-
20110225330 Provide portable device comprising one processor: Embodiments of the invention provide a portable device comprising at least one processor. The portable device also comprises a memory coupled to the processor comprising data. Further, the portable device comprises a detector configured to detect at least one external device. The at least one external device is configured to connect to the portable device. Further, the portable device comprises an interface to connect to the at least one external device. The interface is configured to transmit or receive one or more control signals excluding the data. Furthermore, the portable device comprises a controller configured to enable controlling of the portable device from the at least one external device; and controlling of the at least one external device from the portable device through the interface.
READ MORE20110225330 Provide portable device comprising one processor: Embodiments of the invention provide a portable device comprising at least one processor. The portable device also comprises a memory coupled to the processor comprising data. Further, the portable device comprises a detector configured to detect at least one external device. The at least one external device is configured to connect to the portable device. Further, the portable device comprises an interface to connect to the at least one external device. The interface is configured to transmit or receive one or more control signals excluding the data. Furthermore, the portable device comprises a controller configured to enable controlling of the portable device from the at least one external device; and controlling of the at least one external device from the portable device through the interface.
READ MORE -
20100220616 Optimizing network connections by a computing device: Embodiments of the invention provide methods and systems for optimizing network connections by a computing device. One or more network connections between a source and a destination may be monitored for one or more values of one or more connection parameters. Thereafter, one or more values of the connection parameters of the monitored network connections may be analyzed to select one or more combinations of the values. Further, the selected combinations of the values of the connection parameters may be stored. Subsequently, one or more monitored network connections may be established based on the stored values of the combinations.
READ MORE20100220616 Optimizing network connections by a computing device: Embodiments of the invention provide methods and systems for optimizing network connections by a computing device. One or more network connections between a source and a destination may be monitored for one or more values of one or more connection parameters. Thereafter, one or more values of the connection parameters of the monitored network connections may be analyzed to select one or more combinations of the values. Further, the selected combinations of the values of the connection parameters may be stored. Subsequently, one or more monitored network connections may be established based on the stored values of the combinations.
READ MORE -
20100217854 Intelligent Management of a Network Element: A network element (NE) includes an intelligent interface (II) with its own operating environment rendering it active during the NE boot process, and with separate intelligence allowing it to take actions on the NE prior to, during, and after the boot process. The combination of independent operation and increased intelligence provides enhanced management opportunities to enable the NE to be controlled throughout the boot process and after completion of the boot process. For example, files may be uploaded to the NE before or during the boot process to restart the NE from a new software image. The II allows this downloading process to occur in parallel on multiple NEs from a centralized storage resource. Diagnostic checks may be run on the NE, and files, and MIB information, and other data may be transmitted from the II to enable a network manager to more effectively manage the NE.
READ MORE20100217854 Intelligent Management of a Network Element: A network element (NE) includes an intelligent interface (II) with its own operating environment rendering it active during the NE boot process, and with separate intelligence allowing it to take actions on the NE prior to, during, and after the boot process. The combination of independent operation and increased intelligence provides enhanced management opportunities to enable the NE to be controlled throughout the boot process and after completion of the boot process. For example, files may be uploaded to the NE before or during the boot process to restart the NE from a new software image. The II allows this downloading process to occur in parallel on multiple NEs from a centralized storage resource. Diagnostic checks may be run on the NE, and files, and MIB information, and other data may be transmitted from the II to enable a network manager to more effectively manage the NE.
READ MORE -
20150058490 Grid applications to access resources: Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
READ MORE20150058490 Grid applications to access resources: Various embodiments allow Grid applications to access resources shared in communication network domains. Grid Proxy Architecture for Network Resources (GPAN) bridges Grid services serving user applications and network services controlling network devices through proxy functions. At times, GPAN employs distributed network service peers (NSP) in network domains to discover, negotiate and allocate network resources for Grid applications. An elected master NSP is the unique Grid node that runs GPAN and represents the whole network to share network resources to Grids without Grid involvement of network devices. GPAN provides the Grid Proxy service (GPS) to interface with Grid services and applications, and the Grid Delegation service (GDS) to interface with network services to utilize network resources. In some cases, resource-based XML messaging can be employed for the GPAN proxy communication.
READ MORE -
20100146112 Improving the efficiency of communication in a network: Embodiments of techniques that may be used to improve communication efficiency in a network are provided. One or more versions of one or more communication protocols in the network may be monitored. A document object model of data may be processed at a device to generate raw data. Subsequently, the raw data may be transmitted by the device on the network based on the versions of the communication protocols.
READ MORE20100146112 Improving the efficiency of communication in a network: Embodiments of techniques that may be used to improve communication efficiency in a network are provided. One or more versions of one or more communication protocols in the network may be monitored. A document object model of data may be processed at a device to generate raw data. Subsequently, the raw data may be transmitted by the device on the network based on the versions of the communication protocols.
READ MORE -
20100146111 Efficient communication in a network: A connection may be established between a first device and a second device in a network. Thereafter, the first device may be monitored for one or more performance parameters. Subsequently, full state information of an application may be processed at the first device based on the performance parameters, and the processed full state information may be transmitted by the first device to the second device. Thereafter, one or more state changes of the application may be processed at the first device based on the one or more performance parameters while the connection is active. Subsequently, one or more processed state changes of the application may be transmitted sequentially by the first device to the second device.
READ MORE20100146111 Efficient communication in a network: A connection may be established between a first device and a second device in a network. Thereafter, the first device may be monitored for one or more performance parameters. Subsequently, full state information of an application may be processed at the first device based on the performance parameters, and the processed full state information may be transmitted by the first device to the second device. Thereafter, one or more state changes of the application may be processed at the first device based on the one or more performance parameters while the connection is active. Subsequently, one or more processed state changes of the application may be transmitted sequentially by the first device to the second device.
READ MORE -
WO 2006063052 Computer network security by network immunization: Network elements (12, 14) that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service (30), new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements (12, 14) so that malicious code may be filtered on the network before it reaches the end users (20). The filter rules may be derived by security software (28) resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements (12, 14) that are to be implemented as detection points on the network.
READ MOREWO 2006063052 Computer network security by network immunization: Network elements (12, 14) that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service (30), new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements (12, 14) so that malicious code may be filtered on the network before it reaches the end users (20). The filter rules may be derived by security software (28) resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements (12, 14) that are to be implemented as detection points on the network.
READ MORE -
20060123481 Method and apparatus for network immunization: Network elements that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service, new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements so that malicious code may be filtered on the network before it reaches the end users. The filter rules may be derived by security software resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements that are to be implemented as detection points on the network.
READ MORE20060123481 Method and apparatus for network immunization: Network elements that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service, new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements so that malicious code may be filtered on the network before it reaches the end users. The filter rules may be derived by security software resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements that are to be implemented as detection points on the network.
READ MORE -
WO 2005033899 Data transfers over switched underlay networks: A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
READ MOREWO 2005033899 Data transfers over switched underlay networks: A method and apparatus for resource scheduling on a switched underlay network (18) enables coordination, scheduling, and scheduling optimization to take place taking into account the availability of the data and the network resources comprising the switched underlay network (18). Requested transfers may be fulfilled by assessing the requested transfer parameters, the availability of the network resources required to fulfill the request, the availability of the data to be transferred, the availability of sufficient storage resources to receive the data, and other potentially conflicting requested transfers. In one embodiment, the requests are under-constrained to enable transfer scheduling optimization to occur. The under-constrained nature of the requests enable transfer scheduling optimization to occur. The under-constrained nature of the requests enables requests to be scheduled taking into account factors such as transfer priority, transfer duration, the amount of time it has been since the transfer request was submitted, and many other factors.
READ MORE -
20060075042 Messaging between user applications and network elements: Extensible resource messaging in a communication network is provided through creation of a flexible, extensible, and secure messaging environment. A client-server architecture may be implemented in which user applications employ messaging clients to send resource requests for network information, allocation and other operations and receive resource responses, and in which network elements, through resource agents, may use messaging servers to accept resource requests and return resource responses. Resource agents in different network domains may interact through the messaging environment and work together to fulfill resource requests. An XML-based messaging mechanism may be built with a defined message format that can provide flexible message contexts. Network resource semantics may be specified using XML schemas so that network resources are expressed as resource-specific XML elements and network updates can be implemented by updating the XML resource schemas. Secure enhancements may be realized by secure transport, message verification and other means.
READ MORE20060075042 Messaging between user applications and network elements: Extensible resource messaging in a communication network is provided through creation of a flexible, extensible, and secure messaging environment. A client-server architecture may be implemented in which user applications employ messaging clients to send resource requests for network information, allocation and other operations and receive resource responses, and in which network elements, through resource agents, may use messaging servers to accept resource requests and return resource responses. Resource agents in different network domains may interact through the messaging environment and work together to fulfill resource requests. An XML-based messaging mechanism may be built with a defined message format that can provide flexible message contexts. Network resource semantics may be specified using XML schemas so that network resources are expressed as resource-specific XML elements and network updates can be implemented by updating the XML resource schemas. Secure enhancements may be realized by secure transport, message verification and other means.
READ MORE