile phone can leverage the car's stereo system to present higher quality audio than it could present with the headphones. Functionality can be implemented in a communication device to detect connection of a peripheral device and determine multimedia capabilities of the peripheral device. The communication device updates its presence information to indicate the multimedia capabilities of the peripheral device. In response, a multimedia server determines multimedia capabilities indicated in the presence information have changed and optimizes delivery of multimedia content based on the updated multimedia capabilities. | 09-16-2010 |
20110119388 | Optimization of Multimedia Service Over an IMS Network - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 05-19-2011 |
20120137101 | OPTIMIZING MEMORY MANAGEMENT OF AN APPLICATION RUNNING ON A VIRTUAL MACHINE - A method, system and computer program product for optimizing memory usage of an application running on a virtual machine. A virtual machine memory block is pre-allocated and the average memory usage of the virtual machine is periodically computed using statistics collected from the virtual machine through an API. If the memory usage average becomes higher than a maximum threshold, then a recovery mode is entered by releasing the virtual machine memory block and forcing the running application to reduce its processing activity; optionally, a garbage collector cycle can be forced. If the computed memory usage average becomes lower than a minimum threshold value, which is lower than the maximum threshold value, then a normal mode is entered by re-allocating the virtual machine memory block and forcing the running application to resumes its normal processing activity. Optionally, when the virtual machine is idle, a deep garbage collection is forced. | 05-31-2012 |
20120143988 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 06-07-2012 |
20120150986 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120151067 | Method and System for Extending Memory Capacity of a Mobile Device Using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 06-14-2012 |
20120151488 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 06-14-2012 |
20120174192 | Displaying A Known Sender's Identifier To A Recipient Of A Joint Senders' Message - An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG. | 07-05-2012 |
20120191812 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Unicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120191821 | Extending Memory Capacity of a Mobile Device using Proximate Devices and Multicasting - An improved download capability for mobile devices, without requiring increasing of the local memory of such devices, by providing a set of multimedia devices with the capability to create a cooperative download grid where multiple instrumented devices can be aggregated together according to predefined profiles. This capability is useful in at least two different scenarios. The first is when a SIP enabled device must download a large file having a capacity that is larger than the available memory of the SIP device. The second is when a SIP enabled device must download a file but cannot be connected for a long enough time to accomplish the download. If the SIP device is in proximity to other compatible devices such as Voice over Internet Protocol (VoIP) or Session Initiation Protocol (SIP), these devices are operable to be dynamically aggregated to provide a download grid with multiprotocol support that allows optimized downloading. | 07-26-2012 |
20120317546 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. | 12-13-2012 |
20120317563 | METHOD AND SYSTEM FOR CHECKING THE CONSISTENCY OF APPLICATION JAR FILES - A computer method and system dynamically provide consistency of Java application files. A processor executed routine is configured (e.g., instrumented as an agent) to intercept each class that is loaded into a subject Java application or JVM. The system computes a cyclic redundancy check (CRC) of the respective JAR file surrounding the loaded class. The system compares the computed CRC value to a CRC value of at least one other copy of the respective JAR file. Based on results of the comparison, the system determines consistency (e.g., same version) of the multiple copies of the respective JAR file used by the subject Java application. If the multiple copies of the respective JAR file are determined to be inconsistent, the system alerts the user and/or enables the application to abort. The comparative CRC value may be stored in a repository; and the step of comparing looks up the stored CRC value in the repository. | 12-13-2012 |
20130007713 | AUTOMATED TESTING PROCESS - A method, computer program product, and system for automating a test environment is provided. The method may include providing, at one or more computing devices, a superclass and a class-under-test, the superclass and the class-under-test having an inheritance chain therebetween. The method may further include inserting, via the computing device, an intermediate mock class between the superclass and the class-under-test. The method may also include automatically modifying, via the computing device, the class-under-test at runtime. | 01-03-2013 |
20130007714 | AUTOMATED TESTING PROCESS - A method, computer program product, and system for automating a test environment is provided. The method may include providing, at one or more computing devices, a superclass and a class-under-test, the superclass and the class-under-test having an inheritance chain therebetween. The method may further include inserting, via the computing device, an intermediate mock class between the superclass and the class-under-test. The method may also include automatically modifying, via the computing device, the class-under-test at runtime. | 01-03-2013 |
20130018951 | SCHEDULING A MEETING IN REAL TIMEAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A method, data processing system, and computer program product for sending a notification of a meeting. An identification is made when a number of users in a plurality of users requesting the notification of the meeting is within a threshold distance. Whether the number of users is greater than or equal to a threshold number of the plurality of users needed to have the meeting is determined in response to the identification that the number of users in the plurality of users is within the threshold distance. The notification of the meeting is sent to the number of the users in response to determining that the number of users is greater than or equal to the threshold number. | 01-17-2013 |
20130019313 | GRANULAR VIRUS DETECTIONAANM Piccinini; SandroAACI RomeAACO ITAAGP Piccinini; Sandro Rome ITAANM Pichetti; LuigiAACI RomeAACO ITAAGP Pichetti; Luigi Rome ITAANM Secchi; MarcoAACI RomeAACO ITAAGP Secchi; Marco Rome ITAANM Sidoti; StefanoAACI RomeAACO ITAAGP Sidoti; Stefano Rome IT - A group of files for an application installed on a computer system is identified in response to a request to scan the application for malware. The group of files for the application is scanned for the malware. A result is obtained. An action is performed based on the result. | 01-17-2013 |
20130040602 | Managing Cellular Phone Calls - A mechanism is disclosed for managing phone calls on phone devices used by the employee of a company. When the user wants to give a call, a new plugin in the phone device interprets an attribute value added by the phone device user to each phone number in order to categorize the call. The cell phone user enters a profile describing his call accounting information. A call management plugin computes a prefix for user personal calls which will be adapted to the user location. The call management plugin at the end of the call tags the call information as a personal call or business call. The phone device sends the tagged call information to a remote server of the company, which consolidates billing information received from the phone operators with the tagged call information. | 02-14-2013 |
20130103800 | DYNAMICALLY OPTIMIZING DELIVERY OF MULTIMEDIA CONTENT OVER A NETWORK - A method includes connecting a communications device to an Internet Multimedia Subsystem network. The method includes transmitting presence information indicating multimedia capabilities of the communications device and requesting multimedia content from a multimedia server to cause the multimedia server to transmit multimedia content. The method includes detecting connection of a peripheral device to the communications device and determining that the multimedia capabilities have increased due to the connection of the peripheral device. The method includes updating the presence information to indicate the increased multimedia capabilities and transmitting the updated presence information to cause the multimedia server to transmit the multimedia content adjusted for the increased multimedia capabilities indicated in the updated presence information. The method includes receiving the multimedia content adjusted for the increased multimedia capabilities and presenting at least some of the adjusted multimedia content on the peripheral device. | 04-25-2013 |
20130138754 | Displaying A Known Sender's Identifier To A Recipient Of A Joint Senders' Message - An approach is provided in which a request is received from a requestor to send a new email message to one or more recipients on behalf of a selected joint sender group (JSG). The selected JSG includes multiple JSG members with one of the JSG members being the requestor. Permissions corresponding to the JSG are then retrieved and compared to the requestor and the contents of the new email message are identified. The new email message is then sent to the recipients in response to determining, based on the comparison, that the requestor has permission to send the new email message on behalf of the selected JSG. On the other hand, the sending of the new email message is inhibited in response to determining that the requestor lacks permission to send the new email message on behalf of the selected JSG. | 05-30-2013 |
20130174156 | Measuring Transaction Performance Across Application Asynchronous Flows - A mechanism modifies a deployment descriptor of each application component including at least one producer application component or consumer application component, by adding, for each producer application component or consumer application component, an application component identifier, a producer or consumer type, and a recipient identifier of a recipient the application component uses. Responsive to determining a match exists and the given application component is of producer type, the application server virtual machine logs an identifier of a recipient containing a message sent by the given application component, a correlation identifier of the given application component, and an execution start time. Responsive to determining a match exists and the given application component is of consumer type, the application server virtual machine logs an identifier of the recipient resource containing a message processed by the given application component, a correlation identifier of the given application component, and an execution end time. | 07-04-2013 |
20140086397 | Phone Call Management - An approach is provided to manage phone calls. The approach is implemented by an information handling system, such as a smart phone. A requestor sends a contact request to another device over a network. If the request is accepted, the requestor receives a token with the token including usage parameters controlling the requestor's ability to contact the recipient by telephone. When the requestor requests to make a call to the recipient, the call is only placed upon successful determination made by comparing the usage parameters included in the token to a set of current call data. If a successful determination is made, the call is placed to the recipient without revealing the recipient's telephone number. However, if the request is denied, the system prevents the requestor for placing a call to the recipient. | 03-27-2014 |
20140142999 | Managing Assets - A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. | 05-22-2014 |
20140143293 | Managing Assets - A system or computer usable program product for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task. | 05-22-2014 |
20140188394 | DETERMINING SEISMIC RESPONSE CHARACTERISTICS OF STRUCTURES - A system, method and/or software for determining at least one characteristic of at least one structure. A server sub-system includes a processor set and seismic software that runs on the processor set. The sever sub-system being in data communication with a communication network. The server sub-system receives, through the communication network, first detected movement information, relating to seismically-induced physical movement of a first client device. The server sub-system performs structure-characteristic determination, by its seismic software, to determine at least one structure characteristic of a first structure based, at least in part, upon the first detected movement information. Preferably, detected movement data from a great many client devices is utilized in performing the structure-characteristic determination. | 07-03-2014 |
20140200943 | ELECTRONIC CALENDAR SCHEDULING - A computer sends a binary representation of a request for a meeting to end-users. The computer generates one or more lists, wherein each of the lists includes electronic calendar time slots during which at least one of the plurality of end-users is able to attend the meeting. The computer identifies at least one electronic calendar time slot having a highest frequency of occurrence on the lists generated, which comprises iterating through each of the lists and computing a frequency of occurrence of the at least one electronic calendar time slot on the lists. The computer records the frequency of occurrence. The computer queues the meeting in response to the frequency of occurrence being less than a configurable threshold value. The computer schedules the meeting in response to the frequency of occurrence being equal to or greater than the configurable threshold value. | 07-17-2014 |
20140214969 | MANAGING ELECTRONIC MAIL FOR AN END-USER THAT IS UNAVAILABLE - A first computer sends an electronic message transparently to a second computer of intended recipients of an electronic mail (e-mail), in response to the e-mail addresses of the intended recipients being entered, by a first end-user on the first computer, into a ‘To’ message header field of the e-mail. The second computer sends a Boolean value to the first computer, wherein one of the intended recipients is not available to respond to the e-mail. The first computer queries a repository to return to the first end-user contact information of backup contact entities to respond the e-mail for the intended recipients that are not available to respond to the e-mail. The first computer sends the e-mail to the backup contact entities that are available to respond to the e-mail. The first computer deletes the e-mail from each inbox of the backup contact entities that received but did not read the e-mail before the intended recipients read the e-mail. | 07-31-2014 |
20150089070 | OPTIMIZATION OF MULTIMEDIA SERVICE OVER AN IMS NETWORK - Predetermined multimedia services are provided to a plurality of users through a IP Multimedia Subsystem (IMS). A request is received at a placement server of a multimedia service by at least one user, and the placement server retrieves on a presence server information about the at least one user. The placement server identifies application servers including a multimedia application capable of providing the requested multimedia service, and the placement server selects an application server that is located a minimum average distance from at least one user. In response to the minimum average distance being greater than a predetermined threshold, a local application server is selected with an average distance from the user that is less than the predetermined threshold. A virtual image of the multimedia application is created on the selected local application server, and a connection is established between the user and the selected local application server. | 03-26-2015 |