Follow us on Twitter
twitter icon@FreshPatents


Cloud patents

      

This page is updated frequently with new Cloud-related patent applications.

SALE: 1700+ Cloud-related patent PDFs



 Predictive reservation of radio cells for interruption-free communication with a data cloud patent thumbnailPredictive reservation of radio cells for interruption-free communication with a data cloud
A method for operating a terminal for a communication network, the terminal, based on a future route of the terminal, transmitting a reservation request for logging into a radio cell of the communication network along the route via the communication network to a radio cell management server, to be able to log into the requested radio cell as a function of a response of the radio cell management server. A method for operating a radio cell management server, a terminal, a radio cell management server, a vehicle, and a computer program, are also described..
Robert Bosch Gmbh


 Cloud based access network patent thumbnailCloud based access network
Information on a tier comprising given resources operationally connected to a set of remote radio heads and configured to process traffic to and from the remote radio heads is gathered and maintained (300). The usage of the tier resources on different connections and services is controlled (302).
Nokia Solutions And Networks Oy


 Network configuration of wifi networks via a cloud-based wifi network manager patent thumbnailNetwork configuration of wifi networks via a cloud-based wifi network manager
A method of managing wi-fi access points using a wi-fi network manager is disclosed. Measurement data is received from a plurality of wi-fi access points via a control interface.
Plume Design, Inc.


 Discovery mechanism for service server connection patent thumbnailDiscovery mechanism for service server connection
In some example embodiments there is provided a method. The method may include sending, by a user equipment having a connection to a service at a cloud-based server, a publication message to a local cluster comprising at least one other user equipment and the user equipment, wherein the publication message offers to share, with the at least one other user equipment, the connection; receiving, by the user equipment, a request from the at least one other user equipment to access the connection made available by the user equipment, when the at least one other user equipment lacks connectivity to the service at the cloud-based server; and sending, by the user equipment, a response message indicating to the at least one other user equipment whether the at least one other user equipment is allowed to access the connection made available by the user equipment..
Nokia Technologies Oy


 Platform for geo-fence social media patent thumbnailPlatform for geo-fence social media
A social media application that integrates with a map application which enables users to interact with both stationary and mobile geo-fences that are placed around locations or objects of interest. The geo-fences are populated with content or programmed to provide notifications, and social features.
Hippware, Inc.


 Secure and private cloud based broadcast identification patent thumbnailSecure and private cloud based broadcast identification
A tracking device can securely communicate with a secondary device by generating a hash value based on the identity of the tracking device. If the secondary device cannot resolve the hash value, the hash value can be provided to a tracking server, such as a cloud server, for resolving the hash value.
Tile, Inc.


 System and methods for scalable packet inspection in cloud computing patent thumbnailSystem and methods for scalable packet inspection in cloud computing
A method for packet inspection in a computer network includes receiving a plurality of network streams from a plurality of client systems at a first load balancer; allocating the network streams across a proxy instances; and inspecting and filtering the network streams by the proxy instances. The method further includes forwarding the filtered network streams to a second load balancer; allocating the filtered network streams to a plurality of application instances; and processing and responding to the network streams at the application instances.
Secureworks Corp.


 Platform for constructing and consuming realm and object featured clouds patent thumbnailPlatform for constructing and consuming realm and object featured clouds
A computer-implemented method of providing a server-based feature cloud model of a realm includes receiving by a server a series of digital contributions that collectively originate from a plurality of remote computing devices, characterizing portions of the realm. The method also includes processing by the server the received digital contributions to associate them with a global coordinate system and storing the processed contributions in a realm model database as components of the feature cloud model of the realm.

 Cloud storage platform providing performance-based service level agreements patent thumbnailCloud storage platform providing performance-based service level agreements
A performance-based storage service level agreement (sla) can be established that specifies one or more storage performance parameters. A storage allocation process can include receiving a request for a storage sla that specifies one or more storage performance parameters, determining, for a virtual machine (vm) and based at least in part on the one or more storage performance parameters in the storage sla: (i) a storage location among a set of candidate storage locations, and (ii) an amount of storage to allocate.
Microsoft Technology Licensing, Llc


 Proactive content push for enhancing real-time service delivery via cloud patent thumbnailProactive content push for enhancing real-time service delivery via cloud
Embodiments disclose systems, methods, and computer program products to perform an operation for proactively sending content to mobile devices. The operation generally includes receiving, from an application executing on a mobile device, a request to access content, and identifying, from a plurality of content items, at least a first content item responsive to the request.
International Business Machines Corporation


System and method to access aggregated metric data in a computer network

A metric data aggregator includes a processor and a data store. The processor is configured to obtain service level metric data from a plurality of proxy servers; obtain cloud level metric data from a plurality of proxy servers and at least one load balancer; aggregate the service level metric data and the cloud level metric data; and provide the aggregated service level and cloud level metric data to a remote user.
Secureworks Corp.

System and method to enable pki- and pmi- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added

A central server configured with an attribute authority (“aa”) acting as a trusted third party mediating service provider and using x.509-compatible pki and pmi, vpn technology, device-side thin client applications, security hardware (hsm, network), cloud hosting, authentication, active directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys.
T-central, Inc.

System and secure and efficient communication within an organization

The present disclosure relates to system(s) and method(s) for enabling secure and efficient communication between user devices within an organization. cloud-based messaging services are popular, but organizations hesitate to use them due to the risk of private data residing on public cloud servers.
Webaroo Inc

System and cloud-networked stand-alone dual modulation lan

A cloud-networked stand-alone local area network (lan) is disclosed. A stand-alone lan is networked to a server outside the stand-alone lan, and the server is part of a cloud of servers.

System and preemptive self-healing security

The present system and method allow for preemptive, self-healing computer security. The system includes a user device processor and a pss server processor.
Auburn University

Laser plasma lens

A device for collimation or focusing of a relativistic electron packet, obtained in particular by laser-plasma acceleration, including a gas cloud and a laser capable of emitting a laser pulse focused in the gas cloud in order to create therein a wave of focusing electric and magnetic fields. The invention also relates to a device for emission of a collimated or focused relativistic electron packet.
Ecole Nationale SupÉrieure De Techniques AvancÉes

Apparatus enabling secure wireless access to an enclosure

An apparatus for more efficiently enabling secure access to an enclosure is described herein. The apparatus may include a wireless transmitter in a selectably opaque container, a wireless transceiver, a gps receiver, an nfc transmitter and/or receiver, one or more hardware processors, and hardware memory.

Virtual hybrid texture mapping

A gaming device is configured to provide virtual hybrid texture mapping, which provides a type of virtual placeholder that can be filled in using cloud computing resources. The virtual placeholders are filled in to create more detailed textures whose calculated are offloaded to a cloud computing service provider data center's cluster..
Vmware, Inc.

Cloud-based workflow management platform defined by permission-based roles and relationships for administering, creating, and processing commercial advertising work orders

An internet-based workflow management platform for use in the broadcast and web industry to facilitate resources sharing and improved production efficiency—specifically adapted for creation and production of commercial advertisements. An internet, cloud-backed system for the creation and production of commercial advertising spots is provided wherein a role-based structure ensures that users only see the information relevant to them and relevant to their part in the overall process and workflow that ends with the completion of a work order.

Mobile-based common platform enabling electronic outlets for companies

In one example, a method for providing a common platform enabling electronic outlets for companies is described. A plurality of companies and users may be enabled to subscribe with a cloud-based server.
Ittiam Systems Pte. Ltd.

Community content identification

In one embodiment, a method for community content identification is provided. The method includes identifying one or more error messages from software running on a cloud instance.
International Business Machines Corporation

Providing enterprise product bundles as a cloud-based service

Systems, methods, and computer-readable storage media are provided for creating and delivering product packaging as a cloud-based service to enterprise administrators. Administrators utilize user credentials to access a web-based portal where a name or identifier of each package created by any enterprise administrator of the organization is presented.
Adobe Systems Incorporated

Rapid identification of object properties in an evolving domain model of an enterprise application on the cloud

The present disclosure involves systems, software, and computer implemented methods for identifying traits of an object. In one example, a set of traits is identified in an object-oriented system.
Sap Se

Methods and systems for electric vehicle (ev) charging and cloud remote access and user notifications

Systems and methods for charging an electric battery of a vehicle are provided. The vehicle includes a battery for powering an electric motor of the vehicle.
Emerging Automotive, Llc

Instrumented orthotic

A semi-rigid foot orthotic can have 3-axis accelerometers, gyroscopes, magnetometers, and strain gauges embedded in one or more flexible regions along with a microprocessor and wireless transmitter. Data from the sensors can be used to track the gait cycle.

Method for data analysis and processing of an elasticity detection device, and elasticity detection device

Provided is a method for data analysis and processing of an elasticity detection device, and an elasticity detection device. The method includes: transmitting, by each elasticity detection device, a detection result to a cloud server if a communication connection between the elasticity detection device and the cloud server is determined to be normal so that the cloud server can store the detection result in a database.
Wuxi Hisky Medical Technologies Co., Ltd.

Phono-electro-cardiogram monitoring unit

A phono-electro-cardiogram monitoring unit that detects and monitors ecg and pcg signal comprising a phono-electro-cardiogram sensor button capable of electrical conduction of the electrical potential changes arising from the heart activity of a user or a patient. The sensor button includes a microphone which allows detection of electrocardiography signal and phonocardiogram signal simultaneously and the detected electrocardiography signal and phonocardiogram signal are processed by a multifunction microprocessor and the processed electrocardiography signal and phonocardiogram signal data are stored in a memory or be transmitted to a work station or a personal cloud for further processing and storing where the data can be forwarded to authorized individuals via wireless connectivity for communication, interpretation, service and help..
Corbit Inc.

Method and system of cultivating aquatic product and plant

A method of cultivating aquatic product and plant contains steps of: (a) preparing a cultivation tank with cultivation water; (b) aerating the cultivation water; (c) drawing overflow water in a top of the cultivation tank and foul water in a bottom of the cultivation tank into a protein separator and a first ultrafiltration unit; (d) collecting bubbled fluid from the protein separator and concentrated waste fluid from the first ultrafiltration unit into a collection chamber; (e) pumping the cultivation wastewater into a second ultrafiltration unit and filtering the cultivation wastewater by using ultrafiltration films of the second ultrafiltration unit; (f) discharging cloudy high-protein concentration fluid into a first gathering bucket; (g) pumping filtered fluid filtered by the plurality of ultrafiltration films of the second ultrafiltration unit into a nano-filtration unit; and (h) flowing the recyclable water into the cultivation tank from the recycle tank.. .

Mobile network with software defined networking architecture

A network core with a software defined networking (“sdn”) controller is provided to control routing of traffic within the network and between the network and the traffic destination. The sdn controller is merged with existing 3rd generation partnership project (“3gpp”) network architecture to enable service deliveries via open application programming interfaces (“apis”) and move the network core towards an all internet protocol (“ip”), cloud based, and software driven telecom network.

Induction type ornament with private message transmission

An induction type ornament with private message transmission includes: an ornament; an electronic tag installed to the ornament and having an nfc chip and an nfc coil; a private message stored in the electronic tag or a cloud server; so that when a recipient uses a mobile induction device to read the electronic tag from the ornament given by a giver, the recipient can read the private message which is pre-recorded and stored in the electronic tag or the cloud server, so as to provide significance, uniqueness, and the effect of transmitting private messages to the ornament or a gift and the ornament or gift provides the convenience of receiving and displaying a message to improve the using value of the ornament or gift.. .

Methods and systems for cloud- and mobile device-based biological inventory tracking

The subject matter described herein includes methods, systems, and computer program products for biological inventory tracking using cloud services and mobile devices. According to one method, information is input from a mobile device about a specimen sample.

System and secure call routing and queuing

An agent queuing system implemented without relying on a private branch exchange. The queuing system can be cloud-based and routes calls to agents, for example, through a first-in/first-out (fifo) queue.

Cloud-based contacts management

Various embodiments disclosed herein provide for a system for managing and adding contacts. A first mobile device can display an image that can be recorded by a second mobile device.

Adjustment to managed-infrastructure-as-a-service cloud standard

An arbitrary customer instance is transferred from a customer environment to a target managed-infrastructure-as-a-service cloud environment as a transferred image. An image adjustment plan, capturing at least one adjustment required to render the transferred image compliant with standards of the target managed-infrastructure-as-a-service cloud environment, is formulated.

Method and system for processing tasks in a cloud service

There are provided a method and a system for processing tasks in a cloud service. The method comprises: receiving, by the first controlling electronic device, a first task; determining whether at least one server within a plurality of servers of the first data center being available for performing the first task; responsive to the at least one server within the plurality of servers of the first data center being available for performing the first task, assigning the first task to said at least one available server; responsive to none server within the plurality of servers of the first data center being available for performing the first task, transmitting said first task to at least one cross-datacenter storing device, the at least one cross-datacenter storing device is configured to transmit the first task to the second controlling electronic device responsive to receiving a request from the second controlling electronic device..

Self-organizing storage system for asynchronous storage service

An archival cloud storage service can be created with cost efficient components for large scale data storage and can efficiently use these components. A frontend of the cloud storage service presents an asynchronous storage interface to consuming devices of the cloud storage service.

Naming of distributed business transactions

The present technology monitors a web application provided by one or more services. A service may be provided by applications.

Wireless network access

A system and machine-implemented method of wireless network access are provided. An authentication request comprising credentials for a user account of a cloud-based service is received from a wireless client device.

Security credential protection with cloud services

Presented herein are techniques for remotely releasing bootstrap credentials to a cloud management proxy device. In particular, a cloud management proxy device that is associated with a cloud system commences a boot operation.

Convergence of cloud and mobile environments

In an approach for converging a cloud computing environment and a mobile device into an integrated environment, a processor receives a request to complete a computing task on a first device. A processor identifies capabilities of the first device.

System and management of cloud-based systems

System and method for reporting usage of a network infrastructure includes obtaining a map that includes at least one flow-mapping that correlates a flow feature with a service and that correlates a flow feature with an endpoint type, wherein the endpoint types include at least a subscriber type and a service type; at a first computer, receiving flow telemetry of a network infrastructure, the flow telemetry representing at least the destination and source attributes for network traffic in the flow telemetry; categorizing the flow telemetry into at least a subscriber flow category based on the source and destination endpoint types of the traffic; for subscriber flow telemetry of a subscriber, processing the subscriber flow telemetry into at least one flow feature; identifying at least one service to attribute to at least a portion of the subscriber flow telemetry, the service identified through the processed flow feature and a flow-mapping.. .

Apparatus for testing and developing products of network computing based on open-source virtualized cloud

An apparatus for testing and developing products of network computing based on an open-source virtualized cloud includes a physical space, a network function virtualization (nfv) infrastructure domain space that provides a virtualization function in an independent environment of each user; an nfv engine space that provides a processing based environment for virtual appliances which are units of a virtual network device that is individually operable, a framework space that provides support to allow the virtual appliances to be developed and registered, and a virtual network service space that provides a user interface interoperating with the framework space so that a user configures a virtual network through the user interface and a test function of the configured virtual network is supported.. .

Neuron system based on internet of things and communication network, and neuron device thereof

Disclosed are a neuron system based on an internet of things and a communication network, and a neuron device thereof, which integrate resources of the internet of things and the communication network, thereby improving the degree of utilization of data collected by a sensor, reducing manufacturing costs of mobile terminals, and improving the utilization efficiency of resources. The present invention has the technical solution that the system comprises a sensor actuator, an internet of things, a communication network, a cloud server and a neuron device, wherein the sensor actuator collects information about an induction object; the neuron device conducts direct data communication with the sensor actuator and conducts, as a dynamic mobile node in the communication network, information interaction with the cloud server through the communication network; and the cloud server conducts information transmission with various neuron devices in the communication network and uniformly stores and processes information uploaded by the neuron device..

Audio watermarking system and processes

An audio watermarking system and processes are disclosed. A process includes steps for assigning an audio watermarking plug-in tool to a master channel of an audio content project in a digital audio workstation software application, editing the audio content project, and saving the watermarked audio content.

Image processing apparatus, image processing method, and a non-transitory computer readable medium

An image processing apparatus comprising: a storage device storing weather data representing a state of an atmospheric air in at least one of a plurality of areas existing within a predetermined range; and a control device computing a color of a cloud about at least one area by using the weather data.. .

Sensory totem badge capable of transmitting individualized information

A sensory totem badge capable of transmitting individualized information and includes: a totem badge body attached or sewed onto an object surface; an e-tag, installed to the totem badge body, and including an nfc chip and an nfc coil; and a totem individualized information, stored in the e-tag or a cloud server; such that when a mobile sensing device is near the e-tag of the totem badge body, the implication represented by a totem on the totem badge body, the story behind it, or private words can be read. Therefore, the totem badge body is given with intangible specificity and commemoration to achieve higher value and sense of technology..

Security layer and methods for protecting tenant data in a cloud-mediated computing network

A system for protecting data managed in a cloud-computing network from malicious data operations includes an internet-connected server and software executing on the server from a non-transitory physical medium, the software providing a first function for generating one or more security tokens that validate one or more computing operations to be performed on the data, a second function for generating a hash for each token generated, the hash detailing, in a secure fashion, the operation type or types permitted by the one or more tokens, a third function for brokering two-party signature of the one or more tokens, and a fourth function for dynamically activating the one or more signed tokens for a specific time window required to perform the operations permitted by the token.. .

Method, apparatus, system, device and computer storage medium for treating virus

The present invention provides a method, apparatus, system, device and a computer storage medium for treating virus. A client reports a scan log to a cloud service platform, and/or reports virus family information to the cloud service platform after the virus family information is identified based on the scan log.

Generating word clouds

A computer-implemented method includes identifying an information resource. The information resource includes text information.

Multi-cluster warehouse

A method for a multi-cluster warehouse includes allocating a plurality of compute clusters as part of a virtual warehouse. The compute clusters are used to access and perform queries against one or more databases in one or more cloud storage resources.

Multi hard-disk file management system and method thereof

The instant disclosure provides a multi hard-disk file management system and a method thereof. The multi hard-disk file management system comprises at least one external hard disk, a host computer and a file database.

Common data processing definition across multiple data processing nodes

Embodiments include a method and system for supporting a common data processing definition across multiple data processing nodes in a data swamp comprising at least one local data storage system and one or more remote data storage systems including remote databases, cloud-based data storage, or one or more computational clusters. Users can create a document in a common data processing language (e.g., xml) that describes a set of data processing tasks and a set of data processing resources to perform the data processing tasks in a graphical interface.

Cache scoring scheme for a cloud-backed deduplication storage system

Exemplary embodiments relate to cache replacement schemes. Incoming data may be sorted into buckets.

Coarse-grained cache replacement scheme for a cloud-backed deduplication storage system

Exemplary embodiments relate to cache replacement schemes. Incoming data may be sorted into buckets.

Systems and methods for performance testing cloud applications from multiple different geographic locations

A method and system for testing the end-to-end performance of cloud based applications. Real workload is created for the cloud based applications using synthetic users.

Recovering unreadable data for a vaulted volume

A method, a computing device, and a non-transitory machine-readable medium for replacing an unreadable sector in a storage system is provided. In some embodiments, the method includes identifying a sector from a plurality of sectors in a physical memory of a storage device in a storage system as an unreadable sector.

Namespace policy based deduplication indexes

A cloud storage gateway device can be used to deduplicate data across different namespaces while complying with slos that govern data of the different namespaces. A cloud storage gateway device can use multiple fingerprint indexes to comply with different slos.

Application management in enterprise environments using cloud-based application recipes

A cloud-based system is described for producing application deltas based on application recipes that identify components of the application deltas using unique identifiers, without the recipe containing all or any content of the actual application. The application recipe can be conveyed to an organization operating on an enterprise network, where the application recipe can be matched with application files in the organization's backup storage containing copies of content of endpoint devices on the network to retrieve components identified by the recipe and produce the application delta for the application.

Interactive multimodal display platform

An interactive multimodal display platform comprising a rich internet application (ria) built on a cross-platform runtime system that allows a user to combine, connect and customize web-based applications and local, user-created content for display in a multi-view presentation. Users can open for a quick view any number of files in different formats from their desktops.

Feature switching in a multi-tenant cloud service

Techniques are described for feature switching in a multi-tenant cloud service. In one implementation, a computer program product comprises a computer-readable storage medium having program code embodied therewith.

A client device for data acquisition and pre-processing of process-related mass data from at least one cnc machine or industrial robot

The present invention relates to a client device and a system for data acquisition and pre-processing of process-related mass data from at least one cnc machine or an industrial robot and for transmitting said process-related data to at least one data recipient, e.g. A cloud-based server, the client device comprising at least one first data communication interface to at least one controller of the cnc machine or industrial robot, for continuously recording hard-realtime process-related data via at least one realtime data channel, and for recording non-realtime process-related data via at least one non-realtime data channel.

Long-range cloud conditions detector

Apparatus and associated methods relate to detecting cloud conditions from a distance by generating a polarized microwave-frequency electromagnetic pulse and evaluating various reflected wave parameters pertaining to a corresponding cloud-reflected microwave-frequency electromagnetic reflection. Various cloud metrics can be calculated using these collected wave parameters.

Remote monitoring electricity demand of fused magnesium furnace group

A remote monitoring system and method for electricity demand of a fused magnesium furnace group. The system has a data acquisition device, a local pc, a cloud server and a remote pc.

Method and apparatus of detecting liquid water in a cloud

Apparatus and associated methods relate to determining liquid-water concentration in a cloud atmosphere based on a frequency of resonance of a magnetostrictive resonator and/or a temporal variation of the resonant frequency of the magnetostrictive resonator. The magnetostrictive resonator is configured to resonate at a resonant frequency indicative of a measure of ice accumulation upon an exterior surface of the magnetostrictive resonator.

Road traffic warning device and communicator and method thereof

A mobile warning device on a vehicle includes a detecting module, a driving module, a monitoring module, and a communication module. The detecting module determines whether the vehicle is unexpectedly immobile.

Cloud gaming device handover

Methods and systems to identify options of secondary client devices for a device handover of game play include establishing a session of game play of a game for a primary client device by executing the game on a server for streaming video frames to the primary client device. A request is received to generate a profile of one or more secondary client devices that are identified to be local to the primary client device.

Methods and self optimization and/or improvement of a cloud-based wireless network

In some embodiments, an apparatus includes a monitor module configured to monitor a set of performance indicators associated with a first network topology of a wireless network provider system. In the first network topology, a set of virtual baseband units services a set of remote radio heads.
Viavi Solutions Inc.

Procedures to provision and attach a cellular internet of things device to a cloud service provider

A cellular iot (ciot) device can comprise a coverage and/or processing constrained device e.g., devices operating primarily mtc or m2m (e.g., sensor devices, controller devices, etc.). These devices can have limited or no user interface, and can be used for machines or devices with little mobility.
Intel Ip Corporation

System for managing web-based swipe module tool and software for scrolling and paging through content data and applications

A cloud-based computer system and architecture for managing and migrating through web-based content data and content applications from multiple content data sources or service providers in real time is disclosed. The cloud-based computing system and architecture of the present invention includes a log-in or master server that acts as a single point access and supports a single user interface.

Scalable data enrichment for cloud streaming analytics

A method is described of pre-processing real-time data to be processed by one or more real-time analytics services. The method includes: receiving, at a stateless ingress node, data from one or more client devices; transforming the data in real-time at the stateless ingress node; determining in real-time, at the stateless ingress node, a real-time analytics service for the transformed data; and forwarding in real-time the transformed data to the determined real-time analytics service for stateful processing..
Microsoft Technology Licensing, Llc

System and cloud computing on-demand dynamic service management engine

The present arrangement is a system for connecting consumers with services. The system has a mobile application management platform for supporting connection with a plurality of third party service providers.
Tize Technologies Inc. (accomplicetm) C/o Wework

System and cloud storage device detection

A document processing system includes an embedded controller that has both a local area network interface for receiving documents over an associated network and a wireless personal area network interface for communicating with mobile computing devices using bluetooth low power communications. The embedded controller transmits broadcasts message to nearby mobile computing devices that send responses to the broadcast messages.
Toshiba Tec Kabushiki Kaisha

Cloud based peer assisted updates in a device management environment

Peer assisted updates can be provided in a device management environment. When it is desired to deploy an update to a group of managed devices, an update command can be sent to a first set of managed devices in the group instructing these managed devices to download the update.
Wyse Technology L.l.c.

Systems and methods for downloading files

Systems according to various embodiments use a file download widget to facilitate the download of one or more files from one or more servers associated with a website. In particular embodiments, the file download widget may be used to facilitate the download of one or more particular files that are associated with the widget directly to a content management system, such as a synched or non-synched cloud-based content management system.
Dropbox, Inc.

Media asset streaming over network to devices

Streaming of a media asset from a cloud server computer to a media playback device is disclosed. In an embodiment, a list of media assets stored in the cloud server computer is sent over network from the cloud server computer to a portable device.
Kojicast, Llc

Media asset streaming over network to devices

Streaming of a media asset from a cloud server computer to a media playback device is disclosed. In an embodiment, a list of media assets stored in the cloud server computer is sent over network from the cloud server computer to a portable device.
Kojicast, Llc

Cloud based security using dns

A cloud-based security method using domain name system (dns) includes receiving a request from a user device at a dns server; performing a security check on the request based on a policy look up associated with the user device; responsive to the policy look up, performing a dns security check on the request; and responsive to the dns security check, performing one of allowing the request to the internet; blocking the request based on the policy; and providing the request to inline inspection based on the policy, wherein the request is one of allowed to the internet or blocked based on the inline inspection.. .
Zscaler, Inc.

Method and apparatus to support binary packing of json data

A new approach is proposed that contemplates systems and methods to support packing of both binary data and fields of non-binary logical data (e.g., json) into a payload, which is then transmitted by a client to a cloud-based storage or a web server over a communication network. Here, the payload is designed for the packing binary data with the non-binary data fields that preserves backwards compatibility with all types of clients of the data without any limitation on the data format supported by the clients.
Barracuda Networks, Inc.

Method for configuring a tunnel connection for an automation network

In a method for configuring a communication between a first computer with an automation engineering software and a second computer which is connected in a proprietary automation network, the first computer is run in a cloud environment. The communication between the first computer and the second computer is carried out by a tunnel protocol for establishing a tunnel connection, and a configuration of the tunnel connection is automatically configured by determining information heuristically..
Siemens Aktiengesellschaft

Constructing computing systems with flexible capacity of resources using disaggregated systems

Various embodiments for allocating resources in a disaggregated cloud computing environment, by a processor device, are provided. Respective members of a pool of hardware resources are assigned to each one of a plurality of tenants based upon a classification of the respective members of the pool of hardware resources.
International Business Machines Corporation

Method and system for provisioning computing resources

A method, computer-readable medium, and system for provisioning computing resources across multiple cloud providers and/or data centers are disclosed. A graphical user interface is used to select a plurality of computing resources and at least one cloud provider and/or at least one data center for providing the plurality of computing resources.
Accenture Global Solutions Limited

Distributing data analytics in a hierarchical network based on computational complexity

A method provided in a network including edge devices to collect data from data producers connected to the edge devices and to communicate with cloud-based prosumers connected with the edge devices. Data analytics tasks are identified.
Cisco Technology, Inc.

Network architecture for predictive services management in cable network environments

An example system for predictive services management (psm) in cable network environments is provided and includes a data collector located in a cable network that captures multi-tone signals traversing the cable network, a data repository located in a cloud network, and a central server having psm algorithms configured for: retrieving key performance indicators from the multi-tone signals; identifying a fault signature based on the key performance indicators, the fault signature being identified based on phase domain analysis of a channel response; accessing the data repository for geographical information; determining a location of a fault in the cable network based on the fault signature and the geographical information; accessing the data repository for device information; determining a type of fault based on the location of the fault and the device information; and activating repair and maintenance activities based on the type of fault, location of the fault and the fault signature.. .
Cisco Technology, Inc.

Cloud based wake-on-lan for thin clients

cloud based wake-on-lan (wol) for thin clients can be performed to allow a cloud based management server to wake up a thin client prior to an update command (or other communication) being transmitted to the thin client to ensure that the thin client will receive the update command. Cloud based wol can therefore facilitate the deployment of updates to thin clients by providing a way for the administrator to wake up the thin clients from the cloud..
Wyse Technology L.l.c.

Hybrid fibre coaxial fault classification in cable network environments

One embodiment is a system including a data collector located in a cable network for capturing multi-tone signals traversing the cable network; a data repository located in a cloud network and having an interface for communicating with the data collector and for storing the multi-tone signals captured by the data collector and network data associated with the cable network; and a central server including a memory element storing predictive services management (psm) algorithms comprising instructions and associated data and a processor operable to execute the psm algorithms. The central server is configured for detecting a fault in the cable network and identifying a segment associated with the fault; determining a maximum tap magnitude for the fault; calculating an aggregate tap magnitude for the fault; and classifying a severity of the fault based at least in part on the maximum tap magnitude and the aggregate tap magnitude..
Cisco Technology, Inc.

Hybrid fibre coaxial fault locationing in cable network environments

One embodiment is a method that includes retrieving key performance indicators from multi-tone signals captured by a data collector located in a cable network; identifying a fault signature based on the key performance indicators, in which the fault signature is identified based on phase domain analysis of a channel response; and accessing a data repository located in a cloud network for geographical information associated with the cable network. The method further includes determining a location of a fault in the cable network based on the fault signature and the geographical information, in which the determining further includes: determining a length of a fault cavity associated with the fault; identifying at least one segment having a length the same as the length of the fault cavity; identifying terminating devices associated with the at least one segment; and tagging the identified terminating devices as potentially faulty..
Cisco Technology, Inc.

Measuring resource consumption in a multi-tenant platform-as-a-service (paas) system

Implementations for measuring resource consumption in a cloud provider system are disclosed. A method of the disclosure includes determining that a resource of an application of a cloud provider system is initializing, determining whether each operation in a list of initialization operations used in the initialization of the resources is performed successfully, prior to a create usage record operation in the list of initialization operations, in response to determining that each of the initialization operations prior to the create usage record operation in the list of initialization operations is performed successfully, creating a usage record for the resource using the create usage record operation based on a threshold usage level associated with the application, and in response to determining that at least one of the initialization operations prior to the create usage record operation in the list of initialization operations has failed, performing a roll-back operation or a re-try operation for the at least one of the initialization operations that has failed..
Red Hat, Inc.

Experimental smartphone ground station grid system and method

This system and method provides for a plurality of satellite ground stations, distributed across some geographic region, and for these regions in turn to be scalable to cover large regions or even the globe using a combination of low-orbit satellites, terrestrial participant devices, and cloud-based communications. The invention in its simplest form is intended to solve the short temporal window problem inherent to the scenario where a single base or ground station is trying to track and communicate with a low-end leosat or even a cube-satellite..
University Of Louisiana At Lafayette

Cloud-based video monitoring

One embodiment of the present invention provides a cloud-based video monitoring system comprising a camera and a network video recorder (nvr). During operation, the camera stores in a buffer last predetermined temporal segment of a video.
Ubiquiti Networks, Inc.

Method and rescuing driverless vehicles

The present application discloses at least a method and apparatus for rescuing driverless vehicles. A specific implementation of the method includes: collecting status information of a driverless vehicle; determining whether the driverless vehicle has an autonomous driving ability; if not, setting a driving mode of the driverless vehicle to a manual driving mode and further determining whether the driverless vehicle has a traveling ability in the manual driving mode; and collecting passenger information of the driverless vehicle and sending the status information and the passenger information to a cloud server providing support for the driverless vehicle, in response to the driverless vehicle not having the traveling ability in the manual driving mode.
Baidu Online Network Technology (beijing) Co., Ltd.

Printout delivery system and method using mobile device

A method of transmitting contents stored in a mobile device may include displaying a list of the contents on a display screen, receiving a user input for selecting content to be printed, on the display screen, displaying a list of printers capable of printing the selected content, and a ‘send to delivery server’ item on the display screen, transmitting the content to a cloud server based on a user input for selecting the ‘send to delivery server’ item on the display screen, displaying a printing cost of the content on the display screen while the content is being converted into print data by the cloud server, receiving payment information of the printing cost and receiver information of a printout of the content, and transmitting the payment information and the receiver information to the cloud server.. .
S-printing Solution Co., Ltd.

Three dimensional object recognition

A methods and system for recognizing a three dimensional object on a base are disclosed. A three dimensional image of the object is received as a three-dimensional point cloud having depth data and color data.
Hewlett-packard Development Company, L.p.

Method and system for health condition analysis based on elasticity detection device

The invention provides a method and system for health condition analysis based on an elasticity detection device. The method includes: sending, by a client, a health condition analysis request to a cloud server, where the health condition analysis request includes individual attribute identification information of a querier; acquiring, by the cloud server, to-be-analyzed data corresponding to the health condition analysis request from a cloud database storing displacement data of each querier, and conducting data analysis on the to-be-analyzed data to obtain health condition information of the querier; and receiving, by the client, the health condition information of the querier sent by the cloud server.
Beijing Friendshiip Hospital, Capital Medical University

System and disaster recovery of cloud applications

cloud computing is continuously growing as a business model for hosting information and communications technology applications. While the on-demand resource consumption and faster deployment time make this model appealing for the enterprise, other concerns arise regarding the quality of service offered by the cloud.
Telefonaktiebolaget Lm Ericsson (publ)

Partial cloud data storage

Technologies are generally described for partial cloud data storage. In one example, a method includes dividing, by a system comprising a processor, a file into a set of source packets in response to an indication that the file is to be stored in a data store of a network device.
Empire Technology Development Llc

Proactive cloud orchestration

Methods, systems, and devices are described for providing proactive cloud orchestration services for a cloud hardware infrastructure. A health management system may monitor component(s) of the cloud hardware infrastructure.
Seagate Technology Llc

System and operating questionnaire sticker

A system and an operating method of a questionnaire sticker are disclosed. The system includes a sending end, a receiving end and a cloud server.

Bladders, compartments, chambers or internal sipes controlled by a web-based cloud computer system using a smartphone device

A computer system including a web site and/or a cloud array of computers configured to have a connection to a smartphone or other mobile computer device and use the device and connection to control a configuration of one or more bladders, compartments, chambers and internal sipes located in a sole or removable inner sole insert of footwear. The computer system can also use the device and connection to transmit data to the computer system for storage and/or shared or independent processing and/or analysis, process data from sensors located in either one or both of the sole or the removable inner sole insert of the device user, and in, on, or near a center of gravity of the device user, and use the processed data to alter a configuration of the bladders, compartments, chambers and internal sipes and to control the relative foot position of the right and left feet..

Multi-wavelength lidar system

A multi-wavelength lidar system includes a first laser source that generates a first optical beam having a first wavelength and a second laser source that generates a second optical beam having a second wavelength. An optical element projects the first optical beam to form a first beam profile at a target plane and projects the second optical beam to form a second beam profile at the target plane.
Opsys Tech Ltd.

Object detection using radar and machine learning

A method and system for using one or more radar systems for object detection based on machine learning in an environment is disclosed. A scanning radar or combination of radars mounted on a vehicle or moving object scans the environment to acquire information.

Method of creating a subsurface 3d engraving in a crystal

A method of creating a subsurface engraved crystal comprising the steps of: performing a 3d/4d scan of a subject; saving the volumetric data; generating a point cloud based on the volumetric data; outputting the point cloud to a laser engraver; and engraving a crystal with the laser engraver.. .
Ultrasound Baby Face Ltd

System and measuring a closed-side and/or open-side setting of a gyratory crusher

A gyratory crusher and system for determining a close-side setting or an open-side setting is provided including a point cloud generator mounted proximate the crusher; a drone; a laser emitter mounted on the drone to mark the first trace on the mantle at a predetermined position of the gap; a camera mounted on the drone to capture a series of image of the first trace as the mantle of the gyratory crusher rotates; and a computer in communication with the camera, the point cloud generator and the drone, the computer comprising a memory and a processor, the memory providing instructions to process the image to provide a gap width and to determine at least one of a close-side setting or an open-side setting from the gap width.. .
Crusher Vision, Inc.

User save data migration based on location information

Methods and systems for assigning a data center in a second geo location for migrating data in anticipation of receiving a request from a user account from the second geo location includes receiving an indication of a change in geo location of a user from a first geo location to the second geo location. Save data for the user is identified at the first geo location.
Sony Interactive Entertainment America Llc

Warm cloud catalyst, preparation method therefor and application thereof

Disclosed are a warm cloud catalyst, a preparation method and an application thereof. The warm cloud catalyst comprises the following components in parts by weight: plant powder/plant ash/plant carbon powder 80-120 parts; surfactant dry powder 0.5-5 parts or a surfactant solution 15-32 parts; and a thickening agent 2-10 parts.

Logical address assignment in a cloud cell

A method and system for assigning a unique logical address in a cloud cell having a mobile station, slave base stations and a master base station are provided. The method includes determining at least one unassigned logical address from respective address spaces associated with the slave base stations and the master base station in the cloud cell by the master base station, selecting the unique logical address from the at least one unassigned logical address determined from the respective address spaces associated with the plurality of base stations, and assigning the selected unique logical address to the mobile station in the cloud cell.

Cloud-based device twinning

A network-based service is utilized to facilitate twinning of two or more communication devices associated with a subscriber account. Incoming communication is intercepted by a communication device and forwarded to a network server, which in turn transmits the incoming communication to the multiple twinned devices.

Cloud enabling resources as a service

One aspect includes a method for constructing a specified virtual solution, comprising: obtaining a solution profile from a solution repository catalog, wherein the solution profile identifies one or more resources for the specified virtual solution; acquiring the one or more resources identified by the solution profile from one or more devices; and assembling the acquired one or more resources in accordance with the solution profile to construct the specified virtual solution. Another aspect includes a method for providing a resource-as-a-service (raas) functionality in a cloud architecture, comprising: implementing a software defined infrastructure comprising distributed workload placement, location management, and data management; and implementing a raas layer comprising resource discovery and registration of capabilities..

Cloud computing service architecture

A service control system manages a set of storage clients operating within one or more computing hosts. Storage clients may access a consistent storage system regardless which cloud provider the computing hosts come from.

Storage and application controller for mirroring and switchover of applications in a plurality of cloud locations via a plurality of configurable security protocols

A storage and application controller that is coupled to a plurality of storage and application execution clouds is maintained. The storage and application controller transmits, via a first communications protocol, an application to a first storage and application execution cloud.

Virtual channel joining

Methods for establishing connection to the internet using multiple channels. A device takes advantage of several channels available to it internally and/or from neighboring devices to request the various resources of the webpage, and assembles the webpage using the resources arriving from the different channels.

Cloud streaming service system, cloud streaming service method using optimal gpu, and same

A cloud streaming service system, a cloud streaming service method using an optimal gpu, and an apparatus for the same are disclosed. A cloud streaming service can be provided by determining whether a video is played on a browser, when a playback of the video is sensed, decoding the video by using a video decoding entity determined on the basis of system resource conditions, and performing a streaming procedure corresponding to capturing, encoding and sending the decoded video.

Method, system, and computer program product for providing security and responsiveness in cloud based data storage and application execution

A storage controller that is coupled to a plurality of storage clouds is maintained. The storage controller determines security requirements for performing a selected operation in the plurality of storage cloud.

Systems and methods for segmenting industrial asset services

Systems and methods are presented for receiving, at a server computer associated with an industrial asset cloud computing system, a request from a user device for industrial asset application development services, the request including a username and password, and verifying, by the server computer, the username and password. The systems and methods further comprise determining, by the server computer, a user profile based on the username, the user profile comprising at least one of an industry, a region of operation, a negotiated contract term, an identity of the user associated with the username as an individual developer or an enterprise, and a role associated with the user; determining, by the server computer, a subset of a plurality of industrial asset application development services based on the user profile, and sending the subset of the plurality of industrial asset development services to the user device to be displayed on the user device..

Secure and anonymized authentication

An embodiment may involve receiving, by a computing system, a message from a wireless service provider system. The computing system may include one or more computing devices located, e.g., in the trusted cloud.

Cryptographic security functions based on anticipated changes in dynamic minutiae

Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely identifying and validating the device include: selecting a subset of minutia from a plurality of minutia types; computing a challenge from which the user device can form a response based on the selected combination of minutia; computing a set of pre-processed responses that covers a range of all actual responses possible to be received from the device if the combination of the particular device with the device's collected actual values of minutia is valid; receiving an actual response to the challenge from the device; determining whether the actual response matches any of the pre-processed responses; and providing validation, enabling authentication, data protection, and digital signatures..

Method and system for secure communication with shared cloud services

A computer implemented method of secure communication between a virtual machine in a set of virtual machines in a virtualized computing environment and a shared software service over a network, the method comprising: establishing a network connection between the virtual machine and the software service; communicating data between the virtual machine and the software service; and, establishing a tunneling virtual private network (vpn) connection for communication of encrypted network traffic between the virtual machine and the software service, access to the vpn connection being restricted so as to securely separate communication between the virtual machine and the software service from communication occurring with other virtual machines in the set, and wherein data is communicated between the virtual machine and the software service via the vpn connection.. .

Pluggable allocation in a cloud computing system

In one embodiment, a cloud computing system provides user extensibility by providing a plugin interface for major systems. Plugin interfaces for a compute service, object service, network service, authentication and authorization service, message service, and image service are disclosed.

Multi-tenant middleware cloud service technology

A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services.

Cloud optimizer

A system that communicates with one or more host providers to monitor a computing load on the computing resources of the host providers and then compares this computing load or usage with expected threshold values to determine if notifications should be generated to alert administrators or the host provider of unexpected usage. The system also provides dynamic adjustment of the thresholds based on increased usage that is desired such as a large number of unique users accessing the software application to use the software application in a way that generates revenue or the potential for revenue for the software application provider..

Device cloud monitoring and stability

An example system may include a first device connected over respective communications interfaces to a plurality of second devices. The first device may establish respective remote terminals between the first device and one or more second devices.

Topology based management of second day operations

In one implementation, a method for topology based management of second day operations can include identifying a cloud service operating on a second system, discovering, via a first system, an existing realized topology of the second system as an inferred realized topology for the first system, wherein the existing realized topology is provisioned by the second system, defining a management process to be performed within the cloud service, via the first system, upon the instantiation of the inferred realized topology by the first system, and executing the management process utilizing the first system.. .

Secure cloud fabric to connect subnets in different network domains

A secure virtual network platform connects two or more subnets in different or separate network domains. The secure virtual network can use the under layer physical networks in various domains as an ip forwarding fabric without changing any existing firewalls, security settings, or network topology.

Method and managing virtual networks via cloud hosted application

An apparatus and method for providing a cloud hosted application able to manage virtual network (“vn”) is disclosed. In one embodiment, a process of managing vn using virtual machines (“vms”) receives a message or request from a user requesting a new vn to be built.

Automatic placement of clients in a distributed computer system satisfying constraints

A cloud management server and method for performing automatic placement of clients in a distributed computer system uses a list of compatible clusters to select an affinity cluster to place the clients associated with an affinity constraint. As part of the placement method, a cluster that cannot satisfy any anti-affinity constraint associated with the clients and the affinity constrain is removed from the list of compatible clusters.

Mechanism for facilitating dynamic and trusted cloud-based extension upgrades for computing systems

A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade.

Dual server based storage controllers with distributed storage of each server data in different clouds

A storage controller comprising a first server and a second server is maintained. Data of the first server is stored in a first storage cloud, and data of the second server is stored in a second storage cloud.

Content sharing method, terminal, server, and system

Embodiments provide a content sharing method and system. A source terminal cloud server receives a content sending command sent by a source terminal, where the content sending command carries an address of a destination terminal cloud server.

Synchronizing credential hashes between directory services

The subject disclosure is directed towards securely synchronizing passwords that are changed at a source location (e.g., an on-premises directory service) to a target location (e.g., a cloud directory service), so that the same credentials may be used to log into the source or target location, yet without necessarily having each domain controller handle the synchronization. The plaintext password is not revealed, instead using hash values computed therefrom to represent the password-related data.

Profile matching of buildings and urban structures

A method and apparatus for determining a building/urban profile image location includes extracting a building/urban profile from an obtained image and comparing the image to a database of building/urban profiles. The database may be created by obtaining point cloud data sets scanned building/urban profiles, converting the obtained point cloud data sets to a corresponding 3d surface model, and creating the database of stored building/urban profiles viewed from multiple locations within each of the 3d surface models.

Cloud-based estate management and execution

A system for cloud-based estate management and execution is disclosed. With this system, digital representations of estate asset documents, estate transactions documents, are securely uploaded into an estate vault server where they are securely kept, accessible only by persons predesignated by the estate holder.

Audible barcode system

A system using a mobile internet device with ability to scan a barcode in which a uniform resource locator (url) is placed, and plays a transmitted audio signal activated by the url in a cloud database where both audio and word contents are stored. From general information for direction, instruction and information on the bottle of medicine, nutrition facts and ingredient tables on the packages of food, monthly bills, invoices, menu, magazines, to advertisement—all are either possessed of limited language translation options or use small font to explain something in a limited space.

Systems and methods for automated analytics for security surveillance in operation areas

Systems and methods for cloud-based surveillance for an operation area are disclosed. At least two input capture devices, at least one safety control device and at least one user device are communicatively connected to a cloud-based analytics platform.

Cloud-based authentication of user devices for onboarding to a wi-fi network

cloud-based authentication is provided for additional user stations of a user once a trusted user station has been established. Responsive to a match in a common qr-code received from the trusted user station and a second user station, one or more access points associated with the user is identified.

Prefix search in encrypted text

A method enables prefix search of cloud stored encrypted files that are encrypted using an order preserving encryption (ope) algorithm. The encrypted text prefix search method generates a minimum possible plaintext string and a maximum possible plaintext string of the same character length including the search term as the prefix.

Hybrid approach to data governance

A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a connection with a remote data storage system associated with a remote file system over a wide-area network (wan).

Hybrid approach to data governance

A cloud-based data governance system includes a processing unit, a network adapter, and memory for storing data and code. The network adapter establishes a connection with a remote data storage system associated with a remote file system over a wide-area network (wan).

Securely processing range predicates on cloud databases

Methods, systems, and computer program products for securely processing range predicates on cloud databases are provided herein. A computer-implemented method includes separately encrypting a set of plain text data using two or more encryption functions, thereby producing an encrypted domain comprising at least two distinct groups of encrypted data items; converting a range query over plain text data items into a query over at least one of the distinct groups of encrypted data items; and combining results from the query over the distinct groups of encrypted data items, thereby generating a final encrypted result to the range query..

Software verification method and apparatus

A software verification method and apparatus are disclosed, applied to the cloud computing field and the communications field, and can be used to automatically verify whether an installation file of vnf software has been tampered with. The method includes: obtaining installation files of vnf software and signature files of the installation files, where the signature files of the installation files are used to store verification information of the installation files; verifying the installation files according to the signature files of the installation files; and determining, if the verification of the installation files succeeds, that the vnf software has not been tampered with..

Apparatus and monitoring patient use of medication

Certain aspects of the present disclosure provide a cloud-based platform for monitoring patient adherence to a medication regimen. A cloud-based platform to monitor and promote patient adherence, as described herein, may help enable various useful applications..

Presenting a trusted tag cloud

A method for presenting a trusted tag cloud to a user. The method includes associating a number of tags with a first user who applies the tags, calculating a weight of the tags being examined by a second user.

Customized and automated dynamic infographics

In embodiments of customized and automated dynamic infographics, an infographic template is received at a cloud-based service from a computing device, where a user at the computing device creates the infographic template in a graphics application to display data obtained from data sources. The cloud-based service assigns an identifier to associate the infographic template and the data sources of the data, and posts the infographic template making it available for cloud-based access by other computing devices that request to display the posted infographic template.

System and dynamic, encrypted searching

This disclosure relates to personalized and dynamic server-side searching techniques for encrypted data. Current so-called ‘zero-knowledge’ privacy systems (i.e., systems where the server has ‘zero-knowledge’ about the client data that it is storing) utilize servers that hold encrypted data without the decryption keys necessary to decrypt, index, and/or re-encrypt the data.

Cloud platform application-orientated service recommendation method, device, and system

A cloud platform application-orientated service recommendation method includes obtaining service status information of a cloud platform, and obtaining a target service type, where the target service type is a service type required by a target application, and the target application is an application that runs on the cloud platform and requires service recommendation. The method further includes obtaining, according to the service status information, a service that matches the target service type, and using the service as a to-be-recommended service..

Representation of an interactive document as a graph of entities

Techniques for representing and publishing an interactive document useful for analyzing data. The document may be represented as a directed acyclic graph of entities interconnected by edges.

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing

Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing are provided. A method includes associating at least one secure storage disk and at least one non-secure storage disk to a virtual disk, and associating the virtual disk to an application to allow access of the at least one secure storage disk and the at least one non-secure storage disk.

Policy based workload scaler

In one implementation, a system for policy based workload scaler includes a parameters engine to define external factors for a number of resources providing a number of cloud service workloads, a threshold engine to define a threshold value for the cloud service workloads from the number of resources, a priority engine to assign a priority to each of the number of cloud service workloads, and a service engine to reclaim resources from a first portion of cloud service workloads with a first priority and allocate the reclaimed resources to a second portion of cloud service workloads when the threshold value is exceeded and the external factors are exceeded.. .

Method for allocating communication path in cloudified network, apparatus, and system

A method of communication in a cloudified network, an apparatus, and a system, where the method includes receiving, by a software-defined networking (sdn) controller, a communication path request message from a policy management apparatus, allocating, by the sdn controller from a network resource managed by the sdn controller, a communication path meeting a bandwidth requirement and a quality of service (qos) requirement to both the communications nodes according to the address information of the different communications nodes, and the bandwidth requirement information and the qos requirement information of the communication path between the different communications nodes, and sending, by the sdn controller, a message carrying the communication path to a bearer network forwarding device.. .

Matching resources associated with a virtual machine to offered resources

A request to instantiate one or more virtual machines in a cloud may be received. The request may specify a service level agreement (sla).

Application deployment and monitoring in a cloud environment to satisfy integrity and geo-fencing constraints

Examples of techniques for deploying an application on a cloud environment satisfying integrity and geo-fencing constraints are disclosed herein. A computer implemented method may include: receiving a guest application for deployment on a cloud environment; receiving the integrity constraints on the integrity of each of the plurality of host where the application is to be deployed; receiving geo-fencing constraints identifying a geographic location where the guest application is to be deployed; determining for which of the plurality of hosts the integrity constraints and the geo-fencing constraints are satisfied; and deploying the guest application on at least one of the plurality of hosts that satisfy the integrity constraints and the geo-fencing constraints..

Mainframe to commodity computer data exchange

This invention solves many of the technological challenges to exchange information between ibm ebcdic mainframe computers (mainframe computers, mainframe) and commodity computers (ascii based pcs, computer servers, and the “cloud”) in a cost effective, timely and reliable manner.. .

Methods and systems for lidar point cloud anomalies

Systems and method are provided for controlling an autonomous vehicle. In one embodiment, a method for controlling an autonomous vehicle comprises obtaining lidar data from one or more lidar sensors disposed on the autonomous vehicle during operation of the autonomous vehicle, generating a lidar point cloud using the lidar data, making an initial determination, via a processor onboard the autonomous vehicle, of a possible lidar point cloud anomaly based on a comparison of the lidar point cloud with prior lidar point cloud information stored in memory, receiving a notification from a remote module as to whether the possible lidar point cloud anomaly is a confirmed lidar point cloud anomaly, and taking one or more vehicle actions when there is a confirmed lidar point cloud anomaly..

Detection unit and identifying and monitoring clouds in an observed area of the sky

A detecting assembly and method for identifying and tracking clouds in a zone of the sky being observed where some thermal-infrared flux emitted the zone is collected and transmitted to a thermal-infrared detector, the detector including a sensor sensitive to the flux in a set band of wavelengths, a measurement of the actual temperature and actual relative humidity of the air at ground level is carried out and the vertical temperature and water vapor distribution is deduced therefrom, the dataset relating to the thermal-infrared signal emitted by a reference sky for the vertical temperature and water vapor distribution is stimulated or obtained, the dataset thus simulated or obtained is subtracted from the dataset measured by the sensor to determine if clouds are present in the zone, and the dataset thus obtained is processed in order to compute the optical thickness and/or altitude of each cloud in the observation area.. .

Non-destructive detection charged particles without mass limitation

A non-destructive method for detecting charged particles, includes measuring a reference value of at least one physical parameter of an ion cloud confined in an ion trap; performing an injection of a sample in the ion cloud confined in the ion trap, the sample crossing the ion cloud and getting out the ion cloud without being trapped inside the ion trap; measuring a first experimental value of the at least one physical parameter of the ion cloud; and comparing the first experimental value with the reference value in order to determine the presence of at least one charged particle in the sample, or the absence of any charged particle in the sample.. .

Methods and systems for calibrating sensors

A method for calibrating sensors devices mounted on a machine is disclosed. The method includes transforming a first 3d point cloud to generate a transformed first 3d point cloud based on an alignment of the first 3d point cloud with a 3d model of the machine.

Pre-loading translated code in cloud based emulated applications

Pre-translated code for an emulated application may be retrieved and executed to translate data from the emulated application into a form compatible with the client device before receiving a request for the emulated application from the client device. The translated data may be delivered to the client device platform over a network after receiving the request for the emulated application from the client device.

Method and system for 3d online sports athletics

The present disclosure discloses a method and system for 3d online sports athletics. The system comprises a cloud server and several head-mounted devices having a virtual reality function, wherein each of the head-mounted devices is paired with an intelligent terminal having a step counting function; a 3d scene virtualizing unit of the head-mounted device virtualizing a 3d online sports athletics scene to display the virtualized objects of all the head-mounted device users that participate in the sports athletics; a wirelessly connecting unit, during the process of the sports athletics, wirelessly connecting the intelligent terminal that it is paired with and the cloud server; and a processing unit acquiring, in real time, step counting data of the intelligent terminal that it is paired with and uploading the step counting data to the cloud server, and acquiring the step counting data of other head-mounted devices from the cloud server, driving the 3d scene virtualizing unit to display online the step counting data of each of the head-mounted device users in its 3d online running athletics scene, to realize sports athletics where a plurality of persons are simultaneously online.

Wireless monitoring device

The present disclosure relates to a monitor and monitoring system suitable for attachment to the skin of a mammal, including a human. The monitor and monitoring system are designed for continuous wireless real-time measurement of physiological signals and transmission of the measurements through the cloud to a remote computer or mobile device..

System and millimeter wave communications

A method includes determining that a change is needed to a configuration of a user equipment (ue) centric cloud cell, where the determining is in accordance with measurement reports of beam-formed reference signals transmitted by mmwave tps of a measurement set, and when the change comprises a change to a modulation coding scheme (mcs) level of a communications link associated with the ue centric cloud cell, adjusting the mcs level of the communications link. The method includes when the change comprises at least one of a change to a communications beam or a mmwave tp change, sending a change query requesting the at least one of the change to the communications beam or the mmwave tp change, and receiving from a central controller a confirmation message.
Futurewei Technologies, Inc.

System and millimeter wave communications

A method includes measuring beam-formed reference signals transmitted by a plurality of mmwave transmission points (tps), sending a cloud cell formation request including indicators associated with best mmwave tps determined in accordance with the measured beam-formed reference signals, receiving a cloud cell formation request response including indicators associated with a subset of the best mmwave tps selected by a central controller in accordance with selection information, where the subset of the best mmwave tps includes a first mmwave transmission point (tp) serving as a master tp and a second mmwave tp serving as a slave tp, and establishing a cloud cell with mmwave tps of the subset of the best mmwave tps selected by the central controller, where a data connection is established with the slave tp and at least a control connection is established with the master tp.. .
Futurewei Technologies, Inc.

Systems and methods for cloud-based device configuration management of heterogeneous devices

The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems.
Dell Software, Inc.

Enterprise theater management system

Novel methods and systems for providing an enterprise theater management system are disclosed. A remote or cloud-based enterprise theater management system uses a ruleset to uniformly control theater playlist presentation for multiple theaters in either a point of sale controlled or fully autonomous manner, including the sequencing of theater cues with the playlist clips..
Dolby Laboratories Licensing Corporation

Optimal dynamic cloud network control

Various exemplary embodiments relate to a network node in a distributed dynamic cloud, the node including: a memory; and a processor configured to: observe a local queue backlog at the beginning of a timeslot, for each of a plurality of commodities; compute a processing utility weight for a first commodity based upon the local queue backlog of the first commodity, the local queue backlog of a second commodity, and a processing cost; where the second commodity may be the succeeding commodity in a service chain; compute an optimal commodity using the processing utility weights; wherein the optimal commodity is the commodity with the highest utility weight; assign the number of processing resource units allocated to the timeslot to zero when the processing utility weight of the optimal commodity is less than or equal to zero; and execute processing resource allocation and processing flow rate assignment decisions based upon the optimal commodity.. .
Alcatel-lucent Usa, Inc.

Synchronizing head-worn computers

Aspects of the present disclosure relate to synchronizing presentation of content in head-worn computing systems including linking the multiple users to the same access point in the cloud, the users indicating to the cloud that they would like to participate in a synchronized experience of the content and identifying, by the cloud, how many head-worn computers will be included in the synchronized experience of the content. The method further includes downloading the content to the multiple head-worn computers from the cloud, polling the multiple head-worn computers to determine the percentage of the content that has been downloaded to each of multiple head-worn computers, and when all of the multiple head-worn computers has exceeded a predetermined percentage of content that has been downloaded, sending a start command from the cloud to each of the head-worn computers simultaneously to begin a synchronized presentation of the content to all of the multiple users..
Osterhout Group, Inc.

Using a shared data store for peer discovery

An example method includes: identifying, by a new node, an address of a shared data store comprising information on a current membership in a peer-to-peer system, wherein the shared data store is shared by a plurality of nodes that are current members of the peer-to-peer system, wherein the shared data store is a container for storing data in a storage cloud; sending, by the new node, a first message comprising an address of the new node to the shared data store; requesting, by the new node, at least one membership data structure from the shared data store; receiving, by the new node, a second message comprising the at least one membership data structure; generating, by the new node, a new membership data structure comprising the address of the new node and the plurality of addresses for the plurality of nodes identified in the at least one membership data structure; sending, by the new node, a third message comprising the new membership data structure to the shared data store; and joining, by the new node, the peer-to-peer system, wherein the joining comprises using the new membership data structure to identify nodes of the plurality of nodes to receive a plurality of messages from the new node.. .
Red Hat, Inc.

Collaborator network creation using cloud-based metadata

Systems for managing user collaboration over objects stored on a cloud-based service platform. A server in a cloud-based platform maintains a set of read/write metadata that is associated in one-to-one correspondence to stored objects that are accessible by two or more collaborators.
Box, Inc.

Techniques for cloud security monitoring and threat intelligence

Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy..
Oracle International Corporation

Security management in a networked computing environment

An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications.
International Business Machines Corporation

Activity based access control in heterogeneous environments

A method, a system and/or an apparatus of activity based access control in heterogeneous information technology infrastructure is disclosed. The infrastructure security server authenticates that a user is authorized to access a set of heterogeneous cloud-based services using at least one heterogeneous authorization system.

Aggregator technology without usernames and passwords

Techniques are described in which to access a user's web applications, the user registers and signs on to an aggregator system using any supported login identity provider username and password. When the user registers for the first time, the system collects additional information to verify the user for a subsequent access to the system.
Avatier Corporation

Cloud-based authentication keyboard

Aspects of the subject disclosure may include, for example a method that includes detecting, by a system comprising a processor, a password creation request, obtaining, by the system, an identification of a password requesting application associated with the password creation request, receiving, by the system, an input password, obtaining, by the system, a transformation key for the input password, transforming, by the system, the input password into an adjusted password by applying the transformation key to the input password, and providing, by the system, the adjusted password to the password requesting application. Other embodiments are disclosed..
At&t Intellectual Property I, Lp

Three-tiered security and computational architecture

A computing system, method, and storage medium prevent denial of provision of a network service by a server computer to an authorized client device. The computing system receives network service data that include a credential, then transmits that credential to a cloud-based identity system.
Inferspect, Llc

Cloud based manual discovery of devices in a device management environment

Manual discovery of devices in a device management environment can be performed from a management server. The manual discovery process can enable the discovery process to be initiated at the management server and can be performed without requiring an administrator or other user to manually configure each device to initiate and perform the discovery process.
Wyse Technology L.l.c.

Security camera system

A monitoring system includes a first camera having a housing and an image sensor positioned in or on the housing and designed to detect image data corresponding to an environment of the first camera. The camera further includes a camera network access device positioned in the housing and designed to wirelessly transmit the image data.
Superior Communications, Inc.

Trainable transceiver and cloud computing system architecture systems and methods

A system for installation in a vehicle and for controlling a device, the system including a trainable transceiver, communications electronics, and a processing circuit coupled to the trainable transceiver and the communications electronics. The processing circuit is configured to train the trainable transceiver to control a device using information received from a cloud computing system remote from the device and vehicle via the communications electronics..
Gentex Corporation

Method and generating road surface, processing point cloud data, computer program, and computer readable recording medium

Provided herein is a method for generating a road surface. The method for generating a road surface includes: obtaining a view height of a laser scanner used in an operation process through a mobile mapping system (mms); determining a reference height on the basis of the obtained view height and a height measured by a global positioning system (gps); extracting point cloud data positioned in a predetermined height range from the determined reference height among point cloud data obtained in the mobile mapping system; and generating the road surface on the basis of the extracted point cloud data..
Thinkware Corporation

Dynamically provisioning and scaling graphic processing units for data analytic workloads in a hardware cloud

Server resources in a data center are disaggregated into shared server resource pools, including a graphics processing unit (gpu) pool. Servers are constructed dynamically, on-demand and based on workload requirements, by allocating from these resource pools.
International Business Machines Corporation

Method and system for managing and displaying product images with progressive resolution display

A method and system displaying and managing images of consumer products with cloud computing. One or more consumer products are selected.

Smart refrigerator

The present disclosure illustrates a smart refrigerator including a user interface, a recipe management module, a storage management module and an order management module. The user interface is configured to input an ordering instruction.
Probe Jet Tech

Real time multi dimensional image fusing

Within examples, systems and methods of generating a synthetic image representative of an environment of a vehicle are described comprising generating a first image using infrared information from an infrared (ir) camera, generating a second image using laser point cloud data from a lidar, generating an embedded point cloud representative of the environment based on a combination of the first image and the second image, receiving navigation information traversed by the vehicle, transforming the embedded point cloud into a geo-referenced coordinate space based on the navigation information, and combining the transformed embedded point cloud with imagery of terrain of the environment to generate the synthetic image representative of the environment of the vehicle.. .
The Boeing Company

Method and a mobile device based cluster computing infrastructure

A mobile computing apparatus including a processor coupled to a wireless communications interface, wherein the processor is configured to execute an init process, wherein the init process comprises a container manager. The processor creates, using the container manager, a plurality of secure containers and executes, in a first secure container of the plurality of secure containers, a first mobile device process.
Huawei Technologies Co., Ltd.

Case-based reasoning in the cloud using deep learning

In order to compare high-dimensional, multi-modal data for a patient to data for other patients, deep learning is used to encode original, multi-modal data for a patient into a compact signature. The compact signature is compared to predetermined compact signatures generated for other patients, and similar predetermined compact signatures are identified based on the comparison.

System and remote pathology consultation data transfer and storage

A synchronized data processing system and method are provided for remote pathology consultation to address performance issues caused by resources conflicts between upload from referral sources and online image browsing by consultants when the two are geographically distant (e.g., in china and the united states). The system includes two parts—a local end that is in close geographic proximity to referral sources and a remote end that is in close geographic proximity to referral sources consultants.
Bingsheng Technology (wuhan) Co., Ltd.

Systems, methods and software for ranking potential geroprotective drugs

The present invention provides improved systems, methods and software for determining a pathway activation strength in old subjects relative to young subjects of the same species, the method including collecting young subject transcriptome data and old subject transcriptome data for one species to evaluate pathway activation strength (pas) and down-regulation strength for a plurality of biological pathways, mapping the plurality of biological pathways for the activation strength and down-regulation strength from old subject samples relative to young subject samples to form a pathway cloud map and providing a gero-protective rating for each of a plurality of drugs in accordance with a drug rating for minimizing signaling pathway cloud disturbance (spcd) in the pathway cloud map of the one species to provide a ranking of the gero-protective drugs.. .
Insilico Medicine, Inc.

Managing persistent database result sets

A method, system, and apparatus for managing a persistent query result set are disclosed. A resource manager is disclosed that receives a query from a client over a computer network.
Snowflake Computing, Inc.

Method and system that extends a private data center to encompass infrastructure allocated from a remote cloud-computing facility

The current document is directed to methods and systems that extend cloud-management-facility management from a private data center to infrastructure provided by a remote cloud-computing facility. A remote cloud-management-facility agent is installed within the remote cloud-computing facility to mediate exchange of control and information messages between the cloud-management facility within the private data center and virtual machines executing within the remote cloud-computing facility.
Vmware, Inc.

Learning system for efficient sun-blinds control

A sun blinds system for light conditions control in a room or space. The space or room with one or more windows may have a set of sun blinds that have a position to cover the whole or part of the window to prevent to an extent, as desired by an occupant or occupants, sunlight from entering the space.
Honeywell International Inc.

Sunlight intensity or cloud detection with variable distance sensing

Certain aspects pertain to a cloud detector comprising a first detector module directed to a first region of the sky and a second detector module directed to a second region of the sky. Each detector module has a tube enclosing one or more sensing elements.
View, Inc.

Wearable lifetime personal high sensitivity and wide-dynamic range measurement real-time radiation exposure measurement and cancer risk management due to harmful radiation in all environments

A dynamic, wearable low-cost, personal high-sensitivity and wide-dynamic range measurement apparatus and method provide an accurate, objective and independent device for the real-time measurement and monitoring of an individual's career or lifetime exposure to known and unknown sources of harmful ionizing radiation, for real-time radiation exposure monitoring, overexposure warning and cancer risk management due to harmful radiation in all ambient environments. The measurement apparatus and method are wirelessly interfaced to a smartphone/controller or other host computer which provide a verification device to prevent an unauthorized use, a device to time-stamp and permanently data-log measured location based data using a smartphone/gps data, and a device to predict and warn the individual when dangerous levels are actually approached, or will likely be approached or exceeded over the entire career or lifetime of the individual, and provide an access device for real-time estimates of the individual's risk of developing cancer or other threatening disease.

Sea state estimation

A method for measuring sea state includes scanning an area of a waterborne moving object over a period of time using at least one sensor to obtain point cloud data of the moving object. The area of the moving object is identified based on the point cloud data.
Sikorsky Aircraft Corporation

Power management via coordination and selective operation of timer-related tasks

Mobile computing device power consumption can be reduced by using expiration window timers, state-based timers and/or the coordination of keep-alive timers. A mobile computing device can execute tasks associated with multiple keep-alive timers used for maintaining communication links between the device and cloud-based service providers in a single active state.
Microsoft Technology Licensing, Llc

Method and system for handling a traffic flow between local service clouds

A method in a network node for handling a traffic flow of a user equipment, ue. The network node creates a unique network address translated, nat:ed, internet protocol, ip, address mapping to an ip address of the ue.
Telefonaktiebolaget Lm Ericsson (publ)

Geographically based access management for internet of things device data

The proliferation of iot devices has led to an increase in sensitive, cloud-stored data. To provide further protection, iot device data may be secured by geographically based access controls as a supplement to or in place of traditional password protection.
Ca, Inc.

System, methods and devices for secure data storage with wireless authentication

A secure data storage device with wireless authentication is provided. The described data storage device is wirelessly unlocked using another wireless device.
Green Tree Labs Inc.

Gis based compression and reconstruction of gps data for transmission from a vehicular edge platform to the cloud

Example implementations described herein are directed to a system involving a cloud architecture and an edge architecture associated with one or more vehicles. The edge architecture can involve devices associated with the one or more vehicles and can conduct edge processing to determine, from global positioning satellite (gps) information, a proximity of the first apparatus to a first geographic information system (gis) waypoint relative to a second gis waypoint, generate index information representative of the proximity of the apparatus to the first gis waypoint relative to the second gis waypoint; and transmit the index information to the cloud architecture..
Hitachi Ltd.

Hearing device and monitoring system thereof

A system for monitoring the status and/or performance of one or more hearing devices is disclosed. The system comprises a number of access points configured to receive wireless signals transmitted by the hearing devices, wherein the access points are connected to a central unit communicatively connected to the internet/cloud, wherein the system is configured to automatically monitor the status and/or performance of one or more parameter of the one or more hearing devices received by access points, wherein the monitored parameters are accessible from the central unit and/or from a cloud service..
Oticon A/s

Method for positioning video, terminal apparatus and cloud server

Disclosed is a method for positioning a video, a terminal apparatus and a cloud server, including acquiring user's impression data associated with a playback progress of a video, and positioning the content of the video based on the acquired user's impression data.. .
Samsung Electronics Co., Ltd.

Camera cloud recording

Systems and methods for dynamic communication and control of devices associated with a premises are disclosed. The systems and methods may include a device such as a camera that may be configured via configuration service to capture video of a premises and to transmit segments of the captured video having a pre-determined length of time to a video service.
Comcast Cable Communications, Llc

Live broadcast delaying method and apparatus

The disclosure discloses a live broadcast delaying method and apparatus, the method including: receiving live streaming media transmitted on the spot; segmenting the live streaming media into segmented files at a preset length of time; if a live broadcast delay instruction is received, then obtaining a delay period of time indicated by the live broadcast delay instruction; calculating a play start point of time from the current system time and the delay period of time; searching for one of the segmented files corresponding to the play start point of time, and downloading the segmented file searched to a cloud encoder; encoding the segmented file downloaded in the cloud encoder into delayed live streaming media; and transmitting the delayed live streaming media to a streaming media server, so that the live broadcast can be delayed without any additional costly delay device to thereby lower a cost of delaying the live broadcast.. .
Le Cloud Computing Co., Ltd.

Multitenant video intercom door station

A wireless, multitenant video intercom door station is provided, along with methods for operating same. A common door station may be installed near a property entry door.
Bird Home Automation Gmbh

Device locator disable authentication

A device locator mode or find my device (fmd) mode can allow a lost, stolen, or misplaced mobile device to be located. The fmd mode can be enabled or disabled on a mobile device.
Apple Inc.

Implementing logical endpoints in internet-enabled devices

A method for handling communication in a lan environment between an endpoint (30) supporting standard messages and an internet-enabled device (10) supporting device-native messages, the method characterized by communicating the internet-enabled device (10) with a cloud service (20) configured to translate the standard messages into device-native messages and the device-native messages to the standard messages.. .
Advanced Digital Broadcast S.a.

Cloud system for controlling outdoor grill with mobile application

Embodiments are directed to communicating with and controlling operation of electronically-controlled appliances. In one scenario, a computer system receives a first input from a computing system indicating that an electronically-controlled appliance is permitted to communicate with a cloud computing platform.
Traeger Pellet Grills, Llc

Wall clock with clock face as a display for displaying information from a plurality of devices in the internet of things

Proposed is a device associated with the internet of things (iot) in the form of a wall clock having a clock face as a full-color led display with a translucent cover. The clock enclosure contains a clock mechanism and a built-in speaker.

Cloud tabs

The presently disclosed techniques related to data transfer and synchronization between multiple electronic devices. The multiple electronic devices may be logged onto a user's account with a cloud computing service so that they may transfer data relating to websites that they have accessed to the cloud computing service so that such data may be synchronized amongst the multiple electronic devices.
Apple Inc.

Cloud operating system and method

A cloud operating system (cos) and a computer system and method using the cloud operating system to perform electronic data interchange transfers of documents, converted as needed to file formats usable by receiving entities. The cos is configured to operate on a plurality of machines including an external computer system hosting a single server component and a database system-wide critical state/counter tables, and one or more server clusters interacting with the server component and state/counter database.
Task Performance Group, Inc.

Adaptive internet of things edge device security

In an example, there is disclosed an apparatus, including: a network interface to communicatively couple to an internet of thing (iot) having at least one edge device; a gateway engine to provide gateway services to one or more edge devices via the network interface; and one or more logic devices, including at least one hardware logic device, providing an adaptive security engine to: compile a periodic device interaction summary (dis) for the edge device; send the dis to a cloud service; receive from the cloud service a dis signature for the edge device; determine that one or more interactions from the edge device are suspicious; and act on the determining.. .
Intel Corporation

Cloud-based communication account security

A request is received over a network to resolve a problem relating to a networked user device. The request is accepted in order to provide user service.
At&t Intellectual Property I, L.p.

Establishing a cleanroom data processing environment

Techniques for providing a virtual cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud environment is configured to prevent data from being sent to network locations external to the virtual private cloud environment.
Oracle International Corporation

System and securing authentication information in a networked environment

This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user.
Sailpoint Technologies, Inc.

Enforcing data security in a cleanroom data processing envrionment

Techniques for enforcing data security in a cleanroom data processing environment are described herein. In one or more embodiments, a virtual private cloud environment stores a first set of data provided by a first user account and a second set of data provided by a second user account, where the first user account is associated with a first set of one or more security credentials and the second user account is associated with a second set of security credentials and where the first user account is prevented from accessing at least the second set of data and the second user account is prevented from accessing at least the first set of data.
Oracle International Corporation

Model driven process for automated deployment of domain 2.0 virtualized services and applications on cloud infrastructure

A model-driven system automatically deploys a virtualized service, including multiple service components, on a distributed cloud infrastructure. A master service orchestrator causes a cloud platform orchestrator to retrieve a cloud services archive file, extract a cloud resource configuration template and create cloud resources at appropriate data centers as specified.
At&t Intellectual Property I, L.p.

Container-based mobile code offloading support system in cloud environment and offloading method thereof

The present invention discloses a container-based mobile code offloading support system in a cloud environment and the offloading method thereof, comprising a front-end processing layer, a runtime layer and a back-end resource layer. The front-end processing layer is responsible for responding to an arrived request and managing a status of a container, which is realized by a request distribution module, a code caching module and a monitoring and scheduling module; the runtime layer provides the same execution environment as that of a terminal, which is realized by a runtime module consisted of a plurality of mobile cloud containers; and the back-end resource layer solves incompatibility of a cloud platform with an mobile terminal environment and provides underlying resource support for a runtime, which is realized by a resource sharing module and an extended kernel module within a host operating system.
Huazhong University Of Science And Technology

Technologies for deploying dynamic underlay networks in cloud computing infrastructures

Technologies for deploying dynamic underlay networks in a cloud computing infrastructure include a network controller of the cloud computing infrastructure communicatively coupled via disaggregated switches to one or more compute nodes of the cloud computing infrastructure. The network controller is configured to receive tenant network creation requests from a cloud operating system (os) of the cloud computing infrastructure indicating that a tenant network is to be created in the cloud computing infrastructure (e.g., for a new tenant of the cloud computing infrastructure).





Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Cloud for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cloud with additional patents listed. Browse our RSS directory or Search for other possible listings.


1.4626

file did exist - 10780

1 - 1 - 251