Validity Report
Full Report
US9635134B2 — Resource management in a cloud computing environment
Priority Date: 2012-07-03, Publication Date: 2017-04-25, Current Assignee: BEIJING ENDLESS TIME AND SPACE TECHNOLOGY Co Ltd, INVINCIBLE IP LLCReport Generated: 2021-07-13

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP2842282A11.475DISTRIBUTED VIRTUAL SWITCH ARCHITECTURE FOR A HYBRID CLOUDGRANT2015-03-042012-04-2448289674GreatCisco Technology IncCisco Technology Inc
US8271653B21.408Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled cloudsGRANT2012-09-182009-08-3143626495GreatRed Hat IncRed Hat Inc
US8849971B21.383Load balancing in cloud-based networksGRANT2014-09-302008-05-2841381184GreatRed Hat IncRed Hat Inc
US9450783B21.351Abstracting cloud managementGRANT2016-09-202009-05-2843221758GreatRed Hat IncRed Hat Inc
EP2648391A11.320Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environmentGRANT2013-10-092012-04-0447997096GreatCisco Technology IncCisco Technology Inc
US8316125B21.316Methods and systems for automated migration of cloud processes to external cloudsGRANT2012-11-202009-08-3143626484GreatRed Hat IncRed Hat Inc
US10372490B21.314Migration of a virtual machine from a first cloud computing environment to a second cloud computing environment in response to a resource or services in the second cloud computing environment becoming availableGRANT2019-08-062008-05-3041381480GreatRed Hat IncRed Hat Inc
US8612615B21.310Systems and methods for identifying usage histories for producing optimized cloud utilizationGRANT2013-12-172010-11-2346065427GreatRed Hat IncRed Hat Inc
EP2574005B11.294CLOUD SERVICE AGENCY  CLOUD COMPUTING METHOD AND CLOUD SYSTEMGRANT2019-12-112010-05-2044982927GreatZTE CorpZTE Corp
US8677454B21.289Utilization of virtual machines by a community cloudGRANT2014-03-182010-05-1844973567GreatRed Hat IncRed Hat Inc
US8433802B21.281System and method for fair and economical resource partitioning using virtual hypervisorGRANT2013-04-302010-01-2644309812GreatInternational Business Machines CorpInternational Business Machines Corp
US9015708B21.281System for improving the performance of high performance computing applications on cloud using integrated load balancingGRANT2015-04-212011-07-2847598361GreatInternational Business Machines CorpInternational Business Machines Corp
US8862720B21.276Flexible cloud management including external cloudsGRANT2014-10-142009-08-3143626497GreatRed Hat IncRed Hat Inc
EP2737401A11.270METHOD AND APPARATUS FOR ASSIGNMENT OF VIRTUAL RESOURCES WITHIN A CLOUD ENVIRONMENTGRANT2014-06-042011-07-2746513831GreatAlcatel Lucent SASAlcatel Lucent SAS
EP2773145B11.259WIRELESS COMMUNICATION SYSTEMGRANT2017-05-172011-11-1848428992GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US9104407B21.246Flexible cloud management with power management supportGRANT2015-08-112009-05-2843221503GreatRed Hat IncRed Hat Inc
EP2405386A21.245Brokered cloud computing architectureGRANT2012-01-112010-07-0944645423GreatSAP SESAP SE
US9311162B21.244Flexible cloud managementGRANT2016-04-122009-05-2743221517GreatRed Hat IncRed Hat Inc
US10341383B21.213Cloud protection techniquesGRANT2019-07-022011-10-2848173871GreatMicro Focus Software IncMicro Focus Software Inc
US9218196B21.202Performing pre-stage replication of data associated with virtual machines prior to migration of virtual machines based on resource usageGRANT2015-12-222012-05-1749582393GreatInternational Business Machines CorpInternational Business Machines Corp
EP2870580A11.198MANAGING A HYBRID CLOUD SERVICEGRANT2015-05-132012-07-0349882386GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9495215B21.183Optimizing virtual machines placement in cloud computing environmentsGRANT2016-11-152011-10-1247990877GreatInternational Business Machines CorpInternational Business Machines Corp
EP2707805A11.177COMPOSITE PUBLIC CLOUD  METHOD AND SYSTEMGRANT2014-03-192011-05-0947139632GreatMetacloud LLCCisco Technology Inc
US8832459B21.174Securely terminating processes in a cloud computing environmentGRANT2014-09-092009-08-2843626589GreatRed Hat IncRed Hat Inc
EP2386948B11.171System and method for managing resources in a partitioned computing system based on resource usage volatilityGRANT2019-12-112010-05-1144515153GreatAvago Technologies International Sales Pte LtdAvago Technologies General IP Singapore Pte Ltd, Avago Technologies International Sales Pte Ltd
US9223634B21.155System and method for simulating virtual machine migration in a network environmentGRANT2015-12-292012-05-0249513507GreatCisco Technology IncCisco Technology Inc
EP2867771A11.154OPTIMIZING PLACEMENT OF VIRTUAL MACHINESGRANT2015-05-062012-06-2949782366GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
EP2812799B11.154TAGGING PHYSICAL RESOURCES IN A CLOUD COMPUTING ENVIRONMENTGRANT2021-05-192012-02-0947891912GreatCitrix Systems IncCitrix Systems Inc
EP2615803B11.154Performance interference model for managing consolidated workloads in QoS-aware cloudsGRANT2017-03-082012-01-1347552898GreatAccenture Global Services LtdAccenture Global Services Ltd
EP2648098A21.149System and method for migrating application virtual machines in a network environmentGRANT2013-10-092012-04-0547997095GreatCisco Technology IncCisco Technology Inc
EP2646905B11.143VIRTUALIZED CONNECTIVITY IN A CLOUD SERVICES ENVIRONMENTGRANT2020-01-222010-12-0346172301GreatLevel 3 Communications LLCLevel 3 Communications LLC
US9003019B11.137Methods and systems for utilization tracking and notification of cloud resourcesGRANT2015-04-072011-09-3052745270GreatEMC CorpEMC Corp
EP2383956B11.136CLOUD-BASED BILLING  CREDENTIAL  AND DATA SHARING MANAGEMENT SYSTEMGRANT2017-09-062010-04-2744117629GreatAccenture Global Services LtdAccenture Global Services Ltd
EP2548130B11.134SHAPING VIRTUAL MACHINE COMMUNICATION TRAFFICGRANT2018-12-122010-03-1644648118GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
EP2798492A11.133VIRTUAL MACHINE MIGRATION USING 3GPP MCIMGRANT2014-11-052011-12-2945440554GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP2648370A11.130Location-Aware Virtual Service Provisioning in a Hybrid Cloud EnvironmentGRANT2013-10-092012-04-0447997068GreatCisco Technology IncCisco Technology Inc
EP2867772A11.130DYNAMIC RESOURCE ALLOCATION FOR VIRTUAL MACHINESGRANT2015-05-062012-06-2949779695GreatBrocade Communications Systems LLCAvago Technologies International Sales Pte Ltd, Brocade Communications Systems LLC
EP2812809A11.127CLOUD COMPUTING SERVICES FRAMEWORKGRANT2014-12-172012-02-1048948016GreatOracle International CorpOracle International Corp
US8037187B21.125Resource exchange management within a cloud computing environmentGRANT2011-10-112009-12-1144144135GreatInternational Business Machines CorpInternational Business Machines Corp
US9250944B21.118Selection of virtual machines from pools of pre-provisioned virtual machines in a networked computing environmentGRANT2016-02-022011-08-3047745603GreatInternational Business Machines CorpInternational Business Machines Corp
EP2805473B11.116SECURITY MANAGEMENT FOR CLOUD SERVICESGRANT2018-03-072012-01-1745814086GreatSecure Cloudlink LtdSECURE CLOUDLINK LIMITED
US20130219390A11.115CLOUD SERVER AND METHOD FOR CREATING VIRTUAL MACHINESAPPLICATION2013-08-222012-02-2148983377GreatHon Hai Precision Industry Co LtdHon Hai Precision Industry Co Ltd
WO2011067029A11.113INTER-CLOUD RESOURCE SHARING WITHIN A CLOUD COMPUTING ENVIRONMENTAPPLICATION2011-06-092009-12-0343242310Great
US9929931B21.109Efficient provisioning and deployment of virtual machinesGRANT2018-03-272011-03-1646829521GreatInternational Business Machines CorpInternational Business Machines Corp
US9367362B21.107Administration of virtual machine affinity in a cloud computing environmentGRANT2016-06-142010-04-0144711137GreatInternational Business Machines CorpInternational Business Machines Corp
EP2603855A21.107INTEGRATED INFORMATION TECHNOLOGY SERVICE MANAGEMENT FOR CLOUD RESOURCESGRANT2013-06-192010-08-1247882429GreatUnisys CorpUnisys Corp
EP2344953B11.105PROVISIONING VIRTUAL RESOURCES USING NAME RESOLUTIONGRANT2014-10-292008-08-2541278321GreatInternational Business Machines CorpInternational Business Machines Corp
US8301746B21.102Method and system for abstracting non-functional requirements based deployment of virtual machinesGRANT2012-10-302010-01-2644309811GreatInternational Business Machines CorpInternational Business Machines Corp
EP2784985A11.099CLOUD COMPUTING SYSTEM AND METHOD FOR MANAGING STORAGE RESOURCES THEREINGRANT2014-10-012011-12-2948696225GreatHuawei Technologies Co LtdHuawei Technologies Co Ltd
US9158590B21.098Dynamically acquiring computing resources in a networked computing environmentGRANT2015-10-132011-08-0847667820GreatInternational Business Machines CorpInternational Business Machines Corp
WO2013150490A11.098METHOD AND DEVICE TO OPTIMISE PLACEMENT OF VIRTUAL MACHINES WITH USE OF MULTIPLE PARAMETERSAPPLICATION2013-10-102012-04-0548577157Great
US9223624B21.097Processing requests in a cloud computing environmentGRANT2015-12-292010-10-2045973920GreatInternational Business Machines CorpInternational Business Machines Corp
US20130290538A11.081EVALUATION OF CLOUD COMPUTING SERVICESAPPLICATION2013-10-312012-04-2749478351GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20130339200A11.079Fair Distribution Of Power Savings Benefit Among Customers In A Computing CloudAPPLICATION2013-12-192012-06-1949756789GreatInternational Business Machines CorpInternational Business Machines Corp
US9081750B21.076Recovery escalation of cloud deploymentsGRANT2015-07-142012-02-2949004626GreatRed Hat IncRed Hat Inc
US20110295999A11.074METHODS AND SYSTEMS FOR CLOUD DEPLOYMENT ANALYSIS FEATURING RELATIVE CLOUD RESOURCE IMPORTANCEAPPLICATION2011-12-012010-05-2845023027GreatRed Hat IncRed Hat Inc
US9063789B21.072Hybrid cloud integrator plug-in componentsGRANT2015-06-232011-02-0846601441GreatInternational Business Machines CorpInternational Business Machines Corp
US8930948B21.071Opportunistically proactive resource management using spare capacityGRANT2015-01-062012-06-2149775567GreatVMware IncVMware Inc
EP2839373A11.068VIRTUAL COMPUTING RESOURCE ORCHESTRATIONGRANT2015-02-252012-04-1649383890GreatHewlett Packard Development Co LPHewlett Packard Development Co LP, Hewlett Packard Enterprise Development LP
US9026864B21.064Offloading health-checking policyGRANT2015-05-052012-02-2949004642GreatRed Hat IncRed Hat Inc
US9037717B21.063Virtual machine demand estimationGRANT2015-05-192009-09-2143757575GreatInternational Business Machines CorpInternational Business Machines Corp
EP2697714A11.063DEPLOYMENT SYSTEM FOR MULTI-NODE APPLICATIONSGRANT2014-02-192011-04-1247007371GreatVMware IncPivotal Software Inc
US9619262B21.059Techniques for security auditing of cloud resourcesGRANT2017-04-112011-05-3147262630GreatMicro Focus Software IncMicro Focus Software Inc
US8914469B21.058Negotiating agreements within a cloud computing environmentGRANT2014-12-162009-12-1144143993GoodInternational Business Machines CorpInternational Business Machines Corp
US8793685B21.052Techniques for operating virtual switches in a virtualized computing environmentGRANT2014-07-292011-05-1347142770GoodInternational Business Machines CorpInternational Business Machines Corp
EP2836908B11.050LAYER 3 SERVICE IMPLEMENTATION IN CLOUD SERVERS AND METHODGRANT2016-04-062012-04-1246727274GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8984506B21.048Techniques for dynamically discovering and adapting resource and relationship information in virtualized computing environmentsGRANT2015-03-172011-01-0746456220GoodInternational Business Machines CorpInternational Business Machines Corp
EP2825959A11.047METHOD AND SYSTEM FOR UTILIZING SPARE CLOUD RESOURCESGRANT2015-01-212012-03-1648014310GoodRackspace US IncRackspace US Inc
US8572612B21.038Autonomic scaling of virtual machines in a cloud computing environmentGRANT2013-10-292010-04-1444789188GoodInternational Business Machines CorpDaedalus Blue LLC
US20120226808A11.037SYSTEMS AND METHODS FOR METERING CLOUD RESOURCE CONSUMPTION USING MULTIPLE HIERARCHICAL SUBSCRIPTION PERIODSAPPLICATION2012-09-062011-03-0146754003GoodRed Hat IncRed Hat Inc
US9720727B11.034Managing virtual machine migrationGRANT2017-08-012010-12-2849770156GoodAmazon Technologies IncAmazon Technologies Inc
US9189259B21.034Provisioning of virtual machine pools based on historical data in a networked computing environmentGRANT2015-11-172011-08-2247745591GoodInternational Business Machines CorpInternational Business Machines Corp
US9703598B21.031Managing virtual machine migrationGRANT2017-07-112010-12-2853718914GoodAmazon Technologies IncAmazon Technologies Inc
US8527633B21.028Techniques for addressing geographical location issues in computing environmentsGRANT2013-09-032011-01-0646456110GoodInternational Business Machines CorpInternational Business Machines Corp
WO2013009665A11.026APPLICATION RESOURCE MANAGER OVER A CLOUDAPPLICATION2013-01-172011-07-1247506432Good
US8839243B21.023Remediating resource overloadGRANT2014-09-162012-04-2349290323GoodInternational Business Machines CorpInternational Business Machines Corp
EP1269313B11.022REAL-TIME SCHEDULING OF VIRTUAL MACHINESGRANT2009-05-132000-03-3124159616GoodIntel CorpIntel Corp
US9547509B21.020System and method for information acquisition of wireless sensor network data as cloud based serviceGRANT2017-01-172012-02-2349004760GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20110246627A11.020Data Center Affinity Of Virtual Machines In A Cloud Computing EnvironmentAPPLICATION2011-10-062010-04-0144710932GoodInternational Business Machines CorpLenovo Enterprise Solutions Singapore Pte Ltd
US8904402B21.013Controlling capacity in a multi-tenant platform-as-a-service environment in a cloud computing systemGRANT2014-12-022012-05-3049671949GoodRed Hat IncRed Hat Inc
US8800055B21.012Node controller for an endpoint in a cloud computing environmentGRANT2014-08-052010-10-2045974140GoodInternational Business Machines CorpInternational Business Machines Corp
US8832239B21.011System  method and program product for optimizing virtual machine placement and configurationGRANT2014-09-092011-09-2647912497GoodInternational Business Machines CorpInternational Business Machines Corp
US9250863B11.009Managing virtual machine migrationGRANT2016-02-022010-12-2855174927GoodAmazon Technologies IncAmazon Technologies Inc
US8789043B21.009Optimized placement planning for virtual machines in a network by breaking relocation graph into one or more cores to apply different solutionsGRANT2014-07-222009-03-2445565723GoodInternational Business Machines CorpInternational Business Machines Corp
US8935397B21.006Dividing cloud resourcesGRANT2015-01-132010-07-0145400573GoodRed Hat IncRed Hat Inc
US8725891B21.006Aggregation across cloud providersGRANT2014-05-132010-07-0145400582GoodRed Hat IncRed Hat Inc
EP2342628B11.002INTEGRATION OF AN INTERNAL CLOUD INFRASTRUCTURE WITH EXISTING ENTERPRISE SERVICES AND SYSTEMSGRANT2013-11-202008-09-0841797382GoodeBay InceBay Inc
EP2820542B11.001ASSIGNING STATES TO CLOUD RESOURCESGRANT2017-09-062012-03-0147843444GoodCitrix Systems IncCitrix Systems Inc
EP2828751B10.995CLOUD APPLICATION SCALING FRAMEWORKGRANT2019-05-012012-03-2149213405GoodTier 3 IncTier 3 Inc
US8639747B20.993System and method for providing a cloud computing graphical user interfaceGRANT2014-01-282010-07-0144645741GoodRed Hat IncRed Hat Inc
US8762538B20.992Workload-aware placement in private heterogeneous cloudsGRANT2014-06-242011-05-0447091014GoodInternational Business Machines CorpInternational Business Machines Corp
US20100131324A10.990SYSTEMS AND METHODS FOR SERVICE LEVEL BACKUP USING RE-CLOUD NETWORKAPPLICATION2010-05-272008-11-2642197158GoodRed Hat IncRed Hat Inc
EP2381363B10.989CLOUD PLATFORM ARCHITECTUREGRANT2017-07-192010-04-2644117587GoodPivotal Software IncPivotal Software Inc
US9264376B20.988Reallocating resource capacity among resource pools in a cloud computing environmentGRANT2016-02-162010-10-1845935094GoodInternational Business Machines CorpInternational Business Machines Corp
US9104460B20.988Inter-cloud live migration of virtualization systemsGRANT2015-08-112011-05-3147262729GoodRed Hat IncRed Hat Inc
EP2629490B10.988Optimizing traffic load in a communications networkGRANT2015-06-172012-02-1447681800GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8578028B20.982Techniques for provisioning cloud computing environment resources based on social media analysisGRANT2013-11-052011-01-0646456111GoodInternational Business Machines CorpInternational Business Machines Corp
EP2850521B10.978LOCALLY BACKED CLOUD-BASED STORAGEGRANT2018-11-212012-05-1648471106GoodApple IncApple Inc
US8423998B20.973System and method for virtual machine multiplexing for resource provisioning in compute cloudsGRANT2013-04-162010-06-0445065497GoodInternational Business Machines CorpInternational Business Machines Corp
US9727847B20.972Peak-performance-aware billing for cloud computing environmentGRANT2017-08-082011-06-1447357655GoodEmpire Technology Development LLCEmpire Technology Development LLC
US8707302B20.969Techniques for personalizing feed content in virtualized computing environmentsGRANT2014-04-222011-01-0646456219GoodInternational Business Machines CorpInternational Business Machines Corp
EP2587373A10.966Software application placement based on failure correlationGRANT2013-05-012011-10-1347189719GoodVMware IncVMware Inc
US9483503B20.966Placing a databaseGRANT2016-11-012012-05-2849671612GoodInternational Business Machines CorpInternational Business Machines Corp
US8615757B20.959Negotiated assignment of resources to a virtual machine in a multi-virtual machine environmentGRANT2013-12-242007-12-2640800294GoodIntel CorpIntel Corp
US8365178B20.956Prioritizing scheduling of virtual machines by recalculating priority numbers for each virtual machine based on the interaction of users with the virtual machinesGRANT2013-01-292009-10-0243824146GoodRed Hat Israel LtdRed Hat Israel Ltd
US8803876B20.952Hardware accelerated graphics for network enabled applicationsGRANT2014-08-122010-12-1544872355GoodInternational Business Machines CorpInternational Business Machines Corp
US8850432B20.951Controlling utilization in a multi-tenant platform-as-a-service (PaaS) environment in a cloud computing systemGRANT2014-09-302012-05-3049671950GoodRed Hat IncRed Hat Inc
US9245246B20.947Capacity over-commit management in resource provisioning environmentsGRANT2016-01-262010-04-2247391809GoodInternational Business Machines CorpInternational Business Machines Corp
US20110055385A10.944ENTERPRISE-LEVEL MANAGEMENT  CONTROL AND INFORMATION ASPECTS OF CLOUD CONSOLEAPPLICATION2011-03-032009-08-3143626489GoodAccenture Global Services GmbHAccenture Global Services Ltd
US20120166644A10.941METHOD AND MANAGER PHYSICAL MACHINE FOR VIRTUAL MACHINE CONSOLIDATIONAPPLICATION2012-06-282010-12-2346318412GoodIndustrial Technology Research Institute ITRIIndustrial Technology Research Institute ITRI
US8863257B20.940Securely connecting virtual machines in a public cloud to corporate resourceGRANT2014-10-142011-03-1046797268GoodRed Hat IncRed Hat Inc
EP2329370A10.939SECURING LIVE MIGRATION OF A VIRTUAL MACHINE WITHIN A SERVICE LANDSCAPEGRANT2011-06-082008-09-1541259603GoodInternational Business Machines CorpInternational Business Machines Corp
US9038065B20.938Integrated virtual infrastructure systemGRANT2015-05-192012-01-3048836951GoodInternational Business Machines CorpInternational Business Machines Corp
US8510590B20.935Method and system for cluster resource management in a virtualized computing environmentGRANT2013-08-132010-03-1744648168GoodVMware IncVMware Inc
US7543166B20.934System for managing power states of a virtual machine based on global power management policy and power management command sent by the virtual machineGRANT2009-06-022004-05-1235426763GoodIntel CorpIntel Corp
EP2577459A20.932APPLYING POLICIES TO SCHEDULE NETWORK BANDWIDTH AMONG VIRTUAL MACHINESGRANT2013-04-102010-05-3145022060GoodMicrosoft CorpMicrosoft Corp, Microsoft Technology Licensing LLC
US9176762B20.931Hierarchical thresholds-based virtual machine configurationGRANT2015-11-032012-07-0249779694GoodInternational Business Machines CorpInternational Business Machines Corp
US9164791B20.931Hierarchical thresholds-based virtual machine configurationGRANT2015-10-202012-07-0251062040GoodInternational Business Machines CorpInternational Business Machines Corp
US8631131B20.929Virtual machine pool cacheGRANT2014-01-142011-09-0747754016GoodRed Hat Israel LtdRed Hat Israel Ltd
US7797707B20.929System and method for attributing to a corresponding virtual machine CPU usage of a domain in which a shared resource's device driver residesGRANT2010-09-142005-03-0236945505GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8548790B20.928Rapidly determining fragmentation in computing environmentsGRANT2013-10-012011-01-0746455937GoodInternational Business Machines CorpInternational Business Machines Corp
US8631406B20.920Distributed cloud computing architectureGRANT2014-01-142010-06-3045400758GoodSAP SE SAP SE
US8954586B20.920Pre-provisioning virtual machines in a networked computing environmentGRANT2015-02-102011-07-1347519603GoodInternational Business Machines CorpInternational Business Machines Corp
EP2726984B10.920CONTROLLING NETWORK UTILIZATIONGRANT2019-10-302011-06-2947391801GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8887169B20.918Task assignment in cloud computing environmentGRANT2014-11-112010-09-1545830924GoodEmpire Technology Development LLCEmpire Technology Development LLC
EP2856721A10.916DISTRIBUTED DEMAND-BASED STORAGE QUALITY OF SERVICE MANAGEMENT USING RESOURCE POOLINGGRANT2015-04-082012-05-3149671702GoodVMware IncVMware Inc
US10445121B20.912Building virtual machine disk images for different cloud configurations from a single generic virtual machine disk imageGRANT2019-10-152012-02-2349004508GoodRed Hat IncRed Hat Inc
EP2769527B10.910METHOD AND APPARATUS FOR MAINTAINING ONE OR MORE COMMUNICATION SESSIONSGRANT2017-03-012011-10-2148136923GoodNokia Technologies OyNokia Technologies Oy
US8924534B20.910Resource optimization and monitoring in virtualized infrastructureGRANT2014-12-302009-10-2743899316GoodVMware IncVMware Inc
EP2539791B10.906VIRTUAL MACHINE POWER CONSUMPTION MEASUREMENT AND MANAGEMENTGRANT2018-03-282010-02-2644505945GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8332848B20.903Mechanism for staged upgrades of a virtual machine systemGRANT2012-12-112009-03-1242731753GoodRed Hat Israel LtdRed Hat Israel Ltd
EP2748705A20.902SYSTEMS AND METHODS OF HOST-AWARE RESOURCE MANAGEMENT INVOLVING CLUSTER-BASED RESOURCE POOLSGRANT2014-07-022011-08-2547745611GoodVirtustream IncVirtustream IP Holding Co Inc
EP2864884B10.900MONITORING RESOURCE USAGE BY A VIRTUAL MACHINEGRANT2019-12-182012-06-2049769201GoodIntel CorpIntel Corp
EP2756392B10.896MULTI TENANT ACCESS TO APPLICATIONSGRANT2018-11-072011-09-1447647102GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8667500B10.893Use of dynamic entitlement and adaptive threshold for cluster process balancingGRANT2014-03-042006-10-1750158943GoodVMware IncVMware Inc
EP2859442B10.889UNIFIED STORAGE/VDI PROVISIONING METHODOLOGYGRANT2017-05-242012-06-1148700701GoodVMware IncVMware Inc
US8799997B20.883Secure network cloud architectureGRANT2014-08-052011-04-1847007293GoodBank of America CorpBank of America Corp
US8429449B20.883Optimized placement of virtual machines in a network environmentGRANT2013-04-232010-03-0144505949GoodInternational Business Machines CorpInternational Business Machines Corp
US8949415B20.878Activity-based virtual machine availability in a networked computing environmentGRANT2015-02-032012-01-0448695875GoodInternational Business Machines CorpInternational Business Machines Corp
EP2624138B10.876Elastic allocation of computing resources to software applicationsGRANT2019-07-242012-01-3147740803GoodVMware IncVMware Inc
US20050132362A10.871Virtual machine management using activity informationAPPLICATION2005-06-162003-12-1034653044GoodIntel CorpIntel Corp
US9256463B20.869Method and apparatus to replicate stateful virtual machines between cloudsGRANT2016-02-092012-06-2949779690GoodInternational Business Machines CorpInternational Business Machines Corp
US8949431B20.860Method for live migration of virtual machinesGRANT2015-02-032011-08-2447745297GoodRadware LtdRadware Ltd
US9256648B20.857Data handling in a cloud computing environmentGRANT2016-02-092012-05-2246546448GoodInternational Business Machines CorpInternational Business Machines Corp
US20120124211A10.855SYSTEM AND METHOD FOR CLOUD ENTERPRISE SERVICESAPPLICATION2012-05-172010-10-0544983412GoodAccenture Global Services LtdAccenture Global Services Ltd
US8019861B20.854Speculative virtual machine resource schedulingGRANT2011-09-132009-01-2942355043GoodVMware IncVMware Inc
US9038063B20.854Determining virtual machine image pattern distributions in a networked computing environmentGRANT2015-05-192011-09-0746605715GoodInternational Business Machines CorpInternational Business Machines Corp
EP2842049B10.847SECURE ADMINISTRATION OF VIRTUAL MACHINESGRANT2019-07-032012-04-2549478563GoodCitrix Systems IncCitrix Systems Inc
US8607082B20.839Mechanism for managing power in a virtual machine systemGRANT2013-12-102009-08-3143626599GoodRed Hat Israel LtdRed Hat Israel Ltd
US8707300B20.839Workload interference estimation and performance optimizationGRANT2014-04-222010-07-2645494599GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9223616B20.837Virtual machine resource reduction for live migration optimizationGRANT2015-12-292011-02-2846719771GoodRed Hat Israel LtdRed Hat Israel Ltd
US9003007B20.835Administration of virtual machine affinity in a data centerGRANT2015-04-072010-03-2444657601GoodInternational Business Machines CorpInternational Business Machines Corp
US8826272B20.826Planning a reliable migration in a limited stability virtualized environmentGRANT2014-09-022010-11-2946127512GoodInternational Business Machines CorpInternational Business Machines Corp
EP2024847A10.823DEPLOYING VIRTUAL MACHINE TO HOST BASED ON WORKLOAD CHARACTERIZATIONSGRANT2009-02-182006-05-1838713348GoodMicrosoft CorpMicrosoft Corp
EP2780799B10.821THROTTLE DISK I/O USING DISK DRIVE SIMULATION MODELGRANT2017-04-052011-11-1748414865GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20120290725A10.820Dynamic Cost Model Based Resource Scheduling In Distributed Compute FarmsAPPLICATION2012-11-152011-05-0947142655GoodOracle International CorpOracle International Corp
US8639745B20.820Providing a neutral interface to multiple cloud computing systemsGRANT2014-01-282010-07-0145400538GoodRed Hat IncRed Hat Inc
US8930652B20.811Method for obtaining a snapshot image of a disk shared by multiple virtual machinesGRANT2015-01-062009-11-1143975011GoodRed Hat Israel LtdRed Hat Israel Ltd
US9563453B20.810Decentralized management of virtualized hostsGRANT2017-02-072011-06-1444774176GoodVMware IncVMware Inc
US20130263117A10.810ALLOCATING RESOURCES TO VIRTUAL MACHINES VIA A WEIGHTED COST RATIOAPPLICATION2013-10-032012-03-2849236842GoodInternational Business Machines CorpInternational Business Machines Corp
EP1989635A10.806MIGRATING A VIRTUAL MACHINE THAT OWNS A RESOURCE SUCH AS A HARDWARE DEVICEGRANT2008-11-122006-02-2838445496GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9882917B20.799Cloud computing secure data storageGRANT2018-01-302012-03-0949115887GoodEmpire Technology Development LLCEmpire Technology Development LLC
US8806485B20.796Configuring virtual machine images in a networked computing environmentGRANT2014-08-122011-05-0347091155GoodInternational Business Machines CorpInternational Business Machines Corp
US8813072B10.796Inverse virtual machineGRANT2014-08-192011-03-1851301863GoodDirectPacket Research IncDirectPacket Research Inc
EP1939742A20.793Dynamic virtual machine generationGRANT2008-07-022006-12-2939313234GoodIntel CorpIntel Corp
US8301859B20.789Automatically adjusting memory of a VM on a power clientGRANT2012-10-302009-06-2243355298GoodRed Hat Israel LtdRed Hat Israel Ltd
US8150971B20.786Mechanism for migration of client-side virtual machine system resourcesGRANT2012-04-032009-05-3143221520GoodRed Hat Israel LtdRed Hat Israel Ltd
US9413683B20.776Managing resources in a distributed system using dynamic clustersGRANT2016-08-092011-06-1447354639GoodVMware IncVMware Inc
US8707301B20.776Insertion of management agents during machine deploymentGRANT2014-04-222010-11-0846020684GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8650563B20.768Identification and placement of new virtual machines to reduce memory consumption based on shared images with hosted virtual machinesGRANT2014-02-112010-02-2644506007GoodRed Hat Israel LtdRed Hat Israel Ltd
WO2008062864A10.759VIRTUAL MACHINE LOCATING SYSTEM  VIRTUAL MACHINE LOCATING METHOD  PROGRAM  VIRTUAL MACHINE MANAGEMENT DEVICE AND SERVERAPPLICATION2008-05-292006-11-2439429793Good
US8443219B20.751Mechanism for reducing the power consumption of virtual desktop serversGRANT2013-05-142009-08-3143626756GoodRed Hat Israel LtdRed Hat Israel Ltd
EP2241973A20.748Electronic apparatus  virtual machine providing apparatus  and method of using virtual machine serviceGRANT2010-10-202009-02-0242212193GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US8694644B20.743Network-aware coordination of virtual machine migrations in enterprise data centers and cloudsGRANT2014-04-082011-09-2947993741GoodNEC Laboratories America IncNEC Corp
US20100169477A10.737SYSTEMS AND METHODS FOR DYNAMICALLY PROVISIONING CLOUD COMPUTING RESOURCESAPPLICATION2010-07-012008-12-3142286240GoodSAP SE SAP SE
US20060069761A10.730System and method for load balancing virtual machines in a computer networkAPPLICATION2006-03-302004-09-1436100481GoodDell Products LPDell Products LP
US8261268B10.716System and method for dynamic allocation of virtual machines in a virtual server environmentGRANT2012-09-042009-08-0546726646GoodNetApp IncNetApp Inc
US20160226955A10.715METHOD AND APPARATUS FOR CLEARING CLOUD COMPUTE DEMANDAPPLICATION2016-08-042010-08-2445723793GoodSolano Labs IncSolano Labs Inc
US9122537B20.711Balancing server load according to availability of physical resources based on the detection of out-of-sequence packetsGRANT2015-09-012009-10-3043416224GoodCisco Technology IncCisco Technology Inc
US8589923B20.709Preprovisioning virtual machines based on request frequency and current network configurationGRANT2013-11-192010-10-1445935253GoodInternational Business Machines CorpInternational Business Machines Corp
US7783779B10.705Storage multipath management in a virtual computer systemGRANT2010-08-242003-09-1942583449GoodVMware IncVMware Inc
US9378056B20.704Management server  and virtual machine move control methodGRANT2016-06-282012-06-2549775569GoodFujitsu LtdFujitsu Ltd
US7979857B20.700Method and apparatus for dynamic memory resource managementGRANT2011-07-122004-05-2134967120GoodComputer Associates Think IncComputer Associates Think Inc
US9075648B20.696Virtual machine switching based on measured network delayGRANT2015-07-072012-04-2749478529GoodEmpire Technology Development LLCINVINCIBLE IP LLC
EP2084605B10.696CONTROL AND MANAGEMENT OF VIRTUAL SYSTEMSGRANT2018-02-282006-10-1739344990GoodManageIQ IncRed Hat Inc
US20130024567A10.695NETWORK MONITORAPPLICATION2013-01-242010-03-3142357549GoodBritish Telecommunications PLCBritish Telecommunications PLC
US8438283B20.690Method and apparatus of dynamically allocating resources across multiple virtual machinesGRANT2013-05-072008-01-3140932712GoodInternational Business Machines CorpInternational Business Machines Corp
US8595740B20.688Priority-based management of system load levelGRANT2013-11-262009-03-3142785937GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7299468B20.687Management of virtual machines to utilize shared resourcesGRANT2007-11-202003-04-2933309697GoodInternational Business Machines CorpHuawei Technologies Co Ltd
US20110196968A10.683COMPUTER SYSTEM  RESOURCE MANAGEMENT SERVER FOR COMPUTER SYSTEM  AND RESOURCE MANAGEMENT METHOD FOR COMPUTER SYSTEMAPPLICATION2011-08-112009-03-2542780389GoodHitachi LtdHitachi Ltd
US7979863B20.678Method and apparatus for dynamic CPU resource managementGRANT2011-07-122004-05-2134967211GoodComputer Associates Think IncComputer Associates Think Inc
US6851030B20.667System and method for dynamically allocating associative resourcesGRANT2005-02-012002-10-1632092498GoodInternational Business Machines CorpInternational Business Machines Corp
US20090204826A10.663Method for Power Conservation in Virtualized EnvironmentsAPPLICATION2009-08-132008-02-0740939905GoodDell Products LPDell Products LP
US9882773B20.660Virtual resource provider with virtual control planesGRANT2018-01-302010-12-2950158942GoodAmazon Technologies IncMicrosoft Corp, Amazon Technologies Inc
US10033659B20.660Reputation-based mediation of virtual control planesGRANT2018-07-242010-12-2952443794GoodAmazon Technologies IncAmazon Technologies Inc
US20100082320A10.654ACCURACY IN A PREDICTION OF RESOURCE USAGE OF AN APPLICATION IN A VIRTUAL ENVIRONMENTAPPLICATION2010-04-012008-09-3042058373GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20060265711A10.649Methods and apparatus for implementing an integrated user interface for managing multiple virtual machines operative in a computing systemAPPLICATION2006-11-232005-05-2037449718GoodInternational Business Machines CorpServiceNow Inc
US8838968B20.646System and method for virtual machine data protection in a public cloudGRANT2014-09-162012-05-1449549587GoodCA IncCAI Software LLC
US20040143664A10.645Method for allocating computer resourceAPPLICATION2004-07-222002-12-2032708150GoodHitachi LtdHitachi Ltd
US8225313B20.644Object-based virtual infrastructure managementGRANT2012-07-172005-10-1937622015GoodCA IncCAI Software LLC
US8104033B20.642Managing virtual machines based on business priortyGRANT2012-01-242005-09-3037635738GoodComputer Associates Think IncComputer Associates Think Inc
EP2333663B10.639Method and device for providing access to physical resources in a virtual machine environmentGRANT2014-10-152009-12-1043778269GoodEmpire Technology Development LLCEmpire Technology Development LLC
US7308687B20.635Method and system for managing resources in a data centerGRANT2007-12-112002-02-0727734358GoodInternational Business Machines CorpTHINKDYNAMICS Inc, International Business Machines Corp
US9183030B20.635Virtual processor allocation techniquesGRANT2015-11-102011-04-2747068996GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US8635606B20.631Dynamic optimization using a resource cost registryGRANT2014-01-212009-10-1343855838GoodEmpire Technology Development LLCXinova Asia Pte Ltd, Empire Technology Development LLC, Ardent Research Corp
US9928107B10.630Fast IP migration in a hybrid network environmentGRANT2018-03-272012-03-3061629658GoodAmazon Technologies IncAmazon Technologies Inc
EP2356566A10.628SYSTEMS AND METHODS FOR OPTIMIZING CONFIGURATION OF A VIRTUAL MACHINE RUNNING AT LEAST ONE PROCESSGRANT2011-08-172008-12-0141557518GoodCitrix Systems IncCitrix Systems Inc
US20030158884A10.626Apparatus and method of dynamically repartitioning a computer system in response to partition workloadsAPPLICATION2003-08-212002-02-2127733354GoodInternational Business Machines CorpInternational Business Machines Corp
US9317316B20.615Host virtual machine assisting booting of a fully-encrypted user virtual machine on a cloud environmentGRANT2016-04-192011-12-2846950489GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US20080295096A10.614DYNAMIC PLACEMENT OF VIRTUAL MACHINES FOR MANAGING VIOLATIONS OF SERVICE LEVEL AGREEMENTS (SLAs)APPLICATION2008-11-272007-05-2140073608GoodInternational Business Machines CorpInternational Business Machines Corp
US20060136912A10.602Method  apparatus and system for transparent unification of virtual machinesAPPLICATION2006-06-222004-12-1736597702GoodIntel CorpIntel Corp
US20120089784A10.601Lock Amortization In A Data CounterAPPLICATION2012-04-122010-10-1245926022GoodRed Hat IncRed Hat Inc
US8255915B10.593Workload management for computer system with container hierarchy and workload-group policiesGRANT2012-08-282006-10-3146689941GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6178529B10.591Method and system for resource monitoring of disparate resources in a server clusterGRANT2001-01-231997-11-0325506667GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9191327B20.591Distributed service processing of network gateways using virtual machinesGRANT2015-11-172011-02-1046636843GoodVARMOUR NETWORKS IncVARMOUR NETWORKS Inc
US20050120160A10.585System and method for managing virtual serversAPPLICATION2005-06-022003-08-2034966878GoodVirtual Iron Software Inc, Katana Technology IncOracle International Corp, Virtual Iron Software Inc
US10700963B20.581Locating service endpoints from a service registryGRANT2020-06-302010-08-1644629488GoodInternational Business Machines CorpInternational Business Machines Corp
US6968441B10.579Method and system for managing interdependent resources of a computer systemGRANT2005-11-222002-04-1235345083GoodBarsa Consulting Group LLCBarsa Consulting Group LLC
US20120072910A10.572METHODS AND SYSTEMS FOR MANAGING A VIRTUAL DATA CENTER WITH EMBEDDED ROLES BASED ACCESS CONTROLAPPLICATION2012-03-222010-09-0345773522GoodTime Warner Cable IncTime Warner Cable Enterprises LLC, Spectrum Management Holding Co LLC
US8959623B20.570Protecting virtual machine console from misuse  hijacking or eavesdropping in cloud environmentsGRANT2015-02-172012-05-2549622619GoodCA IncCAI Software LLC
US20120053925A10.564Method and System for Computer Power and Resource Consumption ModelingAPPLICATION2012-03-012010-08-3145698340GoodAvocent CorpVertiv IT Systems Inc
US7673114B20.563Dynamically improving memory affinity of logical partitionsGRANT2010-03-022006-01-1938264621GoodInternational Business Machines CorpInternational Business Machines Corp
US20050044301A10.553Method and apparatus for providing virtual computing servicesAPPLICATION2005-02-242003-08-2034068471GoodVirtual Iron Software IncOracle International Corp
US8972984B20.552Methods and systems for virtualizing audio hardware for one or more virtual machinesGRANT2015-03-032011-05-2047175963GoodCitrix Systems IncCitrix Systems Inc
US6694419B10.550Method and system for automatically measuring partition memory needs in a partitioned computer systemGRANT2004-02-172002-04-1231186188GoodBarsa Consulting Group LLCBarsa Consulting Group LLC
US6738886B10.549Method and system for automatically distributing memory in a partitioned system to improve overall performanceGRANT2004-05-182002-04-1232296451GoodBarsa Consulting Group LLCBarsa Consulting Group LLC
US20060242641A10.548Method and system for a resource negotiation between virtual machinesAPPLICATION2006-10-262005-04-2137188609GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9311119B20.547Reconfiguring virtual machinesGRANT2016-04-122012-05-3049671948GoodRed Hat IncRed Hat Inc
US6986137B10.539Method  system and program products for managing logical processors of a computing environmentGRANT2006-01-101999-09-2823612731GoodInternational Business Machines CorpInternational Business Machines Corp
US20030037092A10.536Dynamic management of virtual partition computer workloads through service level optimizationAPPLICATION2003-02-202000-01-2830000128GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
US8191064B20.534Method and device for scheduling true CPU resources for a virtual machine systemGRANT2012-05-292007-07-2540296493GoodLenovo Beijing LtdLenovo Beijing Ltd
US20130125116A10.534Method and Device for Adjusting Virtual Resource and Computer Readable Storage MediumAPPLICATION2013-05-162011-11-1048281937GoodInstitute for Information IndustryInstitute for Information Industry
US20070106769A10.531Performance management in a virtual computing environmentAPPLICATION2007-05-102005-11-0438005105GoodSun Microsystems IncOracle America Inc
US7483978B20.526Providing a unified user interface for managing a plurality of heterogeneous computing environmentsGRANT2009-01-272006-05-1538686407GoodComputer Associates Think IncComputer Associates Think Inc
US20110321041A10.521METHOD AND SYSTEM FOR MIGRATING A VIRTUAL MACHINEAPPLICATION2011-12-292010-06-2945353849GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US9098347B20.514Implementation of virtual machine operations using storage system functionalityGRANT2015-08-042006-12-2139544574GoodVMware IncVMware Inc
US7603327B20.514System and method for managing object based clustersGRANT2009-10-132001-07-0623172024GoodComputer Associates Think IncComputer Associates Think Inc
US9354927B20.511Securing virtual machine dataGRANT2016-05-312006-12-2139544600GoodVMware IncVMware Inc
US4253145A0.511Hardware virtualizer for supporting recursive virtual computer systems on a host computer systemGRANT1981-02-241978-12-2625520905GoodBull HN Information Systems IncBull HN Information Systems Inc
US8813169B20.508Virtual security boundary for physical or virtual network devicesGRANT2014-08-192011-11-0348224672GoodVARMOUR NETWORKS IncVARMOUR NETWORKS Inc
US20110199928A10.505FEEDBACK CONTROL OF PROCESSOR USE IN VIRTUAL SYSTEMSAPPLICATION2011-08-182007-05-0844064123GoodJuniper Networks IncJuniper Networks Inc
US20060101224A10.502Autonomic self-tuning of database management system in dynamic logical partitioning environmentAPPLICATION2006-05-112004-11-0836317699GoodInternational Business Machines CorpSAP SE
US8209687B20.497Method and system for evaluating virtualized environmentsGRANT2012-06-262007-08-3140386619GoodCirba IncCirba Inc
US8990823B20.496Optimizing virtual machine synchronization for application softwareGRANT2015-03-242011-03-1046797234GoodInternational Business Machines CorpInternational Business Machines Corp
US20100281478A10.495MULTIPHASE VIRTUAL MACHINE HOST CAPACITY PLANNINGAPPLICATION2010-11-042009-05-0143031386GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9189265B20.494Storage architecture for virtual machinesGRANT2015-11-172006-12-2139544609GoodVMware IncVMware Inc
US9798448B20.492Full-screen heterogeneous desktop display and controlGRANT2017-10-242008-08-2041697481GoodRed Hat IncRed Hat Inc
US20100262974A10.488Optimized Virtual Machine Migration MechanismAPPLICATION2010-10-142009-04-0842935366GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9529995B20.487Auto discovery of virtual machinesGRANT2016-12-272011-11-0848224685GoodVARMOUR NETWORKS IncVARMOUR NETWORKS Inc
US20020087611A10.487Virtual computer system with dynamic resource reallocationAPPLICATION2002-07-042000-12-2818865538GoodHitachi LtdHitachi Ltd
US20120150992A10.482SYSTEM AND METHOD FOR PROVIDING COMPUTER SERVICESAPPLICATION2012-06-142007-09-1040452332Good
US10146463B20.472Method and apparatus for a virtual system on chipGRANT2018-12-042010-04-2844859362GoodCavium LLCCavium International, Marvell Asia Pte Ltd
US8892931B20.468Power channel monitor for a multicore processorGRANT2014-11-182009-10-2043880206GoodEmpire Technology Development LLCXinova Asia Pte Ltd, Empire Technology Development LLC, Ardent Research Corp
US20120290455A10.467System and Method for Providing Computer ServicesAPPLICATION2012-11-152006-02-0138327813Good
US20090210873A10.467RE-TASKING A MANAGED VIRTUAL MACHINE IMAGE IN A VIRTUALIZATION DATA PROCESSING SYSTEMAPPLICATION2009-08-202008-02-1540599681GoodInternational Business Machines CorpInternational Business Machines Corp
US9021499B20.465Moving a logical device between processor modules in response to identifying a varying load patternGRANT2015-04-282012-01-1048744882GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US8627300B20.457Parallel dynamic optimizationGRANT2014-01-072009-10-1343855837GoodEmpire Technology Development LLCXinova Asia Pte Ltd, Empire Technology Development LLC, Ardent Research Corp
US20120158821A10.453SERVICE DELIVERY FRAMEWORKAPPLICATION2012-06-212010-12-1546235828GoodSAP SE SAP SE
US20080098309A10.449Managing virtual machines and hosts by propertyAPPLICATION2008-04-242006-10-2439319503GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US9386085B20.444Techniques for providing scalable application delivery controller servicesGRANT2016-07-052012-04-0449293205GoodRadware LtdRadware Ltd
US20140143846A10.439SYSTEM FOR AND METHOD OF PROVIDING SINGLE SIGN-ON (SSO) CAPABILITY IN AN APPLICATION PUBLISHING ENVIRONMENTAPPLICATION2014-05-222012-05-2550514424GoodGraphOn CorpRPX Corp
US10375158B20.435Techniques for adaptive traffic direction via scalable application delivery controller servicesGRANT2019-08-062012-04-0457684542GoodRadware LtdRadware Ltd
US8307371B20.434Method for efficient utilization of processors in a virtual shared environmentGRANT2012-11-062005-12-2038175262GoodInternational Business Machines CorpInternational Business Machines Corp
US20080172666A10.427VIRTUAL COMPUTER SYSTEM AND SCHEDULING METHOD THEREOFAPPLICATION2008-07-172007-01-1539618751GoodHitachi LtdHitachi Ltd
US20120109852A10.423REACTIVE LOAD BALANCING FOR DISTRIBUTED SYSTEMSAPPLICATION2012-05-032010-10-2745960533GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7761548B20.418Dynamic server consolidation and rationalization modeling toolGRANT2010-07-202005-10-2437491754GoodAccenture Global Services GmbHAccenture Global Services Ltd
US20080295106A10.416METHOD AND SYSTEM FOR IMPROVING THE AVAILABILITY OF A CONSTANT THROUGHPUT SYSTEM DURING A FULL STACK UPDATEAPPLICATION2008-11-272007-05-2240073614GoodInternational Business Machines CorpInternational Business Machines Corp
US20050038989A10.409Method and system for monitoring a computer system for dynamic reconfigurationAPPLICATION2005-02-172003-07-1134079309GoodComputer Associates Think IncComputer Associates Think Inc
US20060020781A10.401Method and apparatus for providing secure virtualization of a trusted platform moduleAPPLICATION2006-01-262004-06-2434971848GoodIntel CorpIntel Corp
US8856794B20.400Multicore runtime management using process affinity graphsGRANT2014-10-072009-10-1343855849GoodEmpire Technology Development LLCXinova Asia Pte Ltd, Empire Technology Development LLC, Ardent Research Corp
US8516462B20.396Method and apparatus for managing a stackGRANT2013-08-202006-10-0939677156GoodInternational Business Machines CorpInternational Business Machines Corp
US9459893B20.390Virtualization for diversified tamper resistanceGRANT2016-10-042006-10-2739495793GoodMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US20040221121A10.386Method and system for automated memory reallocating and optimization between logical partitionsAPPLICATION2004-11-042003-04-3033310143GoodInternational Business Machines CorpInternational Business Machines Corp
US20090077550A10.384VIRTUAL MACHINE SCHEDULAR WITH MEMORY ACCESS CONTROLAPPLICATION2009-03-192007-09-1340455948GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20020173863A10.369Virtual machine system and virtual machine control methodAPPLICATION2002-11-212001-04-1918970495GoodHitachi LtdHitachi Ltd
US5742762A0.367Network management gatewayGRANT1998-04-211995-05-1923765091GoodTelogy Networks IncTelogy Networks Inc
US7080379B20.365Multiprocessor load balancing system for prioritizing threads and assigning threads into one of a plurality of run queues based on a priority band and a current load of the run queueGRANT2006-07-182002-06-2029734386GoodInternational Business Machines CorpInternational Business Machines Corp
EP2698711A10.363METHOD FOR DISPATCHING CENTRAL PROCESSING UNIT OF HOTSPOT DOMAIN VIRTUAL MACHINE AND VIRTUAL MACHINE SYSTEMGRANT2014-02-192011-06-3045429415GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US20050015661A10.363Method and apparatus for managing processors in a multi-processor data processing systemAPPLICATION2005-01-202003-07-1734063105GoodInternational Business Machines CorpInternational Business Machines Corp
US20050081201A10.359System and method for grouping processorsAPPLICATION2005-04-142003-09-2534421993GoodInternational Business Machines CorpIntel Corp
US20110035802A10.358REPRESENTING VIRTUAL OBJECT PRIORITY BASED ON RELATIONSHIPSAPPLICATION2011-02-102009-08-0743535786GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US8762299B10.355Customized predictive analytical model trainingGRANT2014-06-242011-06-2750944186GoodGoogle LLCGoogle LLC
US8166485B20.353Dynamic techniques for optimizing soft real-time task performance in virtual machinesGRANT2012-04-242009-08-1043535765GoodAvaya IncAvaya Inc
US20030182597A10.352Method for optimization of memory usage for a computer programAPPLICATION2003-09-252002-03-2127804323GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6173306B10.351Dynamic load balancingGRANT2001-01-091995-07-2124008962GoodEMC CorpEMC Corp
US6691176B10.349Method for managing client services across browser pagesGRANT2004-02-101999-11-0430771279GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20080282251A10.345THREAD DE-EMPHASIS INSTRUCTION FOR MULTITHREADED PROCESSORAPPLICATION2008-11-132007-05-1039970715GoodNXP USA IncNXP USA Inc
US20110010514A10.339Adjusting Location of Tiered Storage Residence Based on Usage PatternsAPPLICATION2011-01-132009-07-0743428345GoodInternational Business Machines CorpInternational Business Machines Corp
US20140031956A10.333DATA CENTER INTELLIGENT CONTROL AND OPTIMIZATIONAPPLICATION2014-01-302008-12-0448797867GoodIO Data Centers LLCBASELAYER TECHNOLOGY LLC
US5659743A0.331Method and apparatus for a pattern based spaced management systemGRANT1997-08-191994-12-0523373233GoodLegent CorpCAI Software LLC
US20100199036A10.330SYSTEMS AND METHODS FOR BLOCK-LEVEL MANAGEMENT OF TIERED STORAGEAPPLICATION2010-08-052009-02-0242396389GoodAtrato IncAssurance Software and Hardware Solutions LLC
US20040154018A10.325Determining a priority value for a thread for execution on a multithreading processor systemAPPLICATION2004-08-052002-12-2032748759GoodInternational Business Machines CorpInternational Business Machines Corp
US20120131584A10.317Devices and Methods for Optimizing Data-Parallel Processing in Multi-Core Computing SystemsAPPLICATION2012-05-242009-02-1342561454Good
US8286170B20.313System and method for processor thread allocation using delay-costsGRANT2012-10-092007-01-3139111836GoodInternational Business Machines CorpInternational Business Machines Corp
US20030233571A10.298Method and system for simplifying distributed server managementAPPLICATION2003-12-182002-06-1229740828GoodBladelogic IncBIADELOGIC Inc, Bladelogic Inc
US8775741B10.297Using temporal access patterns for determining prefetch suitabilityGRANT2014-07-082009-01-1351031954GoodViolin Memory IncVsip Holdings LLC
US20050289145A10.297Method and system for delivering content over a networkAPPLICATION2005-12-292002-06-1735507322GoodFantastic IP GmbHRovi Technologies Corp
US6115646A0.295Dynamic and generic process automation systemGRANT2000-09-051997-12-1825539634GoodNortel Networks LtdNortel Networks Ltd
US6226273B10.291Communications network managementGRANT2001-05-011993-11-308214619GoodBritish Telecommunications PLCBritish Telecommunications PLC
US6530840B10.290Method and system for an object architecture for a multi-user game lobby and game sessionGRANT2003-03-111997-04-0225261629GoodInternational Business Machines CorpWargaming.net Ltd
US8255516B10.290Performance-data based server consolidationGRANT2012-08-282006-04-2846689903GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20030009543A10.288Network management system and computer-based methods for network managementAPPLICATION2003-01-092001-04-3025295280GoodHewlett Packard CoHewlett Packard Development Co LP
US9032175B20.277Data migration between storage devicesGRANT2015-05-122011-10-3148173662GoodInternational Business Machines CorpInternational Business Machines Corp
US8839254B20.277Precomputation for data center load balancingGRANT2014-09-162009-06-2643382233GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6304864B10.268System for retrieving multimedia information from the internet using multiple evolving intelligent agentsGRANT2001-10-161999-04-2023136633GoodTEXTWISE LLCTEXTWISE LLC
US20080222640A10.264Prediction Based Priority SchedulingAPPLICATION2008-09-112007-03-0739742953GoodInternational Business Machines CorpInternational Business Machines Corp
US20090281865A10.260METHOD AND SYSTEM TO MANAGE A BUSINESS PROCESSAPPLICATION2009-11-122008-05-0841267625GoodSAP SE SAP SE
US20030208521A10.251System and method for thread scheduling with weak preemption policyAPPLICATION2003-11-062002-05-0229269451GoodInternational Business Machines CorpTrend Micro Inc
US8838895B20.250Solid-state disk caching the top-K hard-disk blocks selected as a function of access frequency and a logarithmic system timeGRANT2014-09-162011-06-0947294138Good21VIANET GROUP Inc21VIANET GROUP Inc
US6122664A0.231Process for monitoring a plurality of object types of a plurality of nodes from a management node in a data processing system by distributing configured agentsGRANT2000-09-191996-06-279493482GoodBull SAEVIDAN
US5870559A0.229Software system and associated methods for facilitating the analysis and management of web sitesGRANT1999-02-091996-10-1526703731GoodMercury Interactive LLCHewlett Packard Development Co LP
US6430592B10.226System for sharing CPU time amongst multiple usersGRANT2002-08-061994-06-0222957874GoodInternational Business Machines CorpInternational Business Machines Corp
US6331858B20.225Display terminal user interface with ability to select remotely stored surface finish for mapping onto displayed 3-D surfaceGRANT2001-12-181997-04-1610810882GoodBritish Telecommunications PLCBritish Telecommunications PLC
US20060184939A10.220Method for using a priority queue to perform job scheduling on a cluster based on node rank and performanceAPPLICATION2006-08-172005-02-1536817111GoodInternational Business Machines CorpInternational Business Machines Corp
US5889523A0.215Method and apparatus for dynamically grouping a plurality of graphic objectsGRANT1999-03-301997-11-2525525540GoodFuji Xerox Co Ltd, Xerox CorpFujifilm Business Innovation Corp, Xerox Corp
US20120290691A10.204METHOD AND ARRANGEMENT FOR OPERATING A COMPUTER CLUSTERAPPLICATION2012-11-152011-05-1147142641GoodInternational Business Machines CorpInternational Business Machines Corp
US8046467B20.195Maintaining client affinity in network load balancing systemsGRANT2011-10-252008-08-2941726951GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20040250248A10.189System and method for server load balancing and server affinityAPPLICATION2004-12-092003-02-2432927563GoodBEA Systems IncOracle International Corp
US20130086419A10.173SYSTEM AND METHOD FOR PERSISTING TRANSACTION RECORDS IN A TRANSACTIONAL MIDDLEWARE MACHINE ENVIRONMENTAPPLICATION2013-04-042011-09-2947993823GoodOracle International CorpOracle International Corp
JP2008097173ANRDATA PROCESSORAPPLICATION2008-04-242006-10-1039275939Good
GB2457344ANRMonitoring system for virtual application enviromentsGRANT2009-08-192007-07-2039722242GoodEG Innovations Pte LtdEG Innovations Pte Ltd
CN104011680ANRScheduling virtual central processing units of virtual machines among physical processing unitsGRANT2014-08-272011-12-2648655869Good
CN103502944ANRMethod and device for adjusting memories of virtual machinesGRANT2014-01-082011-11-2848534581Good
CN103294556ANRMethod and system for host system admission controlGRANT2013-09-112012-02-1748983213Good
CN102446114ANRMethod and system used for optimizing virtual graphics processing unit utilizationGRANT2012-05-092010-09-1745817340Good
CN101488098ANRMulti-core computing resource management system based on virtual computing technologyGRANT2009-07-222009-02-1340891000Good
US20130106906A10.747REFLECTING VALUES FOR A METRIC IN A DISPLAYAPPLICATION2013-05-022011-10-2748171954FairHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US20100325199A10.732CLIENT  BROKERAGE SERVER AND METHOD FOR PROVIDING CLOUD STORAGEAPPLICATION2010-12-232009-06-2242395018FairSamsung Electronics Co LtdSamsung Electronics Co Ltd
US20070282794A10.580Dynamically Selecting Alternative Query Access PlansAPPLICATION2007-12-062004-06-2435507288FairInternational Business Machines CorpInternational Business Machines Corp
US20080071755A10.499RE-ALLOCATION OF RESOURCES FOR QUERY EXECUTION IN PARTITIONSAPPLICATION2008-03-202006-08-3139189881FairInternational Business Machines CorpInternational Business Machines Corp
US6848104B10.337Clustering of task-associated objects for effecting tasks among a system and its environmental devicesGRANT2005-01-251998-12-2122810982FairKoninklijke Philips NVAdrea LLC
US20050131941A10.315Reusing intermediate workflow results in successive workflow runsAPPLICATION2005-06-162003-12-1134653266FairInternational Business Machines CorpInternational Business Machines Corp
US20070239747A10.315Methods  systems  and computer program products for providing read ahead and caching in an information lifecycle management systemAPPLICATION2007-10-112006-03-2938576764FairInternational Business Machines CorpInternational Business Machines Corp
US20060017969A10.264System and method for managing jobs in heterogeneous environmentsAPPLICATION2006-01-262004-07-2235656815FairComputer Associates Think IncCAI Software LLC
US20020091702A10.234Dynamic object-driven database manipulation and mapping systemAPPLICATION2002-07-112000-11-1622943402FairThought IncThought Inc
US20070055647A10.230Dynamic class inheritance and distributed caching with object <->relational mapping and Cartesian model support in a database manipulation and mapping systemAPPLICATION2007-03-082002-05-0329273151Fair
US20090086945A10.229Methods and Apparatus for Selecting a Service Provider on a Per-Call BasisAPPLICATION2009-04-022007-09-2740508368FairAvaya IncAvaya Inc
US20020184171A10.148System and method for organizing color values using an artificial intelligence based cluster modelAPPLICATION2002-12-052001-06-0525364360FairBASF CorpBASF Corp
US6505217B10.141Method and apparatus for file placementGRANT2003-01-071998-11-2526807425FairCompaq Computer CorpHewlett Packard Development Co LP
US6853738B10.129Optical object recognition systemGRANT2005-02-081999-06-1615888873FairHonda Motor Co LtdHonda Motor Co Ltd
US20010028729A10.125Object recognition systemAPPLICATION2001-10-112000-03-2718602405FairHonda Motor Co LtdHonda Motor Co Ltd
US7672114B10.089Carbon nanoarchitectures with ultrathin  conformal polymer coatings for electrochemical capacitorsGRANT2010-03-022004-01-1334739930FairUS Department of NavyUS Department of Navy
US20070109852A10.076One time programming memory cell using MOS deviceAPPLICATION2007-05-172005-11-1438040631FairTaiwan Semiconductor Manufacturing Co TSMC LtdTaiwan Semiconductor Manufacturing Co TSMC Ltd
US20100099357A10.048WIRELESS TRANSCEIVER MODULEAPPLICATION2010-04-222008-10-2042109061FairAiconn Technology CorpAccton Technology Corp
CN103516623ANRResource distribution method and systemGRANT2014-01-152012-06-2549898685Fair
CN103246565ANRResource assess arbitration method and deviceGRANT2013-08-142012-02-0248926096Fair
CN102841814ANRMethod  device and system for shared control of hardware resourcesGRANT2012-12-262012-07-0247369211Fair
CN102662636ANRTwo-layer virtual machines-based concurrent job scheduling methodGRANT2012-09-122012-03-2746772137Fair
CN102546627ANRDevice for extracting data from database in cloudGRANT2012-07-042011-12-3046352585Fair
CN102521052ANRResource allocation method of virtualized data center and virtual machine monitorGRANT2012-06-272011-12-0646291987Fair
CN102331948ANRResource state-based virtual machine structure adjustment method and adjustment systemGRANT2012-01-252011-09-0145483734Fair
CN102279771ANRMethod and system for adaptively allocating resources as required in virtualization environmentGRANT2011-12-142011-09-0245105233Fair
CN102156665ANRDifferential serving method for virtual system competition resourcesGRANT2011-08-172011-04-1344438172Fair
CN101154167ANRVirtual machine system and its CPU scheduling methodGRANT2008-04-022006-09-2839255844Fair

Predictive Analytics

Composite Research Score (1-10)
6
  MODERATE
Art VolumeLOW
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,150 — $3,600
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
748
Recommended Classes
187
Government Assigned Classes
3
CPC
Title
Score
H04L67/322whereby quality of service [QoS] or priority requirements are taken into account | monitoring of QoS metrics | (ref: H04L43/08)| | QoS aspects in real-time communications | (ref: H04L65/80)2.121
H04L49/70Virtual switches1.330
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)1.250
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines1.238
H04L49/555Error detection1.231
G06F9/45558Hypervisor-specific management and integration aspects1.230
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.230
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)1.221
G06F9/45533Hypervisors| Virtual machine monitors1.190
H04L41/5054Automatic provisioning of the service triggered by the service manager  e.g. concrete service implementation by automatic configuration of network components | for initializing configuration  i.e. provisioning of network or devices | (ref: H04L41/0806)1.188
G06F11/203using migration1.186
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses1.178
H04L63/101Access control lists [ACL]1.174
G06F8/60Software deployment1.173
G06F9/4856resumption being on a different machine  e.g. task migration  virtual machine migration | (ref: G06F9/5088)|  takes precedence1.169
H04L41/0813Changing of configuration1.168
H04L43/16using threshold monitoring1.161
G06F9/5077Logical partitioning of resources| Management or configuration of virtualized resources | specific details on emulation or internal functioning of virtual machines | (ref: G06F9/455)1.151
H04L47/72Reservation actions1.139
H04L47/783Distributed allocation of resources  e.g. bandwidth brokers1.130
H04L41/0816due to adaptation  e.g. in response to network events1.127
H04L67/1097for distributed storage of data in a network  e.g. network file system [NFS]  transport mechanisms for storage area networks [SAN] or network attached storage [NAS] | temporary storage of data at an intermediate stage | (ref: H04L67/2842)| | dedicated interfaces to storage systems | (ref: G06F3/0601)1.113
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration1.107
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 1.099
H04L41/0806for initial configuration or provisioning1.098
G06F9/5027the resource being a machine  e.g. CPUs  Servers  Terminals1.097
H04L67/38Protocols for telewriting| Protocols for networked simulations  virtual reality or games | games using an electronically generated display | (ref: A63F13/00)| | remote windowing or X-Windows | (ref: G06F9/452)1.093
H04L63/1433Vulnerability analysis1.091
G06F9/5088involving task migration1.086
G06F17/30156De-duplication implemented within the file system  e.g. based on file segments | de-duplication techniques in storage systems for the management of data blocks | (ref: G06F3/0641)1.086
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)1.086
G06F9/45545Guest-host  i.e. hypervisor is an application program itself  e.g. VirtualBox1.085
G06F9/45537Provision of facilities of other operating environments  e.g. WINE | I/O emulation | (ref: G06F13/105)1.081
G06F9/50Allocation of resources  e.g. of the central processing unit [CPU]1.081
H04L43/04Processing of captured monitoring data1.080
H04L41/20Network management software packages1.080
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)1.079
G06F9/4818Priority circuits therefor1.078
G06F8/65Updates | security arrangements therefor | (ref: G06F21/57)1.073
G06F11/3476Data logging | (ref: G06F11/14)|   | (ref: G06F11/2205)|  take precedence1.066
G06F9/5066Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs | mappping at compile time  | see|  | (ref: G06F8/451)1.065
H04L67/10in which an application is distributed across nodes in the network | multiprogramming arrangements | (ref: G06F9/46)1.065
H04L29/08234based on other criteria  e.g.  hash applied to IP address  specific algorithms or cost1.064
G06F9/5005to service a request1.063
G06F9/505considering the load1.062
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)1.062
H04L12/6418Hybrid transport1.061
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)1.056
H04L41/0853by actively collecting or retrieving configuration information1.055
G06F9/4401Bootstrapping | security arrangements therefor | (ref: G06F21/57)1.055
G06F9/4408Boot device selection1.055
G06F9/5038considering the execution order of a plurality of tasks  e.g. taking priority or time dependency constraints into consideration | scheduling strategies | (ref: G06F9/4881)|  and subgroups1.055
G06F9/5016the resource being the memory1.052
H04L41/0273involving the use of web services for network management  e.g. SOAP1.050
G06F9/4881Scheduling strategies for dispatcher  e.g. round robin  multi-level priority queues1.050
H04L67/1008based on parameters of servers  e.g. available memory or workload | allocation of processing resources to a machine considering the load | (ref: G06F9/505)1.049
H04L67/1021based on client or server locations1.049
H04L47/827Aggregation of resource allocation or reservation requests1.048
G06Q40/12Accounting1.046
G06F9/5072Grid computing1.045
H04L69/40Techniques for recovering from a failure of a protocol instance or entity  e.g. failover routines  service redundancy protocols  protocol state redundancy or protocol service redirection in case of a failure or disaster recovery | network fault management | (ref: H04L41/06)| | route fault recovery in network routing | (ref: H04L45/28)| | fault recovery in packet switches | (ref: H04L49/557)| | reactions to failures of replicated servers by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | intermediate processing of oper1.043
H04L47/82Miscellaneous aspects1.042
G06F12/0831using a bus scheme  e.g. with bus monitoring or watching means1.040
H04L41/18Arrangements involving CNM [Customer Network Management]1.040
H04L67/2861for providing operational support to end devices by emulation  e.g. when they are unavailable  or by off-loading in the network | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | reactions to server failures by a load balancer | (ref: H04L67/1034)| | departure or maintenance mechanisms in peer-to-peer networks | (ref: H04L67/1048)| | terminal emulation | (ref: H04L67/08)| | disconnected operation in file systems | (ref: G06F17/30067)| | emulation or software simulation | (ref: G06F9/455)| | input/output emulation function for peripheral devices | 1.039
G06F9/5011the resources being hardware resources other than CPUs  Servers and Terminals1.037
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)1.034
H04L41/046Aspects of network management agents1.032
H04L43/0876Network utilization1.029
H04L41/5051Service on demand  i.e. services are defined and provided in real time as requested by the user1.027
H04L45/66Layer 2 routing  e.g. in Ethernet based MAN's1.027
G06F11/1461Backup scheduling policy1.026
H04L67/16Service discovery or service management  e.g. service location protocol [SLP] or Web services | network service management for ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | address allocation to terminals or nodes connected to a network | (ref: H04L61/30)| | mobile application services specially adapted for wireless communication networks | (ref: H04W4/00)1.026
G06Q10/00Administration| Management1.025
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)1.025
H04L63/0272Virtual private networks1.024
H04L9/3213using tickets or tokens  e.g. Kerberos | network architectures or network communication protocols for entities authentication using tickets in a packet data network | (ref: H04L63/0807)1.024
H04L61/2007internet protocol [IP] addresses1.023
H04L47/808User-type aware1.021
G06Q40/04Exchange  e.g. stocks  commodities  derivatives or currency exchange1.019
H04L41/5029Service quality level based billing  e.g. dependent on measured service level customer is charged more or less | general charging or billing for transport of data packets | (ref: H04L12/14)1.019
G06Q30/0613Third-party assisted1.019
H04L61/2061involving aspects of pools of addresses  e.g. assignment of different pools of addresses to different dynamic host configuration protocol [DHCP] servers1.019
H04L12/46Interconnection of networks1.018
H04L47/781Centralized allocation of resource1.017
H04L47/787Bandwidth trade among domains1.017
H04L67/40Protocols for remote procedure calls [RPC] | remote procedure calls | (ref: G06F9/547)1.016
G06F11/1448Management of the data involved in backup or backup restore1.016
H04L47/829Topology based1.016
G06F11/2033switching over of hardware resources1.014
G06F11/3433for load management | allocation of a server based on load conditions | (ref: G06F9/505)| | load rebalancing | (ref: G06F9/5083)| | redistributing the load in a network by a load balancer | (ref: H04L67/1029)1.012
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)1.010
G06F9/541via adapters  e.g. between incompatible applications1.010
G06F9/4887involving deadlines  e.g. rate based  periodic1.009
H04L43/08Monitoring based on specific metrics1.005
G06F9/5083Techniques for rebalancing the load in a distributed system1.004
G06F11/1417Boot up procedures1.004
G06F21/55Detecting local intrusion or implementing counter-measures1.003
H04L47/828Allocation of resources per group of connections  e.g. per group of users1.001
G06Q10/06313Resource planning in a project environment1.000
G06F11/1458Management of the backup or restore process0.999
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.999
H04L47/22Traffic shaping0.998
G06F9/5044considering hardware capabilities0.998
H04L43/045for graphical visualization of monitoring data | graphical user interfaces | (ref: H04L41/22)| | display of network or application conditions affecting the network application to the application user | (ref: H04L67/36)| | visual indication of the functioning of a computing machine | (ref: G06F11/32)0.997
G06F9/5055considering software capabilities  i.e. software resources associated or available to the machine0.996
H04L43/12using dedicated network monitoring probes0.995
G06F1/3203Power Management  i.e. event-based initiation of power-saving mode0.995
C12Q1/06Quantitative determination0.995
G06F8/61Installation0.994
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]0.994
G06F3/0613in relation to throughput0.994
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.993
H04L41/0686involving notification enrichment0.992
G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit  a program unit and a register  e.g. for a simultaneous processing of several programs | coordinating program control therefor | (ref: G06F9/52)| | in regulating and control system | (ref: G05B)0.992
H04L47/522Dynamic queue service slot or variable bandwidth allocation0.992
G06F11/3409for performance assessment0.991
G06F12/0866for peripheral storage systems  e.g. disk cache0.989
H04L41/0668selecting new candidate element0.989
G06F1/3246Power saving by software initiated power-off0.989
G06F9/5061Partitioning or combining of resources0.987
H04L41/14involving network analysis or design  e.g. simulation  network model or planning | network monitoring | (ref: H04L43/00)0.986
H04L67/1025dynamic adaptation of the criteria on which the server selection is based0.984
G06F21/602Providing cryptographic facilities or services0.983
H04L41/0654Network fault recovery | backup route selection | (ref: H04L45/22)| | route fault recovery | (ref: H04L45/28)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)0.983
G06F11/0709in a distributed system consisting of a plurality of standalone computer nodes  e.g. clusters  client-server systems0.983
G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module  e.g. according to a severity level0.983
H04L47/78Resource allocation architecture0.983
H04L67/36involving the display of network or application conditions affecting the network application to the application user | graphical user interfaces for network management | (ref: H04L41/22)0.982
G06F3/0604Improving or facilitating administration  e.g. storage management0.981
G06F12/0253Garbage collection  i.e. reclamation of unreferenced memory0.981
G06Q20/145Payments according to the detected use or quantity0.981
G06F9/4416Network booting| Remote initial program loading [RIPL]0.981
H04L63/1416Event detection  e.g. attack signature detection0.981
G06F21/606by securing the transmission between two devices or processes0.981
G06F9/4868with creation or replication0.981
H04L47/822Collecting or measuring resource availability data0.980
G06F11/3457Performance evaluation by simulation0.980
H04L29/06027Protocols for multimedia communication0.980
H04L45/74Address processing for routing0.979
H04W12/12Fraud detection0.978
G06F11/301where the computing system is a virtual computing platform  e.g. logically partitioned systems | virtual machines | (ref: G06F9/45533)| | logical partitioning of resources | (ref: G06F9/5077)0.978
G06F11/142Reconfiguring to eliminate the error | group management mechanisms in a peer-to-peer network | (ref: H04L67/1044)0.978
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.976
G06F9/5094where the allocation takes into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.976
G06Q30/04Billing or invoicing |   e.g. tax processing in connection with a sale0.975
H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station  in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom0.975
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.975
H04L41/5025by proactively reacting to service quality change  e.g. degradation or upgrade  by reconfiguration | mere recovery after a network faults | (ref: H04L41/0654)0.975
G06F8/76Adapting program code to run in a different environment| Porting0.974
H04L45/021Routing table update consistency  e.g. epoch number0.972
H04L45/72Routing based on the source address0.971
H04L41/5048Automatic or semi-automatic definitions  e.g. definition templates0.971
G06Q10/10Office automation  e.g. computer aided management of electronic mail or groupware | electronic mail protocols | (ref: H04L29/06)|  | | arrangements for user-to-user messaging in packet-switching networks  e.g. e-mail or instant messages  | (ref: H04L41/00)| Time management  e.g. calendars  reminders  meetings or time accounting | organizing  planning  scheduling or allocating time | (ref: G06Q10/06)0.970
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling0.969
G06F11/1438Restarting or rejuvenating0.969
H04L67/1095for supporting replication or mirroring of data  e.g. scheduling or transport for data synchronisation between network nodes or user terminals or syncML | synchronisation in information retrieval in file systems | (ref: G06F17/30067)| | synchronisation in structured data stores | (ref: G06F17/30575)| | mass storage redundancy by mirroring for error detection or correction of data | (ref: G06F11/2056)0.967
H04L41/082due to updating or upgrading of network functionality  e.g. firmware | topology update or discovery for routing purposes | (ref: H04L45/02)0.967
G06T17/00Three dimensional [3D] modelling  e.g. data description of 3D objects0.966
H04L67/1031Controlling of the operation of servers by a load balancer  e.g. adding or removing servers that serve requests0.966
G06F17/3053using ranking0.965
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.965
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.964
H04L47/746Reaction triggered by a failure0.964
H04L12/185with management of multicast group membership0.964
H04L29/08171based on parameters of servers  e.g. available memory or workload | allocation of processing resources considering the load | (ref: G06F9/505)0.964
G06Q40/025Credit processing or loan processing  e.g. risk analysis for mortgages0.964
H04L47/762triggered by the network0.964
G06F11/2094Redundant storage or storage space | (ref: G06F11/2056)|  takes precedence0.964
G06F3/065Replication mechanisms0.963
H04L47/805QOS or priority aware0.962
G06F9/44505Configuring for program initiating  e.g. using registry  configuration files0.962
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.961
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)0.960
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.960
H04L63/104Grouping of entities0.959
H04L47/765triggered by the end-points0.959
G06F9/546Message passing systems or structures  e.g. queues0.959
H04L67/2833for grouping or aggregating service requests  e.g. for unified processing of service requests | networking arrangements or communication protocols for scheduling or organising the servicing of application requests | (ref: H04L67/32)0.958
G06F11/0793Remedial or corrective actions | by retry | (ref: G06F11/1402)| | recovery from an exception in an instruction pipeline | (ref: G06F9/3861)| | in a network context | (ref: H04L29/14)0.958
H04B1/40Circuits0.957
H04L43/0852Delays0.956
G06F11/263Generation of test inputs  e.g. test vectors  patterns or sequences | | with adaptation of the tested hardware for testability with external testers0.956
H04L41/0233using object oriented techniques  e.g. common object request broker architecture [CORBA] for representation of network management data0.955
G06Q20/102Bill distribution or payments0.955
H04W4/60Subscription-based services using application servers or record carriers  e.g. SIM application toolkits0.955
G06F11/3423where the assessed time is active or idle time0.955
H04L9/3228One-time or temporary data  i.e. information which is sent for every authentication or authorization  e.g. one-time-password  one-time-token or one-time-key0.954
H04L47/724involving intermediate nodes  e.g. RSVP0.954
G06F1/3234Action  measure or step performed to reduce power consumption0.954
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine0.954
G06Q10/06Resources  workflows  human or project management  e.g. organising  planning  scheduling or allocating time  human or machine resources| Enterprise planning| Organisational models | financial asset management | (ref: G06Q40/06)0.953
H04M15/60based on actual use of network resources0.952
H04L47/2475Application aware0.952
H04L47/122Diverting traffic away from congested spots0.952
G06F3/0484for the control of specific functions or operations  e.g. selecting or manipulating an object or an image  setting a parameter value or selecting a range0.951
G06F17/303Database migration support0.949
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.948
H04L41/08Configuration management of network or network elements | proprietary application protocols for remote control of end-devices in special networking environments | (ref: H04L67/125)| | automatic configuration specially adapted for wireless networks | (ref: H04W24/02)0.948
H04L41/0672by re-configuring the faulty entity0.948
H04L63/123received data contents  e.g. message integrity0.947
H04L67/18in which the network application is adapted for the location of the user terminal | wireless application services making use of the location of users or terminals | (ref: H04W4/02)|  takes precedence| location based Web retrieval | (ref: G06F17/3087)0.946
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.945
G06F11/1441Resetting or repowering0.945
H04L63/02for separating internal from external traffic  e.g. firewalls0.944
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.944
G06F17/30321Indexing structures | indexing structures for unstructured textual data | (ref: G06F17/30619)0.944
H04L63/1425Traffic logging  e.g. anomaly detection0.944
G06F21/316by observing the pattern of computer usage  e.g. typical user behaviour0.944
G06F9/5033considering data affinity0.941
G06Q10/06315Needs-based resource requirements planning or analysis0.941
H04W16/18Network planning tools0.940
H04L49/356Storage area network switches0.462
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.461
H04L63/102Entity profiles0.458
G06F3/0647Migration mechanisms0.445
G06F11/1469Backup restoration techniques0.445
G06F11/1471involving logging of persistent data for recovery0.445
H04L29/06523Quality of Service (QoS) aspects | arrangements for scheduling or organising the servicing of requests whereby quality of service or priority requirements are taken into account | (ref: H04L29/08954)| | adaptation for terminals and/or networks with limited resources or for terminal portability | (ref: H04L29/08108)| | data reduction and/or adaptation | (ref: H04L29/08792)| | network application is adapted for the location of the user terminal | (ref: H04L29/08657)0.442
H04L47/215Token bucket0.442
H04L47/20Policing0.442
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.442
H04L41/5022by giving priorities  e.g. assigning classes of service0.440
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.440
G06F9/468Specific access rights for resources  e.g. using capability register0.440
H04L41/0886Fully automatic configuration0.438
H04L67/101based on network conditions0.435
G06F13/385for adaptation of a particular data processing system to different peripheral devices0.430
H04L67/2809for brokering | negotiation of communication capabilities | (ref: H04L69/24)| | e-commerce | (ref: G06Q30/00)0.427
H04L41/042Arrangements involving multiple distributed management centers cooperatively managing the network0.427
H05K999/99dummy group0.424
H04L67/303Terminal profiles0.422
G06F15/177Initialisation or configuration control | processor initialisation | (ref: G06F9/4405)0.422
G06F21/6281at program execution time  where the protection is within the operating system0.422
G06F11/3495for systems0.419
G06F3/0605by facilitating the interaction with a user or administrator0.418
G06F3/0671In-line storage system0.418
G06F3/0644Management of space entities  e.g. partitions  extents  pools0.418
G06F3/067Distributed or networked storage systems  e.g. storage area networks [SAN]  network attached storage [NAS]0.418
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.416
G06F11/00Error detection| Error correction| Monitoring | error detection  correction or monitoring in information storage based on relative movement between record carrier and transducer | (ref: G11B20/18)| | monitoring  i.e. supervising the progress of recording or reproducing | (ref: G11B27/36)| | in static stores | (ref: G11C29/00)0.416
H04L41/0663involving offline failover planning0.415
G06F11/1464for networked environments0.415
G06F9/452Remote windowing  e.g. X-Window System  desktop virtualisation | protocols for telewriting | (ref: H04L67/38)0.413
G06F9/5022Mechanisms to release resources0.413
G06F9/54Interprogram communication0.412
H04L47/10Flow control or congestion control0.412
H04L45/48Routing tree calculation0.412
H04L41/142using statistical or mathematical methods0.412
G06F9/4843by program  e.g. task dispatcher  supervisor  operating system0.411
G06F21/6236between heterogeneous systems0.409
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)0.409
G06F9/48Program initiating| Program switching  e.g. by interrupt0.407
G06F9/4893taking into account power or heat criteria | power management in computers in general | (ref: G06F1/3203)| | thermal management in computers in general | (ref: G06F1/206)0.407
G06F9/4875with migration policy  e.g. auction  contract negotiation0.407
G06F9/4862the task being a mobile agent  i.e. specifically designed to migrate0.407
G06F9/485Task life-cycle  e.g. stopping  restarting  resuming execution | (ref: G06F9/4881)|  takes precedence0.407
G06F3/0608Saving storage space on storage systems0.406
G06F3/0665at area level  e.g. provisioning of virtual or logical volumes0.406
G06F11/2097maintaining the standby controller/processing unit updated | initialisation or re-synchronisation thereof | (ref: G06F11/1658)|  and subgroups0.405
G06F9/00Arrangements for program control  e.g. control units | program control for peripheral devices | (ref: G06F13/10)0.405
H04L67/1002for accessing one among a plurality of replicated servers  e.g. load balancing | arrangements or protocols for peer-to-peer networking | (ref: H04L67/104)| | protocols for client-server architectures | (ref: H04L67/42)| | allocation of processing resources to service requests in a distributed system | (ref: G06F9/5027)| | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)|0.405
H04L67/2842for storing data temporarily at an intermediate stage  e.g. caching | distributed storage of data in a network | (ref: H04L67/1097)| | browsing optimization of access to content by caching | (ref: G06F17/30902)| | addressing of a cache within a hierarchically structured memory system | (ref: G06F12/0802)| | disk caching | (ref: G06F12/0866)0.405
G06F11/1451by selection of backup contents0.405
G06F11/2038with a single idle spare processing component0.405
G06F11/14Error detection or correction of the data by redundancy in operation | (ref: G06F11/16)|  takes precedence0.405
G06F11/1658Data re-synchronization of a redundant component  or initial sync of replacement  additional or spare unit0.405
G06F11/2048where the redundant components share neither address space nor persistent storage0.405
G06F21/577Assessing vulnerabilities and evaluating computer system security0.405
H04L65/60Media handling  encoding  streaming or conversion0.405
G06F11/3404for parallel or distributed programming0.405
G06F11/32with visual | or acoustical|  indication of the functioning of the machine0.405
G06F11/3442for planning or managing the needed capacity0.405
H04L41/5058Service discovery by the service manager | automatically determining the actual topology of a network | (ref: H04L41/12)| | topology discovery for routing | (ref: H04L45/02)| | arrangements for service discovery  e.g. service location protocol | (ref: H04L67/16)0.405
H04L41/5096wherein the managed service relates to distributed or central networked applications | management of file systems | (ref: G06F17/30067)| | management of structured data stores | (ref: G06F17/30286)0.405
H04L41/5009Determining service level performance  e.g. measuring SLA quality parameters  determining contract or guarantee violations  response time or mean time between failure [MTBF] | monitoring performance metrics on a simple network level | (ref: H04L43/08)0.404
G06F21/00Security arrangements for protecting computers  components thereof  programs or data against unauthorised activity0.402
H04L67/34involving the movement of software or configuration parameters | configuration management of network or network elements | (ref: H04L41/08)| | remote booting | (ref: G06F9/4416)| | programme loading or initiating | (ref: G06F9/445)0.402
G06F8/71Version control | security arrangements therefor | (ref: G06F21/57)| Configuration management0.402
G06F8/658Incremental updates| Differential updates0.402
G06F11/0712in a virtual computing platform  e.g. logically partitioned systems0.401
G06F11/0751Error or fault detection not based on redundancy | power supply failures | (ref: G06F1/30)| | network fault management | (ref: H04L41/06)0.401
G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component  e.g. monitoring the presence of processing resources  peripherals  I/O links  software programs | verification or detection of system hardware configuration | (ref: G06F11/2247)0.401
H04L67/00Network-specific arrangements or communication protocols supporting networked applications | message switching systems | (ref: H04L51/00)| | network management protocols | (ref: H04L41/00)| | routing or path finding of packets in data switching networks | (ref: H04L45/00)| | protocols for real-time multimedia communication | (ref: H04L65/00)| | information retrieval | (ref: G06F17/30)| | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)| | network structures or processes for video distribution between server and client or between remote clients | (r0.401
H04L41/5041Service implementation0.401
G06Q30/0206Price or cost determination based on market factors0.400
H04L67/1023based on other criteria  e.g. hash applied to IP address  specific algorithms or cost0.400
G06F11/3006where the computing system is distributed  e.g. networked systems  clusters  multiprocessor systems | multiprogramming arrangements | (ref: G06F9/46)| | allocation of resources | (ref: G06F9/50)0.400
H04L41/069involving storage or log of alarms or notifications or post-processing thereof0.400
G06F11/0784Routing of error reports  e.g. with a specific transmission path or data flow0.400
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.399
G06F11/2023Failover techniques0.399
G06F11/20using active fault-masking  e.g. by switching out faulty elements or by switching in spare elements0.399
G06F11/1433during software upgrading0.399
G06F11/1484involving virtual machines0.399
G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component  e.g. monitoring if the computing system is on  off  available  not available | error or fault processing without redundancy | (ref: G06F11/0703)| | error detection or correction by redundancy in data representation | (ref: G06F11/08)| | error detection or correction by redundancy in operation | (ref: G06F11/14)| | error detection or correction by redundancy in hardware | (ref: G06F11/16)0.399
H04L41/0836to enhance reliability  e.g. reduce downtime0.398
G06F9/4806Task transfer initiation or dispatching0.397
G06F8/63Image based installation| Cloning| Build to order0.397
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.397
H04L67/30involving profiles0.397
H04L9/3271using challenge-response0.396
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.396
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.396
H04L63/0815providing single-sign-on or federations0.396
G06F21/44Program or device authentication0.396
H04L41/0883Semiautomatic configuration  e.g. proposals from system0.396
G06Q30/018Business or product certification or verification0.396
G06F11/3452Performance evaluation by statistical analysis0.395
G06F11/34Recording or statistical evaluation of computer activity  e.g. of down time  of input/output operation | | Recording or statistical evaluation of user activity  e.g. usability assessment0.395
H04L41/145involving simulating  designing  planning or modelling of a network0.394
H04L41/5038Testing of service level quality  e.g. simulating service usage0.394
H04L65/4069Services related to one way streaming0.393
H04L67/1004Server selection in load balancing0.393
H04L41/083for network speed increase0.393
H04L67/1012based on compliance of requirements or conditions with available server resources0.393
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)0.393
H04L63/00Network architectures or network communication protocols for network security | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.393
G06Q10/0631Resource planning  allocation or scheduling for a business operation0.393
G06Q40/10Tax strategies0.392
G06Q30/0207Discounts or incentives  e.g. coupons  rebates  offers or upsales0.392
H04L67/1034Reaction to server failures by a load balancer | network fault restoration | (ref: H04L41/0654)| | departure or maintenance mechanisms in Peer-to-Peer networks | (ref: H04L67/1048)| | intermediate processing providing operational support to end devices by emulation or by off-loading in the network | (ref: H04L67/2861)| | techniques for recovering from a failure of a protocol instance or entity | (ref: H04L69/40)| | error detection or correction of the data by redundancy in hardware | (ref: G06F11/16)| | failing over workload from one server to another one | (ref: G06F11/202)0.391
H04L67/42Protocols for client-server architectures | access to replicated servers | (ref: H04L67/1002)0.391
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols0.391
H04L67/22Tracking the activity of the user | network monitoring arrangements | (ref: H04L43/00)| | recording of computer activity | (ref: G06F11/34)| | e-commerce | (ref: G06Q30/00)0.391
H04L12/14Metering |  charging | or billing|  arrangements | specially adapted for data wireline or wireless communications | payment schemes  architectures or protocols | per se|  | (ref: G06Q20/00)0.391
G06F12/0877Cache access modes0.390
G06F12/0842for multiprocessing or multitasking0.390
G06F12/0804with main memory updating | (ref: G06F12/0806)|  takes precedence0.390
G06F12/0868Data transfer between cache memory and other subsystems  e.g. storage devices or host systems0.390
G06F12/0873Mapping of cache memory to specific storage devices or parts thereof0.390
G06F12/0871Allocation or management of cache space0.390
H04L29/06965at the transport layer  e.g. SSL  TLS0.390
H04L41/02involving integration or standardization0.390
H04L12/16Arrangements for providing special services to substations | contains provisionally no documents0.390
H04L41/5067Customer-centric quality of service [QoS] measurement0.390
H04L67/306User profiles | configuring for programme initiating | (ref: G06F9/44505)| | information retrieval by personalized querying | (ref: G06F17/30867)0.390
H04L63/0209Architectural arrangements  e.g. perimeter networks or demilitarized zones0.389
H04L29/08144Network arrangements or communication protocol arrangements for accessing one among a plurality of replicated servers  e.g. load balancing | rebalancing the processing load in a distributed system | (ref: G06F9/5083)| | arrangements for peer-to-peer networking | (ref: H04L29/08306)| | wireless network traffic load balancing | (ref: H04W28/08)| | network load balancing  traffic engineering | (ref: H04L47/125)| | video servers using load balancing strategies | (ref: H04N21/23103)0.389
H04L43/0882Utilization of link capacity0.389
H04L65/602at the source | reformatting of video signals in video distribution servers | (ref: H04N21/2343)| | reformatting of additional data in video distribution servers | (ref: H04N21/2355)0.388
H04L41/0846based on copy from other elements0.387
H04L67/32for scheduling or organising the servicing of application requests  e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources | computer conference arrangements | (ref: H04L12/1813)| | broadcast or conference with schedule organisation | (ref: H04L12/1881)| | network service management  ensuring proper service fulfilment according to an agreement or contract between two parties | (ref: H04L41/50)| | intermediate grouping or aggregating of service requests | (ref: H04L67/2833)0.387
G06F8/654using techniques specially adapted for alterable solid state memories  e.g. for EEPROM or flash memories0.386
H04L67/2814for data redirection | load balancing of replicated servers | (ref: H04L67/1002)| | access network selection | (ref: H04L12/5691)| | routing or path finding of packets | (ref: H04L45/00)| | content or context based routing | (ref: H04L67/327)| | network addressing or naming provisions | (ref: H04L61/00)0.386
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.386
H04L41/0823Configuration optimization0.386
H04L61/2596Non - internet protocol [IP] address translation0.386
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.386
H04L67/146Markers provided for unambiguous identification of a particular session  e.g. session identifier  session cookie or URL-encoding | IP multimedia subsystem | (ref: H04L65/1016)| | cryptographic mechanisms for verifying the identity or authority of a user or a system  ID based authentication | (ref: H04L9/32)| | cryptographic mechanisms for ID based key exchange | (ref: H04L9/08)0.385
H04L45/00Routing or path finding of packets in data switching networks | specially adapted for wireless routing | (ref: H04W40/00)0.385
G06F9/52Program synchronisation| Mutual exclusion  e.g. by means of semaphores0.385
G06F21/126Interacting with the operating system0.384
G06F21/6263during internet communication  e.g. revealing personal data from cookies0.384
G06F9/542Event management| Broadcasting| Multicasting| Notifications0.384
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.384
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.384
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.384
H04L9/3247involving digital signatures0.384
H04L63/126the source of the received data0.384
G06F11/2041with more than one idle spare processing component0.384
G06F11/008Reliability or availability analysis0.384
H04L61/2053involving timing or renewal aspects0.384
G06Q30/08Auctions |   matching or brokerage | matching or brokerage for stock exchange | (ref: G06Q40/04)0.382
H04L61/2038for local use  e.g. on local area networks [LAN] or on universal serial bus [USB] networks | bus addresses inside a computer | (ref: G06F13/42)0.382
H04L12/462LAN interconnection over a bridge based backbone0.382
H04L43/062for traffic related reporting0.382
H04L67/141provided for setup of an application session | session setup for real-time communications | (ref: H04L65/1069)0.381
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.381
G06F11/1446Point-in-time backing up or restoration of persistent data0.380
G06F12/0875with dedicated cache  e.g. instruction or stack0.380
G06F12/121using replacement algorithms0.380
G06F12/0811with multilevel cache hierarchies0.380
G06F11/3447Performance evaluation by modeling0.380
H04L43/50Testing arrangements0.380
G06F11/3428Benchmarking0.380
G06N3/08Learning methods0.379
G06F9/4555Para-virtualisation  i.e. guest operating system has to be modified0.379
G06Q30/0609Buyer or seller confidence or verification0.379
H04L67/20involving third party service providers | e-commerce | (ref: G06Q30/00)0.379
G06F3/0482interaction with lists of selectable items  e.g. menus0.379
H04L63/105Multiple levels of security0.379
H04L9/3268using certificate validation  registration  distribution or revocation  e.g. certificate revocation list [CRL]0.378
G06F9/46Multiprogramming arrangements0.378
H04L41/0826for network cost reduction0.378
G06F9/45512Command shells0.378
H04W4/38for collecting sensor information0.377
G06F17/50Computer-aided design0.376
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.376
G06F17/30097Hash-based | content-based indexing of textual data | (ref: G06F17/30613)0.376
G06N5/04Inference methods or devices0.376
H04N21/4437Implementing a Virtual Machine [VM] | virtual machines in general | (ref: G06F9/45533)0.376
H04L43/00Arrangements for monitoring or testing packet switching networks | networking arrangements or communications protocols for supporting networked applications for tracking the activity of the application user | (ref: H04L67/22)| | monitoring of computing systems | (ref: G06F11/30)| | monitoring of computer activity | (ref: G06F11/34)0.376
H04L45/586Virtual routers0.376
G06F11/3438monitoring of user actions | checking the network activity of the user for network-specific applications | (ref: H04L67/22)0.376
G06F8/62Uninstallation0.375
G06F8/70Software maintenance or management0.375
H04L41/04Architectural aspects of network management arrangements0.375
G06Q10/06375Prediction of business process outcome or impact based on a proposed change0.375
H04L29/08Transmission control procedure  e.g. data link level control procedure0.375
G06F9/548Object oriented| Remote method invocation [RMI] | non-remote method invocation | (ref: G06F9/449)0.375
H04L67/147provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g.  additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.374
H04L29/0863provided for signalling methods or particular messages providing extensions to IETF  ITU  ETSI or 3GPP protocols  e.g. additional proprietary messages  standard messages enhanced by additional header fields or standard messages being used for purposes other than originally intended0.374
H04L47/12Congestion avoidance or recovery0.374
G06F9/451Execution arrangements for user interfaces0.374
G06Q30/0629for generating comparisons0.374
G06Q30/0627using item specifications0.374
G06Q30/0623Item investigation0.374
G06F17/30516Data stream processing| continuous queries0.374
H04L43/026using flow generation0.374
H04L41/06involving management of faults or events or alarms0.374
H04L43/065for device related reporting | reporting of sensed information of home appliances | (ref: H04L12/2803)0.374
H04L43/14using software  i.e. software packages | network security related monitoring | (ref: H04L63/1408)0.374
G06F11/3419by assessing time0.374
G06F11/321Display for diagnostics  e.g. diagnostic result display  self-test user interface0.374
H04W12/02Protecting privacy or anonymity0.373
H04W12/08Access security0.373
G06F11/3093Configuration details thereof  e.g. installation  enabling  spatial arrangement of the probes0.373
G06F9/44Arrangements for executing specific programs0.373
C12N1/04Preserving or maintaining viable microorganisms | immobilised microorganisms | (ref: C12N11/00)0.373
C12P7/6409Fatty acids0.373
G06F1/26Power supply means  e.g. regulation thereof | for memories | (ref: G11C)0.373
C12P7/6427Polyunsaturated fatty acids [PUFA]  i.e. having 2 or more double bonds in their backbone0.373
C12N1/10Protozoa| Culture media therefor0.373
G06F3/0659Command handling arrangements  e.g. command buffers  queues  command scheduling0.373
G06F3/0676Magnetic disk device0.373
G06F11/3485for I/O devices0.373
H04L67/08adapted for terminal emulation  e.g. telnet | protocols for telewriting or protocols for networked simulations  virtual reality or games | (ref: H04L67/38)| | emulation or software simulation | (ref: G06F9/455)0.373
H04L43/0805Availability0.373
G06F9/4451User profiles  roaming | user profiles for network-specific applications | (ref: H04L67/306)0.372
H04L47/80Actions related to the nature of the flow or the user0.372
H04L43/18using protocol analyzers0.372
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.372
H04L47/30using information about buffer occupancy at either end or transit nodes0.372
G06F17/30194Distributed file systems0.371
G06F9/4418Suspend and resume| Hibernate and awake0.371
G06F1/3228Monitoring task completion  e.g. by use of idle timer  STOP command  WAIT command0.371
H04L49/65Fast packet switch re-configuration0.370
H04L49/351LAN switches  e.g. ethernet switches0.370
H04L41/0873by checking configuration conflicts with other network elements0.370
H04L41/22using GUI [Graphical User Interface]0.370
G06F21/554involving event detection and direct action0.369
H04L41/50Network service management  i.e. ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer0.369
G06F11/1482by means of middleware or OS functionality0.369
G06F11/2025using centralised failover control functionality0.369
G06F3/04845for image manipulation  e.g. dragging  rotation0.368
G06F3/04847Interaction techniques to control parameter settings  e.g. interaction with sliders  dials0.368
G06F3/0631by allocating resources to storage systems0.368
G06F11/1453using de-duplication of the data0.368
H04L63/205involving negotiation or determination of the one or more network security mechanisms to be used  e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved | negotiation of communication capabilities | (ref: H04L69/24)0.368
H04L12/1403Architecture for metering  charging or billing0.368
H04W4/24Accounting or billing0.368
H04M15/00Arrangements for metering  time-control or time indication | | Metering  charging or billing arrangements for voice wireline or wireless communications  e.g. VoIP0.368
H04L12/1421Indication of expected costs0.368
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.367
H04L29/08072Application layer  i.e. layer seven | not used0.367
H04L47/823Prediction of resource usage0.367
H04L45/745Address table lookup or address filtering0.367
H04L45/64using an overlay routing layer | Peer-to-Peer networks | (ref: H04L67/104)0.367
H04L45/38Flow based routing0.367
H04L47/365Dynamic adaptation of the packet size0.367
G06F11/30Monitoring0.367
G06F11/302where the computing system component is a software system0.367
G06F11/3664Environments for testing or debugging software0.367
H04M15/83Notification aspects0.367
H04M15/852Low balance or limit reached0.367
G06Q10/0635Risk analysis0.367
H04M15/883linked escalation limits  i.e. establish  first or second limit0.367
G06F21/121Restricting unauthorised execution of programs0.367
H04L63/14for detecting or protecting against malicious traffic0.367
H04M15/47Fraud detection or prevention means0.367
G06F21/88Detecting or preventing theft or loss0.367
H04L41/0866Checking configuration0.367
G06F13/4081Live connection to bus  e.g. hot-plugging | current or voltage limitation during live insertion | (ref: H02H9/004)0.367
G06F21/556involving covert channels  i.e. data leakage between processes | inhibiting the analysis of circuitry or operation with measures against power attack | (ref: G06F21/755)0.366
H04L12/1485Tariff-related aspects0.366
G06F11/3414Workload generation  e.g. scripts  playback0.366
G06F1/3209Monitoring remote activity  e.g. over telephone line  network connection0.366
H04L47/803Application aware0.365
H04L47/25Rate modification upon detection by the source of changing network conditions0.364
H04L49/354Support for virtual LAN  VLAN tagging or multiple registration  e.g. according to IEEE 802.1q0.364
H04L41/0843based on generic templates0.364
G06F12/084with a shared cache0.364
G06F12/0802Addressing of a memory level in which the access to the desired data or data block requires associative addressing means  e.g. caches0.364
G06N5/00Computer systems utilising knowledge based models0.364
G06F3/0619in relation to data integrity  e.g. data losses  bit errors0.363
G06F3/0689Disk arrays  e.g. RAID  JBOD0.363
H04L67/02involving the use of web-based technology  e.g. hyper text transfer protocol [HTTP] | information retrieval from the Internet | (ref: G06F17/30861)0.363
H04L65/1059End-user terminal functionality | substation equipment for use by subscribers | (ref: H04M1/00)| | terminal profiles | (ref: H04L67/303)| | terminal emulation | (ref: H04L67/08)| | adaptation for terminals with limited resources or for terminal portability | (ref: H04L67/04)| | management of video client characteristics | (ref: H04N21/258)|   | (ref: H04N21/4516)0.363
H04L67/2823for conversion or adaptation of application content or format | message adaptation based on network or terminal capabilities | (ref: H04L51/06)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)| | optimising visualization of content for web browsing | (ref: G06F17/30905)0.362
G06F3/011Arrangements for interaction with the human body  e.g. for user immersion in virtual reality | for handicapped people in general | (ref: A61F4/00)| | robot control | (ref: B25J)| | tactile signalling | (ref: G08B)| | blind teaching | (ref: G09B21/00)| | for electrophonic musical instruments | (ref: G10H1/344)| | electronic switches characterised by the way in which the control signals are generated | (ref: H03K17/94)0.362
H04L67/28for the provision of proxy services  e.g. intermediate processing or storage in the network | network management provisions | (ref: H04L41/00)| | network monitoring provisions | (ref: H04L43/00)| | proxies for network security | (ref: H04L63/0281)| | media manipulation  adaptation or conversion in real-time communications | (ref: H04L65/601)| | protocol conversion | (ref: H04L69/08)0.362
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)0.362
H04L9/0816Key establishment  i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties  for subsequent use0.362
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.362
H04L47/745Reaction in network0.362
H04L47/782Hierarchical allocation of resource  e.g. involving a hierarchy of local and centralized entities0.361
G06F11/2046where the redundant components share persistent storage | (ref: G06F11/2043)|  takes precedence0.361
G06Q30/06Buying  selling or leasing transactions0.361
G06F7/08Sorting  i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry | by merging two or more sets of carriers in ordered sequence | (ref: G06F7/16)0.361
H04L69/164Adaptation or special uses of UDP protocol0.361
G06F3/0673Single storage device0.361
G06F3/0664at device level  e.g. emulation of a storage device or system0.361
H04W12/06Authentication0.361
H04W12/04Key management0.361
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.361
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.360
G06F21/604Tools and structures for managing or administering access control systems0.360
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.360
H04L63/1458Denial of Service0.360
G06F12/0864using pseudo-associative means  e.g. set-associative or hashing0.360
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.360
H04L47/821Prioritising resource allocation or reservation requests0.360
H04L61/6059Internet protocol version 6 [IPv6] addresses0.360
H04L41/044Arrangements involving a hierarchical management structure0.360
H04L61/2592involving tunneling or encapsulation | providing a confidential data exchange among entities communicating through data packet networks | (ref: H04L63/04)0.360
G06F9/45504Abstract machines for programme code execution  e.g. Java virtual machine [JVM]  interpreters  emulators0.360
H04W52/0203in the radio access network or backbone network of wireless communication networks0.359
H04L41/0833to reduce network energy consumption0.359
G06F1/28Supervision thereof  e.g. detecting power-supply failure by out of limits supervision0.359
H04L41/147for prediction of network behaviour0.359
H04L67/325whereby a time schedule is established for servicing the requests0.359
G06F21/54by adding security routines or objects to programs0.359
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.359
H04L67/142provided for managing session state for stateless protocols| Signalling a session state| State transitions| Keeping-state mechanisms0.359
H04L67/06adapted for file transfer  e.g. file transfer protocol [FTP]0.358
G06F9/30076to perform miscellaneous control operations  e.g. NOP0.358
G06F11/261by simulating additional hardware  e.g. fault simulation0.358
H04L67/1014based on the content of a request0.358
H04L41/022Multivendor or multistandard integration0.358
G06Q30/02Marketing  e.g. market research and analysis  surveying  promotions  advertising  buyer profiling  customer management or rewards| Price estimation or determination0.358
G06Q50/188Electronic negotiation0.358
G06Q10/103Workflow collaboration or project management0.358
H04L67/145provided for avoiding end of session  e.g. keep-alive  heartbeats  resumption message  wake-up for inactive or interrupted session0.358
G06F11/3466Performance evaluation by tracing or monitoring0.358
G06N5/02Knowledge representation | (ref: G06N5/04)|  takes precedence0.358
H04L9/321involving a third party or a trusted authority0.358
H04L63/0838using one-time-passwords0.358
G06F21/445by mutual authentication  e.g. between devices or programs0.358
H04L43/022using sampling of monitoring data  i.e. storing only a selection of packets0.358
H04L67/1089Hierarchical topologies0.358
H04L49/355Application aware switches  e.g. HTTP0.358
G06F1/3206Monitoring a parameter  a device or an event triggering a change in power modality0.358
G01R21/133by using digital technique0.358
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)0.358
G06F11/079Root cause analysis  i.e. error or fault diagnosis | in a hardware test environment | (ref: G06F11/22)| | in a software test environment | (ref: G06F11/36)0.357
G06F11/0772Means for error signaling  e.g. using interrupts  exception flags  dedicated error registers0.357
H04M15/8083involving reduced rates or discounts  e.g. time-of-day reductions or volume discounts0.357
G06Q20/14specially adapted for billing systems0.357
G06Q20/322Aspects of commerce using mobile devices [M-devices]0.357
G06Q20/40145Biometric identity checks0.357
G06Q20/38215Use of certificates or encrypted proofs of transaction rights0.357
H04M15/58based on statistics of usage or network monitoring0.357
H04L47/127Congestion prediction0.357
G06F9/45541Bare-metal  i.e. hypervisor runs directly on hardware0.357
G06F15/167using a common memory  e.g. mailbox0.357
G06Q10/063Operations research or analysis0.357
G06F11/3048where the topology of the computing system or computing system component explicitly influences the monitoring activity  e.g. serial  hierarchical systems0.357
G06F11/3072where the reporting involves data filtering  e.g. pattern matching  time or event triggered  adaptive or policy-based reporting0.357
G06F13/28using burst mode transfer  e.g. direct memory access | DMA|   cycle steal | (ref: G06F13/32)|  takes precedence0.357
G06N99/005Learning machines  i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run | neural networks | (ref: G06N3/02)| | knowledge based models | (ref: G06N5/00)| | fuzzy logic systems | (ref: G06N7/02)| | adaptive control systems | (ref: G05B13/00)0.357
G06Q10/04Forecasting or optimisation  e.g. linear programming  "travelling salesman problem" or "cutting stock problem" | data collection specially adapted for marketing  price determination or demand forecasting | (ref: G06Q30/02)0.356
G06F21/629to features or functions of an application0.356
H04L67/1085involving dynamic management of active down- or uploading connections0.356
H04L43/0888Throughput0.356
H04L29/12066using Domain Name System [DNS]0.356
H04L61/1511using domain name system [DNS]0.356
G06F9/4406Loading of operating system0.356
H04L61/2015using the dynamic host configuration protocol [DHCP] or variants0.356
G06F9/45529Embedded in an application  e.g. JavaScript in a Web browser0.356
G06F21/60Protecting data0.356
G06F3/0623in relation to content0.356
G06F3/0683Plurality of storage devices0.356
G06F3/0622in relation to access0.356
G06F3/061Improving I/O performance0.356
G06F9/30003Arrangements for executing specific machine instructions0.356
G06F3/0628making use of a particular technique0.356
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.356
H04L41/0859by keeping history of different configuration generations or versions0.355
H04L41/0863by rolling back to previous configuration versions0.355
H04L49/557Error correction  e.g. fault recovery or fault tolerance0.355
H04L47/76Reallocation of resources  renegotiation of resources  e.g. in-call0.355
G06F3/0617in relation to availability0.355
G06F3/0637Permissions0.355
G06F17/00Digital computing or data processing equipment or methods  specially adapted for specific functions0.355
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.355
H04W28/0226based on location or mobility | handoff or reselection | (ref: H04W36/00)| | mobile application services making use of the location of users or terminals | (ref: H04W4/02)0.355
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.355
G06F15/173using an interconnection network  e.g. matrix  shuffle  pyramid  star  snowflake0.355
G06F11/0757by exceeding a time limit  i.e. time-out  e.g. watchdogs0.354
H04L41/24using dedicated network management hardware0.354
G06F11/3024where the computing system component is a central processing unit [CPU]0.354
H04L41/26using dedicated tools for LAN [Local Area Network] management0.354
G06F11/0721within a central processing unit [CPU]0.354
H04L49/3009Header conversion  routing tables or routing tags0.354
G06F21/32using biometric data  e.g. fingerprints  iris scans or voiceprints0.354
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.354
G06F12/0815Cache consistency protocols0.354
G06F12/023Free address space management0.354
H04L49/90Queuing arrangements0.353
H04L67/148provided for migration or transfer of sessions | in-session procedures in real-time communications | (ref: H04L65/1083)| | control or signalling for completing the hand-off in wireless networks | (ref: H04W36/0005)0.353
G06F3/0635by changing the path  e.g. traffic rerouting  path reconfiguration0.353
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.353
H04B7/18504Aircraft used as relay or high altitude atmospheric platform0.353
H04W24/04Arrangements for maintaining operational condition0.353
H04W88/085Access point devices with remote components0.353
H04W76/10Connection setup0.353
H04W28/08Load balancing or load distribution0.353
G06F2209/5022Workload threshold0.133
G06F2009/45595Network integration| enabling network access in virtual machine instances | network-specific arrangements for supporting networked applications | (ref: H04L67/00)0.083
H04L2012/5617Virtual LANs| Emulation of LANs0.083
G06F2009/4557Distribution of virtual machine instances| Migration and load balancing aspects | load distribution or balancing | (ref: G06F9/505)|   | (ref: G06F9/5083)| | task migration | (ref: G06F9/4856)0.083
H04L45/28Route fault recovery | network fault recovery | (ref: H04L41/0654)0.077
G06F2009/45579I/O management (device drivers  storage access) | internal functioning of device drivers | (ref: G06F13/102)|   loading of device drivers | (ref: G06F9/4411)0.077
H04L2209/76Proxy  i.e. using intermediary entity to perform cryptographic operations | network architectures or network communication protocols using hop-by-hop encryption | (ref: H04L63/0464)0.077
G06F2221/2149Restricted operating environment0.074
G06F2201/815Virtual | middleware or OS functionality using virtual machines to implement generic software techniques for error detection or fault masking | (ref: G06F11/1484)0.074
G06F2209/502Proximity0.074
H04L47/825Involving tunnels  e.g. MPLS0.074
G06F2009/45591Monitoring or debugging support | monitoring and debugging in general in | (ref: G06F11/30)|   | (ref: G06F11/36)0.073
G06F2009/45587Isolation or security of virtual machine instances | security arrangements | (ref: G06F21/00)0.073
G06F2009/45562Creating  deleting  cloning virtual machine instances0.073
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.073
G06F2209/5011Pool0.073
G06F2009/45575Starting  stopping  suspending  resuming virtual machine instances | program initiating | (ref: G06F9/445)| | task life-cycle in general | (ref: G06F9/485)0.073
Y02D10/00Energy efficient computing0.071
G06F2221/2101Auditing as a secondary aspect0.070
G06F2201/81Threshold0.070
G06F2209/504Resource capping0.069
Y02D10/22Resource allocation0.069
G06F2209/508Monitor0.069
G06F2209/5019Workload prediction0.068
H04L43/087Jitter0.068
G06F2209/501Performance criteria0.068
G06F2009/45566Nested virtual machines0.068
H04L61/2076involving update or notification mechanisms  e.g. update of a domain name server with dynamic host configuration protocol [DHCP] assigned addresses0.068
G06F2201/805Real-time0.068
H04L61/2582through control of the NAT server  e.g. using universal plug and play [UPnP]0.068
G06F2201/865Monitoring of software0.068
G06F2209/506Constraint0.067
G06F2209/5017Task decomposition0.067
G06F2209/503Resource availability0.067
G06F2209/5015Service provider selection0.067
G06F2201/84Using snapshots  i.e. a logical point-in-time copy of the data0.066
H04L67/1076Resource dissemination mechanisms or network resource keeping policies for optimal resource availability in the overlay network0.066
H04L69/321Aspects of inter-layer communication protocols or service data unit [SDU] definitions| Interfaces between layers0.066
Y02D30/30by signaling and coordination  e.g. signaling reduction  link layer discovery protocol [LLDP]  control policies  green TCP0.066
Y02D30/00High level techniques for reducing energy consumption in communication networks0.066
G06Q30/0283Price estimation or determination0.065
G06F2212/502using adaptive policy0.065
G06F2212/1024Latency reduction0.065
G06F12/0897with two or more cache hierarchy levels | with multilevel cache hierarchies | (ref: G06F12/0811)0.065
G06F2212/152Virtualized environment  e.g. logically partitioned system0.065
G06F21/572Secure firmware programming  e.g. of basic input output system [BIOS]0.064
G06F8/30Creation or generation of source code0.064
G06F9/466Transaction processing0.064
H04M7/0012Details of application programming interfaces [API] for telephone networks| Arrangements which combine a telephonic communication equipment and a computer  i.e. computer telephony integration [CPI] arrangements0.064
G06F2221/0773Recurrent authorisation0.064
G06F11/2028eliminating a faulty processor or activating a spare0.064
G06F2209/5014Reservation0.064
H04L41/5006Defining or negotiating SLA contracts  guarantees or penalties | SLA negotiation in wireless networks | (ref: H04W28/24)0.063
G06F11/2035without idle spare hardware0.063
G06F2212/283Plural cache memories0.063
G06F2212/1041Resource optimization0.063
G06F2209/509Offload0.063
H04L63/0884by delegation of authentication  e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity0.063
H04L65/604at the destination | reformatting of video signals in video clients | (ref: H04N21/4402)| | reformatting of additional data in video clients | (ref: H04N21/4355)0.063
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.063
G06F21/41where a single sign-on provides access to a plurality of computers0.063
H04L49/00Packet switching elements | selecting arrangements for multiplex arrangements using optical switching | (ref: H04Q11/0001)0.063
G06F2201/82Solving problems relating to consistency | ensuring consistency in mirrored systems | (ref: G06F11/2064)0.063
H04L29/06823Access control0.063
H04L29/06755Authentication mechanisms0.063
G06F12/0846Cache with multiple tag or data arrays being simultaneously accessible0.063
G06F2212/1052Security improvement0.063
H04L12/1439time-based0.063
H04L12/1435volume-based0.063
G06F2201/825the problem or solution involving locking0.062
G06F11/202where processing functionality is redundant | redundant communication control functionality | (ref: G06F11/2005)|   redundant storage control functionality | (ref: G06F11/2089)0.062
G06N3/0445Feedback networks  e.g. hopfield nets  associative networks0.062
G06F2201/875Monitoring of systems including the internet0.062
H04L47/826Involving periods of time0.062
H04L47/39Credit based0.062
H04L47/6295Multiple queues per individual QOS  connection  flow or priority0.062
H04L47/6255queue load conditions  e.g. longest queue first0.062
H04L47/6215Individual queue per QOS  rate or priority0.062
H04L47/125Load balancing  e.g. traffic engineering | load balancing among servers | (ref: H04L67/1002)0.062
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.062
G06F2201/885Monitoring specific for caches0.062
G06F9/3891organised in groups of units sharing resources  e.g. clusters0.062
H04L61/2507translating between special types of IP addresses0.062
G06F21/50Monitoring users  programs or devices to maintain the integrity of platforms  e.g. of processors  firmware or operating systems0.061
G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored0.061
G06F3/0641De-duplication techniques0.061
G06F12/0238Memory management in non-volatile memory  e.g. resistive RAM or ferroelectric memory0.061
G06F3/0643Management of files0.061
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.061
G06F2221/034Test or assess a computer or a system0.061
H04L61/2514between local and global IP addresses0.061
G16H30/20for handling medical images  e.g. DICOM  HL7 or PACS0.061
H04L12/1475the splitting involving a third party0.061
H04Q2209/60for transmitting utility meters data  i.e. transmission of data from the reader of the utility meter0.061
G06F8/443Optimisation0.061
G06F9/465Distributed object oriented systems | remote method invocation [RMI] | (ref: G06F9/548)0.061
G06F8/24Object-oriented0.061
G06F9/4488Object-oriented0.061
H04L41/0246exchanging or transporting network management information using Internet  e.g. aspects relating to embedding network management web servers in network elements  web service for network management purposes  aspects related to Internet applications or services or web-based protocols  simple object access protocol [SOAP] | web-based network application protocols | (ref: H04L67/02)| | web-based network application protocols for remote control of end-devices or monitoring of remote application data | (ref: H04L67/025)| | proprietary application protocols for remote control of end-devices in special0.061
H04L65/102Gateways | arrangements for connecting between networks having differing types of switching systems  e.g. gateways | (ref: H04L12/66)0.061
G06F2212/621Coherency control relating to peripheral accessing  e.g. from DMA or I/O device0.061
Y02D10/32Delegation or migration0.060
G06T2200/04involving 3D image data0.060
A63F2300/51Server architecture0.060
G06F3/0656Data buffering arrangements0.060
G06F11/2056by mirroring0.060
G06F2209/5021Priority0.060
H04L43/067for time frame related reporting0.060
G06F2201/86Event-based monitoring0.060
H04L67/14for session management | session control for real-time communications | (ref: H04L65/1066)| | session initiation protocol | (ref: H04L65/1006)| | negotiation of communication capabilities | (ref: H04L69/24)| | computer conference arrangements | (ref: H04L12/1813)| | connection management in wireless networks | (ref: H04W76/00)| | session management for telephonic communication and services | (ref: H04M7/00)| | intertask communications in multiprogramming arrangements | (ref: G06F9/54)0.060
G06F2212/154Networked environment0.060
G06F2212/6032Way prediction in set-associative cache0.060
G06F2209/505Clust0.060
H04L61/6068Internet protocol [IP] addresses subnets0.060
H04L61/609involving geographic information  e.g. room number0.060
G06F2209/548Queue0.060
G06F1/3287Power saving by switching off individual functional units in a computer system  i.e. selective power distribution0.060
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.060
H04L29/0653Header parsing and analysis0.060
H04L47/283Network and process delay  e.g. jitter or round trip time [RTT]0.060
G06F11/3688for test execution  e.g. scheduling of test suites0.060
G06F2201/88Monitoring involving counting0.060
G06F1/329Power saving by task scheduling0.060
G06Q2220/00Business processing using cryptography | postage metering system using cryptography | (ref: G06Q2250/05)0.060
H04M2215/0188Network monitoring| statistics on usage on called/calling number0.060
H04M2215/0184involving reduced rates or discounts  e.g. time-of-day reductions  volume discounts  cell discounts  group billing  frequent calling destination(s) or user history list0.060
H04L41/509wherein the managed service relates to media content delivery  e.g. audio / video / TV | protocols for real-time multimedia communications | (ref: H04L65/00)| | interactive television or VoD | (ref: H04N21/00)0.059
G06F2221/2137Time limited access  e.g. to a computer or data0.059
G06F2221/2111Location-sensitive  e.g. geographical location  GPS0.059
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.059
G06F2221/2123Dummy operation0.059
H04L2212/00Encapsulation of packets0.059
G06F12/0223User address space allocation  e.g. contiguous or non contiguous base addressing0.059
G06F2212/2542Non-uniform memory access [NUMA] architecture0.059
Y02D10/24Scheduling0.059
Y02D10/26Increasing resource utilisation  e.g. virtualisation  consolidation0.059
G06F3/0629Configuration or reconfiguration of storage systems0.059
H04W84/20Master-slave | selection or change|  arrangements0.059
H04W28/0247based on conditions of the access network or the infrastructure network | central resource management | (ref: H04W28/16)0.059
H04W84/005Moving wireless networks0.059
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.