Follow us on Twitter
twitter icon@FreshPatents


Hosting patents

      

This page is updated frequently with new Hosting-related patent applications.




 Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space patent thumbnailPolicy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space
An information handling system includes a method for executing instructions for a content sharing system executing role-based policy settings for a plurality of remotely connected computing devices operatively connected to share content, detecting pre-paired wireless connectivity of remotely connected computing devices to a system hosting the content sharing system, implementing role-based policy settings to partially limit content sharing system operation based on a device role classification for the at least one of the plurality of remotely connected computing devices, auto-initiating navigation accessibility to the pre-paired remotely connected computing device via the content sharing system, and displaying a content sharing system desktop comprising a plurality of device environment-representative windows representing at least two of the plurality of remotely connected computing devices that devices function via different operating systems.. .
Dell Products, Lp


 Method and  advanced statistics collection patent thumbnailMethod and advanced statistics collection
Systems, methods, and computer-readable media provide for collection of statistics relating to network traffic between virtual machines (vms) in a network. In an example embodiment, a virtual switch hosted on a physical server provides network address information of vms deployed on the physical server to a virtual switch controller.
Cisco Technology, Inc.


 Creating host-level application-consistent backups of virtual machines patent thumbnailCreating host-level application-consistent backups of virtual machines
A host server hosting one or more virtual machines can back up host volumes and the one or more virtual machines installed thereon in an application-consistent manner. In one implementation, a host-level requestor instructs a host-level writer to identify which virtual machines qualify for application-consistent backups.
Microsoft Technology Licensing, Llc


 Distributed lock-free rdma-based memory allocation and de-allocation patent thumbnailDistributed lock-free rdma-based memory allocation and de-allocation
An “rdma-based memory allocator” applies remote direct memory access (rdma) messaging to provide fast lock-free memory allocations and de-allocations for shared memory distributed across multiple servers in an rdma-based network. Alternately, in various implementations, the rdma-based memory allocator combines rdma messaging and remote procedure call (rpc) requests to provide fast lock-free memory allocations and de-allocations for shared memory distributed across multiple servers in an rdma-based network.
Microsoft Technology Licensing, Llc


 Standardized hot-pluggable transceiving unit with control plane functionalities patent thumbnailStandardized hot-pluggable transceiving unit with control plane functionalities
A standardized hot-pluggable transceiving unit comprising a housing, a connector and a processing unit. The housing has specific standardized dimensions and can be inserted into a chassis of a hosting unit.
Embrionix Design Inc.


 Interchangeable i/o modules with individual and shared personalities patent thumbnailInterchangeable i/o modules with individual and shared personalities
Methods and systems for connecting interchangeable input/output (i/o) modules having individual and shared personalities may include a generic i/o bay of a server hosting one or more compute nodes configured to be connected to one or more removable i/o modules. A first connector coupled to a first i/o module may connect the first i/o module to a compute node having a second connector.
Dell Products, L.p.


 Manufacturing  phthalocyanine crystal patent thumbnailManufacturing phthalocyanine crystal
The present invention provides: an electrophotographic photosensitive member which reduces image defects due to ghosting not only under a normal temperature and normal humidity environment but also even under a low temperature and low humidity environment; and a novel phthalocyanine crystal. The electrophotographic photosensitive member of the present invention comprises a photosensitive layer which comprises a phthalocyanine crystal in which a n,n-dimethylformamide is contained.
Canon Kabushiki Kaisha


 Highly interactive fantasy sports interleaver patent thumbnailHighly interactive fantasy sports interleaver
A fantasy sports interleaver may include a video segmenting device to create a plurality of video clips, a clip annotator to associate each of the plurality of video clips with at least one of achievement of an athlete, and an interleaver to associate and transmit at least some of the plurality of video clips to each of a plurality of users. The interleaver may interface with a fantasy sports platform hosting the fantasy team of the user, as well as incoming audio/video feeds from content providers, and content feeds from advertisers.

 Virtual hosting device and service to provide software-defined networks in a cloud environment patent thumbnailVirtual hosting device and service to provide software-defined networks in a cloud environment
A hosting system to facilitate a customer of an operator of the system to connect to a cloud provider, the system including: a first cloud exchange co-located with and connected to first cloud provider equipment; a second cloud exchange co-located with and connected to second cloud provider equipment, wherein the first cloud provider equipment and the second cloud provider equipment are of a same cloud provider but at different geographically spaced locations or the first cloud provider equipment is of a different cloud provider than that of the second cloud provider equipment, and wherein the first cloud exchange is connected to the second cloud exchange; and a non-transitory computer readable medium including computer program instructions, the instructions configured to facilitate the configuration of a software-defined network including the first cloud exchange and/or second cloud exchange, wherein the network connects the customer to the first cloud provider equipment and/or the second cloud provider equipment.. .
Nuvem Networks, Inc.


 Small cell application platform patent thumbnailSmall cell application platform
An example method includes providing small cell computing resources as a service, wherein a base station in the small cell is co-located with an edge computing device providing the small cell computing resources. The method may further include hosting an application on the small cell computing resources of the edge computing device, the application accessible to a mobile device in the small cell..
Qualcomm Incorporated


System and predictive live interaction offering and hosting

A system and method are presented for predictive live interaction offering and hosting. A mechanism may be provided for controlling outstanding offerings, or invitations, of communications with users through points of service.
Interactive Intelligence Group, Inc.

Systems and methods for a social networking platform

Systems and methods for hosting and/or interacting with a social network use a set of postings. Individual postings include a question and may include a set of selectable answers to the question.
Speakbeat Mobile Application, Inc.

Action execution architecture for virtualized technical components

Cloud computing technical components are provisioned into many different service platforms provided by many different service providers. Once provisioned, it is often the case that actions need to be performed against the technical components.
Accenture Global Services Limited

Method, device, and system for access control of a cloud hosting service

Embodiments of the present application relate to a method and device for access control of a cloud hosting service. The method includes receiving a first authentication request from a client, performing a first authentication of the first account information, in the event that the first authentication is successful, generating an authentication password and communicating the authentication password to the client, receiving a second authentication request from a proxy server, wherein the second authentication request comprises the authentication password transmitted to the proxy server by the client, performing a second authentication of the authentication password and causing the proxy server to request the cloud host to perform a third authentication of second account information, and in the event that the third authentication is successful, causing the client to access one or more service resources deployed on the cloud host via the proxy server..
Alibaba Group Holding Limited

Method and sve redundancy

Systems and methods for providing service virtualization endpoint (sve) redundancy in a two-node, active-standby form. An active-standby pair of sves register with a cloud-centric-network control point (ccn-cp) as a single service node (sn) using a virtual ip address for both a control-plane and a data-plane.
Cisco Technology, Inc.

Computerized formatted transcription of multimedia content

Disclosed are systems and methods for improving interactions with and between computers in content searching, generating, hosting and/or providing systems supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data within or across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems.
Yahoo! Inc.

Automated media rights detection

Systems and methods for determining if media files being submitted to a hosting site contain media to which another has rights and informing a submitter of the potential media rights conflict without first divulging such information to a potential third party rights holder. Upon submission, if the media contains material to which another has rights, the submitter will be informed which portion of the submitted media file is infringing and given the opportunity to submit a modified media file.
Google Inc.

Web-based programming environment for embedded devices

A programming environment and a simple programming language that runs on ethernet block-input/output (block-io) devices and hosting servers. In some embodiments, the argee™ system includes a web-based programming environment that compiles a gui program into a bytecode program of a virtual machine; and the virtual machine that runs in the device firmware and executes the bytecode program representing the gui program created by a user.
Turk, Inc.

Data profiler

One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information.
Netapp Inc.

Control program for accessing browser data and for controlling appliance

A localhost computer is network connectable with a website-hosting server, and is for use with an appliance. The localhost computer includes a localhost processor assembly and a non-transitory processor-readable localhost memory tangibly embodying a browser-assigned storage section, a browser application, and a control program.

Systems and methods for deploying applications

Systems and methods for remotely hosting applications are disclosed. A remote server receives files of a software application from an uploading user.
Otoy, Inc.

Securing service control on third party hardware

Techniques for hosting components of provider services within secure execution environments are described herein. Information associated with a request received at a control plane of a service is received at a secure execution environment and, based at least in part on that information, one or more tasks is determined that may be performed to respond to the request.
Amazon Technologies, Inc.

Data sharing system method

A novel architecture for a data sharing system (dss) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions.

Making and adjusting advertiser bids based on call center occupancy

An advertising system receives an advertisement from a merchant system and receives data from a call center associated with the merchant system and with the advertisement. The advertising system determines a call center occupancy at the merchant system call center.
Google Inc.

Method and system for providing information to a mobile handheld device from a database system

A method for providing information to a mobile handheld device from a database system is provided. The method embodiment includes receiving by a node hosting an information management service a request for data.
Salesforce.com, Inc.

System and determining relevance of application software maintenance

A method, computer program product, and computer system for compiling, by a computing device, a list of hosting software classes included in the hosting software fix pack when a fix is available. An execution path of each application hosted on a hosting software may be recorded.
International Business Machines Corporation

Multi-layer qos management in a distributed computing environment

A system for multi-layer quality of service (qos) management in a distributed computing environment includes a management node hosting a workload scheduler operable to receive a workload and identify a workload qos class for the workload. The system also includes a plurality of distributed compute nodes.
International Business Machines Corporation

Accessing a device on a remote machine

Disclosed is a method that may include hosting, by a virtual machine manager of a local machine, a virtual machine having a device driver. The method may include obtaining, by the virtual machine manager, from a stub driver on the remote machine, information about the i/o device on the remote machine.
Intel Corporation

Selectively performing man in the middle decryption

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selectively performing man in the middle decryption. One of the methods includes receiving a first request to access a first resource hosted by a server outside the network, determining whether requests from the client device to access the first resource outside the network should be redirected to a second resource hosted by a proxy within the network, providing a redirect response to the client device, the redirect response including the second universal resource identifier, establishing a first encrypted connected between the client device and the proxy hosting the second resource, and a second encrypted connection between the proxy hosting the second domain and the server hosting the first resource, and decrypting and inspecting the encrypted communication traffic passing between the client device and the server hosting the first resource..
Iboss, Inc.

Availability management for reference data services

Various aspects for scaling an availability of information are disclosed. In one aspect, a response performance associated with responding to data consumption requests is monitored.
Microsoft Technology Licensing, Llc

Distributed application hosting environment to mask heterogeneity

In one embodiment, a device in a network receives data from one or more other devices in the network via one or more protocol adaptors. The device transforms the received data into a common data model.
Cisco Technology, Inc.

Function disabler device and system

A function disabler system includes a personal electronic device having at least one component such as a camera, and a processor having pulsed light communication software enabling receipt and transmission of pulsed light communication signals. The processor additionally includes a hosting customer software application, where the personal electronic device receives at least one pulsed light communication signal within a designated area and the pulsed light communication signal includes an instruction signal which instructs the hosting customer software application to disable the at least one component when the personal electronic device is positioned in the designated area..
Federal Law Enforcement Development Services, Inc.

Provisioning a target hosting environment

A method for dynamically provisioning a target platform to host an application with one or more application program interfaces (apis) is provided. The method determines whether one or more apis are supported on one or more of at least two hosting platforms and whether one or more instructions for the application are permitted to be executed on the one or more of the hosting platforms, and executes the one or more instructions for the application on a supported and permissible platform having the lowest performance metric for running the application..
International Business Machines Corporation

Computerized automated determination of high quality digital content

Disclosed are systems and methods for improving interactions with and between computers in a content generating, hosting and/or providing system supported by or configured with personal computing devices, servers and/or platforms. The systems interact to identify and retrieve data across platforms, which can be used to improve the quality of data used in processing interactions between or among processors in such systems.
Yahoo! Inc.

Computerized determining obstructed portions of displayed digital content

Disclosed are systems and methods for improving interactions with and between computers in content communicating, rendering, generating, hosting and/or providing systems supported by or configured with computing devices, servers and/or platforms. The systems interact to improve the quality of data used in processing interactions between or among processors in such systems for determining obscured portions of displayed digital content.
Al Ibaba Group Holding Limited

Leveraging a unification of content hosting and social networking

Content hosting architectures and/or social networking architectures can be improved by, e.g., unifying the two architectures to some extent. Services or features from both can be leveraged to provide an ecosystem that can be superior or preferred by users or consumers.
Google Inc.

Integrated data mining system architecture for extraction, processing and consumption of user data for customizing search engine output and other applications

The present invention discloses several embodiments of data mining architectures. Data mining architectures have components such as secure cloud servers hosting data warehouses, data modelers, analytics engines, and query engines.

Pool data storage system & method

Disclosed herein is a system that includes a server hosting a pool data receiving and storage service. The system further includes a database in communication with the server.

System and reconstructing ghost-free images from data acquired using simultaneous multislice magnetic resonance imaging

Systems and methods for combined ghost artifact correction and parallel imaging reconstruction of simultaneous multislice (“sms”) magnetic resonance imaging (“mri”) data are provided. Dual-polarity training data are used to generate ghost-free slice data, which are used as target data in a reconstruction kernel training process.
Brigham And Women's Hospital, Inc.

Secure document storage system

A system is provided for the storage of data, the system having: an encrypted host platform disposed in a specific territory and upon which export controlled data is stored; a controller configured to allow a primary user to set permission settings and identify authorized end users and degrees of access granted to each the authorized end user, the authorized end user being pre-cleared for compliance with export controls pertaining to the export controlled data; the controller configured to permit access to the encrypted host platform only if the host platform is located within a specific territory and if the hosting platform is in compliance with predefined data security protocols the controller configured to allow the authorized end user access to the export controlled data, and the controller configured to exclude access to both a provider of the system for storage and a system host platform provider; at least one individual computing device accessible by at least one the authorized end user, disposed within an authorized territory, the individual computing device configured to provide authorized end user identification data to the controller and receive permissions from the controller for access to the host platform; and the host platform only communicates with individual user devices if the devices have received permission from the controller.. .
Regdox Solutions Inc.

Data management in a disttributed computing environment

A method for managing data in a distributed computing environment comprises receiving, on a message bus, a request to communicate data between a first system hosting data and a second system accessing data, referencing a policy defining rules for sharing data between the first system and the second system, compiling, based on the policy, a message indicating subscribers to receive the data to publish, and publishing, on the message bus, the compiled message.. .
Hewlett Packard Enterprise Development Lp

Keyboard

A keyboard includes plural keys, a membrane key switch module and plural diodes. The plural diodes are disposed on the membrane key switch module, and electrically connected with plural upper contacts or plural lower contacts of the membrane key switch module.
Primax Electronics Ltd.

Matching and displaying advertisements to website visitors

A registrant may register a domain name with a registrar. A domain name industry may be determined based on one or more keywords parsed from the domain name.
Go Daddy Operating Company, Llc

System and automated testing of processor-based surveys

In one embodiment, a testing server-implemented method for automated testing of a processor-based survey. The method includes: (a) the testing server receiving from a survey tester, via a testing user interface, a uniform resource locator (url) of a survey residing on a survey hosting server, the survey hosting server having a processor adapted to administer, via a survey-taking interface, the survey to obtain survey data from survey-taking users; (b) the testing server traversing at least a portion of the survey; (c) the testing server analyzing the survey to generate one or more test results; and (d) the testing server providing the one or more test results to the survey tester via the testing user interface.
Survey Sampling International, Llc

Systems and methods for addressing a media database using distance associative hashing

A system, method and computer program utilize a distance associative hashing algorithmic means to provide a highly efficient means to rapidly address a large database. The indexing means can be readily subdivided into a plurality of independently-addressable segments where each such segment can address a portion of related data of the database where the subdivided indexes of said portions reside entirely in the main memory of each of a multiplicity of server means.
Vizio Inscape Technologies, Llc

Systems and methods for addressing a media database using distance associative hashing

A system, method and computer program utilize a distance associative hashing algorithmic means to provide a highly efficient means to rapidly address a large database. The indexing means can be readily subdivided into a plurality of independently-addressable segments where each such segment can address a portion of related data of the database where the subdivided indexes of said portions reside entirely in the main memory of each of a multiplicity of server means.
Vizio Inscape Technologies, Llc

Internet service provider management platform

Some embodiments include an internet service provider (isp) system capable of delegating network policy configuration tasks to isp franchisee accounts. For example, the isp system can establish, via a backhaul channel, a network tunnel from an access point hosting a local area network (lan) to a gateway server connected to a wide area network (wan).
Facebook, Inc.

Method and system for tracking and rewarding selectable individualized user menu/recipe/consumer product combinations

A system and method are provided for uniquely automating and otherwise gamifying a user selection of a particular “recipe” for user-chosen ingredients for a particular beverage or meal (salad, sandwich or the like), and more broadly to any category of consumer goods that may include a menu of user-selectable randomization or customization accessories, with an objective of attracting high levels of potential consumer and/or customer traffic to a particular brand that incorporates the disclosed gaming schemes. The disclosed schemes simplify hosting of, and participation in, a unique implementation of a particular automated game to stimulate customer and/or consumer interest by rewarding unique combinations of user-selected features for customizable products..

Method and hosting a multitasking guest on a host system

Method for hosting a multitasking guest on a host system, wherein the guest is allocated a periodic execution server and a deferrable execution server associated with a partition of the system, event-driven tasks of the guest are assigned to the deferrable execution server, time-driven tasks of the guest are assigned to the periodic execution server, a hypervisor of the execution servers is assigned to a first priority group of the system, the deferrable execution server is assigned to a second priority group of the system, the periodic execution server is assigned to a third priority group of the system, and a preemptive task scheduler maintains a descending priority order among the priority groups while the execution servers execute the tasks concurrently.. .
Robert Bosch Gmbh

Background task management

One or more systems and/or techniques are provided for background task management. A background manager may receive a notification from a background task that the background task is waiting for an event, and may also receive a waitable object from the background task, where the waitable object is used by the background task to wait for the event.
Microsoft Technology Licensing, Llc

Mitigation of impact of intermittent storage unavailability on virtual machines

A virtual machine hosting environment executing on a physical machine is operable to instantiate a virtual machine that is capable of initiating i/o operations directed to a remote storage. The virtual machine hosting environment is operable to determine when an unavailability condition exists with respect to the remote storage and when such unavailability condition no longer exists.
Microsoft Technology Licensing, Llc



Hosting topics:
  • Wide Area Network
  • Coordinates
  • Marine Seismic
  • Access Cellular
  • Playing Cards
  • Data Center
  • Computing Device
  • Database Appliances
  • Appliances
  • Provisioning
  • Database Administrator


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Hosting for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Hosting with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4182

    file did exist - file did put2322

    3 - 1 - 54