Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

12909 results about "PathPing" patented technology

The PathPing command is a command-line network utility supplied in Windows 2000 and beyond that combines the functionality of ping with that of tracert. It is used to locate spots that have network latency and network loss.

Computer system for automatic organization, indexing and viewing of information from multiple sources

A computer data processing system including a central processing unit configured with a novel integrated computer control software system for the management of data objects including dynamic and automatic organization, linking, finding, cross-referencing, viewing and retrieval of multiple objects regardless of nature or source. The inventive system provides underlying component architecture having an object-oriented database structure and a metadata database structure which is unique in storing only one instance of each object while linking the object to multiple collections and domains by unique metadata links for the grouping into and retrieval from any of the collections. The system employs configurable, extensible attribute / properties of data objects in metadata format, and a truly user-friendly configurable interface that facilitates faster, more unified, comprehensive, useful and meaningful information management. Additional features include a sticky path object hierarchy viewing system, key phrase linking, viewing by reference, and drag-and-drop relationship link creation.
Owner:EHIERARCHY LLC

Method and System for Accelerated Stream Processing

Disclosed herein is a method and system for hardware-accelerating various data processing operations in a rule-based decision-making system such as a business rules engine, an event stream processor, and a complex event stream processor. Preferably, incoming data streams are checked against a plurality of rule conditions. Among the data processing operations that are hardware-accelerated include rule condition check operations, filtering operations, and path merging operations. The rule condition check operations generate rule condition check results for the processed data streams, wherein the rule condition check results are indicative of any rule conditions which have been satisfied by the data streams. The generation of such results with a low degree of latency provides enterprises with the ability to perform timely decision-making based on the data present in received data streams.
Owner:IP RESERVOIR

System and method for discovering information objects and information object repositories in computer networks

An address of an information object repository that should service a client request for an information object is returned in response to a request therefor. The address of the information object repository which is returned is selected according to specified performance metrics regardless of whether or not the information object repository maintains a local copy of the information object that is the client request. In some cases, the address of the information object repository is further selected according to an address of a client making the client request. Further, the address of the information object repository is selected from a number of addresses of information object repositories. The specified performance metrics may include one or more of an average delay from the information object repository to the client, average processing delays at the information object repository, reliability of a path from the information object repository to the client, available bandwidth in said path, and loads on the information object repository. In some cases, the information object repository may be instructed to obtain a copy of the information object after the address of the information object repository is returned in response to the request therefore.
Owner:ADARA NETWORKS

User interface for managing storage in a storage system coupled to a network

A method and apparatus for managing the availability and assignment of data in a storage system that is coupled to a network. A user interface is provided that executes on a host processor that is coupled to the storage system over the network. The user interface communicates with a configuration database in the storage system to identify host processors that are logged into the storage system over the network, to identify storage volumes on the storage system, to identify whether access to a particular storage volume on the storage system is permitted from a particular host processor, and to identify a network path by which host processors are logged into the storage system over the network. In one embodiment, a graphical user interface is provided that can be used to graphically represent host processors, host bus adapters, storage systems, and storage system adapters and storage volumes on the storage system. The graphical representation provided by the graphical user interface permits a user to graphically view a topology of the network at varying levels of detail, selectable by the user. The graphical user interface also permits a user to allow or deny access to storage systems or a particular storage volume on storage system from one or more of the host processors, host bus adapters, etc., by selecting and manipulating graphical representations thereof. In another embodiment, a command line user interface is provided with similar functionality.
Owner:EMC IP HLDG CO LLC

Method for authorizing in data transmission systems

The invention relates to a method and to a device for the authorization in data transmission systems employing a transaction authorization number (TAN) or a comparable password. According to a first step, the user sends a qualifying identification of the data input apparatus together with a request for the generation or for the selection of a transaction authorization number TAN or of comparable password from a data file from the data input apparatus to an authorization computer. In a second step the authorization computer generates the transaction authorization number TAN or the comparable password or selects them form a data file. According to a third step, the authorization computer sends the transaction authorization number TAN or the comparable password over a second transmission path different from the first transmission path to a monitor, for example a pager. According to a fourth step, the user reads this transaction authorization number TAN or the comparable password from the receiver and enters the transaction authorization number TAN or the comparable password into the data input apparatus. According to a fifth step, this transaction authorization number TAN or the comparable password is transmitted to the authorization computer. According to a sixth step, the authorization computer verifies the validity of the transaction authorization number TAN or of the comparable password in order to establish or switch free, according to a seventh step, a connection between the data input apparatus and the receiver unit.
Owner:SCHMITZ KIM

Zeroclick

A GUI interface, a method of programming a GUI interface, and an apparatus which enables functions of controls in the GUI to be activated by a movement to a control and then another subsequent movement related to that control. It may be defined more precisely below. A GUI in which, when a pointer 0 old>0 < / highlight>is immediately adjacent or passerea 1, a procedure is initiated whereby subsequentdure is initiated whereby subsequent movement of t area 3 generates a "click" event which simulates < / highlight>generates a "click" event which simulae the predetermined path area 3 prior to completioight>and moving outside the predetermined path areinter has never started along the predetermined paath <bold>3 < / highlight>resets the control to as if the pointer has never started along the predetermined path area <bold>3. < / highlight>
Owner:ZEROCLICK LLC

Load balancing switch protocols

A switch to switch protocol for network load balancing which permits parallel redundant paths in a network to be utilized while reducing broadcast or problems inherent in prior switch configuration protocols. In particular, the present invention includes in the protocol a hello packet protocol which serves to exchange load balancing information among switches within a common load balance domain. Further, the hello packet protocol of the present invention enables detection and correction of improperly configured loops outside a load balance domain.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Controller for determining network state based on SDN (Software Defined Networking) and determination method thereof

The invention discloses a controller for determining a network state based on an SDN (Software Defined Networking) and a determination method thereof. The controller comprises a state updating module, a calculation module, an execution module, a flow management module and an evaluation module, wherein the state updating module is used for updating through a state and a path calculated by the calculation module; the calculation module is used for calculating a current network resource state N; the execution module is used for setting rules according to the path calculated by the calculation module and writing the path into a flow meter; the flow management module is used for carrying out congestion avoidance, flow supervision and shaping; and the evaluation module is used for carrying out synthetic judgment according to the current network resource state N calculated by the calculation module and QoS (Quality of Service) requirements of an application when receiving the application transmitted by a switch. According to the controller, the network state can be accurately controlled, a forwarding plane is precisely controlled, a 'Q+X' resource distribution mode is proposed, and the network resource is scheduled, so that the flexibility, the high efficiency, the intelligence and the optimization of a network can be realized.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

System and method for assisting in controlling real-time transport protocol flow through multiple networks via media flow routing

A system and method for assisting in controlling real-time transport protocol flow through multiple networks via media flow routing is disclosed. The system utilizes a first computer and a second computer connected to the first computer, via a group of associated computers, wherein each of the first computer, second computer, and group of associated computers comprise a transceiver, a memory, and a processor. The processor is configured by the memory to perform the functions of: performing an inbound screen on route information received from the first computer, to determine if the received route information should be discarded; if the route information is not discarded, comparing the received and screened route information to a local policy defined within the second computer; performing an outbound screen on the received and screened information prior to transmitting the received and screened route information to the first computer; and selecting a primary route from the received route information and local route information in accordance with the local policy, wherein the primary route is a path from the second computer to the first computer via the group of associated computers.
Owner:ACME PACKET +1

Technique for fast activation of a secondary head-end node TE-LSP upon failure of a primary head-end node TE-LSP

A technique dynamically activates a secondary Traffic Engineering Label Switched Path (TE-LPs) at a secondary head-end node upon failure of a primary TE-LPs in a computer network. According to the novel technique, a primary head-end node establishes the primary TE-LPs having a primary bandwidth (BW) amount to a primary tail-end node. Also, the secondary head-end node establishes the secondary TE-LPS having zero BW to a secondary tail-end node (e.g., the same as the primary tail-end node). The secondary head-end node monitors the state of the primary TE-LPS, and in response to a failure (e.g., or other state change) substantially immediately adjusts the BW of the secondary TE-LPS to the primary BW amount (“activating” the TE-LPS). A “prior-hop” node to the primary and secondary head-end nodes originally forwarding traffic to the primary head-end node, may then begin forwarding traffic to the secondary head-end node, and thus onto the adjusted secondary TE-LPS.
Owner:CISCO TECH INC

Generalized policy server

A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter use a local copy of an access control database to determine whether an access request made by a user. Changes made by administrators in the local copies are propagated to all of the other local copies. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to of access policies which define access in terms of the user groups and information sets. The rights of administrators are similarly determined by administrative policies. Access is further permitted only if the trust levels of a mode of identification of the user and of the path in the network by which the access is made are sufficient for the sensitivity level of the information resource. If necessary, the access filter automatically encrypts the request with an encryption method whose trust level is sufficient. The first access filter in the path performs the access check and encrypts and authenticates the request; the other access filters in the path do not repeat the access check. A policy server component of the access filter has been separated from the access filter and the policies have been generalized to permit administrators of the policy server to define new types of actions and new types of entities for which policies can be made. Policies may now further have specifications for time intervals during which the policies are in force and the entities may be associated with attributes that specify how the entity is to be used when the policy applies.
Owner:QUEST SOFTWARE INC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products