A first facility may include a data source and an edge service. A second facility may include a first cloud service and a second cloud service. A request may be received at the first cloud service to onboard the data source. A command may be sent from the first cloud service to an edge service to onboard the data source. The edge service may configure the data source to provide monitoring data to the second cloud service through the edge service. A data query may be received at the second cloud service from a client. A set of data queries may be determined based on the data query. A response may be generated based on executing the set of data queries. The response may be provided to the client.
A set of devices may be monitored and a subset of the set of devices which is experiencing a problem may be determined. A cardinality of the subset of the set of devices may be divided by a cardinality of the set of devices to obtain a ratio. An expected distribution over a set of attribute values may be determined by multiplying the ratio with a count of devices corresponding to each attribute value. An observed distribution over the set of attribute values may be determined by counting devices which are experiencing the problem corresponding to each attribute value. A probability value may be determined which represents a probability that the expected distribution matches the observed distribution. A report may be generated which includes attributes and the associated probability values, where an attribute is included in the report if the corresponding probability is less than a threshold.
A first request may be received from a loader to create a first file handle corresponding to a first library, where the first request may include a first identifier corresponding to the first library, and where the loader may be part of an operating system of a computer system. It may be determined that the first library is to be proxied by a second library. The first identifier in the first request may be replaced with a second identifier corresponding to the second library. The first file handle may be created based on the first request. The first file handle may be provided to the loader. An export section of a first image corresponding to the first file handle may be customized when the first image is mapped into a memory.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Troubleshooting of computer software problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for investigating, troubleshooting, diagnosing of computer hardware and software problems and repair of computer hardware and software
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Troubleshooting of computer software problems; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for investigating, troubleshooting, diagnosing of computer hardware and software problems and repair of computer hardware and software
6.
Target process injection prior to execution of marker libraries
A lock may be acquired on a virtual memory of a target process, where the virtual memory of the target process may include import dependency data of a marker library. An injection driver may be executed within the context of the target process when the marker library is loaded by the target process, where executing the injection driver within the context of the target process may enable the injection driver to modify virtual memory tables within the target process. The import dependency data of the marker library may be modified by the injection driver to include an injection library as a dependency of the marker library. After the modified import dependency data is used to load the injection library into the target process, the modified import dependency data may be reverted to an original state.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Application service provider featuring software for use in
the operation of computers; application service provider
featuring software used to monitor, test, enhance,
accelerate, and manage the performance of wide area, local
area, or global networks; application service provider
featuring software used to improve the performance of
computer applications, servers, data storage and
communications protocols used in wide area and global
networks; application service provider featuring software to
facilitate data storage; application service provider
featuring software for the transfer of data over private and
public networks and the global computer network,
transmitting and sharing of global network traffic, data,
and information across computer networks; application
service provider featuring software for optimizing,
enhancing, accelerating, and managing the performance,
security, and delivery of computer application traffic,
computer applications, websites, and data over networks;
application service provider featuring software for use in
the electronic transmission of computer applications and
data across computer networks, for computer network traffic
management, for providing traffic management, application
acceleration, application and network security, and server
optimization, to deliver, deploy and manage software
applications and data over computers networks, and
facilitating application, website and data deployment,
management, security and access across computer networks;
application service provider featuring operating system
software that facilitates application, website and data
deployment, management, security and access across computer
networks; application service provider featuring software
for the creation of firewalls; application service provider
featuring software used to monitor, analyze, manage, assess
and anticipate trends, troubleshoot, record, and enhance the
performance and security of computer applications, servers,
network devices, data storage and communications protocols
of computer networks; application service provider featuring
software for installing, monitoring, managing,
troubleshooting, diagnosing, verifying, and supporting
telecommunication networks and related services; application
service provider featuring software allowing collection,
archiving, normalization, reporting, and analysis of network
and infrastructure data, namely, topology, configuration,
performance, and traffic data, and other related application
performance data; application service provider featuring
software for network management and troubleshooting for use
in the fields of information technology, telecommunications,
software development, and software testing; application
service provider featuring software for network simulation;
application service provider featuring software monitor and
analyze web-based applications to better understand the
end-user experience and maximize end-user performance (term
considered incomprehensible by the International Bureau
pursuant to Rule 13 (2) (b) of the Regulations); application
service provider featuring software in the field of web
analytics to host software that collects, manages,
integrates, analyzes, monitors, and tracks the performance
of websites through web user behavior; application service
provider featuring software for analyzing the application
components that comprise an executed transaction end-to-end;
application service provider featuring software for
proactively monitoring and auditing activity and usage
between users and databases; application service provider
featuring software for use in monitoring, diagnosing, and
analyzing the performance of multi-tier applications;
application service provider featuring software for the
transfer of data over private and public networks and the
global computer network; consulting in the field of computer
hardware, software, and networking technology and
information technology; computer hardware and software
consulting services; computer diagnostic services; testing,
analysis, and evaluation of the knowledge, skills and
abilities of others for the purpose of certification in the
field of computer hardware, software, and networking
technology and information technology (term considered too
vague by the International Bureau pursuant to Rule 13 (2)
(b) of the Regulations).
Measurement data may be collected for a computing system, where the measurement data may correspond to leaf nodes in a tree that organizes the measurement data into a hierarchy of categories. A score associated with a first node in the tree may be calculated based on the measurement data and a set of weights, where each node in the tree may be associated with a weight in the set of weights, and where a score associated with a node in the tree may be based on scores associated with child nodes of the node. A first score corresponding to the computing system may be reported relative to other scores corresponding to other computing systems, where the other scores are computed based on other measurement data collected from other computing systems and the set of weights.
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Arranging and conducting educational conferences in the
field of technology; arranging and conducting educational
seminars, workshops, and courses in the field of computer
hardware, software, and networking technology and
information technology; training and teaching in the field
of computer hardware, software, and networking technology
and information technology.
10.
Using machine learning to predict infrastructure health
Metric data may be received, where the metric data may include one or more time series, where each time series may include a set of metric datapoints corresponding to a set of time slices, and where each metric datapoint may be a measurement of a metric of a monitored object in an infrastructure. An infrastructure health score may be computed for each time slice in the set of time slices based on the metric data. A machine learning (ML) model may be trained based on metric datapoints corresponding to at least a current time slice and the infrastructure health score corresponding to a future time slice. The trained ML model may then be used to predict a future infrastructure health score based on at least current metric datapoints.
Systems and techniques are described to facilitate using secure tokens for stateless software defined networking. An initial configuration may be created for deploying a network device at a deployment site. A cryptographically secure certificate may be created that includes the initial configuration for deploying the network device at the deployment site. The cryptographically secure certificate may be stored in a secure token that can be inserted into a secure token reader that is located at the deployment site and communicatively coupled to the device at the deployment site. The network device may then be configured at the deployment site by using the secure token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
Systems and techniques are described to detect and recover from ransomware infections. It may be determined if a ransomware attack is in progress based on analyzing read and write requests to a file system. Next, a mitigation action may be performed in response to determining that a ransomware attack is in progress.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
13.
Using secure tokens for stateless software defined networking
Systems and techniques are described to facilitate using secure tokens for stateless software defined networking. An initial configuration may be created for deploying a network device at a deployment site. A cryptographically secure certificate may be created that includes the initial configuration for deploying the network device at the deployment site. The cryptographically secure certificate may be stored in a secure token that can be inserted into a secure token reader that is located at the deployment site and communicatively coupled to the device at the deployment site. The network device may then be configured at the deployment site by using the secure token.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
14.
Data leak prevention using content based segmentation scanning
Systems and techniques are described for preventing data leaks from a network. A set of sensitive files or sensitive data that includes sensitive information can be received, and a first set of labels can be determined based on the set of sensitive files or sensitive data. An apparatus can then receive data that is to be checked for sensitive information, and determine a second set of labels based on the data. Next, the apparatus can match the second set of labels with the first set of labels. The apparatus can then determine whether or not the data includes sensitive information based on a result of said matching, and perform a data leak prevention action if it is determined that the data includes sensitive information.
Embodiments provide systems, methods, and computer program products to generate a network topology. Internet Protocol (IP) addresses may be collected that immediately precede a first IP address in a set of IP-address-sequences to obtain a first set of previous-hop IP addresses, where each IP-address-sequence in the set of IP-address-sequences comprises a sequence of IP addresses traversed by at least one packet. Next, each IP address in the first set of previous-hop IP addresses may be associated with a first logical node in the network topology.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software for use in performance intelligence,
application performance management, and monitoring desktop
performance, application performance and end user
productivity; computer software for use in IT management in
real or virtual environment; downloadable computer software
for use in performance intelligence, application performance
management, and monitoring desktop performance, application
performance and end user productivity; downloadable computer
software for use in IT management in real or virtual
environment; downloadable computer software for tracing,
detecting, discovering, testing, monitoring, analyzing,
modeling, diagnosing, notifying, and reporting the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; downloadable computer software for
analysis, diagnosis, measurement and management of
performance of distributed applications; downloadable
computer software for collecting statistics on application
performance over computer networks; downloadable computer
software for managing performance of the underlying
architecture of computer applications, websites, and network
systems; downloadable computer software for providing
monitoring, managing, and reporting of user behavior on
computing networks via customized graphical user interfaces;
downloadable computer software for querying and performing
graphical data analysis, namely, for use in understanding
the health and status of entities and systems, understanding
performance for end users engaging with software
downloadable computer software for tracing, detecting,
discovering, testing, monitoring, analyzing, modeling,
diagnosing, notifying and reporting the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; downloadable computer software for management,
optimization, monitoring, diagnosing, testing, tracking,
troubleshooting and investigation of software, applications,
and computer networks; downloadable computer software for
tracking and reporting of computer application, website, and
network performance to determine the technological
effectiveness and speed of the websites and mobile
applications; downloadable computer software for monitoring
technological functions of computer network systems;
downloadable computer software that allows users to measure,
analyze, benchmark, and compare the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; downloadable computer software that allows users to
measure, analyze, benchmark, and compare the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems, based on customizable key performance indicators;
downloadable computer software that allows users to analyze,
review, and report on the performance, availability,
topology, dependencies, functionality, behavior, business
impact, user experience, failures and content of software
applications, websites, and networked systems via customized
graphical user interfaces. Computer services, namely, hosting and maintaining an
on-line web site for others to access performance
intelligence platform and remotely control and manage IT
systems; software as a service (SAAS) services, namely,
hosting software for use by others for use in performance
intelligence, application performance management, monitoring
desktop performance, application performance and end user
productivity; software as a service (SAAS) services, namely,
hosting software for use by others for use in IT management
in real or virtual environment; providing temporary use of
non-downloadable computer software for use in performance
intelligence, application performance management, and
monitoring desktop performance, application performance and
end user productivity; providing temporary use of
non-downloadable computer software for use in IT management
in real or virtual environment; providing temporary use of
non-downloadable computer software for tracing, detecting,
discovering, testing, monitoring, analyzing, modeling,
diagnosing, notifying, and reporting the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; providing temporary use of non-downloadable
computer software for analysis, diagnosis, measurement and
management of performance of distributed applications;
providing temporary use of non-downloadable computer
software for collecting statistics on application
performance over computer networks; providing temporary use
of non-downloadable computer software for managing
performance of the underlying architecture of computer
applications, websites, and network systems; providing
temporary use of non-downloadable computer software for
providing monitoring, managing, and reporting of user
behavior on computing networks via customized graphical user
interfaces; providing temporary use of non-downloadable
computer software for querying and performing graphical data
analysis, namely, for use in understanding the health and
status of entities and systems, understanding performance
for end users engaging with software providing temporary use
of non-downloadable computer software for tracing,
detecting, discovering, testing, monitoring, analyzing,
modeling, diagnosing, notifying and reporting the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; computer consulting and development
services in the field of computer software for management,
optimization, monitoring, diagnosing, testing, tracking,
troubleshooting and investigation of software, applications,
and computer networks; tracking and reporting of computer
application, website, and network performance to determine
the technological effectiveness and speed of the websites
and mobile applications; technical support, namely,
monitoring technological functions of computer network
systems; providing temporary use of non-downloadable
computer software that allows users to measure, analyze,
benchmark, and compare the performance, availability,
topology, dependencies, functionality, behavior, business
impact, user experience, failures and content of software
applications, websites, and networked systems against
competing industry performance indices and competing
software applications, websites, and networked systems;
providing temporary use of non-downloadable computer
software that allows users to measure, analyze, benchmark,
and compare the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems against competing industry
performance indices and competing software applications,
websites, and networked systems, broken down by industry,
geography, company size, and technical parameters; providing
temporary use of non-downloadable computer software that
allows users to measure, analyze, benchmark, and compare the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems against competing industry performance
indices and competing software applications, websites, and
networked systems, based on customizable key performance
indicators; providing temporary use of non-downloadable
computer software that allows users to analyze, review, and
report on the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems via customized graphical
user interfaces.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware and computer networking hardware;
downloadable computer software for use in the operation of
computers; downloadable computer software for network
management; downloadable computer software used to monitor,
test, enhance, accelerate, and manage the performance of
wide area, local area, or global networks; Downloadable
server and networking software used to improve the
performance of computer applications, servers, data storage
and communications protocols used in wide area and global
networks. Application service provider featuring software for use in
the operation of computers; software as a service (SAAS)
services featuring software for use in the operation of
computers; application service provider featuring computer
software for network management; application service
provider featuring software used to monitor, test, enhance,
accelerate, and manage the performance of wide area, local
area, or global networks; application service provider
featuring software used to improve the performance of
computer applications, servers, data storage and
communications protocols used in wide area and global
networks.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software for use in performance intelligence,
application performance management, and monitoring desktop
performance, application performance and end user
productivity; computer software for use in IT management in
real or virtual environment; downloadable computer software
for use in performance intelligence, application performance
management, and monitoring desktop performance, application
performance and end user productivity; downloadable computer
software for use in IT management in real or virtual
environment; downloadable computer software for tracing,
detecting, discovering, testing, monitoring, analyzing,
modeling, diagnosing, notifying, and reporting the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; downloadable computer software for
analysis, diagnosis, measurement and management of
performance of distributed applications; downloadable
computer software for collecting statistics on application
performance over computer networks; downloadable computer
software for managing performance of the underlying
architecture of computer applications, websites, and network
systems; downloadable computer software for providing
monitoring, managing, and reporting of user behavior on
computing networks via customized graphical user interfaces;
downloadable computer software for querying and performing
graphical data analysis, namely, for use in understanding
the health and status of entities and systems, understanding
performance for end users engaging with software
downloadable computer software for tracing, detecting,
discovering, testing, monitoring, analyzing, modeling,
diagnosing, notifying and reporting the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; downloadable computer software for management,
optimization, monitoring, diagnosing, testing, tracking,
troubleshooting and investigation of software, applications,
and computer networks; downloadable computer software for
tracking and reporting of computer application, website, and
network performance to determine the technological
effectiveness and speed of the websites and mobile
applications; downloadable computer software for monitoring
technological functions of computer network systems;
downloadable computer software that allows users to measure,
analyze, benchmark, and compare the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; downloadable computer software that allows users to
measure, analyze, benchmark, and compare the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems, based on customizable key performance indicators;
downloadable computer software that allows users to analyze,
review, and report on the performance, availability,
topology, dependencies, functionality, behavior, business
impact, user experience, failures and content of software
applications, websites, and networked systems via customized
graphical user interfaces. Computer services, namely, hosting and maintaining an
on-line web site for others to access performance
intelligence platform and remotely control and manage IT
systems; software as a service (SAAS) services, namely,
hosting software for use by others for use in performance
intelligence, application performance management, monitoring
desktop performance, application performance and end user
productivity; software as a service (SAAS) services, namely,
hosting software for use by others for use in IT management
in real or virtual environment; providing temporary use of
non-downloadable computer software for use in performance
intelligence, application performance management, and
monitoring desktop performance, application performance and
end user productivity; providing temporary use of
non-downloadable computer software for use in IT management
in real or virtual environment; providing temporary use of
non-downloadable computer software for tracing, detecting,
discovering, testing, monitoring, analyzing, modeling,
diagnosing, notifying, and reporting the performance,
availability, topology, dependencies, functionality,
behavior, business impact, user experience, failures and
content of software applications, websites, and networked
systems; providing temporary use of non-downloadable
computer software for analysis, diagnosis, measurement and
management of performance of distributed applications;
providing temporary use of non-downloadable computer
software for collecting statistics on application
performance over computer networks; providing temporary use
of non-downloadable computer software for managing
performance of the underlying architecture of computer
applications, websites, and network systems; providing
temporary use of non-downloadable computer software for
providing monitoring, managing, and reporting of user
behavior on computing networks via customized graphical user
interfaces; providing temporary use of non-downloadable
computer software for querying and performing graphical data
analysis, namely, for use in understanding the health and
status of entities and systems, understanding performance
for end users engaging with software providing temporary use
of non-downloadable computer software for tracing,
detecting, discovering, testing, monitoring, analyzing,
modeling, diagnosing, notifying and reporting the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; computer consulting and development
services in the field of computer software for management,
optimization, monitoring, diagnosing, testing, tracking,
troubleshooting and investigation of software, applications,
and computer networks; tracking and reporting of computer
application, website, and network performance to determine
the technological effectiveness and speed of the websites
and mobile applications; technical support, namely,
monitoring technological functions of computer network
systems; providing temporary use of non-downloadable
computer software that allows users to measure, analyze,
benchmark, and compare the performance, availability,
topology, dependencies, functionality, behavior, business
impact, user experience, failures and content of software
applications, websites, and networked systems against
competing industry performance indices and competing
software applications, websites, and networked systems;
providing temporary use of non-downloadable computer
software that allows users to measure, analyze, benchmark,
and compare the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems against competing industry
performance indices and competing software applications,
websites, and networked systems, broken down by industry,
geography, company size, and technical parameters; providing
temporary use of non-downloadable computer software that
allows users to measure, analyze, benchmark, and compare the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems against competing industry performance
indices and competing software applications, websites, and
networked systems, based on customizable key performance
indicators; providing temporary use of non-downloadable
computer software that allows users to analyze, review, and
report on the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems via customized graphical
user interfaces.
Systems and techniques are described for ensuring that policies are consistently applied to traffic across an overlay network. An application identifier associated with a forward traffic flow and a corresponding reverse traffic flow can be determined by a device that routes packets of both the forward traffic flow and the corresponding reverse traffic flow. Next, an overlay header can be added to each packet in the forward traffic flow and to each packet in the corresponding reverse traffic flow, wherein the overlay header comprises the application identifier, a policy identifier, and a policy action. Each device in the overlay network can then apply the policy action specified in the overlay header of each packet that it routes.
H04L 12/715 - Routage hiérarchique, p.ex. réseaux en grappe ou routage inter-domaine
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of non-downloadable computer
software for use in performance intelligence, application
performance management, and monitoring desktop performance,
application performance and end user productivity; providing
temporary use of non-downloadable computer software for use
in IT management in real or virtual environment; providing
temporary use of non-downloadable computer software for
tracing, detecting, discovering, testing, monitoring,
analyzing, modeling, diagnosing, notifying, and reporting
the performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; providing temporary use of
non-downloadable computer software for analysis, diagnosis,
measurement and management of performance of distributed
applications; providing temporary use of non-downloadable
computer software for collecting statistics on application
performance over computer networks; providing temporary use
of non-downloadable computer software for managing
performance of the underlying architecture of computer
applications, websites, and network systems; providing
temporary use of non-downloadable computer software for
providing monitoring, managing, and reporting of user
behavior on computing networks via customized graphical user
interfaces; providing temporary use of non-downloadable
computer software for querying and performing graphical data
analysis, namely, for use in understanding the health and
status of entities and systems, understanding performance
for end users engaging with software; providing temporary
use of non-downloadable computer software for tracing,
detecting, discovering, testing, monitoring, analyzing,
modeling, diagnosing, notifying and reporting the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems; computer consulting and development
services in the field of computer software for management,
optimization, monitoring, diagnosing, testing, tracking,
troubleshooting and investigation of software, applications,
and computer networks; tracking and reporting of computer
application, website, and network performance to determine
the technological effectiveness and speed of the websites
and mobile applications; technical support, namely,
monitoring technological functions of computer network
systems; providing temporary use of non-downloadable
computer software that allows users to measure, analyze,
benchmark, and compare the performance, availability,
topology, dependencies, functionality, behavior, business
impact, user experience, failures and content of software
applications, websites, and networked systems against
competing industry performance indices and competing
software applications, websites, and networked systems;
providing temporary use of non-downloadable computer
software that allows users to measure, analyze, benchmark,
and compare the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems against competing industry
performance indices and competing software applications,
websites, and networked systems, broken down by industry,
geography, company size, and technical parameters; providing
temporary use of non-downloadable computer software that
allows users to measure, analyze, benchmark, and compare the
performance, availability, topology, dependencies,
functionality, behavior, business impact, user experience,
failures and content of software applications, websites, and
networked systems against competing industry performance
indices and competing software applications, websites, and
networked systems, based on customizable key performance
indicators; providing temporary use of non-downloadable
computer software that allows users to analyze, review, and
report on the performance, availability, topology,
dependencies, functionality, behavior, business impact, user
experience, failures and content of software applications,
websites, and networked systems via customized graphical
user interfaces.
21.
Software defined wide area network (SD WAN) enabled network fabric for containers
Systems and techniques are described for creating a software-defined wide-area-network (SD-WAN) enabled network fabric for containers. Embodiments can configure one or more virtual networks on a network node, wherein the one or more virtual networks are used for creating the SD-WAN enabled network fabric for containers. Next, the embodiments can deploy a virtual gateway on the network node by executing the virtual gateway image. The embodiments can then create a container network interface configuration based on network address information of the one or more virtual networks and the virtual gateway, and execute the container network interface configuration, thereby enabling containers on the network node to communicate via the SD-WAN enabled network fabric.
H04L 12/933 - Cœur de commutateur, p.ex. barres croisées, mémoire partagée ou support partagé
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 12/715 - Routage hiérarchique, p.ex. réseaux en grappe ou routage inter-domaine
H04L 12/751 - Mise à jour ou découverte de la topologie
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Some embodiments described herein provide a combination of a layer 3 (L3) hop with layer 2 (L2) bypass/fail-to-wire in a network device. Specifically, some embodiments place the network device between two routers, thereby becoming a L3 hop between the two routers. The existing route between the two routers is preserved by using L2 bypass through the network device. If the network device fails, then the physical fail-to-wire will be engaged, removing its L3 hop, but preserving the L2 bypass.
H04L 12/931 - Architecture de matrice de commutation
H04L 12/911 - Contrôle d’admission au réseau et allocation de ressources, p.ex. allocation de bande passante ou renégociation en cours de communication
H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
23.
Estimating data transfer performance improvement that is expected to be achieved by a network optimization device
Systems and techniques are described for calculating performance improvement achieved and/or expected to be achieved by optimizing a network connection. Network characteristics can be measured for non-optimized network connections. Next, the network characteristics can be analyzed to obtain a set of non-optimized connection groups, wherein each non-optimized connection group corresponds to non-optimized network connections that have similar network characteristics. Network characteristics for an optimized network connection can be measured. Next, a non-optimized connection group can be identified based on the network characteristics that were measured for the optimized network connection. A performance improvement metric can then be calculated based on a throughput of the optimized network connection and corresponding throughputs of non-optimized network connections in the identified non-optimized connection group.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
recorded computer software for use in performance intelligence, namely, for evaluating IT performance using data analytics; recorded computer software for use in application performance management, and monitoring desktop performance, application performance and end user productivity; downloadable computer software for use in IT management in real or virtual environment; downloadable computer software for use in performance intelligence, namely, for evaluating IT performance using data analytics; downloadable computer software for use in application performance management, and monitoring desktop performance, application performance and end user productivity; downloadable computer software for use in IT management in real or virtual environment; downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying, and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; downloadable computer software for analysis, diagnosis, measurement and management of performance of distributed applications; downloadable computer software for collecting statistics on application performance over computer networks; downloadable computer software for managing performance of the underlying architecture of computer applications, websites, and network systems; downloadable computer software for providing monitoring, managing, and reporting of user behavior on computing networks via customized graphical user interfaces; downloadable computer software for querying and performing graphical data analysis, namely, for use in understanding the health and status of entities and systems, and understanding performance for end users engaging with software; downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems based on customizable key performance indicators; downloadable computer software that allows users to analyze, review, and report on the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems via customized graphical user interfaces computer services, namely, hosting and maintaining an on-line web site for others to access a performance intelligence platform, namely, a platform that uses software to evaluate IT performance using data analytics, and remotely control and manage IT systems; Software as a service (SAAS) services, namely, hosting software for use by others for use in performance intelligence, namely, for evaluating IT performance using data analytics; Software as a service (SAAS) services, namely, hosting software for use by others for use in application performance management, monitoring desktop performance, application performance and end user productivity; Software as a service (SAAS) services, namely, hosting software for use by others for use in IT management in real or virtual environment; providing temporary use of non-downloadable computer software for use in performance intelligence, namely, for evaluating IT performance using data analytics; providing temporary use of non-downloadable computer software for use in application performance management, and monitoring desktop performance, application performance and end user productivity; providing temporary use of non-downloadable computer software for use in IT management in real or virtual environment; providing temporary use of non-downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying, and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; providing temporary use of non-downloadable computer software for analysis, diagnosis, measurement and management of performance of distributed applications; providing temporary use of non-downloadable computer software for collecting statistics on application performance over computer networks; providing temporary use of non-downloadable computer software for managing performance of the underlying architecture of computer applications, websites, and network systems; providing temporary use of non-downloadable computer software for providing monitoring, managing, and reporting of user behavior on computing networks via customized graphical user interfaces; providing temporary use of non-downloadable computer software for querying and performing graphical data analysis, namely, for use in understanding the health and status of entities and systems, and understanding performance for end users engaging with software; providing temporary use of non-downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; computer consulting and development services in the field of computer software for management, optimization, monitoring, diagnosing, testing, tracking, troubleshooting and investigation of software, applications, and computer networks; tracking and reporting of computer application, website, and network performance to determine the technological effectiveness and speed of the websites and mobile applications; technical support, namely, monitoring technological functions of computer network systems; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems, broken down by industry, geography, company size, and technical parameters; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems, based on customizable key performance indicators; providing temporary use of non-downloadable computer software that allows users to analyze, review, and report on the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems via customized graphical user interfaces
Systems and techniques are described for compressing strings by using a tree data structure. Specifically, for each string in a sequence of strings, the embodiments can traverse the tree data structure by matching characters of the string with characters associated with nodes of the tree data structure until either (1) all characters in the string have been processed, or (2) a current character in the string does not match a corresponding character in a current node of the tree data structure. Next, a first node identifier associated with the current node can be returned if all characters have been processed. Otherwise, a new node can be created in the tree data structure to store the remaining characters in the string, and a second node identifier associated with the new node in the tree data structure can be returned.
H03M 7/00 - Conversion d'un code, dans lequel l'information est représentée par une séquence donnée ou par un nombre de chiffres, en un code dans lequel la même information est représentée par une séquence ou par un nombre de chiffres différents
G06F 40/146 - Codage ou compression de données en configuration arborescente
H03M 7/30 - CompressionExpansionÉlimination de données inutiles, p. ex. réduction de redondance
H03M 7/40 - Conversion en, ou à partir de codes de longueur variable, p. ex. code Shannon-Fano, code Huffman, code Morse
Virtual storage arrays consolidate branch data storage at data centers connected via wide area networks. Virtual storage arrays appear to storage clients as local data storage; however, virtual storage arrays actually store data at the data center. The virtual storage arrays overcomes bandwidth and latency limitations of the wide area network by predicting and prefetching storage blocks, which are then cached at the branch location. Virtual storage arrays leverage an understanding of the semantics and structure of high-level data structures associated with storage blocks to predict which storage blocks are likely to be requested by a storage client in the near future. Virtual storage arrays determine the association between requested storage blocks and corresponding high-level data structure entities to predict additional high-level data structure entities that are likely to be accessed. From this, the virtual storage array identifies the additional storage blocks for prefetching.
G06F 16/172 - Mise en cache, pré-extraction ou accumulation de fichiers
G06F 12/0862 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache avec pré-lecture
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
Systems and techniques are described for applying a set of policy rules to network traffic. During operation, conditions specified in the set of policy rules can be evaluated, wherein each condition is a logical expression defined over a set of variables, and is evaluated by substituting values of the set of variables associated with the network traffic into the logical expression. Next, a subset of policy rules can be selected whose conditions evaluated as true. A highest precedence policy rule from the subset of policy rules can then be identified by applying a set of precedence rules to the subset of policy rules, wherein the set of precedence rules imposes a precedence order on the set of policy rules based on condition categories and condition specificities. Finally, an action that is specified in the highest precedence policy rule can be performed.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
providing temporary use of non-downloadable computer software for use in performance intelligence, application performance management, and monitoring desktop performance, application performance and end user productivity; providing temporary use of non-downloadable computer software for use in IT management in real or virtual environment; providing temporary use of non-downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying, and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; providing temporary use of non-downloadable computer software for analysis, diagnosis, measurement and management of performance of distributed applications; providing temporary use of non-downloadable computer software for collecting statistics on application performance over computer networks; providing temporary use of non-downloadable computer software for managing performance of the underlying architecture of computer applications, websites, and network systems; providing temporary use of non-downloadable computer software for providing monitoring, managing, and reporting of user behavior on computing networks via customized graphical user interfaces; providing temporary use of non-downloadable computer software for querying and performing graphical data analysis, namely, for use in understanding the health and status of entities and systems, understanding performance for end users engaging with software providing temporary use of non-downloadable computer software for tracing, detecting, discovering, testing, monitoring, analyzing, modeling, diagnosing, notifying and reporting the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems; computer consulting and development services in the field of computer software for management, optimization, monitoring, diagnosing, testing, tracking, troubleshooting and investigation of software, applications, and computer networks; tracking and reporting of computer application, website, and network performance to determine the technological effectiveness and speed of the websites and mobile applications; technical support, namely, monitoring technological functions of computer network systems; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems, broken down by industry, geography, company size, and technical parameters; providing temporary use of non-downloadable computer software that allows users to measure, analyze, benchmark, and compare the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems against competing industry performance indices and competing software applications, websites, and networked systems, based on customizable key performance indicators; providing temporary use of non-downloadable computer software that allows users to analyze, review, and report on the performance, availability, topology, dependencies, functionality, behavior, business impact, user experience, failures and content of software applications, websites, and networked systems via customized graphical user interfaces
Systems and techniques are described for configuring path selection in a network. The network can comprise a first router, a second router, a third router, a fourth router, and an intermediary device. The second router can be configured to use Differentiated Services Code Point (DSCP) while routing packets so that packets with a first DSCP value are routed through the third router, and packets with a second DSCP value are routed through the fourth router. The intermediary device can be configured to: (1) transparently intercept a packet forwarded by the first router to the second router, (2) determine whether the packet is to be routed through the third router or the fourth router, (3) modify a DSCP field in the packet based on said determining, and (4) forward the packet to the second router.
H04L 12/703 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP]
H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès
H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Advertising and marketing consultancy; providing business
information in the fields of marketing and selling computer
and computer networking hardware and software, the
configuration management for computer hardware and software,
and the selection, implementation and use of computer
hardware and software systems for others. Educational services, namely, training in the fields of
information technology marketing and selling computer and
computer networking hardware and software, computer and
computer networking hardware and software, the configuration
management for computer hardware and software, and the
selection, implementation and use of computer hardware and
software systems for others. Consultancy and providing information in the fields of
computer and computer networking hardware and software
(terms too vague in the opinion of the International Bureau
- Rule 13 (2) (b) of the Common Regulations); computer
consultation (terms too vague in the opinion of the
International Bureau - Rule 13 (2) (b) of the Common
Regulations); consulting in the field of information
technology; consulting services in the field of
configuration management for computer hardware and software
(terms too vague in the opinion of the International Bureau
- Rule 13 (2) (b) of the Common Regulations); consulting
services in the fields of the selection, implementation and
use of computer hardware and software systems for others;
providing information, news, and commentary in the fields of
computer and computer networking hardware and software
(terms too vague in the opinion of the International Bureau
- Rule 13 (2) (b) of the Common Regulations); providing
information, news, and commentary in the fields of
information technology, the configuration management for
computer hardware and software, and the selection,
implementation, and use of computer hardware and software
systems for others (terms too vague in the opinion of the
International Bureau - Rule 13 (2) (b) of the Common
Regulations).
31.
Automated problem diagnosis on logs using anomalous telemetry analysis
Systems and techniques are described for performing automatic problem diagnosis. Telemetry data of a system can be analyzed to identify a set of time ranges during which the telemetry data exhibits anomalous behavior. Next, a subset of log entries having a timestamp that is in one of the time ranges in set of time ranges can be extracted from a set of log entries generated by the system. The subset of log entries can then be analyzed, by using natural language processing, to identify a subset of the subset of log entries that has a high likelihood to be associated with one or problems in the system. Next, human-readable text can be extracted from the subset of the subset of log entries. A knowledge database can then be searched by using the human-readable text to identify one or more solutions to resolve the one or more problems in the system.
Systems and techniques are described for controlling injection of a library into a process. Specifically, some embodiments provide an Advanced Injection Rule Engine (AIRE), which uses a set of rules to selectively inject a library, e.g., a dynamic-link library (DLL), into a process. Some embodiments implement a Domain Specific Language (DSL), called AIRE Script, to define the injection rules that are used by the AIRE at runtime.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
33.
Connecting transparent network devices to optimize unidirectional network traffic
Transparent network devices intercept unidirectional network traffic and use bidirectional network protocol messages to discover each other and configure an inner connection. A first transparent network device intercepting unidirectional network traffic between a source and destination will send a bidirectional network protocol message addressed to the destination that includes an indicator of its presence. Additional transparent network devices that intercept this network message each add their own indicator to the message. If no response to the bidirectional network message is received, an error message is received, or a response message is received directly from the destination by one of the transparent network devices, this additional transparent network device deduces that it is the closest transparent network device to the destination and sends a response message addressed to the source that includes an indicator of its presence. The first transparent network device receives the response message and establishes an inner connection.
Systems and techniques are described for performing proxy auto-discovery in an Internet Protocol version 6 (IPv6) network by using the destination options extension header field in the IPv6 header. Specifically, systems and techniques are described to enable a pair of proxies to transparently intercept connection handshake messages that are carried in IPv6 packets between two network nodes, and to use the destination options extension header field in the IPv6 packets to automatically discover each other.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04W 4/20 - Signalisation de servicesSignalisation de données auxiliaires, c.-à-d. transmission de données par un canal non destiné au trafic
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer consultation; computer software consultation;
computer technology consultancy; information technology
consulting services; consulting services in the design and
implementation of computer-based information systems;
maintenance and upgrading of computer software; technical
support services, namely, troubleshooting in the nature of
diagnosing computer hardware and software problems; computer
technical support services, namely, help desk services for
it infrastructure, operating systems, database systems, and
web applications; technological planning and consulting
services in the field of computer hardware systems, computer
software, and computer networking; planning and development
of electronic communications networks; planning, design and
implementation of computer technologies for others.
36.
Methods and systems for distribution and retrieval of network traffic records
A method includes transmitting, by a distribution server, to each of a plurality of worker computers, a request for an enumeration of Internet Protocol (IP) addresses ranked according to a criterion. The method includes receiving, by the distribution computer, from a first of the plurality of worker computers, a first partial enumeration of the requested IP addresses ranked according to the criterion, the first partial enumeration stored in a hash table. The method includes receiving, by the distribution computer, from a second of the plurality of worker computers, a second partial enumeration of the requested IP addresses ranked according to the criterion, the second partial enumeration stored in a hash table. The method includes generating, by the distribution computer, a combined enumeration including the first partial enumeration and the second partial enumeration, the combined enumeration ranked according to the criterion. The distribution computer deduplicates the combined enumeration.
Systems and techniques are described for performing minimally invasive monitoring of path quality in a network. Specifically, path quality requests and measurements can be piggy-backed on the data traffic that is flowing through a secure connection between two network nodes. For example, path quality requests and measurements can be inserted into the TFC padding field of IP/ESP packets that are being communicated between two IPsec devices. The disclosed embodiments ensure that the number/frequency of measurements increases/decreases naturally in proportion to the amount of traffic flowing, and that the measurement data does not get differential treatment in the network as they are intrinsically bound to the data packets being monitored.
Systems and techniques are described for dynamically influencing route re-distribution between an exterior gateway protocol (EGP) and an interior gateway protocol (IGP). Some embodiments can dynamically influence which routes are re-distributed into the IGP network for use in cases where traffic destined to that particular remote site is desired to be steered on the desired network/border router. Moreover, some embodiments can dynamically influence route re-distribution from the IGP network to the EGP network for particular destinations so that traffic entering the local site is attracted over a particular network/border router.
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/733 - Sélection d’un chemin de longueur minimum ou de nombre de sauts minimum
H04L 12/781 - Routage multi-protocole, p.ex. adaptation de protocole entre IPv4 et IPv6 ou pile duale
H04L 12/803 - Commande de flux ou commande de congestion Équilibrage de charge, p.ex. répartition du trafic entre multiples liens
H04L 12/751 - Mise à jour ou découverte de la topologie
H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès
39.
Methods and systems for distribution and retrieval of network traffic records
A method includes receiving, by a distribution server, a plurality of network traffic records. The distribution server generates a first hash from a first plurality of fields in a first of the plurality of network traffic records and generating a second hash from a second plurality of fields in a second of the plurality of network traffic records. The distribution server determines that the first and second of the plurality of network traffic records relate to a session. The method includes transmitting the first and second of the plurality of network traffic records to one of a plurality of worker computing devices selected based on the determination and on at least one of the first and second hash. The distribution server transmits a request for an enumeration of addresses ranked according to a criterion, receives partial enumerations from a plurality of worker computers, and generates a combined, deduplicated enumeration.
Systems and techniques are described for caching resources. Multiple distinct resource identifiers that correspond to the same resource can be automatically collected, wherein the multiple distinct resource identifiers are included in resource requests that are sent from at least one client to at least one server. Next, a key can be automatically determined that matches the multiple distinct resource identifiers by analyzing the multiple distinct resource identifiers. A resource request can be received from a client that includes a resource identifier, and in response to determining that the resource identifier matches the key, the resource can be sent to the client.
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 12/0864 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens pseudo-associatifs, p. ex. associatifs d’ensemble ou de hachage
41.
Target process injection prior to execution of marker libraries
The disclosed embodiments provide a system that modifies execution of a target process in a computer system. During loading of a marker library by a target process, the system modifies import dependency data of the marker library to include an injection library as a dependency of a marker library. After the modified import dependency data is used to load the injection library into the target process by the operating system or loader, the system executes the injection library prior to execution of the marker library to revert the import dependency data to an original state and modify execution of the target process.
Disclosed herein are system, method, and computer program product embodiments for performing distributed correlation to determine a probable cause for a performance problem detected in an application. An embodiment operates by triggering an alert for a performance metric of an application executing on a local-level node. The alert may be sent to a higher-level node. Upon receiving the alert, the higher-level node may send a distributed correlation request, used to determine a root cause of the alert, to the lower-level node. Upon receiving the distributed correlation request, the lower-level node may produce and send a correlation result to the higher-level node. Upon receiving the correlation result, the higher-level node may select the probable cause of triggering the alert based on the correlation result. The probable cause may then be presented to the user.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/24 - Dispositions pour la maintenance ou la gestion
Systems and techniques are described for path selection. A packet can be transparently intercepted at an intermediary device. Next, the intermediary device may modify one or more bits in the header of the packet. The intermediary device can then forward the packet to the next hop device. In some network configurations, the modifications to the one or more bits in the header of the packet may cause a downstream device to select a path that is different from the path that would have been selected by the downstream device if the one or more bits in the header of the packet had not been modified. A path selection policy can be used to determine whether or not one or more bits in the header of the packet are to be modified.
H04L 12/703 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP]
H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès
H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
H04L 12/741 - Traitement de l'adressage d’en-tête pour le routage, p.ex. table de correspondance
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
44.
Displaying adaptive content in heterogeneous performance monitoring and troubleshooting environments
Systems, methods, and computer program embodiments are disclosed for adaptively displaying application performance data. In an embodiment, a plurality of performance monitoring data sources may be identified based on an application model that defines the topological structure of a software application. A request may be received for performance data associated with the application. One or more content options may then be determined based on the received request, and each content option may include one or more target performance metrics. Each content option may also be associated with one or more data sources. For each content option, the associated data sources may be queried to identify available data sources containing relevant performance data. A content option may be selected from the determined content options based on a priority associated with the content option. The performance data corresponding to the selected content option may subsequently be retrieved and presented for display.
Systems and techniques are described for optimizing communications between a client and a server. Specifically, in some embodiments, an executing script on a client can send a resource request to a server. In response, the server can send an optimized version of the resource back to the client. The client can then reconstruct the resource from the optimized version of the resource.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
46.
Single-ended deduplication using cloud storage protocol
A single-ended optimized storage protocol enables storage clients or other devices to direct a remote data storage to copy data. In response to commands via the protocol, a remote data storage can copy portions of a data stream at the remote data storage to destination storage locations within the same or a different data stream. The protocol may be utilized for optimized transfer of data via a network to a remote data storage. An initial data stream is divided into segments. Redundant segments are removed from the data stream to form an optimized data stream, which is transferred to the remote data storage. Commands are issued to the remote data storage using the protocol to direct the remote data storage to reconstruct the initial data stream at the remote data storage using the optimized data stream and optionally segments from other data streams previously transferred to the remote data storage.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
The file creation on remote data storage accessible via a WAN can be optimized by creating temporary files in advance on a remote data storage. The file handles or other file access parameters for these temporary files are cached at a client network location. A file creation request from a client is intercepted at the client network location and one of the cached file handle is returned to the client. This enables the client to immediately write data to the corresponding temporary file, avoiding the delay incurred by communicating the file creation request and its response over a WAN. One or more storage commands are sent to the remote data storage to change the attributes of the temporary file to match those requested by the client, such as the file name, directory, and/or file permissions. File creation requests may be selectively optimized according to rules or criteria specified by users.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet
48.
Optimizing secure communications between a client authenticating server and a mobile client
Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a secure connection handshake or a handshake renegotiation between two computing devices. The first and second intermediaries can then optimize secure communications between the two computing devices.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
Systems and techniques are described for optimizing secure communications. A client can use an authentication protocol, e.g., Kerberos, to authenticate with the server. Specifically, the client can obtain a service ticket from a ticket granting server, and then use the service ticket to authenticate with the server. The server can respond by providing an encrypted session key. The session key can then be used by the client and server to securely communicate with each other. A wide area network (WAN) optimization device described in this disclosure is capable of obtaining the session key without decrypting the service ticket. Specifically, the WAN optimization device can use information other than the service ticket to obtain the session key.
The presently disclosed subject matter includes a device, system and method for monitoring activity at a computerized device, the device running one or more processes, at least one of the processes executing one or more system events being part of an activity. An activity of interest can be identified if system events related to the activity of interest are identified. An activity is monitored at the device using API queries to obtain descriptive information of the at least one respective system event executed as part of the activity. Using non-intrusive monitoring methods which are based on API queries enables to reduce the potential of interference of the monitoring with applications running on the monitored device.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
Network traffic information from multiple sources, at multiple time scales, and at multiple levels of detail are integrated so that users may more easily identify relevant network information. The network monitoring system stores and manipulates low-level and higher-level network traffic data separately to enable efficient data collection and storage. Packet traffic data is collected, stored, and analyzed at multiple locations. The network monitoring locations communicate summary and aggregate data to central modules, which combine this data to provide an end-to-end description of network traffic at coarser time scales. The network monitoring system enables users to zoom in on high-level, coarse time scale network performance data to one or more lower levels of network performance data at finer time scales. When high-level network performance data of interest is selected, corresponding low-level network performance data is retrieved from the appropriate distributed network monitoring locations to provide additional detailed information.
A method and apparatus are provided for scheduling a heterogeneous communication flow. A heterogeneous flow is a flow comprising packets with varying classes or levels of service, which may correspond to different priorities, qualities of service or other service characteristics. When a packet is ready for scheduling, it is queued in order in a flow queue that corresponds to the communication flow. The flow queue then migrates among class queues that correspond to the class or level of service of the packet at the head of the flow queue. Thus, after the head packet is scheduled, the flow queue may be dequeued from its current class queue and requeued at the tail of another class queue. If the subsequent packet has the same classification, it may be requeued at the tail of the class queue or may remain in place for another servicing round.
Systems and techniques are described for load balancing between WAN optimization devices. During operation, a mapping is determined based solely or partially on capacities of a set of remote WAN optimization devices and capacities of a set of local WAN optimization devices, wherein the mapping maps each remote WAN optimization device to a local WAN optimization device. Next, connection requests are directed to WAN optimization devices based on the mapping.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/927 - Allocation de ressources en fonction du type de trafic, qualité de service ou priorité
54.
Method and apparatus for scheduling a heterogeneous communication flow
A method and apparatus are provided for scheduling a heterogeneous communication flow. A heterogeneous flow is a flow comprising packets with varying classes or levels of service, which may correspond to different priorities, qualities of service or other service characteristics. When a packet is ready for scheduling, it is queued in order in a flow queue that corresponds to the communication flow. The flow queue then migrates among class queues that correspond to the class or level of service of the packet at the head of the flow queue. Thus, after the head packet is scheduled, the flow queue may be dequeued from its current class queue and requeued at the tail of another class queue. If the subsequent packet has the same classification, it may be requeued at the tail of the class queue or may remain in place for another servicing round.
Systems and techniques are described for path selection. A packet can be transparently intercepted at an intermediary device. Next, the intermediary device may modify one or more bits in the header of the packet. The intermediary device can then forward the packet to the next hop device. In some network configurations, the modifications to the one or more bits in the header of the packet may cause a downstream device to select a path that is different from the path that would have been selected by the downstream device if the one or more bits in the header of the packet had not been modified. A path selection policy can be used to determine whether or not one or more bits in the header of the packet are to be modified.
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/707 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP] par redondance des chemins d’accès
H04L 12/947 - Procédés d’adressage dans un dispositif, p.ex. utilisant des identifiants ou étiquettes internes pour routage dans un commutateur
H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
H04L 12/703 - Prévention ou récupération du défaut de routage, p.ex. reroutage, redondance de route "virtual router redundancy protocol" [VRRP] ou "hot standby router protocol" [HSRP]
56.
Methods and systems for distribution and retrieval of network traffic records
A method includes receiving, by a distribution server, from an exporter device, a plurality of network traffic records. The method includes generating, by the distribution server, a first hash from a first plurality of fields in a first of the plurality of network traffic records and generating a second hash from a second plurality of fields in a second of the plurality of network traffic records. The method includes comparing the first hash and the second hash and determining that the first of the plurality of network traffic records and the second of the plurality of network traffic records relate to a session, based upon the comparison. The method includes transmitting the first and second of the plurality of network traffic records to one of a plurality of worker computing devices selected based on the determination and on at least one of the first and second hash.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
application service provider featuring software for use in the operation of computers; computer software for network management; application service provider featuring software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; application service provider featuring software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks; application service provider featuring software to facilitate data storage; application service provider featuring software for the transfer of data over private and public networks and the global computer network, transmitting and sharing of global network traffic, data, and information across computer networks; application service provider featuring software for optimizing, enhancing, accelerating, and managing the performance, security, and delivery of computer application traffic, computer applications [ , websites, ] and data over networks; application service provider featuring software for use in the electronic transmission of computer applications and data across computer networks, for computer network traffic management, for providing traffic management, application acceleration, application and network security, and server optimization, to deliver, deploy and manage software applications and data over computers networks, and facilitating application, [ website and ] data deployment, management, security and access across computer networks; application service provider featuring operating system software that facilitates application, [ website and ] data deployment, management, security and access across computer networks; [ application service provider featuring software for the creation of firewalls; ] application service provider featuring software used to monitor, analyze, manage, assess and anticipate trends, troubleshoot, record, and enhance the performance and security of computer applications, servers, network devices, data storage and communications protocols of computer networks; application service provider featuring software for installing, monitoring, managing, troubleshooting, diagnosing, verifying, and supporting telecommunication networks and related services; application service provider featuring software allowing collection, archiving, normalization, reporting, and analysis of network and infrastructure data, namely, topology, configuration, performance, and traffic data, and other related application performance data; application service provider featuring software for network management and troubleshooting for use in the fields of information technology, telecommunications, software development, and software testing; application service provider featuring software for network simulation; application service provider featuring software monitor and analyze web-based applications to better understand the end-user experience and maximize end-user performance; application service provider featuring software in the field of web analytics to host software that collects, manages, integrates, analyzes, monitors, and tracks the performance of websites through web user behavior; application service provider featuring software for analyzing the application components that comprise an executed transaction end-to-end; application service provider featuring software for proactively monitoring and auditing activity and usage between users and databases; application service provider featuring software for use in monitoring, diagnosing, and analyzing the performance of multi-tier applications [ ; application service provider featuring software for the transfer of data over private and public networks and the global computer network; consulting in the field of computer hardware, software, and networking technology and information technology; computer hardware and software consulting services; computer diagnostic services; testing, analysis, and evaluation of the knowledge, skills and abilities of others for the purpose of certification in the field of computer hardware, software, and networking technology and information technology ]
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware and computer networking hardware; computer software for use in the operation of computers; computer software for network management; software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; computer software and computer networking software for the transfer of data over private and public networks and the global computer network; computer software and computer networking software to facilitate data storage; server and networking software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks; computer software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks. Application service provider featuring software for use in the operation of computers; application service provider featuring software for network management; application service provider featuring software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; application service provider featuring software for the transfer of data over private and public networks and the global computer network; application service provider featuring software to facilitate data storage; application service provider featuring software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware and computer networking hardware; computer software for use in the operation of computers; computer software for network management; software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; server and networking software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks. Application service provider featuring software for use in the operation of computers; application service provider featuring computer software for network management; application service provider featuring software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; application service provider featuring software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks.
60.
Automatic prompt detection for universal device support
Embodiments provide systems, methods, and computer program products for network management application to automatically determine a session prompt for a network device and perform error handling. After logging in to a network device, the network management application records the first session prompt response. The network management application sends a series of empty carriage returns and random characters and records the session prompt responses. The network management application compares the responses and determines whether the prompt is a static or a dynamic prompt based on the results. The network management application elicits error responses from the network device by sending additional random characters and records the results in an error handling dictionary. The error handling dictionary is used later when running user-provided commands, enabling a determination of whether a command executed successfully.
G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
H04L 12/24 - Dispositions pour la maintenance ou la gestion
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p. ex. essais de mise en route
G06F 11/263 - Génération de signaux d'entrée de test, p. ex. vecteurs, formes ou séquences de test
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
61.
Managing digital certificates for WAN optimization over content delivery networks
Digital certificates are distributed to WAN optimization modules in organization and content delivery networks to securely optimize network traffic. The content delivery network identifies edge WAN optimization modules for use with each combination of organizations and their cloud services and distributes digital certificates accordingly. Peering digital certificates for establishing inner connections between organization and edge WAN optimization modules are exchanged via one or more management portals. Shadow digital certificates for establishing outer connections between WAN optimization modules and clients are generated in the form of certificate signing requests. Configuration information identifies any additional cloud services associated with a given cloud service and generate corresponding additional certificate signing requests. Certificate signing requests are digitally signed by a certificate signing authority associated with the organization and then returned via the one or more management portals to the allocated edge WAN optimization modules. Digital certificates may be rotated for security purposes.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
62.
Persisting large volumes of data in an efficient unobtrusive manner
Embodiments provide a data persisting mechanism that allows for efficient, unobtrusive persisting of large volumes of data while optimizing the use of system resources by the persisting process. In an embodiment, the persisting process includes a self-tuning algorithm that constantly monitors persistence performance and that adjusts persistence time to maintain performance within user-defined criteria. From one aspect, this allows the persisting process to seamlessly adapt to changes in system environment (speeding up persistence during times of low processor usage and slowing down persistence during times of high processor usage) and to reduce or eliminate CPU spikes caused by persisting process. From another aspect, the persisting process results in the data being persisted as quickly as possible given the system constraints, thereby minimizing the possibility of data loss.
Embodiments provide systems, methods, and computer program products for dynamically hooking multiple levels of application code. A server receives identifying information that identifies a target function of a target application to hook. The server pauses a target process of the target application. The server locates the target function within the target application code based on the received identifying information. The server then hooks the located function outside of the target application, thereby creating hooked code during application runtime.
The connectivity information provided by a variety of inference engines is integrated to provide a set of inferred links within a network. A consolidation is performed among inference engines that operate at a base level of connectivity detail to create a model of the network at this base level. The connectivity information provided by inference engines at each subsequent higher level of connectivity abstraction is then overlaid on the base level connectivity. By separately consolidating the connectivity information at each level of abstraction, the rules for dealing with conflicts can be simplified and/or better focused to resolve the conflict. By assuming that the more detailed lower level information is likely to be more accurate, rules can be developed to modify the connectivity models produced by the higher level techniques to conform to the lower level connectivity details while still maintaining the integrity of the higher level connectivity models.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
G06N 5/04 - Modèles d’inférence ou de raisonnement
H04L 12/24 - Dispositions pour la maintenance ou la gestion
Embodiments provide systems, methods, and computer program products for inferring node and link information from traceroute data in order to generate topology information. A system receives traceroute data for a data packet that traverses a path from a source to a destination. The system infers port types for the addresses in the traceroute data and groups subsets of the addresses in the traceroute data into logical nodes based on neighbor relationships demonstrated in backward and forward neighbors sets. The system then generates node and link information based on the inferred and grouped information.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
66.
Inferring connectivity among network segments in the absence of configuration information
The present system includes a system, method and device for inferring connectivity between unconnected network segments. In operation, unconnected network segments are identified. Configuration data related to the unconnected network segments may be examined to facilitate inferring configuration data for an external network connected between the unconnected network segments. The inferred configuration data may be rendered, such as exported or visualized. The inferred configuration data may be related to a communication protocol and/or may be related to network bandwidth. The examined configuration data may be captured directly from one or more of the unconnected network segments and/or may be retrieved from a configuration data file, such as a network configuration model.
H04L 12/28 - Réseaux de données à commutation caractérisés par la configuration des liaisons, p. ex. réseaux locaux [LAN Local Area Networks] ou réseaux étendus [WAN Wide Area Networks]
G06F 15/177 - Commande d'initialisation ou de configuration
H04L 12/24 - Dispositions pour la maintenance ou la gestion
67.
Quality of service for inbound network traffic flows during slow-start phases
An edge network device controls the quality-of-service of incoming network traffic flows by limiting the bandwidth of incoming network traffic flows to create a network traffic bottleneck at the edge network device. The bottleneck ensures that this edge network device may control the quality-of-service of incoming network traffic flows. During a slow-start phase of a network traffic flow, the edge network device adds phantom network packets to a scheduler queue in addition to the actual packets of the network traffic flow. Phantom packets occupy transmission slots during packet scheduling and are discarded when selected for transmission. This limits the rate that actual packets are received and acknowledged by the destination knowledge, thereby preventing the network traffic flow source from increasing the flow bandwidth above the limit of the inbound network connection.
Potential paths between a source and destination of a network are identified based on trace-route information, then filtered to eliminate paths or links that are not supported by ancillary information associated with the network so as to identify feasible/actual paths between the source and destination. The ancillary information includes, for example, routing tables and ARP tables. If a feasible path cannot be identified based on the ancillary information, supplemental information regarding nodes further along the potential path is assessed to provide a basis for inferring the nodes that may provide a feasible path. The determined feasible paths are displayed for review, and provided to serve as filters for subsequent path-analysis tools.
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/721 - Procédures de routage, p.ex. routage par le chemin le plus court, routage par la source, routage à état de lien ou routage par vecteur de distance
H04L 12/24 - Dispositions pour la maintenance ou la gestion
A method and system that takes advantage of processes that are efficient for determining the topology of small to medium size networks to determine individual network topologies for such networks, and then merges these individual topologies into a consolidated topology for the entire network. Each of the processes that determines the topology of the smaller networks provides the determined network topology, as well as a list of factors that may be relevant in the determination of how the given topology might be attached to any other given topology, such as the identification of a node that is not included in the given topology, or other indications of external connections. The merging process is configured to substantially restrict its analysis to these factors, thereby limiting the extent, and therefore the time consumed, by this stitching and merging process.
Content delivery networks may associate each WAN optimized network connection with a specific client-to-cloud-service connection using connection identifiers. When an edge node of a content delivery network receives or intercepts a network connection request from a client device including an auto-discovery indicator from an upstream WAN optimization module, the edge node stores a connection identifier for this network connection. The edge node sends a connection response back to the client device including an auto-discovery response indicator. In response, the WAN optimization module sends one or more inner connection setup messages including the connection identifier to a second WAN optimization module in the content delivery network to establish a direct connection, referred to as an inner connection. The connection identifier is matched with the previously stored connection identifier to associate an inner connection with the network connection between the client and the cloud service.
09 - Appareils et instruments scientifiques et électriques
Produits et services
[ Computer hardware and computer networking hardware; ] computer software for use in the operation of computers; computer software for network management; software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; computer software and computer networking software for the transfer of data over private and public networks and the global computer network; computer software and networking software to facilitate data storage; server and networking software used to improve the performance of applications, servers, data storage and communications protocols used in wide area and global networks; computer software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
computer hardware and computer networking hardware; computer software for use in the operation of computers; computer software for network management; software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; server and networking software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks application service provider featuring software for use in the operation of computers; application service provider featuring computer software for network management; application service provider featuring software used to monitor, test, enhance, accelerate, and manage the performance of wide area, local area, or global networks; application service provider featuring software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks
73.
System for selecting a proxy pair based on configurations of autodiscovered proxies on a network
Network devices include proxies and where multiple proxies are present on a network, they can probe to determine the existence of other proxies. Where more than two proxies are present and thus different proxy pairings are possible, the proxies are programmed to determine which proxies should form a proxy pair. Marked probe packets are used by proxies to discover each other and probing is done such a connection can be eventually formed even if some probe packets fail due to the marking. Asymmetric routing can be detected and proxies configured for connection forwarding as necessary.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
74.
Capture, analysis, and visualization of concurrent system and network behavior of an application
A first capture system that captures network communication events related to an application, and a second capture system that captures internal processing events related to the application. A visualization system analyzes the data captured by each of the capture systems, synchronizes and correlates the data, and presents an integrated display of these communication and processing events. In a preferred embodiment, the communicated messages include an identifier of the application, and the processing components also associate an identifier of the application to each recorded processing event. To facilitate the integrated display of the events, the visualization system synchronizes the recorded communication and processing events to a common time base.
WAN optimization devices and content delivery networks together optimize network traffic on both private networks and public WANs such as the internet. A WAN optimization device intercepts and optimizes network traffic from clients within a private network. The WAN optimization device communicates this first optimized network traffic to the nearest edge computer in the content delivery network via a public WAN, such as the internet. This edge computer further optimizes the network traffic and communicates the doubly optimized network traffic via the content delivery network to a second edge computer nearest to the network traffic destination. The second edge computer converts the doubly optimized network traffic back to its original format and communicates the reconstructed network traffic from the second edge computer to the destination via a public WAN. Licensing and configuration portals configure WAN optimization devices for specific network protocols, types of network traffic, applications, and/or cloud services.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
76.
Address manipulation to provide for the use of network tools even when transaction acceleration is in use over a network
In address-manipulation enabled transaction accelerators, the transaction accelerators include outer-connection addressing information in packets emitted over an inner connection between transaction accelerators and inner-connection addressing information is added in packets sent over the inner connection. The inner-connection addressing information can be carried in TCP option fields, directly in other fields, or indirectly through data structures maintained by the endpoints processing the connection. Address information can be encoded into header fields originally intended for other purposes but that are unused or encoded into used fields, overlaid in combination with other data that is being carried in those used fields. The existence of inner-connection addressing information in a packet can be signaled by a flag in the packet, by a bit or other designated encoding. The flag can be in an unused header field or overlaid. Where replacement and option addition is needed, swappers and unswappers might be used.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/12 - Dispositions, appareils, circuits ou systèmes non couverts par un seul des groupes caractérisés par le terminal de données
77.
Application monitoring of related activities across multiple threads
Embodiments provide systems, methods, and computer program products for monitoring application performance in multithreaded environments. Monitoring data may be inserted into data structures that propagate and persist between threads involved in a processing event. Data related to specific methods executing on each thread may be output to a trace file. The trace file may be analyzed for application performance by associating the threads that contain the same tracking data from the propagated data structure.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
78.
Instrumenting computer program code by merging template and target code methods
Embodiments provide systems, methods, and computer program products for instrumenting software application code. A target method and a template method may each be elevated to respective linked lists that maintain offsets in a relative relationship using pointers. The lists are merged and converted back to byte code as an instrumented method.
An interactive virtualization management system provides an assessment of proposed or existing virtualization schemes. A Virtual Technology Overhead Profile (VTOP) is created for each of a variety of configurations of host computer systems and virtualization technologies by measuring the overhead experienced under a variety of conditions. The multi-variate overhead profile corresponding to each target configuration being evaluated is used by the virtualization management system to determine the overhead that is to be expected on the target system, based on the particular set of conditions at the target system. Based on these overhead estimates, and the parameters of the jobs assigned to each virtual machine on each target system, the resultant overall performance of the target system for meeting the performance criteria of each of the jobs in each virtual machine is determined, and over-committed virtual machines and computer systems are identified.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
80.
Traffic flow inference based on link loads and gravity measures
Traffic flow between each pair of nodes in a network may be modeled based on loads measured at each link and based on gravity measures associated with each node. Gravity measures correspond to a relative likelihood of the node being a source or a sink of traffic. Gravity objectives are assigned to nodes to serve as an objective for a node's performance. These gravity objectives may be based on qualitative characteristics associated with each node. Because the assigned gravity objectives may be subjective, the gravity measures are used to generate a quantitative function for determining whether a network can achieve these gravity objectives. In one embodiment, link loads are allocated to traffic flows between nodes and current gravity measures are determined. Changes to link loads and traffic flows may then be modeled to minimize a difference between the assigned gravity measures and the gravity measures.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
The performance of a monitored system is profiled based on sampling a portion of its operations. In one embodiment, the monitored system allocates memory for objects created as instances of classes and automatically performs regular garbage collection to reclaim memory. A variety of sampling techniques are used to minimize the impact on the performance of the monitored system. Characteristic memory utilization patterns can then be estimated for classes based on the samples. The patterns may be presented to a user for review and analysis. Characteristics of the monitored system's performance may be presented in an interactive interface that allows the user to trace the cause of the presented memory utilization patterns, and provides statistics regarding memory allocation and release to guide the user in this analysis.
Individual network activities are correlated to interactions with a target web page to facilitate an analysis of the performance of the web page. This correlation is preferably performed using a combination of heuristics and rules developed to filter network activities into those activities that are likely to have been caused by the particular transaction, and those that are unlikely to be associated with that transaction. The activities that are identified as being associated with the transaction are subsequently organized to identify a time-flow of these activities within the transaction, from which performance statistics can be determined and presented to a user. Because the individual activities within the transaction are identified and time-ordered, an analysis of the effects of each activity on the overall performance of the web page can be performed to identify potential problem areas, or to diagnose reported problems.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
09 - Appareils et instruments scientifiques et électriques
Produits et services
computer hardware; computer network hardware; computer peripherals; USB wireless adaptors; ethernet adaptors; computer operating software; computer software for use in the operation of computers; network management computer software systems; computer software for network analysis; computer software used to monitor, analyze, manage, assess and anticipate trends, troubleshoot, record, improve, and enhance the performance and security of computer applications, servers, network devices, data storage and communications protocols of computer networks; computer hardware and embedded software to monitor, analyze, manage, assess and anticipate trends, troubleshoot, record, improve, and enhance the performance and security of computer applications, servers, network devices, data storage and communications protocols of computer networks; computer hardware and software to monitor, manage, analyze, assess and anticipate trends, troubleshoot, and enhance the performance and security of the transmission of data and information; server and networking software used to improve the performance of computer applications, servers, data storage and communications protocols used in wide area, local area, and global networks; computer software for transmitting and sharing of global network traffic, data and information across computer networks; computer software for optimizing and managing the performance, security, and delivery of computer application traffic, computer applications, websites, and data over networks; computer software for use in the electronic transmission of computer applications and data across computer networks; computer software for computer network traffic management; computer software for providing traffic management, application acceleration, application and network security, and server optimization; computer software used to deliver, deploy and manage software applications and data over computers networks; computer software for the transfer of data over private and public networks and the global computer network; computer software for use in the electronic transmission of computer applications and data across computer networks; software for managing application availability and performance by identifying the application and infrastructure relationship in computer systems, networks, appliances, and applications; computer hardware and software enabling users to identify, monitor, diagnose, and analyze business transaction performance, including application performance, end-user experience, and holistic analysis of application component system metrics; computer network software for packet capture, performance analysis, and protocol analysis; computer software for use in visualization, modeling, and simulation of data communication networks and networked applications for use in the fields of information technology, telecommunications, software development, and software testing and program manuals sold as a unit; embedded server software, storage software, and networking software sold as an integral component of computer hardware to improve the performance of computer applications, servers, data storage and communications protocols used in wide area and global networks; computer software for use by service providers, enterprises, and systems integrators to install, monitor, manage, troubleshoot, diagnose, verify and support their real-time communications, including IP telephony and video, networks and services; computer software which extends standard internet transport protocols to maximize link utilization and reliability of data communications; computer software and software development kits (SDKs) comprising of computer software development tools, each for use in the operation of computers, transfer of data over private and public networks and the global computer network, transmitting and sharing of global network traffic, data and information across computer networks, optimizing and managing the performance, security, and delivery of computer application traffic, computer applications, websites, and data over networks, used in the electronic transmission of computer applications and data across computer networks, for computer network traffic management, for providing traffic management, application acceleration, application and network security, and server optimization, to deliver, deploy and manage software applications and data over computers networks, and facilitating application, website and data deployment, management, security and access across computer networks
A system and method for managing captured network traffic data is provided. The invention comprises a plurality of capture agents, each being configured to capture the network traffic associated with one or more applications. Each application is associated with one or more capture agents according to an application profile that is stored and maintained in a capture server. When analysis of an application's network traffic is required, the capture server contacts the corresponding capture agents according to the application profile. The capture server then effects the identification and archiving of the network traffic that corresponds to a user-defined capture condition. A database at the capture server maintains a record that associates the corresponding network traffic with the user-defined capture condition such that the corresponding network traffic can later be retrieved and analyzed using an analysis engine.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
85.
Establishing network connections between transparent network devices
Transparent network devices intercept messages from non-transparent network devices that establish a connection. Transparent network devices modify these messages to establish an inner connection with each other. The transparent network devices mimic at least some of the outer connection messages to establish their inner connection. The mimicked messages and any optional reset messages are intercepted by the transparent network devices to prevent them from reaching the outer connections. Transparent network devices modify network traffic, using error detection data, fragmentation data, or timestamps, so that inner connection network traffic inadvertently received by outer connection devices is rejected or ignored by the outer connection network devices. Transparent network devices may use different sequence windows for inner and outer connection network traffic. To prevent overlapping sequence windows, transparent network devices monitor the locations of the inner and outer connection sequence windows and may rapidly advance the inner connection sequence window as needed.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
G06F 12/00 - Accès à, adressage ou affectation dans des systèmes ou des architectures de mémoires
86.
Quality of service for inbound network traffic flows
An edge network device controls the quality-of-service of incoming network traffic flows by limiting the bandwidth of incoming network traffic flows. To ensure that incoming network traffic classes quickly converge to the desired bandwidth allocations, the maximum bandwidth allocation to each network traffic class is dynamically varied based on current overall usage. The maximum bandwidth allocated to each traffic class at any given moment is the sum of its minimum guaranteed bandwidth and a portion of the available excess bandwidth. Each traffic class' portion of the excess bandwidth is proportional to the ratio between its minimum guaranteed bandwidth and the sum of all traffic classes' minimum guaranteed bandwidths. Phantom network packets equivalent to the difference between each traffic class' allocated and actual bandwidth may be added to its scheduling queue to implement this dynamic variation. Phantom packets occupy transmission slots during packet scheduling and are discarded when selected for transmission.
Serial clustering uses two or more network devices connected in series via a local and/or wide-area network to provide additional capacity when network traffic exceeds the processing capabilities of a single network device. When a first network device reaches its capacity limit, any excess network traffic beyond that limit is passed through the first network device unchanged. A network device connected in series with the first network device intercepts and will process the excess network traffic provided that it has sufficient processing capacity. Additional network devices can process remaining network traffic in a similar manner until all of the excess network traffic has been processed or until there are no more additional network devices. Network devices may use rules to determine how to handle network traffic. Rules may be based on the attributes of received network packets, attributes of the network device, or attributes of the network.
A network capture element is embodied on a virtual machine, and a utility function is embodied on the actual device, preferably within the virtual machine manager. Both the utility function and the traffic capture element are configured to monitor communication events. To minimize the overhead imposed, the utility function is configured to merely store the time that the event occurred on the actual machine, corresponding to an identifier of the event. The network capture element, on the other hand, performs the time consuming tasks of filtering the communications, selectively storing some or all of the data content of the communications, characterizing the data content, and so on. Instead of storing the virtual time that the communication event occurred at the virtual machine, the network capture element uses the identifier of the communication event to retrieve the actual time that the communication event occurred on the actual machine.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A network analysis system provides for a user-definable display of information related to messages communicated on the network. The network analysis system includes one or more display formats that provide a display of message exchanges between nodes of a network, and a display augmenter that provides additional information on the display based on a user-defined visualization. The user defined visualization includes augmenting the display based on user-defined coloring characteristics and/or augmenting the display with user-defined labels. To further facilitate user control of the augmentation of the display, the system accepts user-defined programs for discriminating among messages, for controlling the labeling of messages, and for controlling the coloring of messages and labels. Commonly used user-defined characteristics and labels are stored in a library, for use via a selection from among the library entries.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/24 - Dispositions pour la maintenance ou la gestion
90.
End-to-end analysis of transactions in networks with traffic-altering devices
In a network that includes intermediary nodes, such as WAN accelerators, that transform messages between nodes, an end-to-end path of the messages is determined. The determined end-to-end path is used in subsequent analyses of message traces, to identify timing and other factors related to the performance of the network relative to the propagation of these messages, including the propagation of the transformed messages. A variety of techniques are presented for determining the path of the messages, depending upon the characteristics of the collected trace data. Upon determining the message path, the traces are synchronized in time and correlations between the connections along the path are determined, including causal relationships. In a preferred embodiment, a user identifies an application process between or among particular nodes of a network, and the system provides a variety of formats for viewing statistics related to the performance of the application on the network.
An application monitoring system autonomously selects routines for performance monitoring based on characteristics of the content of the routines. These characteristics are preferably related to aspects of routines that are likely candidates for performance improvement, such as repetitive loops, event waits, synchronized blocks, and on. Routines that appear to be relatively un-improvable are excluded from initial monitoring, and routines that are subsequently determined to be relatively un-improvable, based on performance analysis and/or user feedback, are excluded from future monitoring. The determination of each routine's candidacy for monitoring is maintained over time, so that each subsequent monitoring session need not repeat the determinations. Changed routines are routinely re-monitored and/or re-assessed to affirm or modify the routine's candidacy for subsequent monitoring.
Relatively small capacity solid-state storage devices (SSD) are combined with larger capacity magnetic disk storage devices for storing storage block write data to ensure data consistency. Write operations are stored in a sequential write buffer in an SSD to guarantee the storage of write data and then copied from the sequential write buffer to the destination address in a magnetic disk storage device. The sequential write buffer store write data in locations corresponding to the order of receipt of write operations. Write data from the sequential write buffer is transferred to the magnetic disk storage device in the same order and a checkpoint index is frequently updated to indicate the completion of some transfers. During system initialization, the most recent value of the checkpoint index is retrieved and used as a starting location for transferring write data from the sequential write buffer to the magnetic disk storage device.
WAN optimization devices and content delivery networks together optimize network traffic on both private networks and public WANs such as the internet. A WAN optimization device intercepts and optimizes network traffic from clients within a private network. The WAN optimization device communicates this first optimized network traffic to the nearest edge computer in the content delivery network via a public WAN, such as the internet. This edge computer further optimizes the network traffic and communicates the doubly optimized network traffic via the content delivery network to a second edge computer nearest to the network traffic destination. The second edge computer converts the doubly optimized network traffic back to its original format and communicates the reconstructed network traffic from the second edge computer to the destination via a public WAN. Licensing and configuration portals configure WAN optimization devices for specific network protocols, types of network traffic, applications, and/or cloud services.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
A method and apparatus are provided for distributing or redistributing licenses from a failed or unavailable license controller to one or more backup license controllers. Each controller has an initial count of licenses it can serve or allocate to clients desiring access to licensed electronic content. Each controller maintains a set of data that identifies the initial license counts and that also identifies backup relationships between controllers. Each such relationship for a given controller identifies which controllers will inherit licenses if the given controller becomes unavailable, and how many (e.g., a percentage) of the given controller's license that will be inherited. A redistribution plan for a given controller may have multiple levels, wherein a subsequent level may be applied only if all controllers designated as backups in the preceding level are also unavailable.
Embodiments provide systems, methods, and computer program products for mapping higher-layer circuits, links, flows, and services to lower layer circuit and connection elements to determine utilization of the lower layer circuit elements based on the high-layer traffic. Higher layer configuration data and lower layer configuration data are imported to populate a model. An inter-layer relationship is either directly or indirectly mapped from the higher layers to the lower layer. Once the inter-layer relationship is established, the higher-layer circuits, links, flows, and services are inspected using the lower layer circuit and connection elements. Circuit and packet-based utilization is determined for the lower layer elements based on the higher-layer traffic flows.
H04L 12/835 - Adaptation du débit de flux actifs utilisant des informations sur la capacité de mémoire tampon aux points d’extrémité ou aux nœuds de transit
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04L 12/26 - Dispositions de surveillance; Dispositions de test
96.
Methods and systems for efficient updating of time-aligned graphs in a monitoring system
The present invention relates to displaying data in a time-aligned fashion. A dashboard may have a defined time window and a plurality of graphs for various types of monitoring data metrics. Updates to each of the graphs may occur at different intervals while the graphs stay aligned to the same time window. The updates may be asynchronously received and displayed in the dashboard in real-time or near real-time. The graphs are aligned to the same time window in a dashboard by adding a future time buffer. When the live data reaches the end of the time window, the future time buffer allows a brief overflow period for updates to be added to the graphs while keeping all the graphs on a common time axis. Once the current time reaches the end of the future time buffer, the dashboard is then shifted forward and a future time buffer is added.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 12/26 - Dispositions de surveillance; Dispositions de test
A network health monitoring application computes aggregate reports of network health by combining status results from a group of segments to render a summary health status indicative of the entire group. Individual status values result from policies, which monitor various segments and metrics, or performance parameters (such as byte counts or retransmissions), concerned with providing a particular service. The policies form a hierarchy defining the general or specific nature of the segments included in the policy according to a range of attributes, in which the attributes define a scope of the segments included in the policy group. Multiple metrics gathered on each segment allow filtering by polices based on the metric, rather than the attribute (hierarchy level), thus lending a hierarchy filtering based on “vertical” slices of the hierarchy, allowing the user flexibility to filter on specific attribute values while still computing aggregate health at a particular attribute level.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/24 - Dispositions pour la maintenance ou la gestion
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 12/26 - Dispositions de surveillance; Dispositions de test
Embodiments provide systems, methods, and computer program products for tracking objects within a domain and their possible changes and genealogy over time. An object identifier and an interval identifier are associated with an object that enters the domain with an unknown set of attributes and genealogy. The object identifier is analyzed to determine whether it is a pre-existing object identifier. A comparison of the interval identifier is performed to determine whether the object is a copy of a prior object. The object identifier is replaced with a new object identifier and the interval identifier reset when the object is new or a copy. Based on the object identifier and the interval identifier, which represents the possibility of change during each interval, information about the tracked object may be derived and analyzed to enhance performance.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
H04L 12/24 - Dispositions pour la maintenance ou la gestion
G06F 7/00 - Procédés ou dispositions pour le traitement de données en agissant sur l'ordre ou le contenu des données maniées
G06F 3/00 - Dispositions d'entrée pour le transfert de données destinées à être traitées sous une forme maniable par le calculateurDispositions de sortie pour le transfert de données de l'unité de traitement à l'unité de sortie, p. ex. dispositions d'interface
99.
Cross-session protocol acceleration and its application to storage area network file systems
Protocol acceleration is performed between clients and servers over a network wherein transport connections are established between clients/servers and/or their proxies for acceleration of traffic that uses certain protocols. A first transport connection for a first application protocol and a second transport connection for a second application protocol can be made between two proxies, wherein a client-side proxy is in communication with a client and a server-side proxy is in communication with a server, and the proxies use information from message payloads flowing between the client device and the server device over the first transport connection for acceleration of traffic over the second transport connection. Examples of transport protocols include a file server protocol and a storage access protocol. Cross-protocol acceleration can be expanded so that information obtained for one client on one protocol can be used to accelerate traffic for another client with the same or different protocol.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
Embodiments provide methods for managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 12/26 - Dispositions de surveillance; Dispositions de test
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison