Follow us on Twitter
twitter icon@FreshPatents

Cloud patents

Bulk PDF Downloads
      

This page is updated frequently with new Cloud-related patent applications.




 Proximity-based control of media devices for media presentations patent thumbnailProximity-based control of media devices for media presentations
Embodiments relate generally to electrical/electronic hardware, computer software, wired and wireless network communications, portable, wearable, and stationary media devices. Rf transceivers and/or audio system in each media device may be used to wirelessly communicate between media devices and allow configuration and other data to be wirelessly transmitted from one media device to another media device.
Aliphcom


 Method for configuring downlink transmission power through rrh in cloud lan environment patent thumbnailMethod for configuring downlink transmission power through rrh in cloud lan environment
Disclosed are a bbu power configuring method and a bbu which determine required power which is requested by a bbu to an rrh to transmit a downlink signal to a terminal based on rrh power headroom information in a cloud lan environment in which the rrh and the bbu are separated and transmit a power allocation change request message for making a request for changing transmission power of other bbus connected to the rrh to the other bbus.. .
Lg Electronics Inc.


 Systems and methods for providing mobility aspects to applications in the cloud patent thumbnailSystems and methods for providing mobility aspects to applications in the cloud
An exemplary system according to the present disclosure comprises at least one mobility networking module implemented in at least one lower tier radiolet. The mobility network module performs one or more traffic data plane functions.
Alef Mobitech Inc.


 Diversionary system patent thumbnailDiversionary system
A diversionary system includes a user apparatus in which a vision-assistance device attenuates light in a diversion spectrum and allows light in a perception spectrum, a deployable device that emits a cloud, which is opaque to the diversion spectrum and transparent in the perception spectrum, and a light emitter that emits or strobes in the diversion spectrum to illuminate the cloud. The deployable device may include a sound emitter.

 Using a cache cluster of a cloud computing service as a victim cache patent thumbnailUsing a cache cluster of a cloud computing service as a victim cache
Technology is disclosed for using a cache cluster of a cloud computing service (“cloud”) as a victim cache for a data storage appliance (“appliance”) implemented in the cloud. The cloud includes a cache cluster that acts as a primary cache for caching data of various services implemented in the cloud.
Netapp, Inc.


 Identity management in a networked computing environment patent thumbnailIdentity management in a networked computing environment
An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user.
International Business Machines Corporation


 Two-level cloud system migration patent thumbnailTwo-level cloud system migration
Technologies are generally described for systems and methods effective to provide migration of data to a cloud computing service without interruption of service to client devices. In an example, a method includes establishing a first communication link with one or more communication devices and establishing a second communication link with a source device.
Empire Technology Development Llc


 Providing agentless application performance monitoring (apm) to tenant applications by leveraging software-defined networking (sdn) patent thumbnailProviding agentless application performance monitoring (apm) to tenant applications by leveraging software-defined networking (sdn)
A computing system includes a plurality of physical hosts; a first application of a first tenant and a second application of a second tenant distributed over the plurality of physical hosts; and a plurality of virtual switches with a plurality of ports, each switch associated with a corresponding one of the physical hosts. A first virtual network couples the plurality of first application components and a second virtual network, isolated from the first virtual network, couples the plurality of second application components.
International Business Machines Corporation


 Cloud virtual server scheduling method and apparatus patent thumbnailCloud virtual server scheduling method and apparatus
A cloud virtual server scheduling method includes creating a cloud virtual server cluster including a first preset number of virtual servers; initializing the first preset number of virtual servers included in the cloud virtual server cluster; and receiving a user request to use n number of virtual servers. The method also includes, based on the user request, determining whether the cloud virtual server cluster includes at least n number of virtual servers in an idle state.
Jiangsu Tinno Electronics Technology Co.,ltd


 Multi-tenant-cloud-aggregation and application-support system patent thumbnailMulti-tenant-cloud-aggregation and application-support system
The present application is directed to a distributed system that provides multi-cloud aggregation and that includes a cloud-connector server, cloud-connector nodes, and one or more service-provider nodes that cooperate to provide services that are distributed across multiple clouds. A service-provider node obtains tenant-associated information from a virtual data center in which the service-provider node is installed and provides the tenant-associated information to the cloud-connector server..
Vmware, Inc.


Distributed cloud-based security systems and methods


A distributed security method is implemented in a processing node of a distributed security system comprising one or more processing nodes and one or more authority nodes, wherein the distributed security system is located external to a network edge of an enterprise and external from one of a computer device and a mobile device associated with a user. The distributed security method includes obtaining security policy data associated with the user and the enterprise from an authority node; monitoring data communications between the user, the enterprise, and the internet in a processing node; and controlling the data communications between the user, the enterprise, and the internet based on the monitoring to provide security measures between the user, the enterprise, and the internet..
Zscaler, Inc.


Cloud-based network security and access control


Technologies are presented that provide cloud-based network security and access control in a networked computing system. A method may include: receiving a network traffic request from a user device, identifying the user device, applying rules specific to the network traffic request and the user device, obtaining data specific to the network traffic request in accordance with the applied rules, and providing the data to the user device for presentation to a user in accordance with the applied rules.
Verite Group, Inc.


Methods and systems for providing security to distributed microservices


Systems for providing security to distributed microservices are provided herein. In some embodiments, a system includes a plurality of microservices, each of the plurality of microservices having a plurality of distributed microservice components.
Varmour Networks, Inc.


Systems and methods for cloud-based network control


A method is described. The method includes receiving an access request from a router, the router having received the access request from a client device, the client device initiating the access request to obtain access to a website or application.
Control4 Corporation


Apparatus, system and dynamically controlling access to a cloud service


Embodiments of the present invention are directed to multiple-factor authentication for accessing a cloud service from end-user devices. Authentication can be account-based, carrier-based or a combination thereof.
Synchronoss Technologies, Inc.


First artificial intelligence methods and systems for asset trendspotting (pnn), cyber security (deepcyber), and portable big data cloud (mcps)


New methods, systems, and apparatus, including computer programs called pnn (predictive neural network) artificial intelligence (ai) machines are disclosed for financial and cyber-security predictions. The pnn ai machines use unique neural network algorithms to optimize and select the best method with the highest back-test accuracy for the predictions.

Secure and control data migrating between enterprise and cloud services


A method for operating a cloud gateway is provided. The method includes generating a plurality of rules relating users and groups to data access at a plurality of cloud service providers.
Vormetric, Inc.


Controlling encrypted data stored on a remote storage device


A method, system, and apparatus are provided for controlling encrypted data stored on a remote device. In particular, a remote device includes a storage controller device that can receive a “secure hide” command from an administrator device via a cloud server.
Hgst Netherlands B.v.


Recording encrypted media session


In one implementation, a media stream is recorded using one or more keys. The one or more keys are also encrypted.
Cisco Technology, Inc.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Network bandwidth reservations for system traffic and virtual computing instances


Virtual computing instances are provisioned with network resource allocation constraints, which may include hard constraints that must be met in order for the virtual computing instances to be created in a host server. Network resources from multiple hosts may be pooled in a virtual switch, and a cloud management system (cms) may ensure that a network bandwidth reservation for a new virtual computing instance can be accommodated by network bandwidth in the pool that is reserved for communication endpoint traffic.
Vmware, Inc.


Managing application, middleware, and virtual mechanism density in a cloud


A method, system, and/or computer program product configures hierarchical cloud resources. A supervisor server receives a signal indicating a boundary of a set of hierarchical cloud resources.
International Business Machines Corporation


Method and managing distributed clouds


A method and an apparatus for integrated management/control of regionally distributed micro-cloud data centers. A system for managing distributed clouds includes an apparatus for managing distributed clouds and an apparatus for managing a plurality of micro-data centers.
Electronics And Telecommunications Research Institute


System and improving tcp performance in virtualized environments


Example embodiments described herein provide systems and methods for transmitting data packets between a protocol sender and a protocol receiver in a cloud environment, having either the protocol sender or the protocol receiver residing within a virtualized host. A protocol acceleration module may observe the data packets transmitted along the data path between the protocol sender and the protocol receiver using protocol stack configuration information of the protocol sender.
Appformix Inc.


Contiguous network for cloud communications


A network comprises ingress nodes, egress nodes, primary switches, and secondary switches where any pair of an ingress node and an egress node connects to orthogonal sets of primary switches and each secondary switch connects a respective set of primary switches to an orthogonal set of primary switches. Thus, each ingress node has a primary path and numerous compound paths to each egress node.

Msdc scaling through on-demand path update


In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the original packet along a less-specific path through the cloud switch, the less-specific path based on a domain index of an egress domain for the original packet.
Cisco Technology, Inc.


Deploying applications in a networked computing environment


An approach for deploying and managing applications in a networked computing environment (e.g., a cloud computing environment). A user uploads an application for deployment in the networked computing environment.
International Business Machines Corporation


Accelerating stream processing by dynamic network aware topology re-optimization


Aspects of the present disclosure are directed to techniques that improve performance of streaming systems. Accordingly we disclose efficient techniques for dynamic topology re-optimization, through the use of a feedback-driven control loop that substantially solve a number of these performance-impacting problems affecting such streaming systems.
Nec Laboratories America, Inc.


Creating new cloud resource instruction set architecture


A method and system are provided. The system includes a network configurator for configuring a network as a backplane of the system to optimize throughput rate and minimize latency across a plurality of subsystems that are cloud-based and that form the system.
International Business Machines Corporation


Creating new cloud resource instruction set architecture


A method and system are provided. The system includes a network configurator for configuring a network as a backplane of the system to optimize throughput rate and minimize latency across a plurality of subsystems that are cloud-based and that form the system.
International Business Machines Corporation


System and method using wireless tire pressure detector to transmit data and form network topology


A system and method using a wireless tire pressure detector to transmit data and form a network topology is disclosed herein. The method comprises steps: installing a wireless tire pressure detector in a receiver, and a sender persistently transmitting at least one piece of broadcast information; while the receiver approaches the sender, the wireless tire pressure detector of the receiver using a first transmission module to receive the broadcast information, send the broadcast information to a display device in a vehicle or store the broadcast information in a cloud database, and send the broadcast information to a second transmission module, and using the second transmission module to send the broadcast information to a wireless tire pressure detector of another vehicle, wherein the display device uses an application program to process and display the broadcast information, and wherein the display device includes a video device and an audio device..
Gofull Technology Co., Ltd.


System and implementation of sharing economy in a web environment


The invention provides a method for information exchange in the process of electrical appliance lease. Appliances available for lease are registered in a cloud environment where each appliance is associated with the following information: type (what kind of appliance it is), owner (who is the lessor), holder (who is the current holder), status (is the appliance available for lease), condition (current condition of the appliance), price (lease price of the appliance), rating (rating of appliance) and location (gps data).

Systems and methods for simulating a notification system


Systems and methods for a cloud management system which utilizes both technical and business metrics to achieve operational efficiencies. The systems and methods can be used to provide an elastic infrastructure model for an emergency notifications system which delivers near infinite scale with guaranteed near 100% uptime.
Everbridge, Inc.


Method and system for granting access to secure data


Techniques described herein can be implemented as one or a combination of methods, systems or processor executed code to form embodiments capable of improved protection of data or other computing resources based at least in part upon limiting access to a select number of delegates. Limited access to cloud data based on customer selected or other criterion, reducing the possibility of security exposures and/or improving privacy is provided for..
Salesforce.com, Inc.


Method of handling a document stored in a cloud storage system for processing by an authenticated printing system and system for performing the method


Due to different formats for documents, in particular different means of identifying users, it is a problem how to handle a document in a cloud storage system, in which a user is identified by first user credentials, for processing by an authenticated printing system for which the user is identified by second user credentials. This problem is solved by a method comprising the steps of: i.
Next Print Technologies Aps


Mobile video search


A facility for using a mobile device to search video content takes advantage of computing capacity on the mobile device to capture input through a camera and/or a microphone, extract an audio-video signature of the input in real time, and to perform progressive search. By extracting a joint audio-video signature from the input in real time as the input is received and sending the signature to the cloud to search similar video content through the layered audio-video indexing, the facility can provide progressive results of candidate videos for progressive signature captures..
Microsoft Technology Licensing, Llc


Tag cloud visualization and/or filter for large data volumes


An interactive tag cloud provides an intuitive interface to large data volumes. Where the data is a large table, an overview afforded by the tag cloud may contain relevant table information ranked by priority and volume, represented in different categories.

Proactive cloud orchestration


Methods, systems, and devices are described for providing proactive cloud orchestration services for a cloud hardware infrastructure. A health management system may monitor component(s) of the cloud hardware infrastructure.
Seagate Technology Llc


Virtual machine migration


In some examples, prior to a source cloud migrating one or more virtual machines to a destination cloud, a migration controller may establish one or more migration agreements between at least two of a client, a provider of the source cloud, and a provider of the destination cloud. The migration controller may further sort the virtual machines that execute on the source cloud based on a usage frequency and select an instance of each of the virtual machines to migrate..
Dalian University Of Technology


Method for targeted resource virtualization in containers


A method and computer program product for targeted container virtualization, where only separate components of a computer system or a server are virtualized. The os kernel and other server resources are not virtualized.
Parallels


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Service cloud console


Disclosed are some examples of methods, apparatus, systems and computer program products related to a user interface providing a call center service. In some implementations, the user interface presents session tabs and application tabs.
Salesforce.com, Inc.


Systems and methods for interacting with large displays using shadows


A computer-implemented method being performed in a computerized system incorporating a processing unit, a memory, a display and a depth camera, the computer-implemented method involving: acquiring a depth image of a user using the depth camera; determining a spatial position of a point cloud corresponding to the user using the acquired depth image of the user; determining at least a portion of the point cloud corresponding to the user located within a virtual operation area; generating a virtual shadow of the user using the determined portion of the point cloud corresponding to the user located within the virtual operation area; displaying the generated virtual shadow of the user on the display; and using the displayed virtual shadow of the user for detecting a user interaction event.. .
Fuji Xerox Co., Ltd.


Real time multi dimensional image fusing


Within examples, systems and methods of generating a synthetic image representative of an environment of a vehicle are described comprising generating a first image using infrared information from an infrared (ir) camera, generating a second image using laser point cloud data from a lidar, generating an embedded point cloud representative of the environment based on a combination of the first image and the second image, receiving navigation information traversed by the vehicle, transforming the embedded point cloud into a geo-referenced coordinate space based on the navigation information, and combining the transformed embedded point cloud with imagery of terrain of the environment to generate the synthetic image representative of the environment of the vehicle.. .
The Boeing Company


Wearable device with wireless bluetooth massage function


A wearable device with wireless bluetooth massage function, which is mainly installed inside shoes, and which combines with the mobile device and app to form interactive therapeutic massage shoes; said wearable device includes: an insole, with its surface defined with anode and cathode interfaces of conductive media, an electronic structure, having a motherboard, a bluetooth chipset module, and a battery, and electrically connected to the insole; based on this, when the user is wearing the insole, the body electricity and the anode and cathode conductive media interfaces on the surface of the insole will form a complete electric cycle, and by manipulating the mobile device, options can be made to: in the electro-therapeutic massage mode, provide regular low-frequency electro-therapeutic massage; or in the physiological signal detection mode, acquire physiological feedback signals in real time and transmit them to the mobile device through bluetooth for real-time judgment by the user, or to the cloud data safe for analysis and advice by experts.. .

Autonomic nervous system balancing device and use


A system and method for balancing the autonomic nervous system (ans) of a person to achieve a desired physiological response requires a computer for translating a measured physiological function into a fundamental tone, ftone. In particular, the fundamental tone, ftone, is based on an inflection between sympathetic and parasympathetic responses from the ans of the person.
Strathspey Crown Holdings, Llc


Bladders, compartments, chambers or internal sipes controlled by a web-based cloud computer system using a smartphone device


A computer system including a web site and/or a cloud array of computers configured to have a connection to a smartphone or other mobile computer device and use the device and connection to control a configuration of one or more bladders, compartments, chambers and internal sipes located in a sole or removable inner sole insert of footwear. The computer system can also use the device and connection to transmit data to the computer system for storage and/or shared or independent processing and/or analysis, process data from sensors located in either one or both of the sole or the removable inner sole insert of the device user, in, on, or near a center of gravity of the device user, in the device and/or in, on, or near the head of the device user, and use the processed data to alter a configuration of the bladders, compartments, chambers and internal sipes..

Cloud support for discovery and data transfer for mobile client devices


A host device may include a wireless interface for communications, a memory, and a processor coupled to the memory and to the wireless interface. The host device may receive, via the wireless interface, an advertisement message from a client device.
Apple Inc.


Cloud provider selection


A system and method are disclosed for selecting a cloud provider for a virtual machine deployment. In one implementation, a processing device receives a request to launch a deployment of a virtual machine.
Red Hat, Inc.


System and processing and displaying agricultural data


A system for synchronizing agricultural data uses a synchronization device adapted to receive information from a storage medium associated with a monitor for an agricultural implement. The synchronization device has wireless communication with a mobile device to share the information from the monitor with the mobile device.

Cloud-based data backup and operation method and system


A cloud-based data backup and operation method is provided. The method includes obtaining system version information of an operating system used on a mobile terminal; based on the system version information of the operating system on the mobile terminal, creating a mirror system same as the operating system used on the mobile terminal on a virtual server in a cloud; and synchronizing data of the mobile terminal itself to the mirror system on the virtual server to form backup data..
Jiangsu Tinno Electronics Technology Co.,ltd


Determining consistencies in staged replication data for data migration in cloud based networks


Data migration among cloud-based storage networks is described. A method may include analyzing, by a processor, whether data from a data distribution service is consistent with a data payload of a host cloud provider.
Red Hat, Inc.


Cloud input channel management


Aspects of the present disclosure relate to systems and methods for establishing an assistance output that takes into account client device latency information and sending the assistance output from the server to the client device. Client device information or the assistance output may include a stream of encrypted data packets..
Sony Computer Entertainment America Llc


Cloud-based security policy configuration


Systems and methods for configuring security policies based on security parameters stored in a public or private cloud infrastructure are provided. According to one embodiment, security parameters associated with a first network security device of an enterprise are shared by the first network security device with other network security devices associated with the enterprise by logging into an shared enterprise cloud account.
Fortinet, Inc.


End-to-end secure cloud computing


A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy..
At&t Intellectual Property I, L.p.


Methods and arrangements for cloud caching


In a method in a primary network node for providing a web-service to clients, performing the steps of verifying (s1) a tcp session with a client node and generating tls keys for said session. Subsequently temporarily suspending (s2) the tcp session.
Telefonaktiebolaget L M Ericsson (publ)


Zero day threat detection based on fast flux detection and aggregation


A method in a cloud-based security system includes operating a domain name system (dns) resolution service, proxy, or monitor in the cloud-based security system; receiving dns records with time-to-live (ttl) parameters; checking the ttl parameters for indication of a fast flux technique; and detecting domains performing the fast flux technique based on the dns records. A cloud-based security system includes a plurality of nodes communicatively coupled to one or more users; and a domain name system (dns) service providing a resolution service, proxy, or monitor in the cloud-based security system; wherein the dns service is configured to receive dns records with time-to-live (ttl) parameters; check the ttl parameters for indication of a fast flux technique; and detect domains performing the fast flux technique based on the dns records..
Zscaler, Inc.


Techniques for identity-enabled interface deployment


Techniques for providing identity-enabled interfaces for deployment are presented. Specifically, an agent of an enterprise infrastructure authenticates and acquires an agent identity for interacting with a cloud processing environment.
Novell, Inc.


Digital management of content assets in the cloud


Aspects of the present disclosure relate to systems and methods for sharing assets of applications between users. A user may share an application or certain features within an application via the transfer of application rights between users.
Sony Computer Entertainment America Llc


Method and device for the secure authentication and execution of programs


A device and a method for encrypting a virtual machine by on-the-fly encryption and decryption of the memory is described. The device comprises hardware and software elements, including a hardware security module for executing, in response to data read/write requests, on-the-fly encryption and decryption operations of the data stream associated with an encrypted memory image.
Commissariat A L'energie Atomique Et Aux Energies Alternatives


Cloud-based virtual private access systems and methods


A virtual private access method implemented by a cloud system, includes receiving a request to access resources from a user device, wherein the resources are located in one of a public cloud and an enterprise network and the user device is remote therefrom on the internet; forwarding the request to a central authority for a policy look up and for a determination of connection information to make an associated secure connection through the cloud system to the resources; receiving the connection information from the central authority responsive to an authorized policy look up; and creating secure tunnels between the user device and the resources based on the connection information.. .
Zscaler, Inc.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Method and system for managing resource capability in a service-centric system


A method, system and computer-usable medium are disclosed for managing resource capacity for the provision of cloud-based services. Application deployment and undeployment data is received, and then processed, to perform an update of a capacity-weighted graph to reflect a set of applications deployed in a cloud computing environment.
International Business Machines Corporation


Localized service chaining in nfv clouds


Various exemplary embodiments relate to a chaining of sequential functions associated with a service or application are considered. This approach relies on a centralized load balancer for reducing the load of inter-rack traffic in a data center.
Alcatel-lucent Usa, Inc.


Measuring responsiveness of a load balancing system


In various embodiments, methods and systems for measuring load-balancer responsiveness in a cloud computing infrastructure are provided. A plurality of requests is transmitted to a data center virtual ip (vip), where the data center vip is configured to receive inbound traffic for a service.
Microsoft Technology Licensing, Llc


Cryptographic security functions based on anticipated changes in dynamic minutiae


Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely identifying and validating the device include: selecting a subset of minutia from a plurality of minutia types; computing a challenge from which the user device can form a response based on the selected combination of minutia; computing a set of pre-processed responses that covers a range of all actual responses possible to be received from the device if the combination of the particular device with the device's collected actual values of minutia is valid; receiving an actual response to the challenge from the device; determining whether the actual response matches any of the pre-processed responses; and providing validation, enabling authentication, data protection, and digital signatures..
Msignia, Inc.


Method and device for automated early detection of forest fires by means of optical detection of smoke clouds


A method for the automated early detection of forest fires by means of the optical detection of clouds of smoke, includes the following steps: producing images by means of at least one digital color-image camera and transmitting said images to a digital data processing medium; defining membership functions in a fuzzy-logic system for the classes “smoke,” “forest,” and “dark surface” by evaluating a plurality of test images or test sequences recorded by the color-image camera with respect to the saturation value (s) of the image pixel.. .
Deutsches Zentrum Für Luft-und Raumfahrt


Rapid service orchestration and management


An approach for managing services in a cloud computing service marketplace. In the approach, a request for a service offered within a cloud computing service marketplace is received.
International Business Machines Corporation


System and managing web-based refinery performance optimization using secure cloud computing


A management system for improving operation of a plant. A server is coupled to the management system for communicating with the plant via a communication network.
Uop Llc


Methods and systems for feature extraction of surface manifolds


Methods and systems for feature extraction of lidar surface manifolds. Lidar point data with respect to one or more lidar surface manifolds can be generated.
Knowmtech, Llc


Automatic profiling framework of cross-vm covert channel capacity


Technologies are generally described for a framework to automatically estimate cross-vm covert channel rapacity for channels such as central processing unit (cpu) load, cpu l2 cache, memory bus and disk bus. In some examples, the framework may include automated parameter tuning for various cross-vm covert channels to achieve high data rate and automated capacity estimation of those cross-vm covert channels through machine learning.
Intellectual Ventures Hong Kong Limited


Method and system for metadata synchronization


The present disclosure provides a method for providing transparent configuration metadata for file access and security between replicated copies of data using dissimilar protocols and technologies to store share and access file based data in a hybrid cloud architecture.. .
Superna Business Consulting, Inc.


Adaptive data striping and replication across multiple storage clouds for high availability and performance


Technologies for adaptively striping data across multiple storage clouds include receiving user constraints corresponding one or more cloud storage providers, receiving a file to be striped across the cloud storage providers, splitting the received file into file blocks, allocating each of the file blocks to a different one of the cloud storage providers as a function of the user constraints and operating conditions of each of the cloud storage providers, and sending each of the file blocks to the cloud storage provider to which each file block is allocated. In some embodiments, file blocks may be re-allocated from one cloud storage provider to another cloud storage provider as a function of changing user constraints or operating conditions.
Intel Corporation


Distributed version control of orchestration templates


Distributed version control in a multi-region cloud in which each region includes an instance of a version control service. A first version control service in a first region receives an indicator to re-version a document saved in the first cloud region.
International Business Machines Corporation


Securing sensitive historian configuration information


Systems and methods for securing configuration information for cloud-based services. A system comprises a data store and data sets including plant process information and configuration information.
Invensys Systems, Inc.


Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting


A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (i/o) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram.
International Business Machines Corporation


System and providing an infiniband sr-iov vswitch architecture for a high performance cloud computing environment


Systems and methods are provided for implementing a virtual switch (vswitch) architecture that supports transparent virtualization and live migration. In an embodiment, a vswitch with prepopulated local identifiers (lids).
Oracle International Corporation


Method of handling a print job submitted to a cloud printing service for processing by an authenticated printing system and system for performing the method


Due to different formats for print jobs, in particular different means of identifying users, it is a problem how to handle a print job submitted to a cloud printing service, in which a user is identified by first user credentials, for processing by an authenticated printing system for which the user is identified by second user credentials. This problem is solved by a method comprising the steps of: i.
Next Print Technologies Aps


Dynamic adjustment of cloud game data streams to output device and network quality


Aspects of the present disclosure relate to systems and methods for the dynamic adjustment of data streamed over a network which is then displayed on an output device. In particular, aspects of the present disclosure relate to systems and methods for determining the display capabilities of an output device and then formatting two or more streams of data configured for display on the output device, wherein the user interface and video data are contained in separate streams, such that the content is displayed in a manner consistent with the display capabilities of the output device.
Sony Computer Entertainment America Llc


Methods and apparatuses for reconstructing a 3d sonar image


Methods, apparatuses, and computer program products are provided for producing a 3d image of an underwater environment. 2d sonar return data that defines an angle and distance value may be taken from a theoretical 2d slice of the underwater environment.
Navico Holdings As


Predictive instant play for an application over the cloud


Methods and systems for predicting instant play includes pre-loading one or more instances of select ones of games on one or more game consoles on a cloud game server. The loading of instances is based on usage history of the games.
Sony Interactive Entertainment America Llc


Using connection quality history to optimize user experience


Methods and systems for assigning a data center to service a request from a user account include receiving a login request to a cloud gaming server. The login request is examined to identify a user account.
Sony Computer Entertainment America Llc


Smart electronic vaporizer


The design and structure as well as the control scheme of a smart electronic vaporizer device having a micro-machined (a.k.a. Mems, micro electro mechanical systems) mass flow sensor and control electronics that provide the vaporizing process in proportional to the user inhalation flowrate or strength for the best simulation of the experience for traditional cigarette.
Wisenstech Inc.


Modular non-volatile flash memory blade


Embodiments of the inventive concept include open cloud server (ocs)-compliant and other enterprise servers having high-density modular non-volatile flash memory blades and associated multi-card modules. A modular non-volatile flash memory blade can be seated within a 1u tray.
Samsung Electronics Co., Ltd.


Load balancing for a cloud-based wi-fi controller based on local conditions


Load balancing for cloud-based monitoring of wi-fi devices on local access networks is based on local conditions. Requests for connection are received from wi-fi devices of the plurality of wlans exceed a threshold.
Meru Networks


Video time extracting system and extracting method thereof


A video time extracting system and an extracting method thereof are provided. The video time extracting system includes a display device and a cloud server.
Aircom Pacific Inc.


Portable device and manipulation method


A portable device and a manipulation method thereof are disclosed in this disclosure. The portable device includes a camera unit, a communication unit, a first switch button and a control module.
Htc Corporation


Hard-copy signatures using a cloud-connected printing device with a workflow service


Example systems and related methods may relate to a way to efficiently incorporate authentication to cloud-based review and approval processes. In an example embodiment, a workflow service operating on a network may send a request for document approval to a mobile computing device.
Kyocera Document Solutions Inc.


Mobile device security, device management, and policy enforcement in a cloud based system


Mobile device security, device management, and policy enforcement are described in a cloud based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A cloud based method for mobile device security, device management, and policy enforcement includes, responsive to configuring the mobile device for connectivity to the cloud system, monitoring data between the mobile device and the external network, wherein the cloud system connects to the mobile device independent of a type, platform, or operating system associated with the mobile device; analyzing the data in real-time in the cloud system thereby not impacting performance of the mobile device; and controlling exchange of the data, in the cloud system, between the mobile device and the external network based on the analyzing..
Zscaler, Inc.


Authenticating cloud computing enabling secure services


Authenticating cloud computing enabling secure services (access) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (access) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (access) node.
Telecommunication Systems, Inc.


Distributed dynamic host configuration protocol


Systems and methods for managing networking activities of a multi-tenant cloud computing environment. An example method may include distributing, by a controller node executed by a processing device, a dynamic host configuration protocol (dhcp) agent to each of a plurality of compute nodes of a computing environment; identifying, by the controller node, a first virtual machine hosted on a first compute node of the plurality of compute nodes; determining a first dhcp agent associated with the first virtual machine and the first compute node; and transmitting, by the controller node, networking information relating to the first virtual machine to the first dhcp agent hosted by the first compute node..
Red Hat Israel, Ltd.






Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Cloud for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.2495

4568

2 - 1 - 107