Patent classifications
H04L67/59
MULTILEVEL REDIRECTION IN A VIRTUAL DESKTOP INFRASTRUCTURE ENVIRONMENT
Multilevel redirection can be performed in a VDI environment. When a user establishes a second remote session within a first remote session, various redirection techniques can be configured to span both remote sessions so that redirection will be available within the second remote session in the same manner that redirection was available in the first remote session. Therefore, from the user perspective, redirection will occur regardless of whether the user has established a single tier remote session or multitier remote session.
Host enabled management channel
A logical communication path is provided between a target virtual machine (VM) and a host or application communicating with the VM. The target VM runs on a hypervisor host that has a hypervisor and a proxy agent. The hypervisor manages execution of the VM. A mapping is maintained indicating which VMs execute on which hosts. When the host or application is to send a message or packet to the target VM, the mapping is consulted and the hypervisor host hosting the target VM is identified. The message or packet, which may identify the target VM, is transmitted to the hypervisor host. A proxy agent at the hypervisor host selects a communication channel between the hypervisor and the target VM. The hypervisor then passes the message or packet through the selected channel to the target VM.
Centralized coordination of data collection tasks from multiple sources
A scheduler manages execution of a plurality of data-collection jobs, assigns individual jobs to specific forwarders in a set of forwarders, and generates and transmits tokens (e.g., pairs of data-collection tasks and target sources) to assigned forwarders. The forwarder uses the tokens, along with stored information applicable across jobs, to collect data from the target source and forward it onto an indexer for processing. For example, the indexer can then break a data stream into discrete events, extract a timestamp from each event and index (e.g., store) the event based on the timestamp. The scheduler can monitor forwarders' job performance, such that it can use the performance to influence subsequent job assignments. Thus, data-collection jobs can be efficiently assigned to and executed by a group of forwarders, where the group can potentially be diverse and dynamic in size.
Methods and apparatuses for dynamic content offloading
Methods and apparatuses for dynamic content offloading are provided. For example, a method includes sending, by a client device, a request for one or more data files and receiving a redirection message redirecting the client device to receive the one or more data files through a broadcast channel if offloading is available for the one or more data files. As another example, a method a method includes configuring a client device to utilize offloading and dynamically redirecting the client device to a broadcast channel to receive a transmission of one or more data files in response to (i) receiving a request from the client device for the one or more data files, (ii) determining that offloading to the broadcast channel is appropriate for the one or more data files, and (iii) determining that the client device is configured to utilize offloading.
File transfer system, device and method
A file transfer system including: a file sender, a file receiver, an Instant Messaging (IM) server, a file relay policy server and a file relay server. Also disclosed are the internal structures of the above file relay policy server and IM server and a file transfer method. If the file receiver has not logged in the IM system, it is possible that the file sender sends a file to the file relay policy server, the file relay policy server forwards the file to an appropriate file relay server, and the file relay server transfers the file to a mobile terminal as the file receiver according to a file transfer protocol of the file relay server itself, thereby facilitating the file transfer for the mobile subscriber and enhancing the mobile subscriber's experience in using the mobile IM service.
METHODS AND SYSTEMS FOR SECURED REMOTE BROWSING FROM A TRANSPORTATION VEHICLE
Methods and systems for a transportation vehicle are provided. For example, one method includes providing a seat identifier and/or a transportation vehicle identifier in a request to access a webpage via an Internet connection from a seatback device of a transportation vehicle; selecting a server that is not located on the transportation vehicle for providing content to the seatback device; executing a remote browser at the server for retrieving content from the Internet for the seatback device, without having to execute a browser at the seatback device; and rendering content at the seatback device as an image of the content retrieved by the remote browser.
SYSTEM THAT SAVES DATA, SERVER, AND METHOD
An object of the present invention is to provide a system capable of preventing data from being lost even in the case where upload of the data has failed and of preventing saved data from being deleted without a user knowing it. The present invention is a system that saves data in a storage server and the system includes: a determination unit configured to determine whether or not upload of the data to the storage server has succeeded; a saving unit configured to temporarily save the data in the case where the upload has failed; a notification unit configured to notify a user of that the temporarily saved data exists in the case where the saving unit temporarily saves the data; a retry unit configured to try reupload of the temporarily saved data to the storage server; and a deletion unit configured to delete the temporarily saved data in the case where the reupload has succeeded.
System and method for reducing bandwidth usage of a network
A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.
System and method for reducing bandwidth usage of a network
A method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value.
System and method for advanced control tools for administrators in a cloud-based service
A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of an enterprise account. The advanced control tools permit the administrator to set mobile security settings for mobile devices running applications that allow a user to access enterprise data in the cloud-based platform; activity notification archiving; support for multiple email domains; automation processes; and policies. The settings selected by the administrator are applied enterprise-wide within the cloud-based platform.