At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Selection of a Multipoint Control Unit (MCU) for a video meeting on a
To select an appropriate multipoint control unit (MCU) for hosting an upcoming video meeting, video meeting data of previous meetings is stored, including time...
Split frame multistream encode
Presented herein are techniques for creating video for participants in a video conference. A designated primary video stream is decoded and the resulting video...
Faster access to television channels
In one embodiment, a receiver for an accelerated channel change is provided. The receiver receives a first version of a video stream for a first channel and...
Authentication of devices having unequal capabilities
A system authenticates in-vehicle electronic devices having unequal capabilities such as having varying different communication and processing capabilities. A...
Method and apparatus to process an incoming message
A method and apparatus to process an incoming message is described. The method may comprise, at a recipient system, receiving an incoming message from a message...
Enhancing performance of rapid channel changes and other playback
positioning changes in adaptive streaming
Content is received within a network at a content receiver and that is communicated from a content source, where the content comprises packets to be sent to the...
Network packet steering via configurable association of packet processing
resources and network interfaces
Methods and systems are provided for steering network packets. According to one embodiment, a dynamically configurable steering table is stored within a memory...
Flexible and scalable monitoring in a TRILL network
A monitoring session associated with a virtual nickname may be established in a TRILL network. A monitoring station may be connected to an edge switch of the...
Automated network device provisioning using dynamic host configuration
In an embodiment, an electronic digital data packet router performs receiving a DHCP initiation message on a particular interface among a plurality of network...
Aggregated delivery of tunnel fault messages on common ethernet segments
In one embodiment, a device in a computer network determines one or more tunnels affected by a downstream fault in the computer network, and determines one or...
Methods for exchanging network management messages using UDP over HTTP
A network access device (NAD) receives a UDP packet from a client to be transmitted to a management server over Internet, the UDP packet including a management...
Social cloud application-mediated mobile data hotspot sharing
A method is provided in one example embodiment and includes receiving a message that offers use of a first mobile device as a mobile hotspot for enabling access...
Computer-implemented method and apparatus for encoding natural-language
text content and/or detecting plagiarism
A computer-implemented letter-based method of encoding a length-significant portion of natural language text to generate a letter-based fingerprint of the text...
Method and system for a storage area network
In a system and method for a storage area network (SAN), a first controller receives a write request for a SAN and communicates with a first nested storage...
Dynamically provisioning digital voice trunks
Computer systems and logic are operable to establish a local network connection to a network device; establish a remote network connection to a network service...
Releasable fiber connector for opto-electronic assemblies
An apparatus for providing releasable attachment between a fiber connector and an opto-electronic assembly, the opto-electronic assembly utilizing an interposer...
Modular cable management system
A set of modular bracket units are mountable end-to-end in series on a support structure adjacent a cable interface area of an electronic equipment assembly,...
System and method for resource management for operator services and
A method is provided in one example embodiment and includes providing a multi-radio connectivity service to a mobile subscriber, and managing the multi-radio...
Wireless client association and traffic context cookie
In an example embodiment, an access point or wireless local area network controller programs an opaque cookie into a wireless client. The cookie carries...
Spatial interference suppression using dual-microphone arrays
Systems, processes, devices, apparatuses, algorithms and computer readable medium for suppressing spatial interference using a dual microphone array for...
System and method for scaling a video presentation based on presentation
complexity and room participants
A method is provided in one example embodiment and includes receiving a first presentation material for a videoconference, wherein the first presentation...
Active speaker indicator for conference participants
In one embodiment, a method includes receiving requests to join a conference from a plurality of user devices proximate a first endpoint. The requests include a...
Providing differentiated network services and priorities to VPN
In one embodiment, a first network device receives a priority message from a second network device, wherein the priority message conforms to a connection...
Network session management based on contextual information
An access control module in an enterprise computing network receives contextual information of a first active network session at a first network endpoint and...
System and method for inspecting domain name system flows in a network
A method is provided in one example and includes maintaining a correlation between a domain name and a plurality of Internet protocol (IP) addresses included in...
LSP ping/trace over MPLS networks using entropy labels
The present disclosure provides for carrying downstream mapping information in an echo request message and/or echo reply message, which can describe both IP...
Providing network-wide enhanced load balancing
A method and apparatus to provide network-wide enhanced load balancing. In one embodiment a first message comprising a first value and an address is generated....
System and method for routing internet traffic over internet links
An apparatus and method for Internet Protocol (IP) transit is described. Embodiments include a platform for routing IP traffic in real time from at least one...
Gravitational parent selection in directed acyclic graphs
In one embodiment, a particular node in a computer network receives an indication of a number of child nodes of one or more potential parent nodes to the...
Client addressing and roaming in a wireless network
A managed network receives client device requests for network addresses for communications over the managed network and computes a network address for a client...
Generating a single advice of charge request for multiple sessions in a
In one embodiment, a method includes receiving a selected communication session of a transaction associated with a prepaid end user, such that the transaction...
Charging for network services based on delivered quality of service
In one embodiment, a method includes receiving quality if service difference data. Quality of service difference data indicates how a particular flow of data...
Technologies for high-speed communications
Method, apparatus, and electrical cable for high-speed connections. The apparatus can include an electrical cable, a wire sorter, an electrical mating paddle,...
Enhanced low inductance interconnections between electronic and
opto-electronic integrated circuits
A configuration for routing electrical signals between a conventional electronic integrated circuit (IC) and an opto-electronic subassembly is formed as an...
System and method for embedding data
In one embodiment, a watermark is embedded in a sequence of video frames, for each one of the video frames, a set of N rectangular patches, two palettes of...
LFSR watermark system
In one embodiment, a system including a processor is operative to receive a content item including a watermark encoding a series of data values of an output...
Policy-based control layer in a communication fabric
Presented herein are techniques for adding a secure control layer to a distributed communication fabric that supports publish-subscribe (pub-sub) and direct...
System and method for in-band LUN provisioning in a data center network
A method is provided in one example embodiment and includes instantiating a virtual adapter on a network device connected to a storage array, the virtual...
Intelligent social collaboration watchlist that visually indicates an
order of relevance
In one embodiment, a method includes within a graphical user interface (GUI) presented to a user of a software application, presenting a watchlist associated...
Radio access point location verification using GPS location and radio
Techniques are provided to perform location verification of a radio access point (RAP) device such as femtocell. The RAP is configured to receive signals from...
Apparatus, system, and method for configuring a system of electronic
An example apparatus is provided and may comprise a housing, an electronic blade system, and a plurality of airflow management components. The housing may have...
Electronic devices mounted on multiple substrates
An apparatus includes a first electronic device mounted on a first substrate and a second electronic device mounted on a second substrate. In some embodiments,...
System and method for extending communications between participants in a
A method is provided in one example embodiment and includes receiving data associated with a local endpoint that is configured to participate in a video...
Method and system for managing meeting resources in a network environment
In one example embodiment, a method is provided and includes monitoring a display status associated with a client device that is participating in a meeting...
Method and apparatus for detecting malicious software using machine
Novel methods, components, and systems for detecting malicious software in a proactive manner are presented. More specifically, we describe methods, components,...
Distributed virtual switch architecture for a hybrid cloud
In one embodiment, a secure transport layer tunnel may be established over a public network between a first cloud gateway in a private cloud and a second cloud...
Extending virtual station interface discovery protocol (VDP) and VDP-like
protocols for dual-homed deployments...
Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a...
Flow based network service insertion using a service chain identifier
Techniques are provided to generate and store a network graph database comprising information that indicates a service node topology, and virtual or physical...
Error message monitoring in a network environment
A flow of packets sent from a server device over a TCP network to at least one endpoint device is identified, the endpoint device accessing the TCP network over...
Traffic optimization using network address and port translation in a
Techniques are presented herein for optimizing and load balancing network traffic exchanged between devices in a network environment. At a first device in a...