At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Remote stitched directed acyclic graphs
In one embodiment, in response to a trigger condition being detected at a particular location in a primary directed acyclic graph (DAG) in a computer network, a...
Ethernet virtual private network system for providing fast protection for
In one embodiment, a method includes obtaining a first indication from a first source included in an Ethernet ring and obtaining a second indication from a...
Universal pull tab release for modules including fiber optic and cable
A pluggable module for releasable engagement with a computing device includes a first end portion, a second end portion and a release tab structure. The release...
Adaptive switching of views for a video conference that involves a
Techniques are provided for dynamically adapting the view from a conference endpoint that includes a presentation apparatus, such as a whiteboard. A first...
Efficient and on demand convergence of audio and non-audio portions of a
communication session for phones
In one embodiment, source data for a communication session may be split into an audio portion for transmission on a phone channel and a non-audio portion for...
Integrity monitoring to detect changes at network device for use in secure
In one embodiment, a method includes initiating integrity monitoring at a network device, continuously monitoring the network device to detect changes at the...
Integrated view of network management data
In an embodiment, a method comprises: receiving a first request for network management information, the first request identifying at least one of a user, a user...
System and method for managing power consumption in data propagation
An example method includes communicating a first signal to a remote computer element, the first signal can be used to establish a link between the remote...
Method for emulating communication standards of transceiver modules for
native host devices
An adapter device is provided that is configured to interface with a host device according to a first communication standard via a first connector and with a...
Quality of service (QoS) configuration in low-power and lossy networks
In one embodiment, a distributed intelligence agent (DIA) in a computer network performs deep packet inspection on received packets to determine packet flows,...
Method and apparatus for user domain based white lists
A method is disclosed for determining a whether access to host requested by a user is permitted. User identifying information is obtained using any of a variety...
Communication parameter selection for small cell access points
Communication parameter selection techniques are presented to reduce interference in small cells of wireless networks. A list of neighboring radio access points...
Optical link quality monitoring in a computer network
In one embodiment, a local network device collects local optical power information for at least one of either a local optical transmit interface and a local...
Automatic room rescheduling
Automatic room rescheduling is described. In an embodiment, an apparatus receives status data regarding status of communications resources capable of use in a...
Efficient generation of VPN-based BGP updates
In one embodiment, a router may store a "neighbor table" for storing the router's Border Gateway Protocol (BGP) neighbors. Each neighbor corresponds to a...
Multicast media notification for queued calls
Multicast media notifications are provided when unicast media encoders are unavailable to serve endpoints that send a communication session request to a call...
Video conferencing with multipoint conferencing units and multimedia
In one embodiment, a method includes receiving at a multimedia transformation unit, media streams from a plurality of endpoints, transmitting audio components...
Performing path-oriented systems management
A method is disclosed for transmitting system management requests to computer systems along a network path using a network control protocol, such as RSVP. For...
Dynamic load balancing in a communication network
Methods and systems for providing a dynamic and real time load factor that can be shared with other network elements is disclosed. The load factor can be used...
Method and system for handling mixed illumination in video and photography
A method including: obtaining, with an image processing apparatus, a white point that corresponds to an image captured by a camera with only the natural light...
Access to video streams on mobile communication devices
A method and apparatus to provide access to video streams associated with communication channels in a communication network are described. The method may...
System and method for supporting web authentication
A method is provided in one example embodiment and includes receiving a discover message over a network; determining that the discover message is associated...
Adapting extensible authentication protocol for layer 3 mesh networks
Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network,...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Optimizing application specific integrated circuit pinouts for high
density interconnect printed circuit boards
Techniques for optimizing application specific integrated circuit (ASIC) and other IC pin assignment corresponding to a high density interconnect (HDI) printed...
Method and systems to perform a rolling stack upgrade
Stackable Layer 2 switches may be upgraded through a stateless upgrade procedure that minimizes software upgrade complexity while leveraging the intrinsic...
Virtual machine memory compartmentalization in multi-core architectures
Techniques for memory compartmentalization for trusted execution of a virtual machine (VM) on a multi-core processing architecture are described. Memory...
Interface bundles in virtual network devices
A virtual network device includes several different virtual network device sub-units, which collectively operate as a single logical network device. An...
Controlling access to managed objects in networked devices
Controlling access to managed objects associated with a networked device. A method comprises receiving a request from a principal for access to a managed object...
Remote monitoring and controlling of network utilization
A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management...
System and method for utilizing instant messaging to schedule conference
In one embodiment, a method includes engaging in real-time communications using a first application, and dynamically granting permissions that enable a second...
In-network middlebox compositor for distributed virtualized applications
Techniques are provided for using a middlebox to composite displays from multiple hosted virtualized applications (HVAs) for transmission to a client endpoint...
Peer-to-peer network image distribution hierarchy
In one embodiment, network devices such as IP phones may be upgraded with a set of files. A master network device in the set of network devices is identified....
Apparatus, systems, and methods for client transparent video readdressing
Network operators are striving to find ways to provide stable video services amid a rapid increase in video traffic. In order to provide stable video services...
System and method for generating personal vocabulary from network data
A method is provided in one example and includes receiving data propagating in a network environment, and identifying selected words within the data based on a...
System and method for applications management in a networked vehicular
A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical...
Method and apparatus for testing using a transceiver module
An apparatus in one embodiment includes a transceiver housing operable to be inserted into a port of a host system, the port comprising at least a first channel...
Distribution of storage area network encryption keys across data centers
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another...
Video encoder/decoder, method and computer program product
A video encoder/decoder device, method, and computer program product combine to enhance entropy encoding by using different calculation approaches for assessing...
System and method for discovering and verifying a hybrid fiber-coaxial
topology in a cable network environment
A method in an example embodiment can include polling a first cable modem in a cable network and receiving a first response message from the first cable modem...
Scaling IPv4 in data center networks employing ECMP to reach hosts in a
directly connected subnet
Systems and methods are provided for scaling IPv4 networks for large data centers to reach hosts in a directly connected subnet. ToRs may be dynamically...
Preventing leaks among private virtual local area network ports due to
configuration changes in a headless mode
Techniques are provided for hosting a first virtual switch and one or more virtual machines (VMs) configured to be part of a virtual LAN (VLAN). The first...
System and method for virtual portchannel load balancing in a trill
An example method includes storing a portion of virtual PortChannel (vPC) information in a TRansparent Interconnect of Lots of Links network environment,...
Designated forwarder election for VPLS with BGP-based MAC learning
In one embodiment, a network device may participate in an election process to elect one of two or more Provider Edge devices of a Redundancy Group to be a...
Automatic magnification of data on display screen based on eye
characteristics of user
In one embodiment, a method includes receiving an image of a user's eye at a device having a screen and a camera operable to input the image, processing the...
Processor with differential power analysis attack protection
A device including a processor to perform an operation yielding a result, the processor including a register including bit storage elements and including a...
Reorganization of virtualized computer programs
In an embodiment, a data processing method comprises obtaining access to computer program code; identifying a plurality of code segments in the computer program...
Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
Automated data center network patching system
In one embodiment, a computer implemented method is provided for generating a network patch plan. The method can include selecting at least two devices to be...
Method and apparatus for signaling post-ring reservations
In one embodiment, a method includes obtaining a request from a first endpoint to establish a session, determining whether a resource reservation may be...