Bandwidth Sharing
First Claim
Patent Images
1. A computer-implemented method for bandwidth sharing, the method comprising:
- providing a first key to a first user;
providing a second key to a second user;
receiving the second key from the first user;
responsive to receiving the second key from the first user, allocating an amount of bandwidth normally allocated to the first user to the second user.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for bandwidth sharing. In one embodiment, a computer program product comprising a computer-readable storage medium has program code embodied therewith. The program code is executable by a computing device to provide a first key to a first user, provide a second key to a second user, receive the second key from the first user and, responsive to receiving the second key from the first user, allocate an amount of bandwidth normally allocated to the first user to the second user.
-
Citations
20 Claims
-
1. A computer-implemented method for bandwidth sharing, the method comprising:
-
providing a first key to a first user; providing a second key to a second user; receiving the second key from the first user; responsive to receiving the second key from the first user, allocating an amount of bandwidth normally allocated to the first user to the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for bandwidth sharing, the computer system comprising:
-
one or more processors, one or more computer-readable memories, and one or more computer-readable, tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to provide a first key to a first user; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to providing a second key to a second user; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories to receive the second key from the first user; and program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories to, responsive to receiving the second key from the first user, allocate an amount of bandwidth normally allocated to the first user to the second user. - View Dependent Claims (9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20)
-
-
15. A computer program product for modeling business intelligence data, the computer program product comprising a computer-readable storage medium having program code embodied therewith, the program code executable by a computing device to:
-
provide a first key to a first user; provide a second key to a second user; receive the second key from the first user; and responsive to receiving the second key from the first user, allocate an amount of bandwidth normally allocated to the first user to the second user.
-
Specification