At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Correctly identifying potential anomalies in a distributed storage system
A method for assisting evaluation of anomalies in a distributed storage system is disclosed. The method includes a step of monitoring at least one system metric...
Electro-optic modulator termination
Embodiments presented in this disclosure generally relate to an electro-optic device that includes one or more modulator portions and a terminator portion. Each...
Passive alignment of optical components using optical fiber stubs
Embodiments herein include an optical system that passively aligns an optical component (e.g., a fiber array connector, lens array, lens body, etc.) with a...
Molded glass lid for wafer level packaging of opto-electronic assemblies
An opto-electronic assembly is provided comprising a substrate (generally of silicon or glass) for supporting a plurality of interconnected optical and...
Location services for a wireless device
In an example embodiment, a wireless device is operable to advertise a policy on the inclusion of the wireless device in a radio frequency map. For example, the...
Augmenting Wi-Fi localization with auxiliary sensor information
In one implementation, a method of maintaining continuous identity for mobile devices includes: obtaining a first address for a first device; and obtaining,...
Bit indexed explicit replication for professional media networks
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a first bit string at a node,...
Redundancy network protocol system
A redundancy network protocol system may include a server to manage one or more virtual internet protocol address (VIP) profiles. Each VIP profile may be shared...
Virtual meeting video sharing
A method is provided in one particular example that includes identifying an attempt by a first communications device to play video data within a virtual meeting...
Creation of security policy templates and security policies based on the
A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
Cross-layer forwarding in a Low-power and Lossy Network
In accordance with techniques presented herein, a packet is received at a forwarding device operating in a multi-service Low-power and Lossy Network (LLN). The...
Metadata augmentation in a service function chain
A method for augmenting metadata of a network service header is disclosed. The method includes receiving, at a first service node, a packet or frame of a...
Path optimization for adaptive streaming
In one implementation, downloading of streaming content using a security as a service (SecaaS) system is more efficient because portions of the streaming...
Service level view of audiovisual conference systems
In an embodiment, a machine-readable volatile or non-volatile storage medium stores one or more sequences of instructions which, when executed by one or more...
Segment routing: PCE driven dynamic setup of forwarding adjacencies and
An apparatus and method for path creation element driven dynamic setup of forwarding adjacencies and explicit path. In one embodiment of the method, a node...
Enabling packet handling information in the clear for MACSEC protected
Techniques are provided to append packet handling information "in the clear" ahead of security related information in a packet to be routed over a network to...
Method and system for homomorphicly randomizing an input
In one embodiment, a method for reducing information leakage in order to counter side channel attacks against a secure execution environment is described, the...
Link adaptation based on neighboring cell transmission information
The present disclosure provides a fine-grained link adaptation mechanism that allows for link adaptation at a resource block granularity. To this end, the...
Burst triggered signal analysis
An apparatus can include a detector configured to detect a burst event for a selected frequency of a digital input signal having a predetermined bandwidth. The...
Providing parameterized actionable communication messages via an
A method, an apparatus and computer readable storage media facilitate initiating an actionable message at a computing device in response to input of a defined...
Label masked addressable memory
A network device receives data packets and derives a key from headers in the packets. A search engine in the device searches, or performs a table lookup, for...
Unified communication audit tool
Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of...
Human mobility rule-based device location tracking
Techniques are presented herein to provide human mobility pattern based modeling and tracking of a group of network enabled user devices associated with the...
Localizing a mobile data path in a radio access network under control of a
mobile packet core in a network...
A method is provided in one example embodiment and includes establishing a control channel between a first entity associated with an access network and a second...
Adaptive switching of views for a video conference that involves a
Techniques are provided for dynamically adapting the view from a conference endpoint that includes a presentation apparatus, such as a whiteboard. A first...
Advertisement of adjacency segment identifiers
Various techniques can be used to advertise adjacency segment identifiers (IDs) within a segment routing (SR) network. For example, a method, performed by a...
Cloud-based resource availability calculation of a network environment
An example method for cloud-based resource availability calculation of a network environment is provided and includes receiving a plurality of system error log...
Adaptive intelligent routing in a communication system
This disclosure relates to a system and method for routing data packets adaptively in a communication system. As the proliferation of data rich content and...
Mixed centralized/distributed algorithm for risk mitigation in sparsely
In one embodiment, techniques are shown and described relating to a mixed centralized/distributed algorithm for risk mitigation in sparsely connected networks....
Distributed node migration between routing domains
In one embodiment, a device connected to a network receives at a network interface a first network size indicator for a first network and a second network size...
Implementation of virtual extensible local area network (VXLAN) in
top-of-rack switches in a network environment
An example method for implementation of virtual extensible local area network (VXLAN) in top-of-rack (ToR) switches in a network environment is provided and...
Indexed access to a forwarding table in a network device
A packet is received at an ingress port of a network device. Based on forwarding information in the packet, an adjacency point is generated using a forwarding...
Mapping protocol endpoints to networked devices and applications based on
In an embodiment, a non-transitory computer readable storage medium storing instructions which cause processors to perform: collecting, at a management computer...
Continuous autonomous monitoring of systems along a path
In an embodiment, a method comprises initiating a monitoring session for a communication path including creating and storing monitoring session state data;...
Fibre channel peer zoning
Techniques are provided for the creation of a peer zone definition for use in a Fiber Channel (FC) Fabric. The peer zone definition defines a peer zone in which...
System and method for scalable inter-domain overlay networking
An example method is provided in one example embodiment and includes receiving first values associated with a host located in a first overlay domain;...
Distributed model training
In one embodiment, a device determines that a machine learning model is to be trained by a plurality of devices in a network. A set of training devices are...
Fast learning to train learning machines using smart-triggered reboot
In one embodiment, a triggered reboot of a field area router (FAR) of a computer network is initiated, and gathered states of the FAR are saved. The nodes in...
Printed circuit board clip
In one embodiment, a printed circuit board has a hole. The hole has a longest extent on a surface of the printed circuit board. A clip is held in the hole by...
Networked lighting management
Techniques presented herein are directed to lighting management techniques supporting lighting functions of networked light fixtures. In accordance with one...
Reporting of aggregated RAN congestion information
The present disclosure is directed at systems, methods and media for relieving RAN congestion in a core network. In some embodiments, RAN congestion information...
Kinetic event detection in microphones
In one implementation, the output of a microphone is modified based on movement. A circuit or other controller is in communication with a microphone that...
Methods and apparatus for providing one-arm node clustering using a port
Methods and apparatus for providing one-arm node clustering using a port channel are provided herein. An example application node may be communicatively...
XMPP based UPNP device architecture for cloud computing in a network
An example method for Extensible Messaging and Presence Protocol (XMPP) based Universal Plug and Play (UPnP) device architecture for cloud computing in a...
Elastic scale out policy service
In one embodiment, a scale out policy service for processing a stream of messages includes a distributed stream processing computation system comprising...
Method and system for remote meetings
In one embodiment, a client device determines that a client device display screen is displaying a video image as enlarged, compares received regions of a...
Autonomic locator/identifier separation protocol for secure hybrid cloud
A method is provided in one example embodiment and includes configuring a local network element as an autonomic registrar for a designated network domain;...
Shortening of service paths in service chains in a communications network
A method is provided in one embodiment and includes receiving at a network element a flow offload decision for a first service node that includes a portion of a...