Sign up


Match Document Document Title
8788653 Controlling access to web content  
A method of controlling access to web content at a client computer. The method includes registering an access control status at the client computer, and detecting an attempt to access a website...
8788577 Method and system for automated analysis and transformation of web pages  
A method and system for modifying web pages, including dynamic web pages, based on automated analysis wherein web pages are transformed based on transformation instructions in nearly real-time, and...
8788643 Site integration management system for operational support service in an internet data center  
A method for managing an event by a Management system for an Internet Data Center (IDC). The IDC includes an Information Technology and Network Management System (IT&N) for managing the IDC, and a...
8788652 Real world network testing combining lower layer network tests, application layer tests and interdependent interactions  
Combining lower layer network tests and upper layer network tests is disclosed. A method includes receiving a user selection to create an upper layer test and a lower layer test, receiving upper...
8788630 System and method for proxy address neutrality  
To provide proxy address neutrality, in particular for mobile server devices, a server application can register its network address with a discovery application. Whenever the server application...
8788646 Home gateway policy controlling device, system and implementing method thereof  
An apparatus for implementing policy control for home gateway comprises a Co-located Policy Decision Function Entity (PD-FE) for receiving the QoS policy issued by the PD-FE at network side and...
8788606 Multimedia alerting  
A method, system, apparatus, and device provides alert information to a user of a device. In response to an alert notification of an alert, one or more alert geographical tiles of interest that are...
8789173 Protecting against distributed network flood attacks  
A network security device performs a three-stage analysis of traffic to identify malicious clients. In one example, a device includes an attack detection module to, during a first stage, monitor...
8788654 System and method for allocating resources based on events in a network environment  
An example method is provided and includes receiving information associated with a network event; predicting network activity associated with the network event; determining a level of network...
8789193 Method and apparatus for detecting events pertaining to potential change in vulnerability status  
Method and apparatus for Vulnerability Assessment techniques is disclosed. A method comprises detecting an event on a target in real time or at periodic intervals, by at least one of an OS service,...
8788953 Summarizing portlet usage in a portal page  
A portal summary controller stores detected usage of at least one instance of at least one portlet application within at least one portal page at each of a plurality of different times. The portal...
8789067 Data communications in a parallel active messaging interface of a parallel computer  
Algorithm selection for data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including spe...
8788602 Method and system for providing notifications for specific messages  
Systems, methods, and machine-readable media for providing notifications for specific messages addressed to a recipient is provided. The system may include an interface module, a notification rules...
8787960 Automatically populating a database of wireless access point locations  
Systems, methods, apparatus and software have been discovered for use by individual users to monitor the geographic location of other people or assets with some relationship to the user. Once some...
8788651 Multi-stage value retrieval and multi-rate value retrieval  
An element manager and programming discover that a network managed by the element manager comprises a network element. The network element stores a set of values describing a configuration of the...
8789174 Method and apparatus for examining network traffic and automatically detecting anomalous activity to secure a computer  
A method and apparatus for examining network traffic and automatically detecting anomalous activity to secure a computer is described. In one embodiment, the method includes examining network...
8788661 Device assisted CDR creation, aggregation, mediation and billing  
A method performed by a network system, the method comprising: monitoring traffic over a wireless network between the network system and a device, the traffic being within a service plan associated...
8787176 Switch that monitors for fingerprinted packets  
A switch comprises a switching module coupled to a plurality of ports. The switching module receives and forwards a plurality of packets through the ports. The switch also comprises a management...
8788657 Communication monitoring system and method enabling designating a peer  
A computer-implemented subject monitoring method is provided. The method includes providing an online-monitoring agent configured for monitoring a personal computing device, receiving identifying...
8788659 Playlist analytics  
Systems and methods can facilitate gathering information generated by network traffic to playlists. Based on analytics and metrics derived from the gathered information and reported, feedback about...
8788655 Systems for accepting and approving applications and methods of operation of same  
A managed services platform and method of operation of same are described herein. The platform can include a device management service (DMS) server in which the DMS server can act as a gateway for...
8788650 Hardware based detection devices for detecting network traffic content and methods of using the same  
A device for detecting network traffic content is provided. The device includes a first input port configured to receive one or more signatures, each of the one or more signatures associated with...
8782202 Monitor control of devices connected to network  
At an upload time, each of multiple printers connecting with a network identifies storage or non-storage of any unsent monitor information file, which has not yet been sent to a management server....
8782215 Performance testing in a cloud environment  
A test controller provisions a load generation unit and instructs the load generation unit to generate a load and apply the load to a first application server instance in a cloud computing...
8782237 Audio/video streaming in a topology of devices  
Resources may be managed in a topology for audio/video streaming. The topology includes audio/video sources and sinks and intervening branch devices. Messages between these sources, sinks, and...
8782032 Minimizing visibility of stale content in web searching including revising web crawl intervals of documents  
A method includes comparing a first instance with a second instance of a document in a plurality of documents. The first instance is obtained from a remote location at a specified time before the...
8782205 Device and computer readable medium  
A device and a computer readable medium having a computer program stored thereon are provided. The device includes: a detecting unit configured to detect one or more host computers accessible from...
8782783 Method and system for tracking machines on a network using fuzzy guid technology  
A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines....
8782166 System for generating a site pathing report based on real-time analytics data  
Machine-implemented methods for providing information to a graphical user interface for displaying web site traffic information are provided. In one aspect, the method includes acquiring low...
8782189 Dynamic service level agreement for cloud computing services  
A method for dynamically updating a service level agreement, performed by a cloud computing server, includes storing a preference for service selection, acquiring an actual usage level of a first...
8782222 Timing of keep-alive messages used in a system for mobile network resource conservation and optimization  
Systems and methods for timing of a keep-alive messages used in a system for mobile network resource conservation and optimization are disclosed. In one aspect, embodiments of the present...
8782787 Distributed packet flow inspection and processing  
Distribution of network processing load among a set of packet processing devices is improved by employing means for eliminating, controlling, or otherwise affecting redundant packet processing...
8782146 Method, system, and computer program product for sending and receiving messages  
A system and method for enabling the interchange of enterprise data through an open platform is disclosed. This open platform can be based on a standardized interface that enables parties to easily...
8782781 System for reclassification of electronic messages in a spam filtering system  
A method for indicating probability of spam for email comprises tracking network traffic characteristics for the email, and comparing the tracked characteristics for the email to characteristics...
8782221 Method to allocate buffer for TCP proxy session based on dynamic network conditions  
Allocation of buffers for a TCP proxy session between a client and a server by a service gateway includes: monitoring dynamic network behaviors for server and client side sessions of the TCP proxy...
8782225 On-demand global server load balancing system and method of use  
A method and system for measuring performance and balancing workload of sites and servers is provided. The method includes measuring performance of one or more servers located at different sites of...
8782201 System and method for managing the configuration of resources in an enterprise  
System and method for managing the configuration of resources in an enterprise. Embodiments of the present invention gather, store, and maintain institutional knowledge of configurations of IT...
8782200 System and method for optimizing website visitor actions  
The invention includes a method and system for optimizing web visitor conversion—the science of measuring, testing, and improving the rate at which website visitors respond to website content. T...
8782207 System and method to prevent endpoint device recovery flood in NGN  
A mechanism is provided for recovering from a catastrophic failure that results in a large number of user endpoints attempting to come on line simultaneously after an NGN is restored. In an...
8782229 Transmission management system and transmission system  
A disclosed transmission management system includes a receiver unit to receive alteration information for altering a communication status of a first transmission terminal from the first...
8781463 Method of and an operating support system for providing performance management in a Mobile telecommunications system  
A method of and an Operating Support System, OSS, system (20) for Performance Management, PM, of a mobile telecommunications system (1) comprising a plurality of nodes (6) and radio access units...
8782274 Method and system for progressively transmitting a voice message from sender to recipients across a distributed services communication network  
The progressive transmission of a voice message from server hop to hop across the network enables one or more recipients to review the voice message in real-time. A synchronization element is...
8780699 Handling switchover of multi-homed connections in VPLS networks  
A method includes establishing a bi-directional pseudowire (BPW) between a first provider edge (PE) router and a second PE router that are forwarders for a multi-homed VPLS customer site associated...
8782092 Method and apparatus for streaming netflow data analysis  
A system and method are described for progressively efficiently filtering and gathering netflow data. Flow records are analyzed to find out which keys (addresses, conversations, protocols etc) meet...
8782211 Dynamically scheduling tasks to manage system load  
An example network device includes a data repository configured to store data defining a plurality of time slots, programmable processors that provide an amount of available system processing...
8782208 Method and apparatus for use in a communications network  
A method is disclosed for use by an Interrogating Call/Session Control Function (I-CSCF) of an IP Multimedia Subsystem (IMS). In the method, a Session Initiation Protocol (SIP) message is received...
8782231 Simple integration of on-demand compute environment  
Disclosed are a system and method of integrating an on-demand compute environment into a local compute environment. The method includes receiving a request from an administrator to integrate an...
8782204 Monitoring hardware resources in a software provisioning environment  
A provisioning server can provide and utilize a diagnostic tool to test and interrogate hardware on target machines and to collect data from the hardware. The diagnostic tool can operate on the...
8782213 System and method for the application of psychrometric charts to data centers  
A system and method of displaying the temperature and relative humidity data of sensors on a psychrometric chart. The system and method operate to display an environmental envelope on the...
8782283 Lawful interception and data retention of messages  
A method of configuring a messaging gateway to operate as an Intercepting Control Element or a Data Retention source. The method comprises the steps of receiving, at the messaging gateway, a source...