Month of July 2011 - Page Number 1

Showing 1 - 10 of 579 from July 2011
Browse Prior Art Database
  1. 1.
    IPCOM000209192D | Original Publication Date: 2011-Jul-31
  2. 2.
    The RTP Control Protocol (RTCP) is the out-of-band control protocol for applications that use the Real-time Transport Protocol (RTP) for media transport [RFC3550]. In addition to providing minimal control functionality to RTP entities, RTCP also enables a basic-level monitoring of RTP sessions via sender and receiver...
    IPCOM000209191D | 2011-Jul-30
  3. 3.
    The Datagram Congestion Control Protocol (DCCP) [RFC4340] is a transport protocol for connection-oriented, unreliable, and congestion-controlled datagram delivery. In DCCP, an application has a choice of congestion control mechanisms, each specified by a Congestion Control Identifier (CCID; [RFC4340], Section 10).
    IPCOM000209190D | 2011-Jul-30
  4. 4.
    This document specifies the mapping and notification of defect states between a pseudowire and the Attachment Circuits (AC) of the end-to- end emulated service. It covers the case where the ACs and the PWs are of the same type in accordance to the Pseudowire Emulation Edge- to-Edge (PWE3) architecture [RFC3985] such...
    IPCOM000209189D | 2011-Jul-30
  5. 5.
    Some developers would like the IETF to use the latest version of ASN.1 in its standards. Most of the RFCs that relate to security protocols still use ASN.1 from the 1988 standard, which has been deprecated. This is particularly true for the standards that relate to PKIX, CMS, and Secure/Multipurpose Internet Mail...
    IPCOM000209188D | 2011-Jul-30
  6. 6.
    The physical location of a network device has a range of applications. In particular, emergency telephony applications rely on knowing the location of a caller in order to determine the correct emergency center.
    IPCOM000209187D | Original Publication Date: 2011-Jul-01
  7. 7.
    IPCOM000209186D | Original Publication Date: 2011-Jul-30
  8. 8.
    A solution is invented for manufacturing magnetic media with sub-nanometer thin lubricant. The first step creates the targeted thin thickness of a bonded lubricant layer. The second step coats an additional layer of slowly evaporating non-bonded lubricant.The additional non-fuctional lubricant takes the disks through...
    IPCOM000209185D | 2011-Jul-29
  9. 9.
    IaaS type public cloud provides Windows, Linux and other operating system instances as virtual machines. In same cases, users can access them with User Id and Password-only authentication. For example, to access a Linux instance, they can use ssh with key-exchange method. In this case, if a private ssh key is not...
    IPCOM000209184D | 2011-Jul-29
  10. 10.
    Disclosed is a method to gather multiple snapshots of an operating system reaching its error threshold. Using logarithmic polling, this method provides a more efficient way to track errors and predict possible future failures.
    IPCOM000209183D | 2011-Jul-29