会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • MOVING DEPLOYMENT OF IMAGES BETWEEN COMPUTERS
    • 移动计算机之间的图像部署
    • US20120023222A1
    • 2012-01-26
    • US12841539
    • 2010-07-22
    • Nicholas F. CampionDavid J. GimplGregory R. HintermeisterDavid Peraza
    • Nicholas F. CampionDavid J. GimplGregory R. HintermeisterDavid Peraza
    • G06F15/173G06F3/048
    • G06F9/5072
    • In an embodiment, a unit workload comprises an average processor speed and an average memory amount required by execution of images. If an integer multiple of the average processor speed required minus a free processor speed at a source computer is greater than a first threshold amount, an integer multiple of the average memory amount required minus a free memory amount at the source computer is greater than a second threshold amount, the integer multiple of the average processor speed required minus a processor speed requirement of a source image at the source computer is less than a third threshold amount, and the integer multiple of the average memory required minus a memory requirement of the source image at the source computer is less than a fourth threshold amount, then deployment of the source image is moved from the source computer to a destination computer.
    • 在一个实施例中,单元工作负载包括执行图像所需的平均处理器速度和平均存储量。 如果所需平均处理器速度的整数倍减去源计算机上的空闲处理器速度大于第一阈值量,则所需的平均存储器量的整数倍减去源计算机的可用存储量大于第二阈值 阈值量,所需的平均处理器速度的整数倍减去源计算机处的源图像的处理器速度要求小于第三阈值量,所需的平均存储器的整数倍减去源图像的存储器要求 在源计算机处小于第四阈值量,则源图像的部署从源计算机移动到目的地计算机。
    • 2. 发明授权
    • Moving deployment of images between computers
    • 在计算机之间移动映像的部署
    • US08543687B2
    • 2013-09-24
    • US12841539
    • 2010-07-22
    • Nicholas F. CampionDavid J. GimplGregory R. HintermeisterDavid Peraza
    • Nicholas F. CampionDavid J. GimplGregory R. HintermeisterDavid Peraza
    • G06F15/173
    • G06F9/5072
    • In an embodiment, a unit workload comprises an average processor speed and an average memory amount required by execution of images. If an integer multiple of the average processor speed required minus a free processor speed at a source computer is greater than a first threshold amount, an integer multiple of the average memory amount required minus a free memory amount at the source computer is greater than a second threshold amount, the integer multiple of the average processor speed required minus a processor speed requirement of a source image at the source computer is less than a third threshold amount, and the integer multiple of the average memory required minus a memory requirement of the source image at the source computer is less than a fourth threshold amount, then deployment of the source image is moved from the source computer to a destination computer.
    • 在一个实施例中,单元工作负载包括执行图像所需的平均处理器速度和平均存储量。 如果所需平均处理器速度的整数倍减去源计算机上的空闲处理器速度大于第一阈值量,则所需的平均存储器量的整数倍减去源计算机的可用存储量大于第二阈值 阈值量,所需的平均处理器速度的整数倍减去源计算机处的源图像的处理器速度要求小于第三阈值量,并且所需的平均存储器的整数倍减去源图像的存储器要求 在源计算机处小于第四阈值量,则源图像的部署从源计算机移动到目的地计算机。
    • 7. 发明申请
    • CALLER ID CALLBACK AUTHENTICATIONI FOR VOICE OVER INTERNET PROTOCOL (
    • 通过互联网协议(“VOIP”)部署的电话号码回叫认证
    • US20110211572A1
    • 2011-09-01
    • US12714595
    • 2010-03-01
    • Nicholas F. CampionMichael J. Carpenter
    • Nicholas F. CampionMichael J. Carpenter
    • H04L12/66H04M15/06
    • H04L12/66H04M15/06H04M15/56
    • Systems and methods are disclosed for authenticating caller identification in VoIP communication. A VoIP device receives an incoming call from an originating calling device; wherein the incoming call includes (1) a caller identification and (2) a unique identifier associated with the originating calling device. The VoIP device verifies that the caller identification in the received incoming call matches an entry in a trusted directory, wherein the trusted directory includes one or more entries of previously verified caller identifications. Upon verifying that the caller identification in the received incoming call matches a caller identification entry in the trusted directory, the VoIP device sends an inquiry to a unique locator associated with the matching caller identification in the trusted directory.
    • 公开了用于在VoIP通信中认证呼叫者识别的系统和方法。 VoIP设备从始发呼叫设备接收来话呼叫; 其中所述来电包括(1)呼叫者标识和(2)与所述始发呼叫装置相关联的唯一标识符。 VoIP设备验证所接收的呼入呼叫中的呼叫者标识符合可信任目录中的条目,其中信任目录包括先前验证的呼叫者标识的一个或多个条目。 在验证所接收的呼入呼叫中的呼叫者识别符与受信任目录中的呼叫者识别条目相匹配时,VoIP设备向可信目录中与匹配呼叫者身份相关联的唯一定位器发送查询。
    • 9. 发明申请
    • DETERMINING APPLICATION DISTRIBUTION BASED ON APPLICATION STATE TRACKING INFORMATION
    • 基于应用状态跟踪信息确定应用分配
    • US20090300602A1
    • 2009-12-03
    • US12132358
    • 2008-06-03
    • Michael R. BurkeNicholas F. CampionJoseph H. Peterson
    • Michael R. BurkeNicholas F. CampionJoseph H. Peterson
    • G06F9/445
    • G06F8/61
    • A method of distributing applications between a plurality of machines forming a client system. The method includes determining that applications should be distributed to maximize hardware utilization of each or the plurality of machines; determining a plurality of possible configurations of applications among the plurality of machines; creating a list of all possible configurations; comparing the list of all possible configurations to a database of state information; removing configurations from the list if the configuration is the same as a state previously determined to be non-functional to create a pruned list; generating a score for each configuration on the pruned list by comparing each configuration with states information in the database; selecting the configurations with the highest score, the number of configurations equaling the number of machines; and deploying the selected configurations on the plurality of machines.
    • 一种在形成客户端系统的多个机器之间分配应用的方法。 该方法包括确定应该分发应用以最大化每个或多个机器的硬件利用率; 确定所述多个机器之间的多个可能的应用配置; 创建所有可能配置的列表; 将所有可能的配置的列表与状态信息的数据库进行比较; 如果配置与先前确定为不能用于创建修剪的列表的状态相同,则从列表中删除配置; 通过将每个配置与数据库中的状态信息进行比较,为修剪的列表中的每个配置生成分数; 选择具有最高分数的配置,配置数量等于机器数量; 以及在所述多个机器上部署所选择的配置。