At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
FA network LSI and communication device
An FA network LSI is provided in a communication device performing a communication process in a network layer or higher through a plurality of protocols. The FA...
Storage system architecture
A storage system is provided. The storage system includes a plurality of storage units, each of the plurality of storage units having storage memory for user...
Lockless distributed redundant storage and NVRAM cache in a
highly-distributed shared topology with direct...
A method for data storage includes, in a system that includes multiple servers and multiple multi-queue storage devices that communicate over a network,...
Content continuation system and method
A content delivery system and method for use with plurality of digital multimedia data processing systems and legacy systems spanning across one or more network...
Lock elevation in a distributed file storage system
A client requests access to a resource (e.g., a file) via a node of a storage system. The resource is stored in a directory structure. A directory in the...
Hybrid remote direct memory access
A method for hybrid RDMA, the method may include: (i) receiving, by a first computer, a packet that was sent over a network from a second computer; wherein the...
Method and system for data synchronization
A data synchronization method is provided. The data synchronization method includes providing a first server with a master flag and a write flag for a data...
Social networking and network connectivity
Social networking is used to enhance content delivery to mobile devices. Sometimes a mobile device lacks network connectivity, such as when the mobile device is...
Robust tenant placement and migration in database-as-a-service
A robust tenant placement and migration system, a process, and a respective controller for database-as-a-service environments are disclosed. Multiple tenants...
Method and apparatus for processing server load balancing by using the
result of hash function
For load balancing of a plurality of servers, a server load balancing apparatus selects a hash source from a uniform resource locator (URL) input from a client,...
Remote monitoring pool management
One or more techniques and/or systems are provided for remotely and/or automatically managing a monitoring pool of management servers configured to monitor...
Prediction and distribution of resource demand
A system for predicting one or more changes in demand for computational resources expected as a result of one or more events experienced by a business...
Efficient and scalable pull-based load distribution
Various embodiments relate to a method, device, and machine-readable storage medium including: receiving a work request for distribution among a plurality of...
Compute followed by network load balancing procedure for embedding cloud
services in software-defined...
A method entails an efficient procedure, namely Compute followed by Network Load Balancing (CNLB), that first maps virtual nodes over physical nodes while...
Client-initiated leader election in distributed client-server systems
A method for a client-initiated leader election in a distributed system including receiving a master listener election request by at least one listener of a...
Method and apparatus for managing sequential processing of messages
A method and apparatus to help manage sequential processing of messages. When a layer of a protocol stack in a computing device encounters a need to transmit...
Systems and methods for retrieving customer premise equipment data
A method includes detecting, at a customer premise equipment management system, a trigger event associated with customer premise equipment data, the customer...
Obtaining mobile contact information
The present invention provides an information processing method applied to a first electronic device having a communication function, able to be connected to a...
Client-side aggregation of nested resource dependencies
A computer-implemented method, system, and/or computer program product retrieves a nested resource. A client computer identifies software modules that are...
Techniques for metadata-driven dynamic content serving
Techniques for metadata-driven dynamic content serving. Metadata content is stored as a source instance. The metadata content is utilized to provide...
HTTP parallel processing router
According to one aspect, embodiments of the invention provide a router having a first I/O terminal and a second I/O terminal, wherein the first I/O terminal is...
Back-to-back virtual web real-time communications (WebRTC) agents, and
related methods, systems, and...
Back-to-back Web Real-Time Communication (WebRTC) virtual agents, and related methods, systems, and computer-readable media are disclosed herein. In one...
System for and methods of providing computer telephony integration service
A system and method for providing a Computer Telephony Integration Service Oriented Architecture is presented. The system and method may include providing one...
Ensuring availability and parameter format of URL scheme commands
Techniques for rendering a webview in a host application are described. A webview in a host application is identified, the webview including at least one...
Deploying a portion of a streaming application to one or more virtual
A streams manager monitors performance of a streaming application, and when the performance needs to be improved, the streams manager determines from split...
Wireless transmission of real-time media
A method, wireless communication device, and computer readable medium, are disclosed, for encoding real-time media for wireless transmission from a source to a...
Measuring server availability and managing traffic in adaptive bitrate
Computer-based systems and methods measure saturation of a media server that transmits media content to a plurality of users via data links. The data buffers of...
Dynamic auto-registration and transcoding of media content devices via
network attached storage
A method and system for providing media to a client device by a network attached storage unit is provided. A connection is established between the client device...
Multi-media conferencing system
A multi-media conferencing system that integrates visual, audio, independent data interaction and modification, collaboration of information, independent video...
Seamless switch over from centralized to decentralized media streaming
A media gateway is provided that enables seamless switchover between a centralized media stream passing between first and second endpoints and through the media...
Multimedia conversation history
A method performed by a computing system includes maintaining a record of a terminated conversation, the conversation comprising a plurality of participants and...
Conversion system and method in multioperator environment
The invention relates to a method of performing signalling and media conversion in a multioperator environment. The invention comprises receiving a signalling...
Incident response tool using a data exchange layer system
This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a...
Apparatus and method for diagnosing malicious applications
An apparatus for diagnosing malicious applications includes: a signature storage unit which stores malicious application executable files, which can be run in a...
System and method for managing tokens authorizing on-device operations
A system and method can support on-device operation management. A token issuer on a backend server, and/or a tool, can generate an authorization token, which is...
Systems, devices, and methods for traffic management
Systems, devices, and methods for traffic management are provided. An example of a method for traffic management includes receiving a number of policies for...
Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
Similarity search and malware prioritization
Methods, system, and media for determining similar malware samples are disclosed. Two or more malware samples are received and analyzed to extract information...
Server with mechanism for changing treatment of client connections
determined to be related to attacks
According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with...
System and method for detecting malicious activity and harmful
hardware/software modifications to a vehicle
An Artificial Intelligence (AI) interface and engine is described that enables the monitoring and analysis of vehicle information to determine if the vehicle...
Method and system for detecting malware
A system and method of analysis. NX domain names are collected from an asset in a real network. The NX domain names are domain names that are not registered....
Risk prioritization and management
Methods for managing and prioritizing risk include receiving a data set and analyzing the data set for duplicates, false positives, false negatives, and tool...
Delivering security functions to distributed networks
Systems and methods for delivering security functions to a distributed network are described herein. An exemplary method may include: processing a data packet...
Systems and methods for processing data flows
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and...
Mechanism to augment IPS/SIEM evidence information with process history
snapshot and application window capture...
A method to augment a plurality of IPS or SIEM evidence information is provided. The method may include monitoring a plurality of processes associated with a...
Authenticating customers and managing authenticated sessions
Methods, systems, and computer-readable media for authenticating customers of an organization and managing authenticated sessions of various customers are...
Resource management in a presentation environment
Aspects of the present disclosure are directed toward managing resources in a presentation environment. Aspects are directed toward collecting, using a set of...
Secure content sharing
Convenient sharing of information among authorized network users may be facilitated by allowing a user to send information originating from multiple...
Access permissions management system and method
An access permissions management system including a hierarchical access permissions repository including access permissions relating to data elements arranged...
Securely integrating third-party applications with banking systems
Systems and methods enable third-party applications and devices to interface with financial service provider computer networks in a secure, compliant manner. In...