This website is currently dormant!

API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

System and method for detecting accidental peripheral device disconnection

A detection device for detecting the manner in which a peripheral device is removed from an electronic device is proposed. The detection device can be on the peripheral device or the electronic device and detects whether the peripheral device was removed in a manner that indicates the removal was intentional or unintentional.

  • Pub Date: 2010/31/12
  • Number: 09052758
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Selection of one of several available incremental modification detection techniques for use in incremental backups

Various systems and methods can select an incremental modification detection technique to apply to a data object during generation of an incremental backup. For example, a method can involve accessing information indicating an access characteristic of a data object and then selecting an incremental modification detection technique (from a set of more than one different incremental modification detection techniques), in response to the information. The incremental modification detection technique is selected to be applied to the data object when generating an incremental backup. The set of incremental modification detection techniques can include change tracking and content differencing techniques.

  • Pub Date: 2010/31/12
  • Number: 08655841
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for soliciting an answer to a question

A question-and-answer application with an “ask-to-answer” feature is described. The ask-to-answer feature enables any user to solicit an answer to a question from another user. Upon soliciting another user for an answer to a particular question, a message with a call to action is directed to the solicited user. The message may include a copy of the text of the question and may provide a mechanism (e.g., a selectable user interface element) enabling the solicited user to pass on answering the question. Subsequent to the solicitation, the question page for the question will include a notification with information about the solicitation, including in some instances information identifying the user who has been asked to answer the question and the number of times the user has been asked to provide an answer to the question.

  • Pub Date: 2010/31/12
  • Number: 08516379
  • Owner: Quora, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method frame aggregation for latest user-defined class loader identification

Class loader changes from at least one user-defined class loader to a bootstrap class loader are determined by a stack processing module during de-serialization of a serialized data object. A reference to each user-defined class loader is stored separately from a thread method frame stack in response to each determined change from the at least one user-defined class loader to the bootstrap class loader. For each user-defined class load operation of a user-defined class associated with the de-serialization of the serialized data object, a latest user-defined class loader (LUDCL) is identified using the stored reference and the user-defined class is loaded using the identified LUDCL.

  • Pub Date: 2010/31/12
  • Number: 08661426
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for adapting mobile device to accommodate external display

In at least one embodiment, a mobile device system includes an external display device in communication with a mobile device. The mobile device has a touchscreen display, an operating system and at least one additional software component executed by processing component(s), where one or more input signals from the display are communicated to the operating system. The at least one additional software component generates output signals based upon one or more image signals communicated at least indirectly from the operating system. The external display device receives the output signals and based thereon displays an image having two components, one of which is reflective of a mobile device status/operational condition and is substantially similar to another image that would have been displayed on the touchscreen display if the external display device and mobile device were not in communication. Methods of operating such mobile device systems, and mobile devices, are also disclosed.

  • Pub Date: 2010/31/12
  • Number: 08369893
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Fully automated cloud tiering controlled by an orchestration layer based on dynamic information

A distributed storage system includes an orchestration layer that provides policy driven orchestration for controlling access and/or load balancing in connection with servicing I/O requests from one or hosts at one or more compute sites in a cloud configuration. The I/O requests may be received over a communication link, and the orchestration layer maintain policies and/or other information that control the selection of an compute site for processing of the I/O according to one or more policies and based on tiering designations of the compute sites. For example, according to various embodiments, policy information of the orchestration layer may control the passing of I/O requests to the one or more compute sites with respect to such factors as requirements of particular service legal agreements, specific tolerances for handling the I/O requests and/or times and rates for processing I/O requests at particular compute sites.

  • Pub Date: 2010/31/12
  • Number: 08682955
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic software version selection

Dynamic software version selection is performed by associating a binding library with a software component. The binding library comprises a loader component and a binding component, wherein the loader component serves as an intermediary between the software component and the binding component, and the binding component comprises software component-side logic. Dynamic software version selection further comprises logic in the loader component that decides to load a library from the binding component into memory of a processing device, and selecting by the loader component, a desired version of the requested library, where the desired version of the library is selected from at least two versions of the library associated with the binding component of the binding library. Still further, dynamic software version selection comprises loading the desired version of the library into memory of a computer processing system without requiring that the associated software component restart.

  • Pub Date: 2010/31/12
  • Number: 08595715
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for malware detection and scanning

Systems and methods are provided for malware scanning and detection in a computing system. In one exemplary embodiment, the method includes launching, in a computing device of the computing system, a virtual machine, and launching, in the virtual machine of the computing device, an internet browser. The method also includes requesting, by the internet browser, data from a web page, and performing, using one or more analysis tools, analysis on the web page. In the method, performing analysis on the web page includes performing monitoring and recording of system application programming interface (API) calls, and creating software objects associated with the web page. The method also includes performing antivirus scanning of the software objects, de-obfuscating JavaScript associated with the software objects, and correlating data associated with the performed analysis to determine if the web page is a malicious web page.

  • Pub Date: 2010/30/12
  • Number: 08832836
  • Owner: Verisign, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


System for organizing and guiding a user in the experience of browsing different applications based on contexts

The present invention provides a system that enhances the experience of using a portable device such as mobile phones, smart phones, Personal Digital Assistants PDA etc. To improve the user experience in the use of a portable device, techniques are used for “context characterization, i.e., from a range of conditions possible to detect by the system, such as time (date/time), current location, motion, etc., as well as the historical use of the device, a certain grouping of actions and settings, called “context” are selected automatically or manually, modifying and setting from that moment the way of user interacts with the device.

  • Pub Date: 2010/30/12
  • Number: 09575776
  • Owner: SAMSUNG ELECTRÔNICA DA AMAZÔNIA LTDA.
  • Location: Campinas-São Paulo, BR
  • Details: Visit USPTO

Visit USPTO Page


System and method for testing a software unit of an application

A system, computer readable storage medium including instructions, and a computer-implemented method for testing a software unit of an application is described. A method signature for a method of the software unit of the application is received. A generic test specification for a generic test of the method is identified based on the method signature, the generic test specification being one of a plurality of test specifications, wherein the generic test specification includes a definition for at least one reference input parameter value of the method and a definition for at least one reference output parameter value of the method. The method is executed using the at least one reference input parameter value to produce at least one test output parameter value. A test result is determined based on a comparison between the at least one test output parameter value and the at least one reference output parameter value.

  • Pub Date: 2010/30/12
  • Number: 08813034
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for capturing parameters and recording events in portable devices with digital television receiver

A system and method for capturing and recording parameters of events on portable devices with a digital television receiver, a method for remote configuration of service parameters for capturing and recording events on portable devices, as well as a portable device and server. More specifically, a system and method for capturing audience data, the method for remote configuration of audience data capture service, especially adapted for digital TV services on portable devices such as mobile phones, smartphones, and personal digital assistants, among others, that helps in remotely setting up the service. Another aspect of the present architecture is the fact that it is completely based on software, using only resources that are already present in portable devices with an embedded service.

  • Pub Date: 2010/30/12
  • Number: 08850463
  • Details: Visit USPTO

Visit USPTO Page


System and method for capturing analyzing and recording screen events

A computer-implemented method for assessing the quality of performance of agents engaged in customer-representative interaction-related sessions is provided. The method includes capturing screen events of a computational representative to form a captured event, wherein the screen event is a graphical user interface (GUI) element shown on a screen coupled to the computational device; parsing the captured event according to one or more criteria to obtain screen event data that contains text; triggering recording of screen data associated with the computational device, if the screen event data matches a user defined text search criterion; and performing computer-based automated quality measurement analysis based on the screen event data.

  • Pub Date: 2010/30/12
  • Number: 08984427
  • Owner: Nice-Systems Ltd.
  • Location: Ra'anana, IL
  • Details: Visit USPTO

Visit USPTO Page


Social networking for bandwidth conservation in video on demand systems

A method is disclosed for using social networking information to conserve bandwidth in a video-on-demand (VOD) system operated by a service provider. In a VOD server system, a request for a VOD content item is accepted from a first client system associated with a user of the VOD system. A list of social networking friends of the user is obtained. A node-sharing group of the list of social networking friends is determined. The node-sharing group includes the first client system and zero or more client systems sharing a distribution node of the VOD server system with the first client system. A video delivery start message is sent through the shared distribution node to each client system in the node-sharing group.

  • Pub Date: 2010/30/12
  • Number: 09106972
  • Owner: GOOGLE TECHNOLOGY HOLDINGS LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Social network and matching network search engine

A matching network system including communication devices, servers and software which enables the provisioning of services and execution of transactions based on a plurality of private and public personality profiles and behavior models of the users, of the communication devices, of the products/services and of the servers; in combination with the software resident at the communication device level and or the local/network server level. Matching and searching processes based on a plurality of personality profiles wherein the information, communication and transactions are enabled to be matched with the user, the communication device and or the servers. The communication device is a stationary device or a mobile device, such as a portable computing device, wireless telephone, cellular telephone, personal digital assistant, or a multifunction communication, computing and control device.

  • Pub Date: 2010/30/12
  • Number: 08234346
  • Owner: IP Holdings, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Set-top box circuitry supporting 2D and 3D content reductions to accommodate viewing environment constraints

Set-top box circuitry and methods of operating the same are described that support the delivery of media content between one or more media content sources and a screen assembly of a display system. The set-top box circuitry is configured to process media content having display requirements that exceed constraints associated with a viewing environment that includes the screen assembly to produce processed media content having display requirements that do not exceed the constraints. The set-top box circuitry may also be configured to obtain substitute media content that replaces requested media content when the requested media content has display requirements exceeding constraints associated with a media content source, a communication path from the media content source, and/or the viewing environment.

  • Pub Date: 2010/30/12
  • Number: 08687042
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Selectively organizing a recipient list based on external group data

An ungrouped list associated with a communication artifact can be identified. The information can be associated with a recipient, which can be a user registered within a computing system. Group data information associated with an external source can be received. The source can be a data source not associated with the artifact. The group data can include a group and/or a contact identifier. Recipient information from the recipient list can be associated with a group identifier if the recipient identifier is equivalent to the contact identifier within the group data. A grouped list can be generated from the associated data. A grouped list can be presented within an interface. The presenting can present recipient information within a logical grouping for at least a portion of the recipients of the ungrouped list. The grouping can be an organization of recipient information associated with the group identifier.

  • Pub Date: 2010/30/12
  • Number: 08566319
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time attendance reporting

In one embodiment, a method includes periodically receiving from multiple mobile client systems multiple event attendee list updates, updating an event attendee list database based on the event attendee list updates, and periodically generating an attendance report based the event attendee list and the event attendee list updates.

  • Pub Date: 2010/30/12
  • Number: 08671001
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Protecting screen information

A method, computer program product, and system for protection screen information is described. A method may comprise determining, via a computing device, if there is a screen protection rule, the screen protection rule based upon, at least in part, at least one of an application rule for protecting a portion of a screen region, and a process rule for protecting the portion of the screen region. The method may further comprise modifying, via the computing device, the portion of the screen region based upon, at least in part, at least one of the application rule, and the process rule.

  • Pub Date: 2010/30/12
  • Number: 08847985
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Programming architecture supporting mixed two and three dimensional displays

Applications are provided that contain code of a programming language enabling simultaneous display on a screen of both two-dimensional and three-dimensional content. Furthermore, development systems and program libraries supporting the same are provided. A first command is generated by first program code of an application. The first command directs a first configuration of a first region of the screen to support the three-dimensional content. A second command is generated by second program code of the application. The second command directs a second configuration of a second region of the screen to support the two-dimensional content. The display of the three-dimensional content is caused within the first region of the screen, and the display of the two-dimensional content is caused within the second region of the screen.

  • Pub Date: 2010/30/12
  • Number: 09654767
  • Owner: Avago Technologies General IP (Singapore) Pte. Ltd.
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Operating system supporting mixed 2D, stereoscopic 3D and multi-view 3D displays

Operating systems are described that interface applications and display screens capable of displaying two-dimensional and three-dimensional content. In one aspect, an operating system includes an application programming interface (API), a display driver interface, and a display driver. The API enables one or more applications to deliver requests that define a screen region and either a two-dimension indicator or a three-dimension indicator. The display driver interface passes configuration commands corresponding to the requests. The display driver is associated with a display screen. The display driver receives the configuration commands and responds by generating screen control signals to adjust the display screen to support the screen region.

  • Pub Date: 2010/30/12
  • Number: 09124885
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple remote controllers that each simultaneously controls a different visual presentation of a 2D/3D display

Remote control devices that can be used to independently modify multiple visual presentations that are simultaneously displayed by a screen assembly are described, wherein at least one of the visual presentations is observable by a first viewer but not a second viewer. The remote control devices can also be used to independently select media content upon which each of the multiple visual presentations is based and to control the manner in which such media content is delivered to the screen assembly. In accordance with certain embodiments, at least one of the visual presentations comprises a three-dimensional visual presentation. Display systems that include such remote control devices and methods of operating the same are also described.

  • Pub Date: 2010/30/12
  • Number: 08854531
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


MRI image distortion reduction for MRI images of a recipient having an implantable medical device

A method for generating a new set of MRI images of a region of a recipient in which an implanted medical device having magnetic properties is located. The method includes scanning a plurality of scan slices of the recipient with an MRI machine set at a first fat shift direction to generate a first set of MRI images and rescanning the plurality of scan slices with a fat shift direction different than the first fat shift direction to obtain a second set of MRI images. At least one of the MRI images of the first set and the second set including an artifact resulting from the implanted medical device. The method further includes comparing respective artifacts of the MRI images of the first and second sets, and selecting one of the compared MRI images based on the distortion to the respective MRI image created by the respective artifact.

  • Pub Date: 2010/30/12
  • Number: 08570040
  • Owner: Cochlear Limited
  • Location: Macquarie University, NSW, AU
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and articles of manufacture for smart pattern capturing and layout fixing

Various embodiments are directed at methods and systems for implementing automatic fixing of a layout, implementing fuzzy pattern replacement, and implementing pattern capturing in a layout of an electronic circuit design. Various processes or modules comprise the act or module of identifying a first pattern from within an electronic circuit layout. The processes or modules also comprise identifying a fixing process or a replacement pattern for the first pattern and the act of performing pattern replacement or pattern fixing on the first pattern. The processes or modules may further comprise the act or module of searching the layout for patterns that match the first pattern, and the act or module of performing pattern replacement of pattern fixing on the patterns that match the first pattern. Some embodiments are also directed at articles of manufacture embodying a sequence of instructions for implementing the processes described here.

  • Pub Date: 2010/30/12
  • Number: 08516406
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and articles of manufacture for implementing electronic circuit designs with simulation awareness

Disclosed are methods, systems, and articles of manufacture for implementing electronic designs with simulation awareness. A schematic is identified or created and simulated at the schematic level to characterize the functional behavior of the circuit or to ensure the circuit design meets the required design specifications. Physical data of a component of the design is identified, created, or updated, and the electrical parasitic associated with physical data is characterized. One or more electrical characteristics associated with the parasitic is further characterized and mapped to the simulator to re-simulate the circuit design to analyze the impact of parasitics. Some embodiments re-run the same simulation process incrementally in an interactive manner by accepting incremental design or parameter changes from the design environment.

  • Pub Date: 2010/30/12
  • Number: 08694933
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and articles of manufacture for implementing electronic circuit designs with electro-migration awareness

Disclosed are methods, systems, and articles of manufacture for implementing electronic circuit designs with electro-migration awareness. Some embodiments perform schematic level simulation(s) to determine electrical characteristics, identifies physical parasitics of a layout component, determines the electrical or physical characteristics associated to electro-migration analysis on the component, and determines whether the component meets EM related constraint(s) while implementing the physical design of the electronic circuit in some embodiments. Some embodiments further determine adjustment(s) to the component or related data where the EM related constraints are not met and/or and present the adjustment(s) in the form of hints. Various data and information, such as currents in various forms or voltages, are passed between various schematic level tools and physical level tools.

  • Pub Date: 2010/30/12
  • Number: 09330222
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and articles of manufacture for implementing electronic circuit designs with electrical awareness

Disclosed are a method, system, and computer program product for implementing electronic circuit designs with electrical awareness. The method or the system updates the schematic level tool(s) and physical design tool(s) with electrical parasitic data or electrical characteristic data associated with electrical parasitics so both schematic and physical design tools are aware of the electrical parasitic or characteristic data in performing their functions such as extraction based simulations. The methods or systems are also aware of EM or IR-drop constraint(s) while implementing or creating a partial layout less than a complete layout. The method or the system also provides a user interface for a design tool to provide in situ, customizable, real-time information for implementing electronic circuit designs with electrical awareness. The methods or systems also support constraint verification for electronic circuit design implementation with electrical awareness.

  • Pub Date: 2010/30/12
  • Number: 08694950
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and articles of manufacture for constraint verification for implementing electronic circuit designs with electrical awareness

Disclosed are methods, systems, and articles of manufacture for constraint verification for implementing electronic circuit designs with electrical awareness. Some embodiments identify or set parasitic constraint(s) and compare the electrical parasitic(s) with corresponding parasitic constraint(s) to determine whether the parasitic constraints are met. Some embodiments first identify, determine, or update the physical data of a component of a partial layout and characterize the electrical parasitics associated with the physical data of the component. Some embodiments identify or determine some schematic level performance constraints and estimate parasitic constraints based on schematic simulation results and the performance constraints; the estimated parasitic constraints are then compared with the corresponding electrical parasitics to determine whether the constraints are satisfied. Some embodiments further map schematic level parasitic constraints to a physical design representation and then compares the mapped parasitic constraints with corresponding electrical constraints to determine whether the mapped constraints are met.

  • Pub Date: 2010/30/12
  • Number: 08762914
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and article of manufacture for providing in situ, customizable information in designing electronic circuits with electrical awareness

Disclosed are a method, system, and computer program product for providing customizable information in designing electronic circuits with electrical awareness. The method or the system displays a portion of a physical design of an electronic circuit in a first display area. The method or the system receives or identifies a user's or a system's manipulation of the portion of the physical design of the electronic circuit. The method or the system then determines and displays an in situ response to the manipulation in the first display area. The method or the system may further display, in the first display area or in another display area, result(s) relating to the physical data of a component, electrical parasitic(s) associated with the physical data, electrical characteristic(s) associated with the physical data or the electrical characteristic(s), or other element(s) of the physical design that is impacted by the manipulation.

  • Pub Date: 2010/30/12
  • Number: 08782577
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Logical address based object oriented programming

Disclosed are methods and systems for generating resource with URI. The methods and systems involve receiving a request for processing a data, the request including an uniform resource identifier (URI), based on the URI, sending the request to an associated resource handler, instantiating set of data resources associated with the URI by calling a resource factory and processing the request by passing the set of data resources to a specific application programming interface for presenting instantiated set of data resources.

  • Pub Date: 2010/30/12
  • Number: 08595699
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Local SQL files for mobile clients

In one embodiment, a method includes receiving a request from a mobile client system for an event attendee list and transmitting a request to a data store for the event attendee list. If the event attendee list is available on the data store, then receiving the event attendee list from the data store, else transmitting a request to a data store for the event attendee list and receiving the event attendee list from a module. After receiving the event attendee list, the method includes transmitting the event attendee list to the mobile client system.

  • Pub Date: 2010/30/12
  • Number: 08812525
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Key management using trusted platform modules

Described herein are techniques for distributed key management (DKM) in cooperation with Trusted Platform Modules (TPMs). The use of TPMs strengthens the storage and processing security surrounding management of distributed keys. DKM-managed secret keys are not persistently stored in clear form. In effect, the TPMs of participating DKM nodes provide security for DKM keys, and a DKM key, once decrypted with a TPM, is available to be used from memory for ordinary cryptographic operations to encrypt and decrypt user data. TPM public keys can be used to determine the set of trusted nodes to which TPM-encrypted secret keys can be distributed.

  • Pub Date: 2010/30/12
  • Number: 09026805
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Incorporating social-network information in online games

Particular embodiments receive an indication from a first user that the first user desires to play a game; retrieve, from a social-networking system, one or more second users who are connected to the first user within a threshold degree of separation within the social-networking system; and invite each second user to play the game with the first user.

  • Pub Date: 2010/30/12
  • Number: 08990230
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid network software provision

Various example embodiments are methods and devices for providing an application from at least one remote machine to at least one local machine. The local machine may execute a local executable that has access to local resources of the computer device. The local machine may also execute a browser configured to communicate with the at least one remote machine through a firewall. A connection may be generated between the browser and the local executable. The local machine may download code for implementing a portion of the application from the at least one remote machine through the firewall. The code may be executed in the browser. The browser may generate an instruction directing the local executable to act on the local resources of the computer device. The instruction may be communicated to the local executable via the connection. The local executable may act on the local resources of the computer device in response to the instruction and return to the browser results of the action on the local resources.

  • Pub Date: 2010/30/12
  • Number: 09106514
  • Owner: SPIRENT COMMUNICATIONS, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Function module dispatcher

Disclosed are methods and systems for function module dispatcher. The methods and systems involve generating a multi tenant enabled function module by adding a logical tenant access parameter to a function to be executed in a tenant system. The methods and systems further include receiving access data associated with a central tenant system and input parameters for executing the function module on one or more tenant systems, accessing a central tenant system based on the access data, retrieving tenant access data associated with the tenant system by matching a logical tenant access parameter data received in the input parameters to the multi tenant function call with the tenant access parameter data stored in a destination map and dispatching the call to execute the function module on a respective tenant based on the tenant access data retrieved from the destination map.

  • Pub Date: 2010/30/12
  • Number: 08832180
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Field extensibility for analytical reports

A system may include reception of an instruction to add an extension field to a node of a business object object model, identification of at least one multi-dimensional analytical view object model including a reference field referring to the node of the business object object model, determination of at least one report associated with the determined at least one multi-dimensional analytical view object model, reception of a selection of one of the at least one report, extension of the one of the at least one multi-dimensional analytical view object model associated with the report based on the extension field, and extension of the selected report based on the extension field.

  • Pub Date: 2010/30/12
  • Number: 08886646
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Entertainment companion content application for interacting with television content

Methods and system for providing companion content at a secondary device for a content being rendered on a main device includes establishing a connection between the secondary device and a device that interfaces with the main device so as to enable the secondary device to access and control the content being rendered on the main device. The method further includes detecting data associated with the content being rendered on the main device through the connection, wherein the data includes metadata associated with the content rendered on the main device. The metadata is communicated to a remote application over the internet. The remote application is configured to analyze the metadata to produce communication content that relates to the content rendered on the main device. Companion content for the content being rendered on the main device is obtained from the remote application and rendered on the secondary device while the content is rendering on the main device. The analysis of the metadata detects changes in the content being rendered on the main device which results changes in the obtained companion content that is rendered on the secondary device.

  • Pub Date: 2010/30/12
  • Number: 08793730
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting spam events in event management systems

In one embodiment, a method includes accessing event information and payment information associated with an event listing on an event management system, and calculating a spam risk score for the event listing.

  • Pub Date: 2010/30/12
  • Number: 08844031
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting and reporting problems in a distributed resource computing system

Methods, systems and computer program products are provided. Methods for identifying problems in a distributed computing system may include receiving a user-selected identifier that corresponds to a nonfunctionality in an application. Problem requests including content corresponding to the user-selected identifier are sent to services that provide functionality to the application. The services may optionally respond to the problem requests with problem response data. The problem response data is stored in a data storage allocation that is associated with the user-selected identifier. The problem response data may be retrieved from the data storage allocation.

  • Pub Date: 2010/30/12
  • Number: 08874971
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Communication infrastructure including simultaneous video pathways for multi-viewer support

A communication system is described that allows co-located viewers to simultaneously consume different media content, such as different video content, via the same display screen, wherein video content delivered to at least one co-located viewer is not visible to the other co-located viewer(s). The communication system comprises an infrastructure that includes multiple pathways for delivering media content from one or more media sources to the eyes of each of the co-located viewers, wherein each pathway passes through the pixels of a pixel array included in the shared display screen. The pathways also include distributed or non-distributed processing circuitry that manages certain resources that are shared among the multiple pathways, wherein such shared resources may include shared display resources (e.g., pixels of the pixel array and light generated thereby) and shared data communication resources (e.g., bandwidth on data communication links and processing resources of nodes located on such links).

  • Pub Date: 2010/30/12
  • Number: 09066092
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Application programming interface supporting mixed two and three dimensional displays

Application programming interfaces (APIs) are provided that enable applications to display two-dimensional and three-dimensional content in regions of a display screen. A first command is received from an application directing at least in part a first configuration of a first region of the screen to support the three-dimensional content. The first command is responded to by sending a first configuration request to place the screen in a three-dimensional mode within the first region. A second command is received directing at least in part a second configuration of a second region of the screen to support the two-dimensional content. The second command is responded to by sending a second configuration request to place the screen in mode corresponding to a two-dimensional mode within the second region.

  • Pub Date: 2010/30/12
  • Number: 09143770
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing business data for planning applications

The present disclosure involves systems, software, and computer implemented methods for providing efficient planning through analyzing data. One process includes operations for generating a business object containing parameters and plan data of a business plan, the plan data represented by a plurality of aggregation levels. A change to a particular item in the plan data is identified, the change associated with a particular aggregation level. The change to the particular item is automatically propagated to a lowest level of granularity of the plan data, and the change to the particular item is available to each of the plurality of aggregation levels.

  • Pub Date: 2010/30/12
  • Number: 08412549
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Agent notification triggered by network access failure

A method of electronic communication is provided. The method comprises receiving a first call detail record (CDR), where the first call detail record comprises usage information associated with a portable wireless communication device, and the usage information comprises at least a first parameter. Based on the value of the first parameter, a copy of the first call detail record is transmitted to a computer, where the computer does not perform billing functionality. The computer then changes a subscriber account associated with the portable wireless communication device or changes a provisioning associated with the portable wireless communication device.

  • Pub Date: 2010/30/12
  • Number: 08688072
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual resource provider with virtual control planes

Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be modularized. Control plane modules may be supplied with data from standardized sensors, and required to generate standardized resource configuration requests responsive to solicitations with specified response latencies. Custom control plane modules may be selected to replace or complement default control plane modules. Financial and computational costs associated with control plane modules may be tracked. Competing resource configurations may be mediated by a control plane supervisor. Such mediation may be based on control plane module reputation scores. Reputation scores may be based on customer feedback ratings and/or measured performance with respect to module goals. Mediated configuration parameter values may be based on a combination of competing configuration parameter values weighted according to reputation. Contribution of individual modules to goal achievement may be tracked and rewarded accordingly.

  • Pub Date: 2010/29/12
  • Number: 08667495
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual controller for touch display

Systems and methods are provided for use with a computing device having a touch sensitive display including a touch sensor configured to detect touches of a digit of a user. The method may include detecting an initial digit down position on the display via the touch sensor, and establishing a neutral position for a virtual controller at the digit down position. The method may further include detecting a subsequent movement of the digit relative to the initial digit down position, and determining a controller input parameter based on the subsequent movement of the digit relative to the initial digit down position. The method may further include generating a controller input message indicating the determined controller input parameter.

  • Pub Date: 2010/29/12
  • Number: 09411509
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Touch event anticipation in a computing device

Systems and methods for anticipation of touch events in a computing device are provided. The computing device may include a multi-touch sensitive display including a sensor configured to sense a position and/or movement of a hand. A graphical user interface (GUI) may be displayed, having a state including a plurality of possible touch inputs. The computing device may further include a touch event prediction module configured to compute one or more anticipated touch inputs based on the sensed hand position and/or movement, and the state of the GUI with the plurality of possible user inputs. The computing device may further include a preprocessing module configured to preprocess data for each anticipated touch input, and upon the detection of an actual touch input received from the user that matches one of the anticipated touch inputs, displaying the preprocessed data for the actual touch input on the GUI.

  • Pub Date: 2010/29/12
  • Number: 09354804
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for credential generation

Systems and methods for managing credentials distribute the credentials to subsets of a set of collectively managed computing resources. The collectively managed computing resources may include one or more virtual machine instances. The credentials distributed to the computing resources may be used by the computing resources to perform one or more actions. Actions may include performing one or more functions in connection with configuration, management, and/or operation of the one or more resources, and/or access of other computing resources. The ability to use credentials may be changed based at least in part on the occurrence of one or more events.

  • Pub Date: 2010/29/12
  • Number: 08683560
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing dynamic ad hoc proxy-cache hierarchies

Systems and methods of storing previously transmitted data and using it to reduce bandwidth usage and accelerate future communications are described. By using algorithms to identify long compression history matches, a network device may improve compression efficiently and speed. A network device may also use application specific parsing to improve the length and number of compression history matches. Further, by sharing compression histories, compression history indexes and caches across multiple devices, devices can utilize data previously transmitted to other devices to compress network traffic. Any combination of the systems and methods may be used to efficiently find long matches to stored data, synchronize the storage of previously sent data, and share previously sent data among one or more other devices.

  • Pub Date: 2010/29/12
  • Number: 08352605
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for implementing haptics for pressure sensitive keyboards

Systems and methods are employed for implementing haptics for pressure sensitive keyboards, such as the type of keyboards having keys that produce alternating digital open/short signals that emulate actuation of conventional “momentary on” digital keys. The disclosed systems and methods may be implemented to provide haptics for both touch typing and variable pressure sensitive operation of a pressure sensitive keyboard. Users of a variable pressure keyboard may be provided with a variable pressure haptics effect, e.g., to enable the user to intuitively understand from the haptics vibration produced by the key how much pressure they are applying to a given key at any given time. Vibration characteristics (e.g., vibration rate, vibration waveform pattern, etc.) of a given pressed key may be varied in real time in coordination with, or in response to, corresponding changes in user pressure applied to the same given key.

  • Pub Date: 2010/29/12
  • Number: 08674941
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for starting a cloud-based virtualization system with partially deprivileged host OS

A computing cloud comprising at least one computing node having a Virtual Machine (VM) running on a user level. A plurality of additional computing nodes, each node having a Hypervisor with the highest privilege level, a Virtual Machine Monitor (VMM) running with no higher privileges than the Hypervisor, and a plurality of Virtual Machines (VMs) running on a user level. Each node has a Primary operating system (POS) running within the one of its VMs. The POS has direct access to hardware devices of the corresponding computing node. The other VMs use the corresponding POS of its node to access the hardware devices.

  • Pub Date: 2010/29/12
  • Number: 08370838
  • Owner: Parallels IP Holdings GmbH
  • Location: Schaffhausen, CH
  • Details: Visit USPTO

Visit USPTO Page


System and method for explosively stamping a selective fragmentation pattern

A selective fragmentation pattern of explosive material is applied to a surface of a munition. None, some, or all of the explosive material in the selective fragmentation pattern may be detonated, selectively stamping the surface of the munition with the detonated explosive material. The portion of the selective fragmentation pattern selected for ignition is determined by lethality requirements of a target of the munition. Upon detonation of the munition, fragments are formed based on the selected portion of the selective fragmentation pattern. Consequently, igniting all, some, or none of the selective fragmentation pattern may vary lethality of a munition and one munition may be used for a wide range of lethality.

  • Pub Date: 2010/29/12
  • Number: 08161884
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for establishing bidirectional links between multiphysics modeling and design systems

A system and method for implementing, on one or more processors, a bidirectional link between a design system and a multiphysics modeling system includes establishing via a communications link a connection between the design system and the multiphysics modeling system. Instructions are communicated via the communication link that include commands for generating a geometric representation in the design system based on parameters communicated from the multiphysics modeling system. One or more memory components can be configured to store a design system dynamic link library and a multiphysics modeling system dynamic link library. A controller can be operative to detect an installation of the design system, and implement via the dynamic link libraries, bidirectional communications of instructions between the design system and the multiphysics modeling system.

  • Pub Date: 2010/29/12
  • Number: 09208270
  • Owner: Comsol AB
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


System and method for administration and operation of one or more mobile electronic communications devices

A mobile electronic communications device includes a housing, a memory, a data entry mechanism, a display for visual data, at least one wireless transceiver configured to transmit and receive electromagnetic signals conforming to a plurality of wireless signaling protocols, and a controller. The controller is communicatively connected to the memory, data entry mechanism, and display; and is configured to send and receive data using the at least one wireless transceiver. The controller detects available wireless networks using at least one of the plurality of wireless signaling protocols, compares network identifications of available wireless networks to a predetermined list of network identifications ordered by preference, establishes a wireless network connection with an available wireless network having a network identification corresponding to a most preferred network identification in the predetermined list of network identifications, and executes an authentication process in response to establishing the wireless network connection.

  • Pub Date: 2010/29/12
  • Number: 09131356
  • Owner: Zipit Wireless, Inc.
  • Location: Greenville, US
  • Details: Visit USPTO

Visit USPTO Page


Synchronizing execution of a testing application

A method and apparatus for synchronizing execution of a test application is described. In one embodiment, the method includes receiving two or more commands from a test application. The method may also include distributing a first command from the received two or more commands to a plurality of client computer systems, each client computer system to issue the first command to a server computer system. Furthermore, the method may include distributing a second command from the received two or more commands to the plurality of client computer systems after receipt of a response to the first command from each of the plurality of client computer systems.

  • Pub Date: 2010/29/12
  • Number: 09064054
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Signature based map caching

Systems, methods, and computing devices for building, operating and using map systems with signature-based map caches are disclosed. Based on the desired map properties included in a formatted map request, a map signature can be generated. The map signature can be used to access a signature based map cache to determine whether a map with identical map properties has been previously generated and stored in cache or otherwise available for retrieval. If the map signature exists in the map cache, the corresponding map can be delivered to a map client. If the map signature does not exist in the map cache, then a map can be generated or rendered based on the map properties in the map request. Once the map is generated, it can be saved to the map cache along with associated map signature for future retrieval.

  • Pub Date: 2010/29/12
  • Number: 08880589
  • Owner: Environmental Systems Research Institute, Inc.
  • Location: Redlands, US
  • Details: Visit USPTO

Visit USPTO Page


Reputation-based mediation of virtual control planes

Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be modularized. Control plane modules may be supplied with data from standardized sensors, and required to generate standardized resource configuration requests responsive to solicitations with specified response latencies. Custom control plane modules may be selected to replace or complement default control plane modules. Financial and computational costs associated with control plane modules may be tracked. Competing resource configurations may be mediated by a control plane supervisor. Such mediation may be based on control plane module reputation scores. Reputation scores may be based on customer feedback ratings and/or measured performance with respect to module goals. Mediated configuration parameter values may be based on a combination of competing configuration parameter values weighted according to reputation. Contribution of individual modules to goal achievement may be tracked and rewarded accordingly.

  • Pub Date: 2010/29/12
  • Number: 08954978
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Post attack man-in-the-middle detection

Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer also uploads the stored public key certificates associated with a domain to a second computer each time a connection is established with the domain. The second computer receives the public key certificates from the first computer. The second computer then determines whether any of the public key certificates provided by the first computer are fraudulent certificates by comparing the received certificates to known valid certificates. If the second computer determines that the first computer has received one or more fraudulent certificates, the second computer may cause action to be taken with regard to the fraudulent certificates.

  • Pub Date: 2010/29/12
  • Number: 08484460
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating medical conditions by neuromodulation of the sympathetic nervous system

The present invention is directed to systems and methods for treating respiratory or pulmonary medical conditions by neuromodulation of a target site of the sympathetic nervous system and preferably a target site in communication with a sympathetic nerve chain. A system for treating a respiratory or pulmonary medical condition incorporating a closed-loop feedback system is also provided.

  • Pub Date: 2010/29/12
  • Number: 08583229
  • Owner: The Cleveland Clinic Foundation
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for application programming interface mashups

Methods, systems, and computer-readable media for providing customized content delivery from one or more data sources include receiving a selection of one or more base requests for content; receiving a selection of a custom request for content; receiving a mapping of the custom request to at least one of the base requests; building an output template including the custom request mapped to the at least one of the base requests; and publishing a resource based on the output template.

  • Pub Date: 2010/29/12
  • Number: 09026608
  • Owner: CBS Interactive Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for facilitating wireless communication via alternate wireless pathway

A mobile device system and related method are disclosed by which the device is able to communicate wirelessly not only via a Wide Area Network (WAN) communication link but also via an alternate communication link such as a Wi-Fi communication link. In one embodiment, the method includes detecting an availability of an additional (alternate) communication link made possible via an access point (AP), determining whether one or more first criteria relating to one or both of the AP and the device have been met and, provided that the one or more first criteria are met, automatically launching a browser to communicate with one or both of the AP and a remote server. The method further includes determining based upon one or more interactions whether one or more second criteria have been met and, provided that the one or more second criteria are met, conducting communications via the additional communication link.

  • Pub Date: 2010/29/12
  • Number: 08634348
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Infusion pump assembly

A wearable infusion pump assembly. The wearable infusion pump assembly includes a reservoir for receiving an infusible fluid and a fluid delivery system configured to deliver the infusible fluid from the reservoir to an external infusion set. The fluid delivery system includes a controller, a pump assembly for extracting a quantity of infusible fluid from the reservoir and providing the quantity of infusible fluid to the external infusion set, the pump assembly comprising a pump plunger, the pump plunger having distance of travel, the distance of travel having a starting position and an ending position, at least one optical sensor assembly for sensing the starting position and ending position of the pump plunger distance of travel and sending sensor output to the controller, and a first valve assembly configured to selectively isolate the pump assembly from the reservoir, wherein the controller receives the sensor output and determines the total displacement of the pump plunger.

  • Pub Date: 2010/29/12
  • Number: 08613724
  • Owner: DEKA Products Limted Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Delaying one-shot signal objects

A device may include a processor to execute a thread. The processor may be further configured to execute a set of wrappers that are called from within the thread to invoke a set of one-shot signal objects to generate delayed signals. Each of the set of wrappers may be configured to detect whether different ones of one-shot signal objects that were invoked from within the thread have generated signals at periodic time intervals, determine a delay to be used for invoking one of the set of one-shot signal objects, and invoke the one of the set of one-shot signal object to generate one of the delayed signals based on the delay when the different ones of one-shot signal objects have generated signals at periodic time intervals. The processor may be further configured to receive the delayed signals generated from the set of one-shot signal objects over a time period.

  • Pub Date: 2010/29/12
  • Number: 08402301
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Customized ID generation

Technologies are described herein for customized identifier (“ID”) generation by an ID service. One or more calling components (“components”) remote from the ID service generate requests for IDs. The requests can include one or more rules defining how the IDs are to be generated, type data identifying a type of IDs to be generated, encryption data specifying whether, and if so, how the IDs are to be encrypted, and number data defining how many IDs are to be generated at a particular time. The ID service receives the request, and in response to the request, generates the number of IDs specified, in accordance with the rules, type data, and encryption data provided in the request. An ID database can store one or more of the IDs and/or rules associated with the components, such that each component can be relieved from maintaining its own database for ID operations.

  • Pub Date: 2010/29/12
  • Number: 08856540
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Cost tracking for virtual control planes

Control planes of virtual resource providers may be customized in a secure, stable and efficient manner with virtual control planes. Control planes may be modularized. Control plane modules may be supplied with data from standardized sensors, and required to generate standardized resource configuration requests responsive to solicitations with specified response latencies. Custom control plane modules may be selected to replace or complement default control plane modules. Financial and computational costs associated with control plane modules may be tracked. Competing resource configurations may be mediated by a control plane supervisor. Such mediation may be based on control plane module reputation scores. Reputation scores may be based on customer feedback ratings and/or measured performance with respect to module goals. Mediated configuration parameter values may be based on a combination of competing configuration parameter values weighted according to reputation. Contribution of individual modules to goal achievement may be tracked and rewarded accordingly.

  • Pub Date: 2010/29/12
  • Number: 08667399
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Compounds for treatment of cancer

The present invention relates to novel compounds having anti-cancer activity, methods of making these compounds, and their use for treating cancer and drug-resistant tumors, e.g. melanoma, metastatic melanoma, drug resistant melanoma, prostate cancer and drug resistant prostate cancer.

  • Pub Date: 2010/29/12
  • Number: 09334242
  • Owner: UNIVERSITY OF TENNESSEE
  • Location: Knoxville, US
  • Details: Visit USPTO

Visit USPTO Page


Authorizations for analytical reports

A system may include reception of a request from a user to start a report associated with a node of a business object object model, where the node of the business object object model is associated with an access control list associating instances of the node with at least one access context restriction, determination of a first access context restriction associated with the user, retrieval of the at least one instance of the node based on the first access context restriction and on the access control list associated with the node, and presentation of an instance of the report to the user, the instance of the report populated with the at least one instance.

  • Pub Date: 2010/29/12
  • Number: 08726336
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for fluid delivery

A fill adapter for filling a reservoir. The fill adapter includes a button assembly actuator and a pump chamber plunger actuator hingably attached to the button assembly actuator, wherein the actuation of the button assembly actuator actuates the pump chamber plunger actuator and wherein the pump chamber plunger actuator actuates a pump chamber membrane before the at least one button assembly is actuated.

  • Pub Date: 2010/29/12
  • Number: 08881774
  • Owner: DEKA Research & Development Corp.
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for mounting haptics actuation circuitry in keyboards

Systems and methods are employed for implementing haptics for pressure sensitive keyboards, such as the type of keyboards having keys that produce alternating digital open/short signals that emulate actuation of conventional “momentary on” digital keys. The disclosed systems and methods may be implemented to provide haptics for both touch typing and variable pressure sensitive operation of a pressure sensitive keyboard. Users of a variable pressure keyboard may be provided with a variable pressure haptics effect, e.g., to enable the user to intuitively understand from the haptics vibration produced by the key how much pressure they are applying to a given key at any given time. Vibration characteristics (e.g., vibration rate, vibration waveform pattern, etc.) of a given pressed key may be varied in real time in coordination with, or in response to, corresponding changes in user pressure applied to the same given key.

  • Pub Date: 2010/29/12
  • Number: 08760273
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for performing actions based upon physical locations of paper documents

According to one set of embodiments, techniques are provided for performing actions based upon physical locations of one or more paper documents. According to another set of embodiments, techniques are provided for tracking the physical locations of paper documents. According to another set of embodiments, techniques are provided for determining electronic document information for paper documents. According to another set of embodiments, techniques are provided for determining and tracking the contents of a container. According to another set of embodiments, a document security system is provided. According to another set of embodiments, techniques are provided for tracking documents in a workflow.

  • Pub Date: 2010/28/12
  • Number: 08493601
  • Owner: Ricoh Company Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Task allocation multiple nodes in a distributed computing system

Work is distributed amongst a plurality of nodes. A first plurality of tasks is extracted, where the number of tasks is selected in correspondence to the number of nodes, and where sizes of the tasks are sized based on a job load metric. The first plurality of tasks is distributed. A determination is made whether a time difference between a response from a node that is first to complete its task and a response from a node that is last to complete its task exceeds a predefined threshold. In response to a determination that the time difference exceeds the predefined threshold, the job load metric is adjusted. A second plurality of tasks is extracted, where the number of tasks is selected in correspondence to the number of nodes, and wherein sizes of the tasks are sized based on the adjusted job load metric. The second plurality of tasks is distributed.

  • Pub Date: 2010/28/12
  • Number: 08645454
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Providing social-network information to third-party systems

Particular embodiments receive, at a first computing device associated with a social-networking system and from a second computing device associated with a third-party system, a query comprising a first identifier corresponding to a user of the third-party system, wherein the first identifier is computed by applying a hash algorithm to a user credential associated with the user of the third-party system; determine, by the first computing device, whether the user of the third-party system matches any member of the social-networking system; and if the second identifier corresponding to a member of the social-networking system matches the first identifier, then send, by the first computing device to the second computing device, social-network information of the member of the social-networking system in response to the query.

  • Pub Date: 2010/28/12
  • Number: 08799304
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Network traffic control

Information about the transmission of packets or other information can be inferred based at least in part upon the state of one or more queues used to transmit that information. In a networking example, a hook can be added to a free buffer API call from a queue of a NIC driver. When a packet is transmitted and a buffer freed, the hook can cause information for that packet to be transmitted to an appropriate location, such as a network traffic control component or control plane component, whereby that information can be compared with packet, source, and other such information to infer which packets have been transmitted, which packets are pending, and other such information. This information can be used for various purposes, such as to dynamically adjust the allocation of a resource (e.g., a NIC) to various sources based at least in part upon the monitored behavior.

  • Pub Date: 2010/28/12
  • Number: 08462632
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for regulating operation of one or more functions of a mobile application

Various embodiments include a method for regulating operation of mobile applications executing on a nomadic device. Signals for determining a speed of travel may be received at the nomadic device. The speed may be determined based on the one or more signals. If the determined speed exceeds a speed threshold, a speed restriction flag may be set and one or more functions of the mobile applications may be restricted. If, after setting the speed restriction flag, a speed cannot be determined, the application functions may be continually restricted until a speed can be determined.

  • Pub Date: 2010/28/12
  • Number: 08560739
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing an adaptive input user interface for data entry applications

Embodiments are described for a system and method for adapting an online user input form that provides user input to a web-based application. A method comprises defining one or more attributes related to one or more fields of the online user input form, obtaining historical data comprising past user input to related user input forms, calculating historical most common values for each attribute of the one or more attributes; and modifying the one or more fields of the online user input form in accordance with the calculated historical average values. The attributes may include at least one of the size, location, and datatype of each field of the form. The method may be implemented through an application programming interface for implementation through server-side and client-side processes that are written in a web-browser compatible markup language.

  • Pub Date: 2010/28/12
  • Number: 09405426
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for presenting a navigation path for enabling retrieval of content

An approach for enabling presentment of a navigation path as performed by a user over a network to facilitate rapid acquisition of content is described. A navigation path representing one or more sequences of resource identifiers that are related based on selection information provided by a user in navigating, via a browser application is presented. The navigation path is presented to permit direct selection of one of the resource identifiers of the one or more sequences for acquiring content associated with the selected resource identifier.

  • Pub Date: 2010/28/12
  • Number: 09582590
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated system and method for validating the functionality and performance of software applications

The system and method presented provides a multi-phase, end-to-end integrated process for testing application software using a standard software testing tool. The system and method involve integrating the functional, automated regression and performance phases of software application testing by leveraging deliverables at each phase so that the deliverables may be efficiently reused in subsequent test phases. Deliverables such as functional and technical test conditions and manual test scripts are used as inputs for each phase of the integrated tests. The use of leveraged requirements-based deliverables between test phases significantly reduces much of the repetitive testing typically associated with functionality and performance testing and minimizes repetition of testing errors discovered in earlier test phases. This integrated system and method for validating the functionality and performance of software applications by leveraging deliverables provides enhanced efficiencies, test procedure consistency throughout multiple test phases, consistent test results and high quality software applications.

  • Pub Date: 2010/28/12
  • Number: 08434058
  • Owner: JPMorgan Chase Bank, N.A.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Information technology resource allocation and utilization tracking in a cloud-based system

An apparatus for allocating and tracking utilization of information technology resources of a distributed virtual infrastructure comprises at least one processing platform associated with the distributed virtual infrastructure. The processing platform comprises at least one processing device having a processor coupled to a memory. The processing platform is operative to allocate at least a designated one of the information technology resources to a user responsive to a corresponding request, to track utilization of the designated information technology resource allocated to the user, and to generate one or more notifications if the utilization of the designated information technology resource by the user falls below a specified threshold. The distributed virtual infrastructure may comprise an enterprise private cloud infrastructure.

  • Pub Date: 2010/28/12
  • Number: 09037512
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Enforceable launch configurations

Users intending to launch instances or otherwise access virtual resources in a multi-tenant environment can specify a launch configuration. For each type of instance or each type of user, at least one launch configuration is created that includes parameters and values to be used in instantiating an instance of that type, the values being optimized for the current environment and type of instance. Launch configurations can be optimized for different types of users, such as to account for security credentials and access levels. Such an approach enables users to launch instances by contacting the resource provider directly without need for a proxy, which can function as a choke point under heavy load. The use of an appropriate launch configuration can be enforced for any type of user at any level, such as at the sub-net level, by modifying a request that does not specify an appropriate launch configuration.

  • Pub Date: 2010/28/12
  • Number: 08560699
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic book pagination

An electronic book can be paginated by reference to a print version of the same book. Pages of the print version are scanned to obtain text strings and page labels corresponding to each of the pages. The text strings are then compared to the electronic book to find the best matching positions within the electronic book. The matching positions within the electronic book are then associated with the page numbers of the pages from which the matching text strings were obtained. Autocorrelation can be used to determine matching positions.

  • Pub Date: 2010/28/12
  • Number: 08798366
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic data set replica management

Systems and methods dynamically manage replicas of data sets. A collection of data stores is used to redundantly store one or more replicas of one or more data sets. The replicas may be used to respond to read requests from multiple sources. Upon identification of a need to allocate storage space to a data object, space used by one or more of the replicas is allocated to the data object. Various parameters may be utilized in the selection of one or more replicas whose storage space can be allocated to the data object. The parameters may be based at least in part on characteristics of the one or more data sets relative to one another.

  • Pub Date: 2010/28/12
  • Number: 08849758
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of and responses to network attacks

Disclosed are various embodiments for detecting and responding to attacks on a computer network. One embodiment of such a method describes monitoring data communications transmitted to a target class of first computing nodes; in response to detecting a non-legitimate data communication to a computing node in the target class, determining whether the non-legitimate data communication is a form of attack on a network to which the computing nodes are connected; and in response to determining that the network is under attack, implementing new security measures for second computing nodes that are not part of the target class to protect the second computing nodes against the attack on the network while the attack is ongoing.

  • Pub Date: 2010/28/12
  • Number: 08499348
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Derived simulations for planning systems

Baseline data may be generated, including copying selected data from a planning database. Modifying requests associated with changes to a derived simulation may be received, and affected entries within the baseline data that are affected by the modifying requests may be determined. Simulation entries may be stored within a derived simulation dataset, the simulation entries corresponding to the affected entries within the baseline data. A mapping may be provided between the simulation entries within the derived simulation dataset and the affected entries within the baseline data. The derived simulation may be provided in response to the modifying requests and based on the mapping.

  • Pub Date: 2010/28/12
  • Number: 08612190
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Data replication framework

Generally described, the present disclosure is directed to an eventually consistent replicated data store that uses, for its underlying storage, a computer software library that provides a high-performance embedded database for data. The replicated data store employs a plurality of hosts interconnected to one another, allowing for writes to any host and full awareness of membership across all hosts. With the data replication framework disclosed herein, various modes are allowed to be built up on top of the core system.

  • Pub Date: 2010/28/12
  • Number: 09449065
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Capacity availability aware auto scaling

Technologies are described herein for capacity availability aware auto scaling. Capacity event auto scaling rules can be defined that specify how computing resources are to be scaled during a capacity event. The capacity event auto scaling rules can be defined to allow utilization of the computing resources to increase during a capacity event. A probability that capacity will be available for providing computing resources during a capacity event can also be computed. Standard auto scaling rules utilized by an auto scaling component can then be modified based upon the computed probability. Other types of actions might also be taken based upon the computed probability, such as reserving instances of computing resources.

  • Pub Date: 2010/28/12
  • Number: 09448824
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing data management operations using snapshots

A system stores a snapshot and an associated data structure or index to storage media to create a secondary copy of a volume of data. In some cases, the associated index includes application specific data about a file system or other application that created the data to identify the location of the data. The associated index may include three entries, and may be used to facilitate the recovery of data via the snapshot. The snapshot may be used by ancillary applications to perform various functions, such as content indexing, data classification, deduplication, e-discovery, and other functions.

  • Pub Date: 2010/27/12
  • Number: 08595191
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for analyzing snapshots

This application describes techniques for creating a second snapshot of a first snapshot of a set of data, modifying the first snapshot, and reverting the modifications to the first snapshot. For example, portions of one or more transaction logs may be played into a database to put the database in a particular state a particular point in time. The second snapshot may then be used to revert to a prior state of the database such that additional transaction logs may be played into the database. These techniques enable the ability to put the database into multiple states as the database existed at multiple points in time. Therefore, data can be recovered from the database as the data existed at different points in time. Moreover, individual data objects in the database can be accessed and analyzed as the individual data objects existed at different points in time.

  • Pub Date: 2010/27/12
  • Number: 08433682
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Providing and accessing data in a standard-compliant manner

In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be intercepted in response to a request for information from a second entity. The method may include converting the intercepted data from a first format to a second format, the second format compliant with a standard for providing intercepted data to the second entity. The method may include storing, in one or more memory units, the intercepted communication data in the second format. The one or more memory units may be part of a subset of a plurality of computing resources designated for use by the first entity. The method may include storing audit data providing a record of a chain of custody of the intercepted communication data. The method may include providing access to a portion of the stored intercepted communication data in the second format to the second entity.

  • Pub Date: 2010/27/12
  • Number: 09432407
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting, diagnosing, and recovering from application failures based on resource access patterns

Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error.

  • Pub Date: 2010/27/12
  • Number: 09189308
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Performing predictive modeling of virtual machine relationships

An exemplary method may include collecting performance data of present operating conditions of network components operating in an enterprise network, extracting ontological component data of the network components from the collected performance data, comparing the collected performance data with predefined service tier threshold parameters, and determining if the ontological component data represents operational relationships between the network components, and establishing direct and indirect relationships between the network components based on the determined operational relationships and establishing a business application service group based on the ontological component data.

  • Pub Date: 2010/27/12
  • Number: 09477572
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Performing dependency analysis on nodes of a business application service group

A method and apparatus of determining enterprise network component dependency in a business application service group is disclosed. An example method may include collecting performance data of present operating conditions of a plurality of network components operating in the enterprise network and storing the performance data in memory. The method may also include extracting ontological component data of the plurality of network components from the collected performance data, and comparing the collected performance data with predefined service tier threshold parameters. The method may also include establishing direct and indirect relationships between the plurality of network components based on the determined operational relationships, and assigning a steady state to the established direct and indirect relationships.

  • Pub Date: 2010/27/12
  • Number: 09569330
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Layering concept for a repository of a user interface framework for web applications

Various embodiments of systems and methods for a layering concept for a repository of a user interface framework for Web applications are described herein. The content of a repository provided by different parties (e.g., vendor, partner, customer, user, etc.) is separated. The separation is achieved by assigning solutions to the parties that store content in the repository. Simplified access to the repository is achieved by layering the solutions in a stack and implementing a layer strategy for the layers and their order of access.

  • Pub Date: 2010/27/12
  • Number: 08694544
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Intelligent trust management method and system

Intelligent Trust Management provides a centralized security facility that gives system components a flexible mechanism for implementing security policies. System components such as applications create a request describing an action that needs to be checked against an appropriate security policy. The request is given to a trust system that determines which policy object applies to the request, and may pass request arguments to the policy. The policy objects include executable code that uses any arguments along with dynamically obtained variable information to make a decision. The decision is returned to the system component, which then operates accordingly. Policy objects may maintain state and interface with the user independent of the system component in order to obtain information to make their decisions. Policy objects may call other policy objects and/or mathematically combine the results of other policy objects to make a decision.

  • Pub Date: 2010/27/12
  • Number: 08355970
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying lost write errors in a raid array

A storage server stores data in a stripe of a parity group that includes a plurality of data storage devices to store data and a parity storage device to store parity information. The stripe includes a data block from each of the data storage devices and a parity block from the parity storage device. The storage server receives a data access request specifying a data block in the stripe, and a lost write detection module detects an error in the data block. The lost write detection module compares a first storage device signature stored in a metadata field associated with the data block to a second storage device signature stored in a global field of the data storage device containing the data block. If the first storage device signature matches the second storage device signature, the lost write detection module compares a consistency point count stored in the metadata field to a reconstructed consistency point count. If the reconstructed consistency point count is greater than the consistency point count stored in the metadata field, the lost write detection module identifies the error as a lost write error for the data block. Accurately detecting and identifying the location of a lost write allows the storage server to correct the error and provide a user with a complete and accurate set of data.

  • Pub Date: 2010/27/12
  • Number: 08595595
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Gift campaigns in a social networking system

Disclosed are various embodiments for facilitating gift campaigns in a social networking system. An initiator of a gift campaign can select a recipient of a gift campaign as well as participants. Embodiments of the disclosure can facilitate selection of participants, collection of funds for the gift campaign and fulfillment of the gift to the recipient.

  • Pub Date: 2010/27/12
  • Number: 09152992
  • Owner: AMAZON TECHNOLOGIES, INC.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Generic boxed components for multi-client systems

In one embodiment, a method includes defining a parent structure including an extension. A polymorphic structure is defined for the extension. The polymorphic structure is associated with a plurality of client specialization structures, each client specialization being associated with a client in a plurality of clients. During runtime by a computing device, the parent structure is generated with an extension to a client specialization structure associated with one of the plurality of clients where client specialization structures associated with other clients are not visible to the parent structure.

  • Pub Date: 2010/27/12
  • Number: 09378468
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Dynamic interactive seat map

Systems and methods for providing an interactive seat map showing locations of available tickets in an event venue are described. A client computer receives, from a network-based system, a base map illustrating locations of sections within the event venue, a coded image map for building a map overlay having a polygon for each section depicted in the base map, and an inventory for an event at the event venue. The inventory provides, for each section, section data that includes available tickets for each section within the event venue. The client computer displays an interactive seat map by loading the base map and building the map overlay on top of the base map so that each polygon of the map overlay aligns with the respective section of the base map. The client computer determines one or more characteristics for each polygon of the map overlay based on the received section data corresponding to each polygon. The client computer applies the one or more characteristics to each polygon of the map overlay, and links each polygon of the map overlay that includes available tickets to the section in the inventory.

  • Pub Date: 2010/27/12
  • Number: 09367848
  • Owner: Stubhub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic determination of required resource allocation of virtual machines

Virtual machine resources may be monitored for optimal allocation. One example method may include monitoring a virtual machine operating in a network to determine whether at least one predefined service tier threshold has been exceeded for a predefined amount of time, initiating a query to determine current performance threshold data of the at least one predefined service tier threshold from a database, determining at least one component state of at least one component of the virtual machine based on the at least one service tier threshold assigned to the at least one component, and reallocating the resource provided by the virtual machine when the component state indicates a high warning state.

  • Pub Date: 2010/27/12
  • Number: 09588821
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic baselining of business application service groups comprised of virtual machines

An example method of automatically establishing a baseline of virtual machines operating in a network may include parsing service group ontology information stored of an established service group to determine components of a business application service group that are communicating with one another. The example method may also include tracking the current state of the business application service group to determine if any changes have occurred since a previous service business application service group configuration, and, if so, updating the ontology information to reflect those changes, and generating a list of candidate virtual machines that are candidates for participating in the established baseline.

  • Pub Date: 2010/27/12
  • Number: 09495152
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Assigning virtual machines to business application service groups based on ranking of the virtual machines

Virtual machine resources may be monitored for optimal allocation. One example method may include generating a list of virtual machines operating in a network and surveying the virtual machines to determine their current resource usage data. The method may also include ranking the virtual machines based on their current resource usage data to indicate available resources of the virtual machines, and assigning the virtual machines to at least one business application service group (BASG) that requires the available resources of the virtual machines.

  • Pub Date: 2010/27/12
  • Number: 09354960
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Application execution in a restricted application execution environment

Application programming interface (API) calls made by an application are intercepted at runtime. A determination is made as to whether each intercepted API call is allowed or blocked by a restricted application execution environment. Each API call that is blocked by the restricted application execution environment is modified so that the API call is allowable such as, for instance, modifying the API call to execute against a shadow resource. Remediation code might also be executed at runtime to reformat the API call so that it is allowed to execute in the restricted application execution environment.

  • Pub Date: 2010/27/12
  • Number: 08789138
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems to implement a physical device to differentiate amongst multiple virtual machines of a host computer system

Methods and systems to implement a physical device to differentiate amongst multiple virtual machines (VM) of a computer system. The device may include a wireless network interface controller. VM differentiation may be performed with respect to configuration controls and/or data traffic. VM differentiation may be performed based on VM-specific identifiers (VM IDs). VM IDs may be identified within host application programming interface (API) headers of incoming configuration controls and data packets, and/or may be looked-up based on VM-specific MAC addresses associated with data packets. VM IDs may be inserted in API headers of outgoing controls and/or data packets to permit a host computer system to forward the controls and/or packets to appropriate VMs. VM IDs may be used look-up VM-specific configuration parameters and connection information to reconfigure the physical device on a per VM basis. VM IDs may be used look-up VM-specific security information with which to process data packets.

  • Pub Date: 2010/25/12
  • Number: 08392625
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for storing binary large objects (BLObs) in a distributed key-value storage system

A technique for storing binary large objects (BLObs) in a distributed key-value storage system is disclosed. In an embodiment, the storage of BLObs involves dividing the BLObs into smaller “BLOb chunks” and storing the BLOb chunks in storage nodes of the distributed key-value storage system. A BLOb is first associated with a key, referred to as a “BLOb key,” and each subsequent BLOb chunk is associated with a different unique key, referred to as a “BLOb chunk key.” A list of the BLOb chunks keys is maintained and all of the BLOb chunks of the BLOb can be retrieved from the distributed key-value storage system using the BLOb chunks key list.

  • Pub Date: 2010/24/12
  • Number: 09002907
  • Owner: Unwired Planet, LLC
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for recording streams

A method of delivering a live stream is implemented within a content delivery network (CDN) and includes the high level functions of recording the stream using a recording tier, and playing the stream using a player tier. The step of recording the stream includes a set of sub-steps that begins when the stream is received at a CDN entry point in a source format. The stream is then converted into an intermediate format (IF), which is an internal format for delivering the stream within the CDN and comprises a stream manifest, a set of one or more fragment indexes (FI), and a set of IF fragments. The player process begins when a requesting client is associated with a CDN HTTP proxy. In response to receipt at the HTTP proxy of a request for the stream or a portion thereof, the HTTP proxy retrieves (either from the archive or the data store) the stream manifest and at least one fragment index. Using the fragment index, the IF fragments are retrieved to the HTTP proxy, converted to a target format, and then served in response to the client request. The source format may be the same or different from the target format. Preferably, all fragments are accessed, cached and served by the HTTP proxy via HTTP.

  • Pub Date: 2010/24/12
  • Number: 09038116
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic generation of tasks for search engine optimization

A method and a device for search engine optimization, that receives an identifier that identifies a domain, one or more keywords for analysis relative to a search engine, and search engine usage data, for each received keyword, gathering search engine results data, for at least one received keyword, mapping the at least one keyword to at least one web page within the identified domain, said mapping based on at least one of said search engine usage data and said search engine results data, and for at least one of the received keywords, generating at least one instruction to modify a web page element in a web page to which the at least one received keyword is mapped.

  • Pub Date: 2010/24/12
  • Number: 09158856
  • Owner: TASKMASTER TECHNOLOGIES INC.
  • Location: Salinas, US
  • Details: Visit USPTO

Visit USPTO Page


Using social graph for account recovery

A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects connections of the user based on information indicating likelihood of real-world interactions between the user and the selected connections. Access codes are sent to the selected connections and the user instructed to obtain access codes from the selected connections via a communication that is outside the social networking system, for example, via phone. The user provides the access codes obtained from the selected connections to the social networking system. If the access codes provided by the user match the access codes sent to the selected connections, the user is granted access to the account. Real-world interactions between two users are determined based on sharing of devices between the users or information indicating presence of the users in the same place during same time interval.

  • Pub Date: 2010/23/12
  • Number: 09626725
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Targeting questions to users of a social networking system

Users of a social networking system post questions for other users to answer. Questions are automatically tagged based on keywords extracted from text within the posted questions as well as user-selected tags. Users also browse questions asked by other users on the social networking system using an interface that displays questions by topics and sub-topics. Answers may be voted on and sorted by social information related to the browsing user. Affinities for tags are recorded based on users' interactions with the question and answer service. Affinities for tags may also be used to target questions to other users and sort answers.

  • Pub Date: 2010/23/12
  • Number: 08812982
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Tagging questions from users on a social networking system

Users of a social networking system post questions for other users to answer. Questions are automatically tagged based on keywords extracted from text within the posted questions as well as user-selected tags. Answers may be voted on and sorted by social information related to the browsing user. Affinities for tags are recorded based on users' interactions with the question and answer service. Affinities for tags may also be used to target questions to other users and sort answers.

  • Pub Date: 2010/23/12
  • Number: 09576045
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for optimizing smart mail

Methods and systems provide for creating and generating dynamic mailings which include providing for static and dynamic content to be included in a dynamically generated e-mail; establishing filters for determining dynamic content; establishing a generic e-mail including static and dynamic content; selecting dynamic content using the filters; generating a dynamic e-mail based upon the generic e-mail and the dynamic content selected; and transmitting the dynamically generated e-mail.

  • Pub Date: 2010/23/12
  • Number: 08224914
  • Owner: ZDirect, Inc.
  • Location: Hallandale Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for building software packages in secure development environments

The mock tool can be configured to create a mock execution environment for building software packages. The mock execution environment is isolated from resources of the computing system supporting the mock execution environment and other mock execution environments. Further, the mock execution environment can be created to simulate disabling on any features of the operating system supporting the mock execution environment that could cause problems in the building the software packages.

  • Pub Date: 2010/23/12
  • Number: 08615737
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for a VPN ICA proxy on a multi-core system

The present invention is directed towards systems and methods for sharing licenses across resources via a multi-core intermediary device. A device intermediary to a plurality of clients and a server may grant a license for a virtual private network (VPN) session established by a first core of a plurality of cores of the device with a client. A second core of the plurality of cores may receive a first request from the client to establish an application connection between an application and a server via the VPN session. The second core may send a second request to the first core to share the license of the VPN session responsive to determining that the first core owns the VPN session. The second core may establish the application connection responsive to receiving from the first core a response accepting the second request to share the license of the VPN session.

  • Pub Date: 2010/23/12
  • Number: 09055064
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing encryption-related metadata between multiple layers in a storage I/O stack

A host in an encrypted data storage system sends encryption metadata associated with an encrypted logical volume (LV) from a key controller module to an encryption endpoint via a storage I/O stack. The encryption metadata identifies an encryption key and encrypted regions of the LV, and the sending results in establishment of one or more shared associations between the key controller module and the encryption endpoint which associates the encrypted LV with the encryption metadata for the encrypted LV. A data storage operation is performed on the encrypted LV by sending a data storage command from the key controller module to an encrypted region of the encryption endpoint via the storage I/O stack. The encryption endpoint uses the encryption metadata associated with the encrypted LV to cryptographically process data of the data storage operation.

  • Pub Date: 2010/23/12
  • Number: 08751828
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Satisfying application dependencies

The dependencies of an application are identified by intercepting application programming interface calls made by an application. A determination is then made at the runtime of the application as to whether the dependencies of the application are present. If the dependencies are not present, a client device upon which the application is executing is configured such that the dependencies are present and are made available only to the authorized application. If the dependencies are present and the application is authorized to interact with the dependencies, the application is permitted to execute.

  • Pub Date: 2010/23/12
  • Number: 09354852
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Providing a timeline control in a multi-tenant database environment

A system and method for providing a timeline control in a multi-tenant database system. In one embodiment, a method includes determining a plurality of entitlement processes and milestones that are to be enforced, where each entitlement process includes one or more actions, and where each action is associated with a corresponding milestone. The method further includes displaying a timeline control window that shows one or more milestones for an entitlement process, and updating the timeline control window as the status of the entitlement process changes.

  • Pub Date: 2010/23/12
  • Number: 09230224
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Process scheduler employing ordering function to schedule threads running in multiple adaptive partitions

A system includes a processor, one or more memory storage units, and software code stored in the one or more memory storage units. The software code is executable by the processor to generate a plurality of adaptive partitions that are each associated with one or more process threads. The software code further includes a scheduling system that is executable by the processor for selectively allocating the processor to run the process threads based on a comparison between ordering function values for each adaptive partition. The ordering function value for each adaptive partition is calculated using one or more weighted variables for each adaptive partition. The variables include, for example, 1) the process budget, such as a guaranteed time budget, of the adaptive partition, 2) the critical budget, if any, of the adaptive partition, 3) the rate at which the process threads of an adaptive partition consume processor time.

  • Pub Date: 2010/23/12
  • Number: 08595733
  • Owner: QNX Software Systems Limited
  • Location: Kanata, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Preserving LBA information between layers of a storage I/O stack for LBA-dependent encryption

An encryption endpoint (EE) receives, via a storage I/O stack (having a key controller module (KCM)), encryption metadata identifying an encryption key and a set of region entries. Each region entry includes an identification of a region within a storage device subject to encryption with the encryption key and an identification of a correlation between the region and a corresponding region on a logical volume (LV) managed by the KCM. The EE receives, via the stack, a storage command to process a block having a first address on the storage device. It corresponds to a second address located within the corresponding region of the LV. The EE determines the second address within the LV and then cryptographically processes the block using an address-dependent cryptographic algorithm and (a) data of the block, (b) the determined second address, and (c) the encryption key.

  • Pub Date: 2010/23/12
  • Number: 08798262
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Phosphoinositide 3-kinase inhibitor compounds and methods of use

  • Pub Date: 2010/23/12
  • Number: 08383620
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system to identify geographical locations associated with queries received at a search engine

Techniques are provided for prediction locations of users that submit search queries. A query is received at a search engine. An inverted index is searched to identify one or more geographical locations associated with one or more terms of the received query. The inverted index lists a plurality of query terms and one or more geographical locations associated with each query term. Each geographic location that is associated with a listed query term in the inverted index is a determined location for at least one user previously having submitted the listed term in a search query. A geographical location is predicted for a user that submitted the received query based on the identified one or more geographical locations. In this manner, a location is predicted for the user based on similar queries previously submitted by users.

  • Pub Date: 2010/23/12
  • Number: 09384289
  • Owner: EXCALIBUR IP, LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for naming replicated storage

Method and system for uniquely identifying a replicated copy of a storage volume is provided. A unique identifier is created by a storage system managing the replicated copy. The unique identifier includes a time stamp of when the identifier is being created, a system clock of the storage system and a unique address for an adapter that is used by the storage system.

  • Pub Date: 2010/23/12
  • Number: 08380955
  • Owner: Netapp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing storage units

Method and system for managing storage units are provided. A free space module scans a storage unit data structure and a reference data structure to generate an intermediate data structure that identifies storage units that are not referenced by any storage unit client. A lookup module is initiated and the storage unit clients are notified that all new references to any storage unit should be verified with the lookup module. The free space module then verifies if any of the storage units in the intermediate data structure have been referenced since the intermediate data structure was created. Any referenced storage units are removed from the intermediate data structure and a data structure identifying unreferenced storage units is generated. The data structure is then used to allocate the identified storage units.

  • Pub Date: 2010/23/12
  • Number: 08473708
  • Owner: Netapp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Mass modification of attribute values of objects

Various embodiments of systems and methods for mass modification of attribute values of objects are described. The methods include systematically analyzing attributes assigned to multiple objects, displaying the results to the user, enabling mass modification functionality in the user interface, and providing the user a comprehensive variety of options on how to proceed with mass editing.

  • Pub Date: 2010/23/12
  • Number: 08589453
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Managing certificates between software environments

A method is used in managing certificates between software environments. In a Flex operating environment, a certificate store is maintained that is accessible to a Java operating environment. In the Flex operating environment, certificates from the Flex and Java operating environments are caused to be validated and stored in the certificate store.

  • Pub Date: 2010/23/12
  • Number: 08635447
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Hash-join in parallel computation environments

According to some embodiments, a system and method for a parallel join of relational data tables may be provided by calculating, by a plurality of concurrently executing execution threads, hash values for join columns of a first input table and a second input table; storing the calculated hash values in a set of disjoint thread-local hash maps for each of the first input table and the second input table; merging the set of thread-local hash maps of the first input table, by a second plurality of execution threads operating concurrently, to produce a set of merged hash maps; comparing each entry of the merged hash maps to each entry of the set of thread-local hash maps for the second input table to determine whether there is a match, according to a join type; and generating an output table including matches as determined by the comparing.

  • Pub Date: 2010/23/12
  • Number: 08370316
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Grid-based precision aim system and method for disrupting suspect objects

A system and method for disrupting at least one component of a suspect object is provided. The system has a source for passing radiation through the suspect object, a grid board positionable adjacent the suspect object (the grid board having a plurality of grid areas, the radiation from the source passing through the grid board), a screen for receiving the radiation passing through the suspect object and generating at least one image, a weapon for deploying a discharge, and a targeting unit for displaying the image of the suspect object and aiming the weapon according to a disruption point on the displayed image and deploying the discharge into the suspect object to disable the suspect object.

  • Pub Date: 2010/23/12
  • Number: 08746561
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Failover method and system

Method and system is provided for performing a failover operation during which a second storage system takes over the management of a storage volume managed by a first storage system. The first storage system may also manage a plurality of replicated copies of the storage volume and maintain metadata for storing information regarding the replicated copies. The failover operation is completed without having the second storage system read all the metadata.

  • Pub Date: 2010/23/12
  • Number: 08380954
  • Owner: Netapp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Engineered ketoreductases and methods for producing stereoisomerically pure statins

The present disclosure provides ketoreductase enzymes having improved properties as compared to a naturally occurring wild-type ketoreductase enzyme. Also provided are polynucleotides encoding the engineered ketoreductase enzymes, host cells capable of expressing the engineered ketoreductase enzymes, method of using the engineered ketoreductase enzymes to synthesize a variety of chirally pure compounds, and the chirally pure compounds prepared therewith.

  • Pub Date: 2010/23/12
  • Number: 08273547
  • Owner: Codexis, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-domain communication

Disclosed are various embodiments for performing cross-domain communication using messenger frames. One or more messenger frames are dynamically generated in response to determining that a message is to be sent from a first frame in one domain to a second frame in another domain in a client. The message is sent from the first frame to the second frame by embedding the message in addresses of the messenger frames. Code executing in the first frame and code executing in the second frame are restricted from direct communication in the client.

  • Pub Date: 2010/23/12
  • Number: 08689099
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Conducting an application-aware test in a virtual environment

A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.

  • Pub Date: 2010/23/12
  • Number: 08762780
  • Owner: Mitel Networks Corporation
  • Location: Ottawa, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Computer-implemented method and system for managing attributes of intellectual property documents, optionally including organization thereof

A computer-enabled system, method, and medium is provided to support, e.g., analyzing intellectual property documents by assigning attributes to the documents. The present invention is suitable for use by intellectual property professionals and is flexible to support development and use of customized attribute types and attributes. Optionally, a group of intellectual property documents can be divided into projects, which can be ingested including assigning attributes. Optionally, the attributes can be used to filter information included in e.g., searches, and/or reports.

  • Pub Date: 2010/23/12
  • Number: 08271563
  • Details: Visit USPTO

Visit USPTO Page


Chemical combination for the generation of disinfectant and heat

This invention comprises a lightweight, portable chemical combination of reagents for sterilizing or disinfecting objects in the absence of electrical power or fire. The chemical combination includes a chemical oxidant with the capacity to liberate a biocidal intermediate, a chemical reductant of the oxidant with the capacity to react with the oxidant, and an effector to induce a reaction between the oxidant and reductant. In one embodiment, the oxidant comprises chlorite, the reductant comprises sulfite, and the effector comprises ascorbate. In another embodiment, the chemical combination comprises the oxidant, reductant, effector and iron-activated magnesium. When water or water solutions are added to either embodiment, the chemical combination generates heat, steam and a biocidal intermediate that can destroy contaminating microorganisms. In one embodiment, the biocidal intermediate is a halogen-based biocidal intermediate, such as chlorine dioxide. In another embodiment, the biocidal intermediate is a halogen-free biocidal intermediate.

  • Pub Date: 2010/23/12
  • Number: 08366961
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Bulk data management in a virtual environment

A system and method for service aware virtualization is disclosed. The system comprises a plurality of virtual instances operating on virtualization software and a plurality of service manager modules operating on the virtualization software. Each service manager module is coupled to a separate virtual instance and configured to interface with an operation of guest software operating within the virtual instance on the virtualization software. A management interface coupled to the service manager modules interfaces with the plurality of virtual instances.

  • Pub Date: 2010/23/12
  • Number: 08850427
  • Owner: Mitel Networks Corporation
  • Location: Ottawa, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Asynchronous methods of data classification using change journals and other data structures

Aspects of the present invention are generally concerned with systems and methods for generating a database of metadata that describes system data and storage operations. The database of metadata may be referred to herein as a “metabase.” For example, to generate a metabase, a data agent may traverse a file system to obtain certain characteristics of data managed by the file system while substantially simultaneously detecting and recording change notifications. These actions may be performed even if the actions of the data agent are interrupted one or more times during the traversal of the file system. The data agent may process the characteristics and change notifications to generate and update a metabase. Once formed, the metabase may be consulted to determine changes in system data rather than determining the changes by scanning the data files themselves.

  • Pub Date: 2010/23/12
  • Number: 08442983
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatuses, methods and systems for a lead generating hub

The APPARATUSES, METHODS AND SYSTEMS FOR A LEAD GENERATING HUB (“HUB”) facilitates the generation, evaluation, and recording of information and activities related to property transactions and associated communications. In embodiments, the HUB may be configured to identify leads for users based on user-entered information, user contacts, and/or the properties associated with a user and/or in which a user is interested. Leveraging connectivity between contract relationship management functionality, property listing service features, intelligent inbox coordination capabilities, and/or the like, the HUB may identify connections between user requirements and/or assets and opportunities to fulfill those requirements and/or to transact those assets.

  • Pub Date: 2010/23/12
  • Number: 09152946
  • Owner: Brokersavant Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Vertex array access bounds checking

Aspects of the invention relate generally to validating array bounds in an API emulator. More specifically, an OpenGL (or OpenGL ES) emulator may examine each array accessed by a 3D graphic program. If the program requests information outside of an array, the emulator may return an error when the graphic is drawn. However, when the user (here, a programmer) queries the value of the array, the correct value (or the value provided by the programmer) may be returned. In another example, the emulator may examine index buffers which contain the indices of the elements on the other arrays to access. If the program requests a value which is not within the range, the emulator may return an error when the graphic is drawn. Again, when the programmer queries the value of the array, the correct value (or the value provided by the programmer) may be returned.

  • Pub Date: 2010/22/12
  • Number: 08516578
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Unauthorized location detection and countermeasures

A location sentry system is provided for use within a mobile device. The sentry system can be configured to detect unauthorized attempts to locate mobile devices by monitoring messages passed between the mobile device and the wireless network and/or messages passed between components of the mobile device, and determining that one or more of the messages is/are indicative of an attempt to locate the mobile device. In response to a determination that an unauthorized attempt has been detected, the location sentry can be configured to take one or more actions. For example, the location sentry system could prevent location information from being sent back to the wireless network and/or the location sentry system could cause incorrect information to be sent to the wireless network.

  • Pub Date: 2010/22/12
  • Number: 08627484
  • Owner: TruePosition, Inc.
  • Location: Berwyn, US
  • Details: Visit USPTO

Visit USPTO Page


Ultrasonic inspection method and ultrasonic inspection device

An ultrasonic inspection method and an ultrasonic inspection device allow three-dimensional inspection data and three-dimensional shape data to be appropriately positioned on a display screen and allow a defect echo and a shape echo to be quickly identified even when information on the relative positions of a probe and an object to be inspected is not provided. The ultrasonic inspection data that is generated from the waveforms of ultrasonic waves received by an ultrasonic probe is compared with a plurality of ultrasonic propagation data pieces calculated by a ray tracing method on the basis of the three-dimensional shape data on an object to be inspected. The position of the three-dimensional inspection data or the three-dimensional shape data is moved relative to the other data position on the basis of the comparison results, thereby displaying the three-dimensional inspection data and the three-dimensional shape data while overlapping each other.

  • Pub Date: 2010/22/12
  • Number: 09140670
  • Owner: HITACHI-GE NUCLEAR ENERGY, LTD.
  • Location: Ibaraki, JP
  • Details: Visit USPTO

Visit USPTO Page


Transformation of extensible markup language documents for web services customization

A system is provided comprising at least one processor, a memory, and an application stored in the memory that, when executed, receives a first request from a client device for access to a first web service and accesses a policy associated with the first web service. The system also selects a second plurality of data elements from a first plurality of data elements based on the first request and based on the policy wherein the second plurality of data elements is associated with the first web service. The system also provides the second plurality of data elements to the client device and receives a second request from the client device for a first set of data values associated with the second plurality of data elements. The system also authenticates the second request and provides the first set of data values in response to the second request.

  • Pub Date: 2010/22/12
  • Number: 08931036
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for rewriting a stream of data via intermediary

A streaming rewrite method and system that can execute an efficient multiple pattern search method that parses a response in a data structure of an appliance. The method and system can avoid copying to a buffer by parsing data across a data structure to identify search patterns and phrases that may be identified by one or more actions and/or rules of an appliance or system. A parser can input one or more search patterns, and parse a body of a response or one or more packets for the search patterns. The parser can obtain pattern information about the packets and/or the response, and store this information in a database. The appliance can then perform lookups in the database for pattern information and perform rewrites in accordance with the stored pattern information. The rewritten response and/or packets can then be transmitted to a destination.

  • Pub Date: 2010/22/12
  • Number: 08724654
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing spillover limits in a multi-core system

The present disclosure is directed to a system for managing spillover via a plurality of cores of a multi-core device intermediary to a plurality of clients and one or more services. The system may include a device intermediary to a plurality of clients and one or more services. The system may include a spillover limit of a resource. The device may also include a plurality of packet engines operating on a corresponding core of a plurality of cores of the device. The system may include a pool manager allocating to each of the plurality of packet engines a number of resource uses from an exclusive quota pool and shared quota pool based on the spillover limit. The device may also include a virtual server of a packet engine of the plurality of packet engines. The virtual server manages client requests to one or more services. The device determines that the number of resources used by a packet engine of the plurality of packet engine has reached the allocated number of resource uses of the packet engine, and responsive to the determination, forwards to a backup virtual server a request of a client of the plurality of clients received by the device for the virtual server.

  • Pub Date: 2010/22/12
  • Number: 09098335
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing ports for RTSP across cores in a multi-core system

The present application is directed towards systems and methods for systems and methods for handling real-time streaming protocol sessions by an intermediary multi-core system. When a multi-core intermediary receives a setup request for a real-time streaming protocol session, the intermediary processes and forwards the request to a server providing the streaming media. The server sets up an RTSP session and transmits a session identification to the multi-core intermediary. A core of the intermediary receives the transmitted session identification and determines an owner core of the session, based on a hash of the session identification. The core transmits the session information to the determined owner core, which selects two consecutive ports on which to establish listening services. The owner core then notifies all other cores to establish listening services on the same consecutive ports, such that any core that receives an RTSP control message from a client can handle it properly.

  • Pub Date: 2010/22/12
  • Number: 08635344
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for management of common application firewall session data in a multiple core system

The present invention is directed towards systems and methods for efficiently an intermediary device processing strings in web pages across a plurality of user sessions. A device intermediary to a plurality of clients and a server identifies a plurality of strings in forms and uniform resource locators (URLs) of web pages traversing the device across a plurality of user sessions. The device stores each string of the plurality of strings to one or more allocation arenas shared among a plurality of user session. Each string is indexed using a hash key generated from the string. The device recognizes that a received string transmitted from a webpage of a session of a user is eligible to be shared among the plurality of user sessions. The device determines that a copy of the received string is stored in an allocation arena using a hash generated from the received string. The device uses the copy of the received string stored in the allocation arena in place of the string in the web page of the session of the user to process the web page.

  • Pub Date: 2010/22/12
  • Number: 08413225
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for intercepting and automatically filling in forms by the appliance for single-sign on

The present invention is directed towards systems and methods for form-based single sign-on by a user desiring access to one or more protected resources, e.g., protected web pages, protected web-served applications, etc. In various embodiments, a single sign-on (SSO) module is in operation on an intermediary device, which is disposed in a network to manage internet traffic between a plurality of clients and a plurality of servers. The intermediary device can identify an authentication response from a server and forward the authentication response to the SSO module. The SSO module can complete a login form in the authentication response with a client's authentication data, return the completed login form to the server and forward cookies associated with the authentication response to the client. In various embodiments, multiple login forms can be completed, transparently to the client, by the SSO module on a client's behalf and reduce time expended by a client in obtaining access to protected resources.

  • Pub Date: 2010/22/12
  • Number: 08453225
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for AAA-traffic management information sharing across cores in a multi-core system

A method for propagating authentication session information to a plurality of cores of a multi-core device includes establishing, by an authentication virtual server executing on a first core of a device intermediary to at least one client and server, a session for a user, the authentication virtual server authenticating the session. A traffic management virtual server executes on a second core of device, and receives a request to access a server via the session. The traffic management virtual server may identify, responsive to a determination that the session is not stored by the second core, from an identifier of the session that the first core established the session. The second core may send to the first core a request for data for the session identified by the identifier. The second core may receive from the first core a response to the second request identifying whether the session is valid.

  • Pub Date: 2010/22/12
  • Number: 08667575
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System level graphics manipulations on protected content

At least certain embodiments of the present disclosure include a method to manipulate graphics with protected content. In some embodiments, a composite engine of a computing system retrieves data within a region within a frame buffer holding pixels of an image displayed on a display device of the computing system. The region corresponds to an area of interest within the image, and the data retrieved includes pixels forming a portion of the image in the area of interest and protected content associated with the image. The composite engine may re-composite the area of interest with the pixels retrieved to produce an enlarged version of the portion of the image in the area of interest, without exposing the protected content to applications outside of the window server.

  • Pub Date: 2010/22/12
  • Number: 08836727
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for modifying user interface elements

The present disclosure involves systems, products, and methods for modifying elements within a user interface (UI). One method includes operations for identifying an instance of a UI text element for modification within a UI associated with a software application, wherein the UI is displayed to at least one user; retrieving a set of metadata associated with the identified instance of the UI text element, where each instance of the UI text element is associated with the retrieved set of metadata; receiving at least one modification to the retrieved set of metadata associated with the identified instance of the UI text element; and persisting the modified set of metadata associated with the UI text element.

  • Pub Date: 2010/22/12
  • Number: 09423920
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for management of a shared frequency band

A system, method, software and related functions are provided for managing activity in a radio frequency band that is shared, both in frequency and time, by signals of multiple types. An example of such a frequency band is an unlicensed frequency band. Radio frequency energy in the frequency band is captured at one or more devices and/or locations in a region where activity in the frequency band is happening. Signals occurring in the frequency band are detected by sampling part or the entire frequency band for time intervals. Signal pulse energy in the band is detected and is used to classify signals according to signal type. Using knowledge of the types of signals occurring in the frequency band and other spectrum activity related statistics (referred to as spectrum intelligence), actions can be taken in a device or network of devices to avoid interfering with other signals, and in general to optimize simultaneous use of the frequency band with the other signals. The spectrum intelligence may be used to suggest actions to a device user or network administrator, or to automatically invoke actions in a device or network of devices to maintain desirable performance.

  • Pub Date: 2010/22/12
  • Number: 08175539
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dual mode communication

Wi-Fi setup application and path switching applications are provided to allow commands received from native applications of the UE to be redirected to a Wi-Fi engine. The Wi-Fi engine supports circuit switched and packet switched services over a Wi-Fi connection, thus allowing commands received from native applications on a UE to connect the user to either a wireless unlicensed communication system or a wireless licensed communication system.

  • Pub Date: 2010/22/12
  • Number: 09265073
  • Owner: Kineto Wireless, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Sensing user input using the body as an antenna

A human input system is described herein that provides an interaction modality that utilizes the human body as an antenna to receive electromagnetic noise that exists in various environments. By observing the properties of the noise picked up by the body, the system can infer human input on and around existing surfaces and objects. Home power lines have been shown to be a relatively good transmitting antenna that creates a particularly noisy environment. The human input system leverages the body as a receiving antenna and electromagnetic noise modulation for gestural interaction. It is possible to robustly recognize touched locations on an uninstrumented home wall using no specialized sensors. The receiving device for which the human body is the antenna can be built into common, widely available electronics, such as mobile phones or other devices the user is likely to commonly carry.

  • Pub Date: 2010/22/12
  • Number: 08665210
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Secure software development environments

The mock tool can be configured to create a mock execution environment for supporting software development processes. The mock execution environment is isolated from resources of the computing system supporting the mock execution environment and other mock execution environments. Further, the mock execution environment can be created to simulate disabling on any features of the operating system supporting the mock execution environment that could cause problems in the software development process.

  • Pub Date: 2010/22/12
  • Number: 08745714
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Ranking search results using social-networking information

Particular embodiments access a search query submitted by a first user; identify one or more sponsored web pages in response to the search query, wherein each sponsored web page is associated with a hyperlink; determine whether one or more of the sponsored web pages has been accessed by one or more second users, wherein the one or more second users are connected in a graph structure to the first user within a threshold degree of separation; and send a response comprising a hyperlink for at least one of the sponsored web pages in response to the search query, wherein the response further includes a visual tag or a reference to the visual tag for the hyperlink if the sponsored web page has been accessed by at least one of the one or more second users.

  • Pub Date: 2010/22/12
  • Number: 08924406
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Ranking search results based on the frequency of access on the search results by users of a social-networking system

Particular embodiments access a search query submitted by a first user of a social-networking system; identify one or more web pages in response to the search query; for each of the one or more web pages, determine a value indicating a number of user clicks associated with the web page by one or more second users of the social-networking system who are connected to the first user within the social-networking system; and send a set of hyperlinks for the one or more web pages, wherein hyperlinks for web pages where the value is greater than zero are visually emphasized over other hyperlinks.

  • Pub Date: 2010/22/12
  • Number: 08983986
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Program-based authorization

Techniques which allow definition and enforcement of program-based action authorization policies. On a computer, an action or execution attempt is intercepted in real-time. The subject process, the program file of the subject process, the attempted action and the object of the attempted action are determined. An authorization policy considering the program file indicates whether the attempted action is authorized or not. In a tracking mode, the attempted action and its authorization are logged and the attempted action is allowed to proceed. In an enforcement mode, unauthorized attempts are blocked and logged, thereby enforcing the authorization policy.

  • Pub Date: 2010/22/12
  • Number: 08321932
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for detecting skewed data in a multitenant database environment

Detection of skew in an on-demand database services environment is provided. A request is generated to scan a multitenant database for skew indicated by relationship depth exceeding an expected limit. A database crawler calculates skew for tenant identifier for a particular table in the database. Any skew that is detected is identified for later resolution.

  • Pub Date: 2010/22/12
  • Number: 08768963
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to analyze computed tomography scan data

Methods and apparatus to analyze healthcare images are disclosed. An example method includes performing a threshold procedure and a watershed procedure on data obtained via a scan of a brain to generate a plurality of segments based on blood volumes associated with the segments; generating one or more statistics related to the each of the segments; and integrating the statistics into image data associated with the scan such that a first one of the statistics corresponding a first one of the segments is to be displayed to a user of the image data in response to receiving an input from the user in connection with the first one of the segments.

  • Pub Date: 2010/22/12
  • Number: 08467585
  • Owner: Genenal Electric Company
  • Location: Schnectady, US
  • Details: Visit USPTO

Visit USPTO Page


Method of converting bomblet to gun-launched grenade

A Dual Purpose Improved Conventional Munition (DPICM) bomblet may be converted into a gun-launched grenade. The bomblet may include a fuze, a shaped-charge liner, a casing, and explosive material disposed between the shaped-charge liner and the casing. An ogive may be attached to an open end of the bomblet. A generally cup-shaped pusher may be placed over the fuze and attached to the bomblet casing. A conventional cartridge case assembly may be fixed to a fuze end of the bomblet. When the gun-launched grenade impacts a target, the casing may shatter to form shrapnel and a shaped-charge jet may be formed.

  • Pub Date: 2010/22/12
  • Number: 08220395
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing parental control using a playlist

An apparatus for providing parental control via a playlist is disclosed. The apparatus may be a content delivery system headend. The content delivery system headend system may have a Switched Digital Video (SDV) manager for coordinating SDV sessions requested by subscribers over an access network. The headend may have an input for receiving content to be broadcast during the SDV sessions. The headend may also have a subscriber control unit for sending one or more channel change control messages to a client device in accordance with a playlist, the one or more channel change control messages including tuning information for tuning to one or more programs or channels at times indicated in the playlist.

  • Pub Date: 2010/22/12
  • Number: 08966519
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Isolation tool for user assistance in solving a captcha test

A method includes displaying a CAPTCHA test comprising an image with distorted alphanumeric characters. The method also includes associating a mask with the image that maps the alphanumeric characters to coordinates. Further, the method includes, enhancing a portion of the image corresponding to one of the alphanumeric characters responsive to a user positioning an assistance tool proximate to one alphanumeric character to reduce distortion.

  • Pub Date: 2010/22/12
  • Number: 09027122
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Fuel dispensing payment system for secure evaluation of cardholder data

A system used in a retail environment for providing end-to-end encryption of payment cardholder data. An input device configured to receive cardholder data is operative to encrypt the cardholder data according to a first encryption method to produce first encrypted cardholder data. A cardholder data handling device is in electronic communication with the input device. A secure evaluation assembly (SEA) is operatively connected to the cardholder data handling device and comprises antitampering control electronics adapted to decrypt the first encrypted cardholder data to produce unencrypted cardholder data. The antitampering control electronics evaluate the unencrypted cardholder data to determine whether the unencrypted cardholder data is payment cardholder data or nonsensitive cardholder data. Finally, if the unencrypted cardholder data is payment cardholder data, the antitampering control electronics of the SEA are adapted to encrypt the unencrypted cardholder data according to a second encryption method to produce second encrypted cardholder data.

  • Pub Date: 2010/22/12
  • Number: 09262760
  • Owner: Gilbarco, S.r.l.
  • Location: Florence, IT
  • Details: Visit USPTO

Visit USPTO Page


End point context and trust level determination

A server device is configured to receive, from a proxy server, a request by a user device to access a network; obtain information associated with the user device that includes an identifier associated with the user device and context information associated with the user device; determine a level of trust associated with the user device based on the identifier and the context information, where the level of trust is a measure of security risk associated with the user device; generate an access token based on the level of trust, where the access token identifies a level at which the user device is authorized to access the network; and send, to the user device via the proxy server, the access token that enables the proxy server to authorize the user device to access the network at the level identified by the access token.

  • Pub Date: 2010/22/12
  • Number: 08839397
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic user interface content adaptation and aggregation

Upon receiving a request for a user interface view from a user interface, a user identity and a user authorization class for a user of the user interface can be checked against a user registry and an authorization class registry, respectively. A user interface view component can be retrieved according to the user identity and the user authorization class. The user interface view can be generated by aggregating the retrieved user interface view component with at least one other user interface view component consistent with the user identity and user authorization class, and the generated user interface view can be returned for display to the user via the user interface. Related systems, articles of manufacture, and computer-implemented methods are described.

  • Pub Date: 2010/22/12
  • Number: 08578278
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Dynamic chunking for media streaming

Systems and methods for chunking a media file for streaming over a network are disclosed. These systems and methods provide for receiving requests for chunks of a media file and responding to these requests by generating the requested chunks dynamically. The chunks can then be provided to the requesting entity. These systems and methods, which can be utilized with a dynamic file index generator, enable a high degree of flexibility in streaming chunked media files and preclude the need to chunk the media files and store the chunks prior to streaming.

  • Pub Date: 2010/22/12
  • Number: 08145782
  • Owner: Unicorn Media, Inc.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Delivery edge profile aggregation

A system and method for aggregating subscriber information at a delivery edge is disclosed. The method comprises interfacing a user profile aggregation device (UPAD) at a subscriber location with at least one subscriber database in each of a wired network core and a wireless network core. The wired network core and the wireless network core are operated by a Multi-System network Operator. Profile information can be aggregated at the UPAD about the subscriber from at least one database in the wired network core and the wireless network core. The subscriber's aggregated profile information can be communicated to the MSO.

  • Pub Date: 2010/22/12
  • Number: 09155088
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling access of user information using social-networking information

Particular embodiments access a query submitted by a first user; retrieve information concerning one or more second users; retrieve a degree of separation between the first user and each second user within a social-networking system; and for each second user, if the degree of separation between the first user and the second user is less than or equal to a threshold degree of separation, then send the information concerning the second user to the first user in response to the query.

  • Pub Date: 2010/22/12
  • Number: 09158819
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Consumer behaviors at lender level

The present disclosure generally relates to financial data processing, and in particular it relates to lender credit scoring, lender profiling, lender behavior analysis and modeling. More specifically, it relates to rating lenders based on data derived from their respective consumers. Also, the present disclosure relates to rating consumer lenders based on the predicted spend capacity of their consumers.

  • Pub Date: 2010/22/12
  • Number: 08015108
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Configuring component carriers in carrier aggregation

Technology for configuring, activating and deactivating component carriers in carrier aggregation is disclosed. One method comprises configuring a Primary Component Carrier (PCC) as a primary component carrier pair comprising a downlink primary component carrier (DL PCC) and an uplink primary component carrier (UL PCC). At least one Secondary Component Carrier is configured at the eNode B as a secondary component carrier pair comprising a downlink secondary component carrier (DL SCC) and an uplink component carrier (UL SCC) based on a carrier aggregation capability of a selected UE. An activation and deactivation of each SCC is communicated from the eNode B to the UE with a bitmap carried by a media access control (MAC) control element. A bit set to “1” denotes activation of a corresponding SCC at the UE. A bit set to “0” denotes deactivation of a corresponding SCC at the UE.

  • Pub Date: 2010/22/12
  • Number: 08537718
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Clarifying search results using social-networking information

Particular embodiments access a query from a first user, the query comprising a first user attribute; identify a plurality of candidate users sharing the same first user attribute; retrieve one or more members of a social-networking system who are connected to the first user within a threshold degree of separation; compare each candidate user with each member who is connected to the first user within the threshold degree of separation; and if a candidate user matches a member who is connected to the first user within the threshold degree of separation, then identify the matching candidate user as a match result to the query.

  • Pub Date: 2010/22/12
  • Number: 08949261
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-BV8 antibodies and uses thereof

The present invention concerns antibodies to Bv8 and the uses of same.

  • Pub Date: 2010/22/12
  • Number: 08771685
  • Owner: F. Hoffmann-La Roche AG
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Analysis system and computer implemented method for analyzing biological samples

Analysis system and computer implemented method for analyzing biological samples are disclosed. The system has at least one analyzer for performing an analysis and a decision unit being operable to determine in response to the receipt of the analysis request whether results obtained from performing the analysis on the sample indicated in the analysis request are valid. This determination is executed by retrieving the meta information assigned to the sample and by applying the at least one condition on the meta information and wherein the at least one applied condition has at least a condition on whether the sample allows a valid analysis on the sample, and wherein the decision unit returns the decision that the analysis exercised on the indicated sample will return a valid result in case the conditions of the condition set are met by the sample.

  • Pub Date: 2010/22/12
  • Number: 09128069
  • Owner: Roche Diagnostics Operations, Inc.
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Ultrasonic inspection device and ultrasonic inspection method

An ultrasonic inspection device allows position adjustment of three-dimensional inspection data and shape data to be easily performed on a display screen and allows a defect echo and a shape echo to be quickly identified. A calculator generates the three-dimensional inspection data from waveforms stored in a data storage unit. A three-dimensional display unit displays the three-dimensional inspection data generated by the calculator and the three-dimensional shape data on an object to be inspected. The calculator corrects the relative displayed positions of the three-dimensional inspection data and the three-dimensional shape data on the basis of a coordinate system defined by points and a surface that constitute a part of the three-dimensional shape data displayed by the three-dimensional display unit, and causes the three-dimensional display unit to display the three-dimensional inspection data and the three-dimensional shape data while the three-dimensional inspection data and the three-dimensional shape data overlap each other.

  • Pub Date: 2010/21/12
  • Number: 08833168
  • Owner: Mitsubishi Hitachi Power Systems, Ltd.
  • Location: Kanagawa, JP
  • Details: Visit USPTO

Visit USPTO Page


Techniques for capturing data sets

Techniques, including systems and methods, for capturing data sets include performing a client-side two-phase commit to ensure one or more data consistency conditions. A logical volume may represent a data set that is distributed among a plurality of physical storage devices. One or more client devices are instructed to block at least acknowledgment of write operations. When the one or more client devices have blocked at least acknowledgment of write operations, one or more servers in communication with the physical storage devices are instructed to capture corresponding portions of the data set. When the servers have been instructed to capture corresponding portions of the data set, the client devices are instructed to resume at least acknowledgment of write operations.

  • Pub Date: 2010/21/12
  • Number: 08438247
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for playing a role-playing game

A method and apparatus for playing role-playing game is provided that involves wagering. In one example game, players subscribe to multiple game sessions and eliminate other players to become the sole survivor of the game. The players may accrue points by eliminating other players. Further, players may eliminate other players in a combat environment.

  • Pub Date: 2010/21/12
  • Number: 08529351
  • Owner: Scientific Games Holdings Limited
  • Location: Ballymahon, Co. Longford., IE
  • Details: Visit USPTO

Visit USPTO Page


Providing a security boundary

In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an application attempts to access a computer system's resources. During a learning mode of operation, a security monitor stores data in a security monitor database identifying which applications are allowed to access the computer system resources. At runtime of an application, the security monitor operates in an enforcement mode and utilizes the contents of the security monitor database to determine if an application is permitted to access system resources. If data associated with the application is located in the security monitor database, the application is allowed to access computer system resources, if data associated with the application is not located in the security monitor database, the application is not allowed to access computer system resources.

  • Pub Date: 2010/21/12
  • Number: 09003543
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Out-of-band authentication of e-mail messages

Technologies are described herein for providing out-of-band authentication of an e-mail message. A recipient of an e-mail message purporting to be from an organization forwards the e-mail message or submits its content to that organization for authentication. The authenticity of the e-mail message is determined based on authentication data, such as outgoing message logs or authentication keys, maintained at the source of the e-mail message. Upon authenticating the e-mail message, the recipient is informed of the authenticity of the e-mail message.

  • Pub Date: 2010/21/12
  • Number: 08966621
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing custom settings in an on-demand service environment

In accordance with embodiments, there are provided mechanisms and methods for providing custom settings in an on-demand service environment. In an embodiment and by way of example, a method providing custom settings in an on-demand service environment is provided. The method embodiment includes naming the custom object, creating fields for the custom object, assigning a behavior for each field, setting the custom object to a specified type, and if the custom object is of a hierarchical type, then assigning permissions to users with regarding the created fields.

  • Pub Date: 2010/21/12
  • Number: 08554793
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for requesting social services from group of users

A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.

  • Pub Date: 2010/21/12
  • Number: 08676833
  • Owner: Onepatont Software Limited
  • Location: Mumbai, Maharashtra, IN
  • Details: Visit USPTO

Visit USPTO Page


Dynamic generation of scenarios for managing computer system entities using management descriptors

Systems and methods for dynamic generation of scenarios for managing computer system entities are described herein. A number of management programs are deployed in an administrator framework as embedded plug-ins. One or more management descriptors are provided for the plug-ins. The management descriptors include a number of relationships between the deployed programs and a number of computer system entities. The relationships indicate that the management applications can administer one or more aspects of the corresponding entities. A first management program is selected from the number of deployed management programs to administer a related computer system entity. One or more other management programs are dynamically identified and presented to the user as possible management scenarios. The identification of the other management programs is based on correspondence defined in the management descriptors to the aspects or the types of the computer system entity.

  • Pub Date: 2010/21/12
  • Number: 08732708
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Cell content scrolling

Disclosed are methods and systems for cell content alignment. The methods and systems involve retrieving one or more table parameters, the one or more table parameters including size of currently invisible cells in a display window, size of merged cells, the display window size and text size in the merged cells, calculating a position of a text in a visible portion of merged cells based on the table parameters and displaying the text in the merged cells based on the calculated position of the text.

  • Pub Date: 2010/21/12
  • Number: 08782510
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Activate attribute for service profiles in unified computing system

An enterprise computing system is provided comprising a plurality of server computers and a management server configured to communicate with the plurality of server computers. The management server stores data indicating the service profiles installed on respective server computers and an activation status of the service profiles on the respective server computers. Each service profile comprises data defining attributes for the server computer and includes an activation attribute for the service profile indicating whether the service profile is active on the corresponding server computer. The management server sends the service profiles to the together with an activation attribute for each service profile to server computers such that any service profile that is installed on multiple server computers is active on one server computer at any given time.

  • Pub Date: 2010/21/12
  • Number: 08903960
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual resource provisioning by assigning colors to virtual resources in multi-tenant resource pool

Virtual resource provisioning may be enhanced by coloring virtual resource instances and/or underlying implementation resources. Particular resource colors may be associated with particular treatments during allocation of implementation resources to virtual resources. There may be different types of colors corresponding to different types of allocation treatment. Exclusory colors may be utilized to reduce clustering of virtual resources with respect to implementation resources. Assignment of exclusory colors to virtual resources can help strike a balance between lower costs through efficient implementation resource utilization and higher fault tolerance through spreading across an available implementation resource pool. Inclusive colors may be utilized to require and/or prefer allocation of virtual resources to implementation resources painted with the inclusive color. Proximity colors may be utilized to enhance a computational performance of a set of virtual resources. Proximity colors may be associated with proximity specifications that define proximity in implementation resource networks.

  • Pub Date: 2010/20/12
  • Number: 08533724
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Tokenized data security

Provided are devices, methods, systems, computer readable storage media and other means for tokenizing data. In some examples, credit card numbers are tokenized using a pre-generated token map and absent the use of a networked database that stores a relatively large quantity of credit card numbers in a central location. The token map may be generated by a token map generator such that the token map can be used by a tokenizer to replace a portion of an account number with a token, and by a detokenizer to replace the token with the original portion of the account number. A pre-parser and parser may also be used to locate an account number and/or token in a message received over a network.

  • Pub Date: 2010/20/12
  • Number: 08739262
  • Owner: Sabre GLBL Inc.
  • Location: Southlake, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for network replication

In response to a request to duplicate a network, the network is duplicated. The duplicate network includes one or more virtual devices that correspond to one or more devices in the network being duplicated. The devices of the duplicate network are communicatively arranged in a manner consistent with a topology of the network being duplicated. Once the duplicate network is created, access to the duplicate network is provided.

  • Pub Date: 2010/20/12
  • Number: 08549347
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Tamper proof location services

A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location devices, such as GPS. They also have a trusted platform module (TPM) or other security device. Currently GPS location data is made directly accessible to untrusted application code using a simple protocol. The secure location system provides a secure mechanism whereby the GPS location of a computer at a specific time can be certified by the operating system kernel and TPM. The secure location system logs user activity with a label indicating the geographic location of the computing device at the time of the activity. The secure location system can provide a difficult to forge, time-stamped location through a combination of kernel-mode GPS access and TPM security hardware. Thus, the secure location system incorporates secure location information into authorization and other operating system decisions.

  • Pub Date: 2010/20/12
  • Number: 08560839
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for attentive clustering and analytics

Attentive clustering includes constructing an online author network, wherein constructing includes selecting a set of source nodes (S), a set of outlink targets (T) from a selected type or types of hyperlinks, and a set of edges (E) between S and T defined by the selected hyperlinks, constructing a matrix of source nodes in S linked to targets in T′, wherein T′ is derived by normalizing nodes in T, and partitioning the network into at least one set of source nodes with a similar linking history to form an attentive cluster and at least one set of outlink targets with a similar citation profile to form an outlink bundle. Attentive clustering may further include applying any lists specifying inclusion or exclusion of particular nodes. Frequencies of links between attentive clusters and outlink bundles may be measured and analyzed.

  • Pub Date: 2010/20/12
  • Number: 08635281
  • Owner: Morningside Analytics, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Signaling techniques for a multimedia-aware radio and network adaptation

An approach to enhance quality of experience (QoE) in a wireless multimedia communication system is disclosed. A signaling mechanism is provided to make application-layer parameters of a multimedia application to be accessible in one or more network interfaces including an air interface, an access network interface, and a core network interface. Also, the application-layer parameters may be included in quality of service (QoS) class definitions to make the application-layer parameters accessible at the one or more network interfaces. The signaling mechanism and inclusion of application-layer parameters into the QoS class definitions is to enable the QoE-aware link adaptation, resource allocation, joint source channel coding based cross-layer optimizations.

  • Pub Date: 2010/20/12
  • Number: 08675577
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to control privileges of mobile device applications

Methods and apparatus to control privileges of mobile device applications are disclosed. A disclosed example method includes assigning a process identifier to an application on a mobile device, the process identifier generated by an operating system of the mobile device, determining via a digital certificate that the application is authorized to be executed on the mobile device and that the application is authorized to access a network interface of the mobile device, configuring a mandatory access control module of the mobile device to enforce access of the network interface by providing the process identifier to the mandatory access control module, and enabling the application to access the network interface.

  • Pub Date: 2010/20/12
  • Number: 08650620
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for optimal pricing and allocation for a set of contractual rights to be offered with canceling/modifying of indications of interest

A method and system for the determination of optimal pricing and allocation of securities in an open, competitive environment. The method and system may also be used in developing pre-markets of other items that are difficult to price and allocate in a competitive manner, such as the underwriting/securitization of contracts for property; future revenue/earning streams from an asset and/or group of assets; underwritten insurance portfolios, intellectual property and other goods and services. The system of price optimization and allocation is accomplished by interactive feedback of information using a display and including competitive participation of individual members of the public (and/or their agents) or institutional buyers over a data network e.g., the Internet, uncovering the nature and identification of demand in a self-organizing fashion. Demand emerges through participants' interaction with the system and with each other, via a graphically-supported, interactive reservation process.

  • Pub Date: 2010/20/12
  • Number: 08447684
  • Details: Visit USPTO

Visit USPTO Page


Method and system for offline indexing of content and classifying stored data

A method and system for creating an index of content without interfering with the source of the content includes an offline content indexing system that creates an index of content from an offline copy of data. The system may associate additional properties or tags with data that are not part of traditional indexing of content, such as the time the content was last available or user attributes associated with the content. Users can search the created index to locate content that is no longer available or based on the associate attributes.

  • Pub Date: 2010/20/12
  • Number: 08037031
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for selective file erasure using metadata modifications

A process that ensures the virtual destruction of data files a user wishes to erase from a storage medium, such as a hard drive, flash drive, or removable disk. This approach is appropriate for managing custom distributions from a large file sets as it is roughly linear in compute complexity to the number of files erased but is capped when many files are batch erased.

  • Pub Date: 2010/20/12
  • Number: 08099437
  • Details: Visit USPTO

Visit USPTO Page


Light timeout optimization

A lighting controller may optimize a timeout value of a lamp based on the goals of saving energy and providing occupant comfort. The lamp may illuminate a lighting area. The lighting controller may determine a false-negative rate for the lamp from sensor data that represents a frequency at which the lamp is timed out while the lighting area is occupied. The lighting controller may adjust the timeout value of the lamp over time so that the false-negative rate approaches a threshold false-negative rate. The false-negatives and occupancy periods may be detected from spikes in time distributions of motion data. The amount of energy that the lamp would consume at an increased timeout value of the lamp may be determined from motion data stored while the timeout value of the lamp is at an initial timeout value.

  • Pub Date: 2010/20/12
  • Number: 08538596
  • Owner: Redwood Systems, Inc.
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Large-scale event evaluation using realtime processors

Large-scale event processing systems are often designed to perform data mining operations by storing a large set of events in a massive database, applying complex queries to the records of the events, and generating reports and notifications. However, because such queries are performed on very large data sets, the processing of the queries often introduces a significant delay between the occurrence of the events and the reporting or notification thereof. Instead, a large-scale event processing system may be devised as a large state machine organized according to an evaluation plan, comprising a graph of event processors that, in realtime, evaluate each event in an event stream to update an internal state of the event processor, and to perform responses when response conditions are met. The continuous monitoring and evaluation of the stream of events may therefore enable the event processing system to provide realtime responses and notifications of complex queries.

  • Pub Date: 2010/20/12
  • Number: 08510284
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Information processor, information processing system, data archiving method, and data deletion method

An information processor may include a command receiving unit that receives an immediate processing command in which a deletion target to be deleted from the database is conditioned, and a registration processing unit that registers information defining the deletion target into a management data unit. In addition, the information processor may include a deletion processing unit that deletes the deletion target from a database, and deregisters the deleted deletion target from the management data unit. The information processor can also include a data manipulation command processing unit, which, in the case where a data manipulation command having a manipulation target that coincides with a table of the deletion target registered in the management data unit is received, processes the data manipulation command in a state where a condition to exclude the deletion target from the manipulation target is added to the data manipulation command.

  • Pub Date: 2010/20/12
  • Number: 08849766
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Erasure coding and redundant replication

Disclosed are various embodiments for employing an erasure coding storage scheme and a redundant replication storage scheme in a data storage system. Data objects that are greater than a size threshold and accessed less frequently than an access threshold are stored in an erasure coding scheme, while data objects that are sized less than a size threshold or accessed more often than an access threshold are stored in a redundant replication storage scheme.

  • Pub Date: 2010/20/12
  • Number: 08504535
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient streaming server

Providing media content includes receiving a request from a client for a portion of a selected media file in a streaming server at a streaming tier in a multi-tiered architecture for media content storage and streaming; streaming the requested portion of the selected media file to the client directly from the streaming server if the selected media file is stored on the streaming server; and streaming the requested portion of the selected media file to the client from the streaming server by reverse proxy to at least one server of a storage tier in the multi-tiered architecture if the media file is not stored on the streaming server.

  • Pub Date: 2010/20/12
  • Number: 08769139
  • Owner: Clarendon Foundation, Inc.
  • Location: Murray, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic online communities

Methods, systems, and computer programs for triggering interaction with a Dynamic Online Community (DOC) are presented. In one embodiment, a method includes an operation for monitoring online activity of a user, which includes tracking user input on a web browser. The method further includes operations for detecting that the user is interested in a subject based on the online activity, and for determining whether there is a DOC topic that is associated with the subject. The DOC has members that have shown an interest in the DOC topic. In another operation, the method assigns the user to be a member of the DOC if the determination indicates that there is a DOC topic associated with the subject. The user is automatically recommended to join the DOC. DOC related information is provided to the user after the user is assigned to the DOC. In one embodiment, the online activity of the user is searching in a search provider's website.

  • Pub Date: 2010/20/12
  • Number: 08775355
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of body and props

A system and method for detecting and tracking targets including body parts and props is described. In one aspect, the disclosed technology acquires one or more depth images, generates one or more classification maps associated with one or more body parts and one or more props, tracks the one or more body parts using a skeletal tracking system, tracks the one or more props using a prop tracking system, and reports metrics regarding the one or more body parts and the one or more props. In some embodiments, feedback may occur between the skeletal tracking system and the prop tracking system.

  • Pub Date: 2010/20/12
  • Number: 08660303
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Debugger presentation of parallel application threads

User interface technologies for viewing the state of threads of a target parallel application, such as a massively parallel application intended to run on a GPGPU system, during debugging of the target parallel application are disclosed. The target parallel application includes a kernel, and the kernel includes a set of threads. Coalesced thread information of the threads is presented with the user interface technologies based on user-controllable criteria.

  • Pub Date: 2010/20/12
  • Number: 08566647
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Classification recommendation based on social actions

Embodiments are directed towards employing a classifier to determine a classification for target media content using nominally factored social interaction attributes, the classifier being trained using a training dataset that includes at least one nominally factored social interaction attribute. The trained classifier determines a classification of the target media content based on nominally factored social interaction attributes obtained during a monitored social interaction with the target media content and one or more users. The classification may include identifying at least one genre for the media content, as well as predicting whether the media content will go viral or not. The classification may also be used to provide recommendation to the one or more users of other media content.

  • Pub Date: 2010/20/12
  • Number: 08521679
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Connecting module for connecting at least one sensor, actuator, or effector to a service-oriented-architecture network

The invention relates to a connecting module () for connecting at least one sensor (), effector, or actuator to a service-oriented-architecture, called SOA, network (), wherein a functionality of the at least one sensor () is mapped as a service in the SOA network (). In order to enable the integration of sensors () that are not SOA-capable in themselves into an SOA environment, the connecting module () has at least one first interface () for connecting the at least one sensor (), effector, or actuator, at least one second interface () for connecting the SOA network (), and a computing device () for executing a computer program, wherein a part () of the computer program to be executed is specified by default and another part () of the computer program is freely programmable by a manufacturer of the at least one sensor () in order to adapt firmware on the at least one sensor () to the SOA environment. The invention further relates to a module unit () of the connecting module () that prepares the service mapped in the SOA environment for transmission over a military radio network () having low bandwidth while maintaining the SOA functionality.

  • Pub Date: 2010/18/12
  • Number: 08751707
  • Owner: Thales Defence Deutschland GmbH
  • Location: , DE
  • Details: Visit USPTO

Visit USPTO Page


Work unit adapter for content processing with third party network elements

A method including receiving a work flow for the ingestion, transformation, and distribution of content, wherein the work flow includes one or more work unit tasks; retrieving work unit task information pertaining to the one or more work unit tasks; identifying one or more network elements to execute one of the one or more work unit tasks based on the work unit task information; translating the work unit task information from a format used by one or more devices to another format that is used by the one or more network elements based on one of an object adapter pattern or a class adapter pattern; and send the translated work unit task information to the one or more network elements.

  • Pub Date: 2010/17/12
  • Number: 08463902
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Work order optimization

A method may include receiving an order associated with processing a media file, generating a work order associated with fulfilling the order and identifying tasks associated with the work order. The method may also include accessing information identifying previously processed orders and determining whether at least one stored asset associated with one of the previously processed orders is usable when processing the first order. The method may further include retrieving, when a first one of the stored assets is usable, the first stored asset, and using the first stored asset when processing the work order.

  • Pub Date: 2010/17/12
  • Number: 09213955
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Work order estimator

A method may include receiving an order associated with processing a media file and generating a workflow associated with fulfilling the order. The method may also include identifying a number of tasks associated with the workflow and generating an estimate associated with executing the tasks. The generating an estimate may include identifying a resource type associated with the media file and the order, and identifying at least one of capacity and time requirements associated with executing the tasks.

  • Pub Date: 2010/17/12
  • Number: 08458007
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Work flow command processing system

A method including receiving a work flow for the ingestion, transformation, and distribution of content, wherein the work flow includes one or more work unit tasks; selecting one of the one or more work unit tasks for execution when resources are available; retrieving work unit task information that includes a work unit definition that specifies which of the one or more other work unit tasks are capable of being at least one of an input to the one of the one or more work unit tasks or an output for the one of the one or more work unit tasks, and work unit task connector parameters that specify a type of input content and a type of output content; and executing the one of the one or more work unit tasks based on a translated work unit task information.

  • Pub Date: 2010/17/12
  • Number: 09098338
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine branching and parallel execution

A state branching system is described herein that allows parallel execution of complex state transitions while leveraging time invested to setup a starting state. By allowing branching at the virtual machine level, the state branching system allows setup of a particular condition or state in a virtual machine, then copying and branching to parallel instances of the virtual machine to explore different possible subsequent states. Upon detecting a large state change with unknown outcome, the state branching system instructs the hypervisor to copy the executing virtual machine into one or more separate virtual machines. The system then allows divergent branching between the two or more virtual machines to explore different states from a similar starting point. Once the executions have reached the next state, the system coordinates to determine which copies will continue execution. Thus, the state branching system allows faster exploration of complex state changes.

  • Pub Date: 2010/17/12
  • Number: 08677355
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Temporal rule-based feature definition and extraction

A temporal rule-based feature extraction system and method for extracting features from temporal-based rules satisfied by a trace. Once a temporal-based rule is found that is satisfied by the trace, then embodiments of the temporal rule-based feature extraction system and method leverage that rule to either use as a feature or to extract additional features. The extracted feature then is used to characterize the trace. Embodiments of the system include a feature definition module, which defines features based on the temporal-based rules satisfied by a trace, and a similarity measure module, which defines a similarity measure for the defined features. The defined features include both extrinsic features, which are based on extrinsic properties of the rule, and intrinsic features, which are based on intrinsic properties of the rule. The similarity module generates similarity measures that indicate the similarity of two traces.

  • Pub Date: 2010/17/12
  • Number: 08538909
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and articles of manufacture for virtual display

Systems, methods, and articles of manufacture to virtually segment a display are disclosed. A disclosed example system includes a display abstraction component configured to interface, at a kernel level, between an operating system and a graphics processor, the display abstraction component to receive, adapt, and process display calls from the operating system and instruct the graphics processor to divide the display into multiple virtual displays according to a user specified virtual configuration preference to allow the display to replicate a multiple display configuration.

  • Pub Date: 2010/17/12
  • Number: 08587616
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for reducing test effort by object risk analysis

A system, computer readable medium, and method for automatically testing computer objects affected by an update package. The exemplary method may compare computer objects/instances in an update package with those of the installed version of the computer application. A set of computer objects that have changed in the update package as compared to the installed version may be generated. The changes to each of the computer objects in the set of changed objects may be analyzed to determine if an automated test is related to the changed object. If an object has a related automated test assigned to it, the object may be placed in a separate list for testing. The automated tests of the changed objects in the separate list may be organized into a test plan. The automated tests may be executed according to the test plan. The system may have servers and computer processors to implement the method.

  • Pub Date: 2010/17/12
  • Number: 08954930
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating financial assets

A system for creating and maintaining financial assets which accentuate different types of sub-loan level risk associated with a plurality of home mortgage loans and which are configured to operate as hedges against risks that oppose the different types of sub-loan level risk is provided. A decomposition tool is configured to decompose each of the plurality of home mortgage loans into a plurality of sub-loan level cash flows. A repackaging tool is configured to repackage the plurality of sub-loan level cash flows to form the financial assets. Repackaging includes selecting a sub-combination of the plurality of sub-loan level cash flows, packaging the sub-combination of sub-loan level cash flows to create one of the financial assets, and repeating the selecting and packaging steps to create additional financial assets. A graphical user interface is configured to display information relating to the sub-loan level cash flows and financial assets on a display.

  • Pub Date: 2010/17/12
  • Number: 08195564
  • Owner: Fannie Mae
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Storing and publishing contents of a content store

Aspects are disclosed for publishing contents of a content store. A storage operation is performed, and a completion of the storage operation is detected. Here, the storage operation redundantly stores contents of a content set onto instances associated with a content store. The contents stored in the instances are then published in response to the completion of the storage operation. In another aspect, a dataset table is generated to facilitate storing contents of a content set, which include payload and metadata. The payload is stored onto a payload table, and the metadata is stored onto a metadata table. For this embodiment, the dataset table includes a first foreign key to the payload table, whereas the metadata table includes a second foreign key to the dataset table. The dataset table is monitored to determine a storage status of the contents, and the contents are subsequently published based on the storage status.

  • Pub Date: 2010/17/12
  • Number: 09424362
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Speculative reads

Patterns of access and/or behavior can be analyzed and persisted for use in pre-fetching data from a physical storage device. In at least some embodiments, data can be aggregated across volumes, instances, users, applications, or other such entities, and that data can be analyzed to attempt to determine patterns for any of those entities. The patterns and/or analysis can be persisted such that the information is not lost in the event of a reboot or other such occurrence. Further, aspects such as load and availability across the network can be analyzed to determine where to send and/or store data that is pre-fetched from disk or other such storage in order to reduce latency while preventing bottlenecks or other such issues with resource availability.

  • Pub Date: 2010/17/12
  • Number: 08539163
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Single microstructure lens, systems and methods

Systems and methods for providing enhanced image quality across a wide and extended range of foci encompass vision treatment techniques and ophthalmic lenses such as contact lenses and intraocular lenses (IOLs). Exemplary IOL optics can include a circular surface structure which acts as a diffractive or phase shifting profile. In some cases, a single ring IOL includes an anterior face and a posterior face, where a profile can be imposed on the anterior or posterior surface or face. The profile can have an inner portion such as a microstructure or central echelette, and an outer portion. Between the inner portion and the outer portion, there may be a transition zone that connects the inner and outer portions.

  • Pub Date: 2010/17/12
  • Number: 08430508
  • Owner: AMO Groningen B.V.
  • Location: Groninge, NL
  • Details: Visit USPTO

Visit USPTO Page


Resource manager

A method may include receiving an order associated with processing a media file and generating a workflow associated with fulfilling the order. The method may also include identifying tasks associated with the workflow and generating an estimate associated with executing the tasks. The method may further include allocating resources associated with executing the tasks and scheduling execution of the order.

  • Pub Date: 2010/17/12
  • Number: 08768748
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Ranking of address book contacts based on social proximity

In one embodiment, a user of a social networking system requests to look up an address book maintained by the social networking system. The social networking system improves the look up search results by ranking one or more contacts in the address book based on social graph, social relationship and communication history information.

  • Pub Date: 2010/17/12
  • Number: 08880555
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Plug-in system for software applications

A plug-in framework is invoked within a plug-in, where the plug-in framework includes a software library configured to define, register, and configure plug-ins, where the plug-in includes a software module that extends or customizes functionality of a software application that is external to the plug-in, and where the plug-in includes a mapping name. A plug-in instance declaration is searched, by the plug-in framework, for a mapping that includes the mapping name, where the plug-in instance declaration is located within a plug-in file, and where the plug-in declaration comprises one or more mappings. When a mapping of the mapping name to the value is found, the value is returned, by the plug-in framework, to the plug-in based on the mapping. The plug-in framework also allows a plug-in provider to associate a plug-in with metadata.

  • Pub Date: 2010/17/12
  • Number: 08407461
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing symbol manipulation language-based executable applications for distributed execution

In one embodiment, a method comprises receiving an application that describes functions according to a prescribed symbol manipulation language, the prescribed symbol manipulation language a non-Turing complete language that does not permit partial functions and describes the functions independent of any attribute of any computing system; identifying, in the application, a distribution annotation that identifies a candidate element in the application, the candidate element configured for execution in a distributed computing operation by a distributed computing system comprising two or more distributed computing devices; generating one or more variants of the application based on executing a nondestructive transformation of the application relative to prescribed equality axioms, at least one of the variants containing a corresponding semantically-equivalent variation of the candidate element; and selecting one of the variants as an optimization for execution of the application by the distributed computing system relative to prescribed metrics.

  • Pub Date: 2010/17/12
  • Number: 08762964
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile search based on predicted location

A method includes receiving one or more search terms at a mobile computing device while the mobile computing device is located at a particular location. A search query that includes the one or more search terms and a location history of the mobile computing device is transmitted to a server. The method also includes receiving one or more search results in response to the search query, where the one or more search results include content identified based on a predicted destination of the mobile computing device. An interface identifying the one or more search results is displayed at the mobile computing device.

  • Pub Date: 2010/17/12
  • Number: 09134137
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for presenting different versions of an application

Methods and systems for presenting different versions of an application are described. In one example, a selection of a version of application code is received. Such a selection may include a simultaneous selection of all versions. Information about the selected version is retrieved. A description of features contained within the selected version is presented and then a version summary for each listed feature is displayed, together with the description of features, to indicate the versions of the application code that contain the respective feature.

  • Pub Date: 2010/17/12
  • Number: 08782605
  • Owner: Salesforce.com, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for determining candidates for a custom index in a multi-tenant database environment

Methods and systems are described for determining candidates for a custom index in a multi-tenant database environment. In one embodiment, a method includes, capturing a query that is directed to a multi-tenant database, determining whether the captured query is a candidate for an additional filter, determining operators used by the captured query if the query is a candidate, determining data types of the database used by the captured query if the query is a candidate, determining whether there is a current filter for the operator and data types used by the captured query if the query is a candidate, selecting the captured query based on the determined operators, data types, and the determined current filters, and generating a custom index for the selected query.

  • Pub Date: 2010/17/12
  • Number: 08583653
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for generating web pages for topics unassociated with a dominant URL

Techniques are provided for identifying topics that are unassociated with a dominant URL. A set of keywords associated with a topic is identified. A search log is scanned to identify search queries associated with the set of keywords. The identified search queries are grouped into clusters. Clusters associated with similar URLs are merged to generate an extended seed query string. The extended seed query string is analyzed to determine whether it relates to an existing dominant URL. If the extended seed query string is determined to be unassociated with an existing dominant URL, a web page associated with the topic may be generated.

  • Pub Date: 2010/17/12
  • Number: 08799260
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for generating a collaboration timeline illustrating application artifacts in context

A method and apparatus for generating a collaboration timeline which illustrates application artifacts in context. A collaboration session includes a plurality of participants. Each participant collaborates via a corresponding processing device. Media streams associated with the plurality of participants are received during the collaboration session and a collaboration media stream based on the media streams is generated. A collaboration application generates an artifact during the collaboration session. A timeline entry is generated in a collaboration timeline, the timeline entry including time information identifying a time associated with the artifact, and a reference to the artifact.

  • Pub Date: 2010/17/12
  • Number: 08868657
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Limited echelette lens, systems and methods

Systems and methods for providing enhanced image quality across a wide and extended range of foci encompass vision treatment techniques and ophthalmic lenses such as contact lenses and intraocular lenses (IOLs). Exemplary IOL optics can include a circular surface structure with limited adjacent echelettes which act as a diffractive or phase shifting profile.

  • Pub Date: 2010/17/12
  • Number: 08480228
  • Owner: AMO Groningen B.V.
  • Location: Groningen, NL
  • Details: Visit USPTO

Visit USPTO Page


Functionality for providing clinical decision support

An information management system (IMS) is described herein that provides supplemental information to a user who is interacting with an application module. In one implementation, the IMS includes a collection system, an information extraction module, and a notification system. The collection system provides collected information from one or more information sources. The information extraction module extracts application information from the application module, even though the application module may lack a native interface for providing the application information. The analysis engine determines supplemental information to present to the user based on the collected information and the application information. And the notification information provides notification information which alerts the user to the existence of the supplemental information. In one scenario, the IMS can be applied in a healthcare-related domain.

  • Pub Date: 2010/17/12
  • Number: 08473307
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Enterprise-wide security system for computer devices

A system and method for securing data in mobile devices () includes a computing mode () and a plurality of mobile devices (). A node security program () executed in the computing node () interfaces with a device security program () executed at a mobile device (). The computing node () is responsible for managing the security based on a node security profile () interpreted by a node security program () executed in the computing node (). A device discovery method and arrangement () also detects and locates various information () about the mobile devices () based on a scan profile ().

  • Pub Date: 2010/17/12
  • Number: 08341693
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Edge detection using structured illumination

A machine vision inspection system (MVIS) and a related light stripe edge feature location method are disclosed. The MVIS comprises a control system, a light stripe projection system, an imaging system, and a user interface. In a region of interest including the edge feature, the light stripe projection system focuses a light stripe transverse to the edge direction and across the edge feature, such that the light stripe has a changing stripe intensity profile along the light stripe. The imaging system acquires an image of the light stripe and the control system analyzes the image to determine the location of the edge feature based on a changing light intensity profile along the stripe. The method may be implemented in an edge detection video tool. The method may be advantageous for inspecting highly textured, beveled, chamfered, rounded or damaged edges, for example.

  • Pub Date: 2010/17/12
  • Number: 08773526
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Distributed storage system

In one embodiment, a first computing device receives a write request and data from a second computing device; iteratively attempts to write the data until a copy of the data is successfully written to each and every storage node belonging to a storage volume; and transmits a volume identifier of the storage volume and a data identifier assigned to the data to the second computing device. In one embodiment, a first computing device receives a read request and a volume identifier and a data identifier from a second computing device; accesses a cache to select the storage volume identified by the volume identifier; iteratively attempts to read data identified by the data identifier until a copy of the data is successfully read from a storage node belonging to the selected storage volume; and transmits the copy of the data to the second computing device.

  • Pub Date: 2010/17/12
  • Number: 08793328
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Customization of mobile applications using web-based technology

In one embodiment, receiving, at a first computing device from a second computing device, a request for a view of a user interface of a native application executing on the second computing device, wherein the view includes one or more first user interface components; determining, by the first computing device, a user agent type of the second computing device; selecting, by the first computing device, one or more second user-interface components to be included in the view based on the user agent type of the second computing device; generating, by the first computing device, code implementing a structured document that represents the view, wherein the structured document comprises the one or more first user-interface components and the one or more second user-interface components; and transmitting, from the first computing device to the second computing device, the code.

  • Pub Date: 2010/17/12
  • Number: 09026905
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Creating custom policies in a remote-computing environment

Techniques for crafting custom policies for entities (e.g., users, applications, etc.) based on past behavior of the entities are described herein. In one example, the techniques are implemented in a network-based environment. In this environment, a remote-computing service may include multiple different resources that provide different services to customers of the remote-computing service. For instance, the remote-computing service may provide a network-based storage service, a network-based compute service, a network-based payment service, or any other network-based resource. Users and/or applications of a particular customer may then access these resources via an interface provided by the remote-computing service. After tracking a user or application's access to these resources for a certain period of time, the remote-computing service may recommend or create a custom policy for the user or application based on the requests made by the user or application.

  • Pub Date: 2010/17/12
  • Number: 08918834
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Communication port and connector

A communication port and connector are described. A mobile computing device may include a hardware element, with the hardware element being communicatively coupled to a connection. The connection is communicatively coupled to a communication port, and the communication port includes a first pin and a second pin. Additionally, at least one of the first pin and the second pin is comprised of a ferromagnetic material. Other embodiments are described and claimed.

  • Pub Date: 2010/17/12
  • Number: 08838868
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless file transmission

A computer system which includes one or more wireless interface devices that are adapted to communicate with a remote host over a radio link. Each of the wireless interface devices is a pen-based device which includes an ink field in which pen events are translated into pen data packets and transmitted to the remote host over the radio link. Local inking is provided at the wireless interface device in order to maintain the pen paradigm in essentially real time.

  • Pub Date: 2010/16/12
  • Number: 08456453
  • Owner: Warren & Lewis Investment Corporation
  • Location: Falls Church, US
  • Details: Visit USPTO

Visit USPTO Page


Visual or touchscreen password entry

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and movement of either the modified base image or modified overlay image is permitted if a criterion for movement is met. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.

  • Pub Date: 2010/16/12
  • Number: 08635676
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Techniques for automated storage management

Described are techniques for performing automated data storage configuration. A plurality of I/O operations are received on a data path. The I/O operations are analyzed and analysis information is determined. In accordance with the analysis information, an application which issued the plurality of I/O operations is determined. One or more configuration options are determined which are customized in accordance with the application. A portion of data storage in a data storage system is configured for use by the application in accordance with the one or more configuration options.

  • Pub Date: 2010/16/12
  • Number: 08239584
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of efficient library characterization for integrated circuit cell libraries

A method of efficient library characterization of a circuit of a logic gate having a plurality of transistors and a plurality of nodes defining interconnection points in the circuit is disclosed. The method includes determining a plurality of vectors for a plurality of arcs. Each of the plurality of vectors represents possible data bits to inputs and nodes of the logic gate. The method performs circuit pruning for each of distinct vectors. The circuit pruning includes identifying an active circuit for each vector. Then, the circuit simulations limited to a plurality of transistors in the active circuit are performed. The circuit pruning and circuit simulations are repeated for remaining ones of the plurality of substantially distinct vectors. The results of the circuit simulations are then stored on a non-volatile compute readable media, for each active circuit corresponding to each of the plurality of substantially distinct vectors.

  • Pub Date: 2010/16/12
  • Number: 08160858
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing stalled storage devices

Embodiments relate to systems and methods for managing stalled storage devices of a storage system. In one embodiment, a method for managing access to storage devices includes determining that a first storage device, which stores a first resource, is stalled and transitioning the first storage device to a stalled state. The method also includes receiving an access request for at least a portion of the first resource while the first storage device is in the stalled state and attempting to provide access to a representation of the portion of the first resource from at least a second storage device that is not in a stalled state. In another embodiment, a method of managing access requests by a thread for a resource stored on a storage device includes initializing a thread access level for an access request by a thread for the resource. The method also includes determining whether the storage device, which has a device access level, is accessible based at least in part on the thread access level and the device access level and selecting a thread operation based at least in part on the determination of whether the storage device is accessible. The thread operation may be selected from attempting the thread access request if the device is accessible and determining whether to restart the thread access request if the device is not accessible.

  • Pub Date: 2010/16/12
  • Number: 07971021
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for exclusion of inconsistent objects from lifecycle management processes

The present disclosure involves systems, products, and methods for excluding inconsistent objects from lifecycle management processing. One method includes operations for identifying a set of objects in a system, at least a subset of the set of objects associated with a lifecycle management process; prior to performing the lifecycle management process, determining a consistency status for each object in the subset of objects associated with the lifecycle management process; and performing the lifecycle management process, wherein performing the lifecycle management process includes executing at least one lifecycle management operation on each object in the set of objects determined to be consistent within the system prior to performing the lifecycle management process. In some instances, performing the lifecycle management process may include skipping the execution of the at least one lifecycle management operation for each inconsistent object during the lifecycle management process.

  • Pub Date: 2010/16/12
  • Number: 08762929
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for associating data relating to features of a data entity

A system and method for associating data relating to features of an entity. A first and second processor may receive and store first and second data relating to a first and second feature of a data entity in first and second memories. A third processor may store the first and second data in a first file in a third memory with respective time stamps. The first and second processor may receive third and fourth data relating to the first and second features and store the first and second data with respective time stamps. The third processor may compare time stamps and store data relating to the first and second features associated with the most recent time stamp.

  • Pub Date: 2010/16/12
  • Number: 08706705
  • Owner: Conductor, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Supplementing biometric identification with device identification

A computer may identify an individual according to one or more biometrics based on various physiological aspects of the individual, such as metrics of various features of the face, gait, fingerprint, or voice of the individual. However, biometrics are often computationally intensive to compute, inaccurate, and unable to scale to identify an individual among a large set of known individuals. Therefore, the biometric identification of an individual may be supplemented by identifying one or more devices associated with the individual (e.g., a mobile phone, a vehicle driven by the individual, or an implanted medical device). When an individual is registered for identification, various device identifiers of devices associated with the individual may be stored along with the biometrics of the individual. Individuals may then be identified using both biometrics and detected device identifiers, thereby improving the efficiency, speed, accuracy, and scalability of the identification.

  • Pub Date: 2010/16/12
  • Number: 09436816
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Superconducting analog-to-digital converter with current amplified feedback

A superconducting bandpass sigma-delta modulator and a method for analog-to-digital signal conversion is disclosed. The superconducting bandpass sigma-delta modulator includes coupled resonators having a desired impedance ratio. A first resonator connects to a comparator, which comparator generates single-flux-quantum pulses. A feedback loop links from the comparator to a second resonator and includes a current amplifier. A digital RF receiver system is also disclosed. This system includes a second order bandpass sigma-delta modulator, which has a desired impedance ratio between resonators and a feedback loop with current amplification. The system further has an antenna configured to receive a GHz frequency radio transmission and to yield an analog signal which is accepted by the sigma-delta modulator.

  • Pub Date: 2010/16/12
  • Number: 08416109
  • Owner: HYPRES, Inc.
  • Location: Elmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Simple algebraic and multi-layer passwords

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. The modified overlay image comprises a plurality of numbers. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, in sequence, with two or more numbers from the overlay image that equal a pre-selected algebraic result when one or more algebraic operator is apply to the numbers.

  • Pub Date: 2010/16/12
  • Number: 08631487
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Short-term option trading system

Option contracts are traded by valuing an option that has at least one of a) strike price or b) expiration time unknown at the time the option is valued. The previously unknown values of the option are assigned at the time or after the time the trade is completed. An implied underlying price stream is generated from the option prices through the use of feed back between market participants and the marketplace. The resulting system is useful in trading option contracts of short time duration.

  • Pub Date: 2010/16/12
  • Number: 08229840
  • Owner: Microtick LLC
  • Location: Fort Collins, US
  • Details: Visit USPTO

Visit USPTO Page


Shared resource discovery, configuration, and consumption for networked solutions

A networked solution offering a software-based service via a networked architecture having a system landscape can discover a shared resource within the system landscape, for example by accessing a landscape directory comprising information about a plurality of shared resources available in the system landscape. The information about the discovered shared resource can include a second networked solution within the system landscape that has previously configured the discovered shared resource. Configuration settings can be retrieved for the discovered shared resource from the second networked solution. Using the retrieved configuration settings, a shared resource-specific communication channel can be determined for the networked solution to access the discovered shared resource in a peer-to-peer manner. A resource type-specific application programming interface can be provided to the software-based service to enable consumption of the discovered shared resource by the software-based service. Related methods, systems, and articles of manufacture are described.

  • Pub Date: 2010/16/12
  • Number: 08375130
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Secure protocol for peer-to-peer network

A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the unique master keys to selectively remove remote devices from the group such that the remote device cannot later rejoin the group. Other remote devices, each possessing a master key that remains valid, can disconnect from the group and later reconnect to the group without express user action. To support such behavior, the wireless device may provide a user interface through which a user may manage connected remote devices by providing commands to selectively disconnect or remove remote devices from the group.

  • Pub Date: 2010/16/12
  • Number: 08948382
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Rating interestingness of profiling data subsets

Systems and methods for rating interestingness of profiling data subsets are described. Profiling data including a set of nodes associated with at least one executed computer program is received. The profiling data contains a first set of scores corresponding to the resource consumption of the nodes. A second set of scores is identified from the profiling data, wherein a score of the second set of scores indicates a combined resource consumption of a corresponding node of the set of nodes and at least one other node of the set of nodes related to the corresponding node. An interestingness rate is evaluated for groups of nodes of the set of nodes based on the corresponding scores. The group of nodes with the highest, or satisfactory high value of the calculated interestingness rate is presented.

  • Pub Date: 2010/16/12
  • Number: 08839208
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Quality on submit process

The present disclosure involves systems, software, and computer implemented methods for providing a quality on submit process. One process includes operations for monitoring a source control system for submissions of new source code and determining that new source code has been submitted by a user to the source control system. A request to perform a quality control task for the new source code is sent to at least one quality control application. A report from the quality control application regarding results of the quality control task is received. A general report of results of each quality control task performed by each of the at least one quality control application is generated. The general report is sent to the user.

  • Pub Date: 2010/16/12
  • Number: 08584079
  • Owner: SAP Portals Israel Ltd
  • Location: Ra'anana, IL
  • Details: Visit USPTO

Visit USPTO Page


Pressure sensitive multi-layer passwords

A method of authenticating a user of a computing device is proposed, together with a computer readable medium and a computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. Positive authentication is indicated in response to alignment of a base image reference point and an overlay image reference point and an indication of a correct level of pressure applied to a pressure sensitive input device.

  • Pub Date: 2010/16/12
  • Number: 08650635
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Password entry using moving images

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method, an authentication video is displayed on a display. In response to receiving an input at a point in time in the video that matches a pre-selected time reference point, positive authentication is indicated.

  • Pub Date: 2010/16/12
  • Number: 09135426
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Password entry using 3D image with spatial alignment

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, at least one of the base image reference point and the overlay image reference point having coordinates in three dimensions.

  • Pub Date: 2010/16/12
  • Number: 08863271
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


On-line social search

Example methods, apparatuses, or articles of manufacture are disclosed that may be implemented using one or more computing devices to facilitate or otherwise support one or more processes or operations in connection with performing information searches, such as, for example, domain-specific on-line searches using social survey-type queries.

  • Pub Date: 2010/16/12
  • Number: 08484191
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Obscuring visual login

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. A security level requirement is assigned and positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after the moving in a manner that meets the security level requirement.

  • Pub Date: 2010/16/12
  • Number: 08650624
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Multi-layered color-sensitive passwords

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and selection of a color for a portion of the display that matches a pre-selected color.

  • Pub Date: 2010/16/12
  • Number: 09258123
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Multi-layer orientation-changing password

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and the change in orientation matching a pre-selected orientation criterion.

  • Pub Date: 2010/16/12
  • Number: 08661530
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Multi-layer multi-point or randomized passwords

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point.

  • Pub Date: 2010/16/12
  • Number: 08931083
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Multi-layer multi-point or pathway-based passwords

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after moving through at least one other pre-selected reference point.

  • Pub Date: 2010/16/12
  • Number: 08769641
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, unknown
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing a user interface in a multi-tenant database environment

Methods, devices and systems for providing a user interface in an on-demand software service environment are described. Some implementations involve receiving an indication of a component definition to instantiate. The component definition may be a portion of a component definition data structure. Such implementations may also involve instantiating the provided component, instantiating all remaining attributes of the component definition data structure to produce a component instance data structure and transmitting an intermediate representation of the indicated component to a client device. The intermediate representation may comprise a version of the component instance data structure. The intermediate representation may allow the client device to create an instance of the component in memory.

  • Pub Date: 2010/16/12
  • Number: 09021435
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for improved correlation of shear displacement waveforms

Methods and systems for improving correlation of shear displacement waveforms are presented. The method includes delivering one or more reference pulses to a plurality of target regions to detect corresponding initial positions. Further, a plurality of pushing pulse segments are delivered to one or more pushing locations, where one or more parameters corresponding to the plurality of pushing pulse segments are adapted for generating a shear displacement waveform with a desired wave shape. Additionally, one or more tracking pulses may be delivered to the plurality of target regions for detecting displacements of at least a subset of the target regions as a function of time. Particularly, the displacements are determined as time samples of the shear displacement waveform. Subsequently, a shift between the shear displacement waveform detected at least two different target regions in the subset of the plurality of target regions is detected.

  • Pub Date: 2010/16/12
  • Number: 08494791
  • Owner: General Electric Company
  • Location: Niskayuna, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for communicating with storage systems using slim IP stacks

Methods, and associated devices, media, and systems, for establishing a communication link between a host system and a storage device are provided. One method includes an operation for providing on the host a communication stack including a Transmission Control Protocol/Internet Protocol (TCP/IP) module and a host physical layer module. The storage device includes a storage command extractor, and the method includes another operation for establishing a communication channel between an application in the host and the storage device, where the communication channel uses the communication stack and the storage command extractor. In the method, the TCP/IP module converts TCP/IP commands received from the application in the host to storage commands for the storage device.

  • Pub Date: 2010/16/12
  • Number: 08131864
  • Owner: SanDisk IL Ltd.
  • Location: Kfar Saba, IL
  • Details: Visit USPTO

Visit USPTO Page


Method for operating image display apparatus

A multifunctional display device displays a first area containing a program received through a channel, a second area containing card objects, and a third area containing additional information of a downloadable applications selected in association with one of the card objects.

  • Pub Date: 2010/16/12
  • Number: 08863191
  • Owner: LG Electronics Inc.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Metadata-based eventing supporting operations on data

Concepts and technologies are described herein for providing metadata-based eventing supporting operations on data. Application data such as classes and events can be stored in a table and can be associated with and/or described by application metadata. The application metadata also can specify one or more event handlers that reference one or more methods on a class. The event handlers can be invoked via various delegates linked to the one or more application metadata tables. When a create, update, or delete operation on the application data is received, the application metadata can be queried to determine if the application metadata describes event handlers associated with the application data. If event handlers associated with the application data exist, the event handlers can be invoked.

  • Pub Date: 2010/16/12
  • Number: 08793706
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying an efficient destination server

One or more techniques and/or systems are disclosed for identifying a list of destination servers ordered by round-trip time (RTT) for a requesting machine. When a client interacts with an address, such as an IP address, when accessing a remote service, an RTT is collected for the address, or the RTT may be derived for a range of addresses, and saved in a database. When the client subsequently requests access to a remote service, a list of destination servers are returned, respectively identified by corresponding addresses. The destination servers can be sorted in order of efficiency by determining an expected RTT associated with a matching address, or range, in the database, and sorting the destination servers by their respective expected RTTs.

  • Pub Date: 2010/16/12
  • Number: 08583824
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Human-assisted training of automated classifiers

Many computing scenarios involve the classification of content items within one or more categories. The content item set may be too large for humans to classify, but an automated classifier (e.g., an artificial neural network) may not be able to classify all content items with acceptable accuracy. Instead, the automated classifier may calculate a classification confidence while classifying respective content items. Content items having a low classification confidence may be sent to a human classifier, and may be added, along with the categories identified by the human classifier, to a training set. The automated classifier may then be retrained using the training set, thereby incrementally improving the classification confidence of the automated classifier while conserving the involvement of human classifiers. Additionally, human classifiers may be rewarded for classifying the content items, and the costs of such rewards may be considered while selecting content items for the training set.

  • Pub Date: 2010/16/12
  • Number: 08589317
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Determining an unexpected disconnect event constraint within a text exchange session

A device communicatively linked with a text exchange session can be identified. The device can be a computing device associated with a computing resource. The resource can be associated with a state and state information. The device can be associated with a text exchange application. State information associated with the computing resource can be obtained. The state information can be a resource identifier and a resource value. A computing resource state change can be determined. The determination can be responsive to a disconnect event associated with the device. The disconnect event can result in the device not communicatively linked to the text exchange session.

  • Pub Date: 2010/16/12
  • Number: 08984120
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling database trigger execution with trigger return data

A database trigger generates a return code having the effect of inhibiting further executions of the trigger within a pre-defined scope of execution. Preferably, the pre-defined scope is a task or process executing on behalf of a particular user. Upon first encountering the applicable trigger condition, the corresponding trigger is fired normally. Internal logic within the trigger determines whether it is necessary to call the same trigger again within the same scope, and if not, generates corresponding return data. A database management system which manages the trigger and causes it to automatically fire intercepts the return data and disables further firing of the trigger for the pre-defined scope.

  • Pub Date: 2010/16/12
  • Number: 08898124
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Conference calls for social streams

A system and method for generating a conference call within a social network is disclosed. The participants are all members of an affinity group and they communicate with each other using different social streams. When the stream becomes too complicated, a participant transforms the social stream into a conference call so that the discussion is held in real-time. The participant that requests the conference call is designated as a moderator. The moderator controls the conference, including the members of the affinity group, through a user interface. Once the conference is established a notification can be sent to invitees and other members of the affinity group. The notification can also be published on a social network.

  • Pub Date: 2010/16/12
  • Number: 08887070
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Co-browsing systems and methods

Described are systems and methods for screen sharing between host and agent computing systems. At a time before capturing the screen of the host computing system, each open window corresponding to a browser process is identified. Certain information is acquired about each browser process. It is determined, in response to the certain information acquired about each browser process, whether the open window corresponding to that browser process is eligible for screen capture. For each eligible open window, each visible portion of that eligible open window is captured. Capture of an image on the screen of the host computing system is limited to each visible portion of each eligible open window.

  • Pub Date: 2010/16/12
  • Number: 09535651
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Centralized web-based software solution for search engine optimization

A system and method for modifying a parameter of a website in order to optimize an organic listing of the website at one or more search engines is described. Several embodiments include methods and systems for generating scored representations based upon different portions of data associated with a website, and then combining the scored representations to achieve a result. The result indicates a feature of the website that may be modified in order to optimize the organic ranking of the website at one or more search engines.

  • Pub Date: 2010/16/12
  • Number: 08473495
  • Owner: Covario, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic WSDL download of client emulation for a testing tool

A method is disclosed which may include analyzing communication requests in a business process between a client and a server offering a service application to be tested. The method may further include identifying a call to a web service in the analyzed communication. The method may also include determining a location of a Web Service Description Language (WSDL) file relating to the web service on a remote server and downloading the WSDL file from the determined location. A computer readable medium having stored thereon instructions for performing the method and a computer system are also disclosed.

  • Pub Date: 2010/16/12
  • Number: 09043440
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Architecture for an efficient media framework

A system comprises a first media framework component, a second media framework component, and a media framework. The media framework comprises a simplified media framework interface and a non-tunnel mode handler. The simplified media framework interface handles connectivity between a first port and a second port in a tunnel mode. The non-tunnel mode handler converts connectivity of a third port and a fourth port in a non-tunnel mode to appear to be the tunnel mode for the simplified media framework interface. The first port and the second port of the simplified media framework interface is coupled to a fifth port and a sixth port of the non-tunnel mode handler. And, the third port of the non-tunnel mode handler is coupled to the first media framework component and the fourth port of the non-tunnel mode handler is coupled to the second media framework component.

  • Pub Date: 2010/16/12
  • Number: 08539128
  • Owner: VisualOn, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Application level contexts

A call for an application programming interface can be received from an application component at a context checking module, and a current application context of the application component within which the call for the application programming interface was generated can be determined. A context token of the application programming interface can be compared with the current application context, and if the context token does not match the context token, a remedial action can be executed. Related methods, systems, and articles of manufacture are disclosed.

  • Pub Date: 2010/16/12
  • Number: 08621492
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Adjusting the position of an endpoint reference for increasing security during device log-on

A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and with each execution of the method, at least one of a position of a pre-selected base image reference point on the modified base image and a position of a pre-selected overlay image reference point on the modified overlay image is varied. Positive authentication is indicated in response to an input resulting in the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.

  • Pub Date: 2010/16/12
  • Number: 08745694
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Transition from WS-Federation passive profile to active profile

A server system sends a first credential request to a passive requestor at a client device. After sending the first credential request, the server system receives a credential for a user of the client device. If the credential is valid, the server system can provide the passive requestor with access to a resource provided by the server system. After providing the passive requestor with access to the resource, the server system provides an active requestor at the client device with access to the resource without sending a second credential request to the active requestor. Consequently, it may not be necessary for a user of the client device to provide credentials twice in order for the passive requestor and the active requestor to access the resource.

  • Pub Date: 2010/15/12
  • Number: 08370914
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for detecting malicious code in a script attack

A computer-implemented method to detect malicious code in a script attack, is described. An activity associated with calling a function is detected. An operation code set associated with the activity to call the function is identified. A predetermined sequence of characters included in the operation code set is identified. The identified predetermined sequence of characters is analyzed. The operation code set is classified as malicious or non-malicious based on the analysis of the predetermined sequence of characters.

  • Pub Date: 2010/15/12
  • Number: 08839428
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for detecting malformed arguments in a function by hooking a generic object

A computer-implemented method to detect malformed arguments in a function by hooking a generic object, is described. A predetermined argument to monitor is identified. An activity associated with a calling of a function to produce a called out function is detected. The called out function is mapped to a class identification of an object. An argument in the called out function is compared with the predetermined argument. When a match exists, a virtual method table identification is recorded for the called out function. The match between the argument in the called out function and the predetermined argument is reported.

  • Pub Date: 2010/15/12
  • Number: 08429744
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method to visualize measuring and dosing operations

Various embodiments of systems and methods to visualize measuring and dosing operations are described herein. In various embodiments, a computer user interface including a gauge bar, a progress bar, and a target value in combination with a weighing device may be used to measure and dose elements. In one embodiment the method ensures precise and fast dosing when weighing an element. In various embodiments, configuring a mapping function allows numerous combinations of a speed of progress of a progress bar when weighing an element. A progress bar, in combination with acceptable weight values, such as a target value, a primary minimum value, and a primary maximum value allows for color representation when a progress bar enters and exits acceptable weight values. Configuring a set or a plurality set of secondary minimum and maximum values is possible for additional acceptable weight values.

  • Pub Date: 2010/15/12
  • Number: 09121750
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for logging a scheduler

A computer system including instructions recorded on a non-transitory computer-readable storage medium and readable by at least one processor, the system including a logging module, a receiving module, and a transmission module. The logging module is configured to log information associated with a scheduler. The receiving module is configured to receive a request for information associated with the scheduler. The transmission module is configured to transmit information associated with the scheduler.

  • Pub Date: 2010/15/12
  • Number: 08965966
  • Owner: SAP SE
  • Location: Walldorf, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for estimating order position

A system and method for providing order queue position information are disclosed. In this application, market updates are received for a tradable object from at least one exchange. To the extent that the market updates do not include enough details to compute the queue position of a trader's working orders, estimation may be used. As a result, an order queue is generated to approximate a trader's order position in an exchange price order queue. An interface may be used to display the generated order queue estimation to the trader which provides valuable trading information.

  • Pub Date: 2010/15/12
  • Number: 08126801
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Sending application input commands over a network

Disclosed are various embodiments that facilitate sending input commands to an application over a network that may have variable latency characteristics. Multiple input commands are obtained from a client over the network. It is determined whether a delay before one of the input commands is necessary to preserve the meaning of the input command. The input command is provided to an application executed in a hosted environment in one or more computing devices after the delay when the delay is determined to be necessary.

  • Pub Date: 2010/15/12
  • Number: 08806054
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Selective partial cloning of virtual machines in a virtual computing environment

A virtual machine belonging to a virtual computer environment is selectively cloned by retrieving information about applications available in a parent virtual machine to be cloned, and for each application, further retrieving information about a virtual disk associated with the application. Cloning is further performed by identifying a target environment on which the clone is to run, retrieving information about the target environment and calculating a clone of the virtual machine based at least in part, upon retrieved information. Calculating a clone further includes introspecting the virtual disks of the virtual machine. Cloning a virtual machine further comprises generating the clone to the target environment, based on the calculated clone.

  • Pub Date: 2010/15/12
  • Number: 08726275
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Segmented fingerprint datastore and scaling a fingerprint datastore in de-duplication environments

A storage server is coupled to a storage device that stores data blocks, and generates a fingerprint for each data block stored on the storage device. The storage server creates a master datastore and a plurality of datastore segments. The master datastore comprises an entry for each data block that is written to the storage device and a datastore segment comprises an entry for a new data block or a modified data block that is subsequently written to the storage device. The storage server merges the entries in the datastore segments with the entries in the master datastore in memory to free duplicate data blocks in the storage device. The storage server overwrites the master datastore with the entries in the plurality of datastore segments and the entries in the master datastore to create an updated master datastore in response to detecting that the number of datastore segments meets a threshold.

  • Pub Date: 2010/15/12
  • Number: 08904120
  • Owner: NetApp Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to migrate border gateway protocol sessions between routers

Methods and apparatus to migrate border gateway protocol sessions between routers are disclosed. An example method to migrate a border gateway protocol session from a first router to a second router disclosed herein comprises exporting a connection state to migrate a transport control protocol connection supporting the border gateway protocol session with a session endpoint from the first router to the second router, and after the transport control protocol connection has been migrated to the second router, announcing, from the first router to the second router, routes contained in an exported routing information base associated with the session endpoint, the second router to process the routes to migrate handling of the border gateway protocol session with the session endpoint to the second router.

  • Pub Date: 2010/15/12
  • Number: 08806032
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for injecting function calls into a virtual machine

A method and apparatus for injecting function calls into a virtual machine whereby a Function Call Injection (FCI) process is employed, through which a Secure Virtual Machine (SVM) is used to trigger desired function call invocations inside a Guest Virtual Machine (GVM) by externally manipulating the GVMs memory and CPU register contents using a security API. Once the triggered function is executed, control is then returned at the originating SVM invocation point. Therefore, the GVM state is manipulated to externally inject function calls, making it possible to create control appliances which do not require an in-GVM agent.

  • Pub Date: 2010/15/12
  • Number: 09003402
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for characterizing infrastructure of a cellular network

A method and apparatus for characterizing an infrastructure of a wireless network are disclosed. For example, the method obtains a first data set from a server log, and obtains a second data set from a plurality of wireless endpoint device. The method characterizes a parameter of the infrastructure of the wireless network using the first data set and the second data set and optimizes a network resource of the wireless network based on the parameter.

  • Pub Date: 2010/15/12
  • Number: 08948048
  • Owner: University of Michigan
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


Fingerprints datastore and stale fingerprint removal in de-duplication environments

A storage server is coupled to a storage device that stores blocks of data, and generates a fingerprint for each data block stored on the storage device. The storage server creates a fingerprints datastore that is divided into a primary datastore and a secondary datastore. The primary datastore comprises a single entry for each unique fingerprint and the secondary datastore comprises an entry having an identical fingerprint as an entry in the primary datastore. The storage server merges entries in a changelog with the entries in the primary datastore to identify duplicate data blocks in the storage device and frees the identified duplicate data blocks in the storage device. The storage server stores the entries that correspond to the freed data blocks to a third datastore and overwrites the primary datastore with the entries from the merged data that correspond to the unique fingerprints to create an updated primary datastore.

  • Pub Date: 2010/15/12
  • Number: 08898119
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Displaying subtitles

Example methods, apparatus and articles of manufacture to display subtitles are disclosed. A disclosed example method includes selecting a test script that corresponds to an application, and superimposing a subtitle bar including a test instruction from the test script over a portion of a display of the application within a user interface so that the subtitle bar reduces interference with viewing a region of interest of the display, wherein the test instruction provides an action a user is to perform to test the application.

  • Pub Date: 2010/15/12
  • Number: 08549482
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Consumer behaviors at lender level

The present disclosure generally relates to financial data processing, and in particular it relates to lender credit scoring, lender profiling, lender behavior analysis and modeling. More specifically, it relates to rating lenders based on data derived from their respective consumers. Also, the present disclosure relates to rating consumer lenders based on the predicted spend capacity of their consumers.

  • Pub Date: 2010/15/12
  • Number: 08010449
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Comment plug-in for third party system

In one embodiment, a user comment system receives a user comment associated with a content object, assigns one or more privacy settings to the user comment, and stores the user comment in a data store in association with an identifier unique to the content object.

  • Pub Date: 2010/15/12
  • Number: 09311678
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Comment ordering system

In one embodiment, a social networking system receives a request by a first user for user comments associated with a content object, accesses a data store of user comments to retrieve a set of user comments associated with the content object, orders the set of user comments based on a time value associated with each comment of the set of user comment, adjusts the order of user comments based on social graph information of the first user, and presents the adjusted list of user comments to the first user.

  • Pub Date: 2010/15/12
  • Number: 09183307
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Client device connectivity with integrated business rules

Applications executing on mobile client devices may access remote resources via network connections. Operational capabilities and financial costs of these connections may differ. Developers, network administrators, and other parties may wish to moderate usage of various available conditions to conform to business rules. Connectivity information including one or more network grants are integrated into an application received from a developer at ingestion by an application management server, which accesses those business rules. The client devices may coordinate with a proxy server to provide additional controls. Networking public interfaces provide the developer with a simplified pathway for development of applications which use network connections, particularly on mobile devices.

  • Pub Date: 2010/15/12
  • Number: 09197617
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Client device connectivity with integrated business rules and multiple network types

Applications executing on mobile client devices may access remote resources via network connections. Operational capabilities and financial costs of these connections may differ. Developers, network administrators, and other parties may wish to moderate usage of various available conditions to conform to business rules. Connectivity information including one or more network grants are integrated into an application received from a developer at ingestion by an application management server, which accesses those business rules. The client devices may coordinate with a proxy server to provide additional controls. Networking public interfaces provide the developer with a simplified pathway for development of applications which use network connections, particularly on mobile devices.

  • Pub Date: 2010/15/12
  • Number: 08806041
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Applying activity actions to frequent activities

Activities of users of a service often involve one or more resources, such as uploading or downloading files in a file system of an FTP server. The activities of the users may be tracked and recorded in an activity log in order to identify frequently performed activities involving particular resources, and for such frequently performed activities, one or more activity actions may be performed. For example, malicious users may upload or utilize an equivalent set of assets stored in several accounts. The frequency of these undesirable activities may be identified, and an activity action may be automatically applied to the users (e.g., banning accounts), resources (e.g., deleting assets), and/or activities (e.g., blocking access to the resources). Conversely, desirable activities involving particular resources may be similarly detected, and the activity action applied to such desirable activities may involve reporting the desirable activity to an administrator of the service.

  • Pub Date: 2010/15/12
  • Number: 09336380
  • Owner: Microsoft Technology Licensing LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


API supporting server and key based networking

An application programming interface (API) supporting server and key based networking is described. In an embodiment, the API receives either a key or a server address from a service running on a server in a direct-connect topology and returns data which identifies suitable next hops for transmission of a packet of data which has a destination of the received server address or of a server address which is encoded within the received key. In another embodiment, the key also encodes information specifying alternative server addresses for use in the event that the original server is unreachable. This information may also be used to define servers for replication of the key. A further embodiment describes a method of queuing packets for transmission against multiple links, where the packet is transmitted on the first available link and at this time is removed from the queues for the other links.

  • Pub Date: 2010/15/12
  • Number: 09015345
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


3D social platform for sharing videos and webpages

A 3D social media platform is provided that allows users to share and experience a realistic social viewing experience with members of their social network. More specifically, a user shares a virtual 3D social venue with one or more members within their social network (e.g., Facebook friends) for the purpose of experiencing the content (e.g., movie, television, video game) as if each of the members were physically together in the venue. The user selects 2D media content, such as a web page, from an external and independent source (such as a web browser) to instantiate onto a virtual screen, window, or other viewing surface inside the virtual 3D social venue. The instantiated media content is displayed to the user and any invited friends within the context of the virtual three-dimensional space.

  • Pub Date: 2010/15/12
  • Number: 08572177
  • Owner: Xmobb, Inc.
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


User interface based malware detection

Malware with fake or misleading anti-malware user interfaces (UIs) are detected. Processes running on a computer system are monitored and their window creation events are detected. The structures of the created windows are retrieved to detect presence of UI features that are commonly presented in known fake or misleading anti-malware UIs (“fakeAVUIs”). If a window includes a UI feature commonly presented in known fakeAVUIs, that window is determined suspicious and additional tests are applied to determine the validity of information in the window. If the information in the window is determined invalid, then the process that created the window is determined to be malware and a remediating action is applied to the process.

  • Pub Date: 2010/14/12
  • Number: 08776227
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for secure recording in a customer center environment

Systems and methods for secure recording in a customer center environment are provided. The system receives data related to a communication at a media distribution device. A key is provided by a key server to the media distribution device to encrypt the received data. In addition, an identifier may be associated with the received data. The key and the identifier are stored in a database associated with the key server. The encrypted data is recorded the a recorder, where it is accessible to authorized users within the customer center. Upon request, the key is provided to the authorized user to decrypt the encrypted data for play back. The customer center environment may include a user interface for viewing customer contacts. The contact may be organized into folders and annotations associated with the customer contacts may be received.

  • Pub Date: 2010/14/12
  • Number: 08724778
  • Owner: Verint Americas Inc.
  • Location: Alpharetta, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining a reputation of at least one telephone number associated with an unclassified source

A computer-implemented method to determine a reputation of at least one telephone number associated with an unclassified source. A first device is monitored for an incoming contact originating from at least one unclassified source. When an incoming contact is detected, at least one attribute of the incoming contact is computed at the first device. The at least one attribute of the incoming contact is transmitted to a second device. A representation of the telephone number associated with the at least one unclassified source of the incoming contact is transmitted to the second device. The reputation of the telephone number is computed at the second device using the at least one attribute.

  • Pub Date: 2010/14/12
  • Number: 09253010
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for flexible path handling

A method for a computer system includes receiving a mapping schema between a plurality of asset-types within an asset-type hierarchy and a plurality of paths within an on-disk storage structure, receiving an asset-type definition list from a user, wherein the asset-type definition list comprises an asset-type from the plurality of asset types, and determining at least one path from the plurality of paths for providing access to assets of the asset-type in response to the mapping schema and the asset-type definition list.

  • Pub Date: 2010/14/12
  • Number: 09286297
  • Owner: Pixar
  • Location: Emeryville, US
  • Details: Visit USPTO

Visit USPTO Page


Personalized content delivery system

A content delivery system for generating personalized content for a user. The system maintains an interest graph that shows the user's current attachment to one or more topics. When a user performs an action, a topic is determined for the action and the user's interest graph is modified based on the action. The system also receives content and analyzes the language of the content to determine a topic of the content. A similarity between the user's interests and the content is determined. The content is also analyzed to determine the popularity of the content. The user's interest level and the popularity of the content are then used to provide the user with a personalized content, such as a content recommendation or enhanced content.

  • Pub Date: 2010/14/12
  • Number: 08615442
  • Owner: Project Rover, Inc.
  • Location: Santa Monica, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and media utilizing ranking techniques in machine learning

Methods, systems and media are taught utilizing ranking techniques in machine learning to learn a ranking function. Specifically, ranking algorithms are applied to learn a ranking function that advantageously minimizes ranking error as a function of targeted ranking order discrepancies between a predetermined first ranking of a training plurality of data elements and a second ranking of the training plurality of data elements by the ranking function. The ranking algorithms taught may be applied to ranking representations of chemical structures and may be particularly advantageous in the field of drug discovery, e.g., for prioritizing chemical structures for drug screenings.

  • Pub Date: 2010/14/12
  • Number: 08862520
  • Owner: Massachusetts Institute of Technology
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Locality based quorums

Disclosed are various embodiments for distributing data items within a plurality of nodes. A data item update request is replicated from a master node in a plurality of nodes to a plurality of slave nodes within the plurality of nodes. The replicated data item update request is determined to be locality-based durable. Responsive to the determination that the replicated data item update request is locality-based durable, the data item update request is confirmed to a client, wherein the client had originated the data item update request. Upon failover of the master node to another node within the plurality of nodes, a fault-tolerant failover quorum ensures that all previously confirmed updates are found and recognized by the new master node.

  • Pub Date: 2010/14/12
  • Number: 08473775
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Load balancing between general purpose processors and graphics processors

Disclosed are various embodiments for facilitating load balancing between central processing units (CPUs) and graphics processing units (GPUs). A request is obtained to execute a first application in one or more computing devices. In one embodiment, a second application associated with the first application is assigned to be executed in GPUs of the one or more computing devices instead of CPUs of the one or more computing devices when a resource usage profile associated with the first application indicates that the first application is relatively more CPU intensive than GPU intensive. Conversely, the second application is assigned to be executed in the CPUs instead of the GPUs when the resource usage profile indicates that the first application is relatively more GPU intensive than CPU intensive.

  • Pub Date: 2010/14/12
  • Number: 08830245
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Linking of a plurality of items of a user interface to display new information inferred from the plurality of items that are linked

A first item and a second item that are displayed in a user interface are selected via a computational device. A determination is made as to whether a linkage between the first item and the second item is a valid linkage, wherein the valid linkage indicates that inferences that relate the first item to the second item may be drawn by interpreting properties of the first item and properties of the second item. In response to determining that the linkage between the first item and the second item is a valid linkage, the properties of the first item and the properties of the second item are interpreted to infer new properties that relate the properties of the first item to the properties of the second item.

  • Pub Date: 2010/14/12
  • Number: 09256666
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated circuit and system for installing computer code thereon

An integrated circuit is provided, which is configured for authentication itself and technical information concerning the integrated circuit or its installed software to an external computing device . The integrated circuit comprises a signer for producing a signature over the information and a challenge using a cryptographic signing key, and a communication module for providing the information and the signature to the computing device . In response to receiving the information and the authentication, the computing device may install new application code on the integrated circuit. After the installation, the integrated circuit may authenticate information concerning the new application code to other computing devices. The integrated circuit is advantageously a multiple application smart card, since it allows application providers to obtain trust in the multiple application smart card without having a relationship with its manufacturer.

  • Pub Date: 2010/14/12
  • Number: 08751811
  • Owner: NXP B.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Electronic messaging technology

Techniques are described for capturing text (e.g., SMS) messages and multimedia (e.g. MMS) messages along with messages and data sent with other communication modalities. The captured information may be used for performing social networking-related, data processing and auditing operations in real-time.

  • Pub Date: 2010/14/12
  • Number: 08953571
  • Owner: AlwaysOn, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Data deduplication in a virtualization environment

Techniques are described herein that are capable of optimizing (i.e., deduplicating) data in a virtualization environment. For example, optimization designations (a.k.a. deduplication designations) may be assigned to respective regions of a virtualized storage file. A virtualized storage file is a file that is configured to be mounted as a disk or a volume to provide a file system interface for accessing hosted files. In accordance with this example, each optimization designation indicates an extent to which the respective region is to be optimized (i.e., deduplicated). In another example, a virtualized storage file is mounted to provide a virtual disk that includes hosted files. In accordance with this example, optimization designations are assigned to the respective hosted files. In further accordance with this example, each optimization designation indicates an extent to which the respective hosted file is to be optimized.

  • Pub Date: 2010/14/12
  • Number: 08959293
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Content rights management for document contents and systems, structures, and methods therefor

A document comprises a body having at least one defined portion therein, each defined portion being represented in the body of the document as a body object, each of the document and each body object therein being rights-managed as protected content based on license terms specified in a digital license. A recipient of the document can render the protected content of each of the document and each body object therein by acquiring the digital license and satisfying the license terms set forth in the digital license.

  • Pub Date: 2010/14/12
  • Number: 08458273
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Compounds for binding to ER alpha/beta and GPR30, methods of treating disease states and conditions mediated through these receptors and identification thereof

The current invention is in the field of molecular biology/pharmacology and provides compounds which modulate the effects of GPR30 as well as the classical estrogen receptors alpha and beta (ERα and ERβ). These compounds may function as agonists and/or antagonists of one or more of the disclosed estrogen receptors. Diseases which are mediated through one or more of these receptors include cancer (particularly breast, reproductive and other hormone-dependent cancers, leukemia, colon cancer, prostate cancer), reproductive (genito-urological) including endometreitis, prostatitis, polycystic ovarian syndrome, bladder control, hormone-related disorders, hearing disorders, cardiovascular conditions including hot flashes and profuse sweating, hypertension, stroke, obesity, osteoporosis, hematologic diseases, vascular diseases or conditions such as venous thrombosis, atherosclerosis, among numerous others and disorders of the central and peripheral nervous system, including depression, insomnia, anxiety, multiple sclerosis, neuropathy, neurodegenerative disoders such as Parkinson's disease and Alzheimer's disease, as well as inflammatory bowel disease, Crohn's disease, coeliac (celiac) disease and related disorders of the intestine. A contraceptive indication to prevent or reduce the likelihood of pregnancy after intercourse is a further aspect of the present invention.

  • Pub Date: 2010/14/12
  • Number: 08487100
  • Owner: STC.UNM
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Communication interface for non-communication applications

Software applications are enabled with multimodal communication capabilities and features associated with enhanced communication systems through a communication application programming interface (API). Applications for document processing, scheduling, audio/video data processing, and/or business operations can exchange communication system data and parameters bi-directionally with components of an enhanced communication system, initiate communication sessions through the application's user interface, and preserve post-communication updates.

  • Pub Date: 2010/14/12
  • Number: 08490119
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Classifying the position of a wireless device

Aspects describe using mobile device telemetry data with location reports from a small fraction of reporting devices to pre-compute a set of categorizing formulas that can quickly assign devices of unknown latitude, longitude, and/or altitude to specific values of latitude, longitude, and/or altitude. The described aspects perform a large percentage of complicated calculations in advance of a particular device of unknown location presenting itself on the radio network. Thus, the categorizing formulas can be applied to categorize the device into a particular range of latitude, longitude, and/or altitude with minimal delays. Various aspects relate to enabling an efficient and highly scalable implementation of mobile device advertising, social networking, and other applications that may reply in rapid, real time delivery of “WITHIN” or NOT WITHIN a “fenced-in” region or geography or shape of space.

  • Pub Date: 2010/14/12
  • Number: 08509806
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Backing up data objects identified by search program and corresponding to search query

A backup program running on a computing device receives a search query. The backup program transmits the search query to a search program. The backup program receives search results corresponding to the search query from the search program. The search results include a list of data objects stored on a storage device and that satisfy the search query. The backup program backs up one or more selected data objects of the list of data objects. The backup program can periodically and automatically without user interaction retransmit the search query to the search program, and receive updated search results corresponding to the search query from the search program. The updated search results include an updated list of data objects stored on the storage device that satisfy the search query. The backup program can then back up the data objects within the updated list of data objects.

  • Pub Date: 2010/14/12
  • Number: 08447735
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Authentication of service requests initiated from a social networking site

Described are computer-based methods and apparatuses, including computer program products, for authenticating user service requests from a social networking site. Data representing a selected message and an originator of the selected message is stored. Data representing a reply to the originator of the selected message is transmitted for posting at the social networking server, the reply including data that causes transmission of a service request to the server when actuated. Data representing the service request and a sender of the service request is received. Data representing a user profile of the sender of the service request is retrieved from the social networking server. One or more attributes of the user profile of the sender are compared against one or more attributes of the stored data representing the originator of the selected message in order to verify the one or more attributes of the user profile.

  • Pub Date: 2010/14/12
  • Number: 08918465
  • Owner: LivePerson, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Allocating a control channel for carrier aggregation

Methods for allocating a physical downlink control channel (PDCCH) to reduce a number of PDCCH candidates in a search space for carrier aggregation on a user equipment (UE) are disclosed. The method comprises the step of selecting a control channel element (CCE) aggregation level for a PDCCH allocation for each of a plurality of user equipments (UEs) at an evolved NodeB (eNB). The operation of identifying a transmission mode for each of a plurality of component carriers (CCs) associated with the PDCCH at the eNB follows. The next operation of the method is assigning each CC's downlink control information (DCI) into CCEs in a PDCCH search space in the PDCCH starting at a CCE location based on the CC's transmission mode and the CCE aggregation level for the UE receiving the CC.

  • Pub Date: 2010/14/12
  • Number: 08626218
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for service isolation

The present invention is directed towards systems and methods of streaming an application from a remote location to a local machine system, and using local machine system resources in executing that application. In various embodiments, services needed by a streamed application may be started with high local system privileges in their own isolation environment. These service may be started, stopped, and otherwise managed by a Service Control Manager. In order for an application to both access services that operate at high local system privileges and the network so that it can access remotely stored, streaming, information; a streaming application may rely on privileges of the user when accessing network information rather than the higher privileges of the services running in isolation.

  • Pub Date: 2010/13/12
  • Number: 09055080
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing one or more pages from an electronic document

Systems and methods for providing one or more pages of an electronic document are provided herein. Some of the methods may include evaluating one or more pages obtained from an electronic document to determine at least one of a pagination and an order for each of the one or more pages, reducing the size of each of the one or more pages, while utilizing at least a portion of the pagination of the each of the one or more pages, associating the one or more pages together according to the determined order, and providing at least one of the one or more pages to a network-enabled computing system upon receiving a request to obtain at least one page of the electronic document from the network-enabled computing system.

  • Pub Date: 2010/13/12
  • Number: 08924251
  • Owner: VLSI Research Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Reverse engineering user interface mockups from working software

The subject disclosure relates to capturing window definitions of an executing user interface application and/or website and generating an editable model representation. A starter storyboard or screens can be generated quickly by recording a manipulation of an existing application or website. States associated with a multitude of user interface control hierarchies of a target application are captured, stored in a generic user interface model, and used for generation of mockups, code, and so forth. In an aspect, an indication is received that an application or website is be captured. Thereafter, the state of the website or application window and subsequent windows are observed and captured. For each of the subsequent windows traversed in a live control hierarchy, basic information about each item is captured. The information gathered for a given window and its control hierarchy can be serialized into a simple XML representation.

  • Pub Date: 2010/13/12
  • Number: 09262158
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Recoil-actuated gun scavenger

A recoil-actuated gun scavenger for a gun having a bore, a breech, a recoiling mass, and a non-recoiling mass. The scavenger may include a pneumatic cylinder and a piston translatable therein. A rod may be fixed to the piston. The cylinder and rod may be fixed to respective recoiling and non-recoiling masses, or vice versa. The cylinder may include intake and exhaust ports with check valves, on both sides of the piston. The exhaust ports may communicate with an accumulator. The accumulator may discharge compressed air to jets located at the open breech end of the gun.

  • Pub Date: 2010/13/12
  • Number: 08161863
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Programmatic modification of a message flow during runtime

A message flow within a message broker can be identified. The message flow can include nodes and connections. The nodes can include a reflective node, a pre-defined node and a user-defined node. The message broker can be an intermediary computer program code able to translate a message from a first formal messaging protocol to a second formal messaging protocol. The code can be stored within a computer readable medium. The reflective node within the message flow can be selected. The reflective node can be associated with an external resource which can be an executable code. The external resource can be executed which can result in the modifying of the structure of the message flow. The modification can occur during runtime. The modification can include node and/or connection adding, altering, and deleting.

  • Pub Date: 2010/13/12
  • Number: 08549539
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Presenting content items shared within social networks

Within a social network, a user may establish a set of contacts who share with the user various content items and comments related thereto. However, these content items are often hosted by a content source outside of the social network, and the user may have to transition to the content source to view the content item, and then transition back to the social network to submit a comment. Instead, a device may monitor the social network to record shared content items. When the user requests a presentation of the content source, the content items hosted by the content source that have been shared with the user may be included in the presentation. The presentation of the content source may also accept comments from the user regarding a content item, and send the comments to the social network where the content item was shared with the user.

  • Pub Date: 2010/13/12
  • Number: 09153000
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method of converting bomblet to hand grenade

A method of converting a bomblet into a hand-thrown grenade may include providing a bomblet having a fuze, a shaped-charge liner, a casing, and explosive material disposed between the shaped-charge liner and the casing. The fuze may be removed from the bomblet. A housing may be attached a fuze end of the bomblet. The housing may adjoin the casing. A cavity that abuts and is exterior to the shaped-charge liner may be filled with a filler material, such as pellets. A hand-grenade fuze may be attached to the fuze end of the bomblet.

  • Pub Date: 2010/13/12
  • Number: 08272328
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for forming an actionable communication resource

An actionable communication resource forming function performs a method for forming an actionable communication resource in a communication system. The method includes receiving, from a resource management system, a plurality of resource identifiers that identify a plurality of resources, wherein each resource is associated with a communication device addressable by a communication system using a communication device identifier; for each resource identifier, determining the communication device identifier for the associated communication device; for each communication device identifier, identifying a communication group to which the corresponding communication device is affiliated, and using the identified communication groups to determine a set of communication groups, wherein each communication group in the set is addressable by the communication system, wherein an actionable communication resource is formed from the set of communication groups to facilitate communications with the communication devices over the communication system using the addressable communication groups.

  • Pub Date: 2010/13/12
  • Number: 08611910
  • Owner: Motorola Solutions, Inc.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Lifecycle stable user interface adaptations

Various embodiments of systems and methods for lifecycle stable user interface adaptations are described herein. All adaptations done by partners/key users/end users to a user interface of a computer software application are preserved during the lifecycle of the application. In one aspect, the adaptations are persisted as additional metadata used for the generation of the user interface. In another aspect, the lifecycle stability is achieved by attaching the adaptations to semantically coherent set of fields placed in the UI that reappear in future releases of the computer software application.

  • Pub Date: 2010/13/12
  • Number: 08555249
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Information processing apparatus and method for displaying status information of a job present in a print queue

An information processing apparatus provided with a display unit includes a status information display unit configured to display status information of a job present in a print queue via the display unit, an acquisition unit configured to acquire setting information of the job present in the print queue, and a job determination unit configured to determine, based on the setting information acquired by the acquisition unit, whether the job is a job to be output to a printing apparatus. The status information display unit displays, without displaying status information of a job determined not to be output to the printing apparatus by the job determination unit, status information of a job determined to be output to the printing apparatus by the job determination unit via the display unit.

  • Pub Date: 2010/13/12
  • Number: 08922810
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Detecting fraudulent event listings

In one embodiment, a method includes accessing event information and payment information associated with an event listing on an event management system, and calculating a fraud risk score for the event listing based at least in part on the event information and payment information.

  • Pub Date: 2010/13/12
  • Number: 08666829
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration of custom controls in data-driven environments

The subject disclosure relates to systems and methods for providing custom controls configuration. In one embodiment, a system comprises a custom controls component configured to receive view information associated with a default view of controls, and receive customized configuration information indicative of a customization of at least one aspect of the controls. The default view of controls is based on data and default configuration information, and the data and the default configuration information are represented via a data-driven programming language. The custom control component is also configured to generate a customized view of the controls based, at least, on the default view of the controls and the customized configuration information. The configuration information comprises metadata, and the customized view of the controls includes a modified view, help text, or a description of a field associated with the controls.

  • Pub Date: 2010/13/12
  • Number: 08887078
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


3D gaze tracker

An embodiment of the invention provides a gaze tracker for determining a gaze vector for a person, which comprises a 3D camera that and a picture camera that image the person and a controller that processes images acquired by the cameras to determine a gaze direction and origin for the gaze vector.

  • Pub Date: 2010/13/12
  • Number: 08408706
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-CCC current source models and static timing analysis methods for integrated circuit designs

In one embodiment of the invention, a multi-CCC current source model is disclosed to perform statistical timing analysis of an integrated circuit design. The multi-CCC current source model includes a voltage waveform transfer function, a voltage dependent current source, and an output capacitor. The voltage waveform transfer function receives an input voltage waveform and transforms it into an intermediate voltage waveform. The voltage dependent current source generates an output current in response to the intermediate voltage waveform. The output capacitor is coupled in parallel to the voltage dependent current source to generate an output voltage waveform for computation of a timing delay.

  • Pub Date: 2010/12/12
  • Number: 08533644
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless controller device

A remote wireless device is provided that operates a user interface specific to a particular target application or device. The wireless device receives information regarding the status or operation of the target's application, and uses that information to determine what information and controls to present to the remote user. The remote user views information regarding the target application, and makes desired control selections using the available controls. The wireless device generates a message according to the control selections, and transmits the message to the target device. The target device acts responsive to the control message, and updated operational information may be sent to the remote wireless device.

  • Pub Date: 2010/11/12
  • Number: 08019329
  • Owner: TOR Anumana
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for facilitating a remote desktop session utilizing long polling

Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling.

  • Pub Date: 2010/11/12
  • Number: 08504654
  • Owner: Wyse Technology Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for a remote desktop session utilizing a HTTP handler and a remote desktop client common interface

Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling.

  • Pub Date: 2010/11/12
  • Number: 08949463
  • Owner: Wyse Technology L.L.C.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Web based desktop environment

A web based desktop environment is disclosed. The desktop environment comprises a work area configured to display application windows in a web browser operating on a computer server. A resident application bar is displayed adjacent the work area and configured to display only icons for resident desktop applications. A power bar resident desktop application is configured to launch web applications to be displayed in the work area. A task board operating in the power bar resident desktop application comprises a vertically resizable two dimensional window located at a selected edge of the work area. The task board is configured to display a web application icon for each web application launched in the power bar resident desktop application.

  • Pub Date: 2010/10/12
  • Number: 08745505
  • Owner: Mitel Networks Corporation
  • Location: Ottawa, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine morphing for heterogeneous migration environments

Virtual machines may migrate between heterogeneous sets of implementation resources in a manner that allows the virtual machines to efficiently and effectively adapt to new implementation resources. Furthermore, virtual machines may change types during migration without terminating the virtual machines. Migration templates may be established to manage migration of sets of virtual machines between sets of implementation resources and/or virtual machine types. Migration templates may be established based at least in part on information provided by migration agents added to the virtual machines under consideration for migration. The migration agents may detect and augment relevant virtual machine capabilities, as well as trigger reconfiguration of virtual machine components in accordance with migration templates.

  • Pub Date: 2010/10/12
  • Number: 09329886
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for providing improved perpetrator imaging

Techniques for providing improved perpetrator imaging are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing improved perpetrator imaging comprising identifying a client device as at least one of lost and stolen, detecting, on the client device, a difference in first pixel data associated with a first frame of a visual image and second pixel data associated with a second frame of the visual image, and capturing, on the client device, a plurality of photographs in response to detecting the difference.

  • Pub Date: 2010/10/12
  • Number: 08730334
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for automated performance testing in a dynamic production environment

The present invention relates to a system and method for automated performance testing in a dynamic production environment. More particularly the present invention relates to an automated system that enables the determination of whether a software application can meet the scalability and performance requirements in a real time use environment, wherein the performance requirement test comprises test for workload, reliability and resource usage. The system of the present invention provides an automated system for performing testing method that can convert a static environment i.e. fixed workload, one application state and one hardware representation into a dynamic one and predict accurate performance results for said constantly changing application. The system enables less effort, time and consequently money, and meets the performance scalability and requirements in real-time.

  • Pub Date: 2010/10/12
  • Number: 08756586
  • Owner: Tata Consultancy Services Limited
  • Location: Mumbai, IN
  • Details: Visit USPTO

Visit USPTO Page


SIMD array operable to process different respective packet protocols simultaneously while executing a single common instruction stream

A data processing architecture includes an input device that receives an incoming stream of data packets. A plurality of processing elements are operable to process data received from the input device. The input device is operable to distribute data packets in whole or in part to the processing elements in dependence upon the data processing bandwidth of the processing elements.

  • Pub Date: 2010/10/12
  • Number: 08127112
  • Owner: Rambus Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Segment identification and classification using horizon structure

One or more computer-readable media including computer-executable instructions to instruct a computing system to perform geometrical calculations using seismic horizon data; and define horizon segments based on the geometrical calculations where each defined horizon segment includes points and where each point has a corresponding probability of that point belonging to a defined horizon segment. Various other apparatuses, systems, methods, etc., are also disclosed.

  • Pub Date: 2010/10/12
  • Number: 09134443
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Rapid cloning of virtual machines

A request is received to clone a source data object. A source block range of the source data object in a source logical storage unit is determined. An empty data object in the destination logical storage unit is created. A destination block range of the empty data object in the destination logical storage unit is determined. The source block range is mapped to the destination block range. The source data object is cloned based on the mapping.

  • Pub Date: 2010/10/12
  • Number: 08688636
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Providing transparent failover in a file system

A connection state system is described herein that allows a client to resume a connection with a server or a different replacement server by remotely storing client state information in association with a resume key. The system provides a resume key filter operating at the server that facilitates the storing of volatile server state information. The state information can include information such as oplocks, leases granted to a client, and in-flight operations on a file handle. The resume key filter driver sits above the file system, which allows multiple file access protocols to use the filter. Upon a failover event, such as a server going down or losing connectivity to a client, the system can bring up another server or the same server and reestablish state for file handles held by various clients using the resume key filter.

  • Pub Date: 2010/10/12
  • Number: 08631277
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Partial fault tolerance in an embedded appliance

A system and method for partial fault tolerance in an embedded appliance is disclosed. The method comprises providing an embedded appliance having first and second digital storage locations, with the second location including a boot manager and a recovery operating system. An image instance of the operational section of the first digital storage location can be copied at a selected frequency to a selected location on the second digital storage location. Files in the image instance can be re-mapped to operate at the second digital storage location. The embedded appliance can be rebooted from the second digital storage location using the boot manager to load an operating system in the image instance to operate the embedded appliance from the image instance at the selected location on the second digital storage location when the operational section of the first digital storage location is inaccessible.

  • Pub Date: 2010/10/12
  • Number: 08990618
  • Owner: Mitel Networks Corporation
  • Location: Ottawa, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for remote desktop session redrawing via HTTP headers

Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling.

  • Pub Date: 2010/10/12
  • Number: 08966376
  • Owner: Wyse Technology L.L.C.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for conducting a remote desktop session via HTML that supports a 2D canvas and dynamic drawing

Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling.

  • Pub Date: 2010/10/12
  • Number: 08949726
  • Owner: Wyse Technology L.L.C.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for accessing and controlling a remote desktop of a remote machine in real time by a web browser at a client device via HTTP API utilizing a transcoding server

Examples of methods, systems, apparatus, and machine-readable storage media are provided to facilitate access and control of a remote desktop of a remote machine by a web browser at a client device through a transcoding server without installing proprietary plug-ins or protocols on the client device. A transcoding server may translate user input requests from a web browser into input calls compatible with a remote desktop display protocol. The transcoding server may receive remote desktop drawing commands from the remote machine and translate the remote desktop drawing commands into web browser drawing updates compatible with the web browser. A transcoding server may communicate with a web browser via HTTP and communicate with a remote machine via a remote desktop display protocol. A web browser may be an HTML5 browser. A transcoding server may send drawing coordinates to the web browser via an HTTP header and may use long polling.

  • Pub Date: 2010/10/12
  • Number: 08589800
  • Owner: Wyse Technology Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for network assisted discovery of femto cells

Method and system for a femto serving switch system. A request for registering a wireless device with a femto cell environment is received. The wireless device is registered based on the request with respect to the femto cell environment. Information related to the femto cell environment and one or more applications is then obtained, based on which a femto discovery notification (FDN) is generated. Such generated FDN is then delivered to the wireless device to assist the wireless device to operate in the femto cell environment.

  • Pub Date: 2010/10/12
  • Number: 08538399
  • Owner: Cellco Partnership
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for communicating between computing devices

A provider device includes structured data schemas, which may be JSON schemas, that correspond to APIs. A requestor device connects to the provider device and the provider device transmits available schemas. The requestor device receives the available schemas and transmits a communication request that asks for one or more of the available schemas. The provider device receives the communication request, formats information regarding APIs according to the specified schemas, and transmits the formatted information. The formatted information specifies how the requestor device can utilize the APIs. The requestor device generates one or more API commands by processing the formatted data and transmits the API commands to the provider device. The provider device then receives and performs the API commands. Subsequently, the provider device may transmit results to the requestor device, which may evaluate the results.

  • Pub Date: 2010/10/12
  • Number: 08887173
  • Owner: EchoStar Global B.V.
  • Location: Almelo, NL
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing highly-scalable network storage for well-gridded objects

An apparatus comprising a plurality of storage nodes comprising a plurality of corresponding storage disks and configured to store data in a distributed manner between the storage disks that achieves a Redundant Array of Independent Disks-0 (RAID0) like performance based on positioning information and without indexing the distributed data. A network component comprising a storage disk configured to maintain a plurality of physical files for different user data that are mapped to different volumes, wherein the volumes are distributed between the storage disk and a second storage disk based on a RAID0 like data distribution scheme without being indexed.

  • Pub Date: 2010/10/12
  • Number: 08996803
  • Owner: Futurewei Technologies, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Inventory verification using inventory snapshots

Various embodiments of systems and methods for inventory verification using inventory snapshots are described herein. In response to a first inventory posting in a current time period, a current open inventory snapshot is created with inventory information. If there is a previously open inventory snapshot that is created in a previous time period before the current period, then the previously open inventory snapshot is closed. To verify inventory for a past time period, a difference between an inventory snapshot that is valid for the past time period and an inventory snapshot that is valid for a time period previous to the past time period is compared with aggregated inventory change confirmations posted in the past time period. An error indicator is provided if there is a mismatch between the difference and the aggregated inventory change confirmations.

  • Pub Date: 2010/10/12
  • Number: 08756123
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Generating suggested search queries

A user supplied search query is received. Historical search queries are identified that are relevant and/or similar to the user supplied search query. The identified historical queries are then ranked according to various factors. Suggested search queries that are relevant to the user supplied query are identified.

  • Pub Date: 2010/10/12
  • Number: 09098569
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Enterprise biometric authentication system for a windows biometric framework

An enterprise biometric authentication system for use with a network of client computing devices, each client computing device executing Windows® 7 operating system with Windows® Biometric Framework components including a client biometric service and a client engine adapter, comprises a client engine wrapper and a server subsystem further including a server database, a server storage adapter, a server engine adapter, and a server component. The client engine wrapper resides on a client computing device and is operable to intercept requests from the client biometric service to the client engine adapter and to transmit the requests. The server storage adapter may store and retrieve biometric templates from the server database. The server engine adapter may generate and compare biometric templates. The server component may receive the requests from the client engine wrapper, forward the requests to the server engine adapter, and transmit results of the requests to the client engine wrapper.

  • Pub Date: 2010/10/12
  • Number: 08566904
  • Owner: Ceelox Patents, LLC
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic low power mode implementation for computing devices

The aspects enable a computing device or microprocessor to determine a low power mode that provides the most system power savings by placing selected resources in a low power mode while continuing to function reliably, depending upon the resources not in use, acceptable system latencies, dynamic operating conditions (e.g., temperature), expected idle time, and the unique electrical characteristics of the particular device. Aspects provide a mechanism for determining an optimal low power configuration made up of a set of low power modes for the various resources within the computing device by determining which low power modes are valid at the time the processor enters an idle state, ranking the valid low power modes by expected power savings given the current device conditions, determining which valid low power mode provides the greatest power savings while meeting the latency requirements, and selecting a particular low power mode for each resource to enter.

  • Pub Date: 2010/10/12
  • Number: 09235251
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomous mobile blogging

An autonomous blog engine is implemented to enable the autonomous generation of a blog. The autonomous blog engine receives media objects that are captured by an electronic device during a trip session. The autonomous blog engine determines a place of interest based on photographs selected from the media objects. The autonomous blog engine then generates textual content using one or more pre-stored knowledge items that include information on the place of interest. The autonomous blog engine further autonomously publishes a blog entry on the place of interest that includes one or more photographs from the photograph cluster and the textual content.

  • Pub Date: 2010/10/12
  • Number: 08655889
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Application-based backup-restore of electronic information

Systems and methods for storing and restoring backup data. One method includes receiving, while a current view of an application is displayed in a user interface, a first user input requesting a history view associated with the current view of the application. The history view is displayed in response to the first user input, the history view including at least a first visual representation of an earlier version of the current view of the application, the earlier version including a first element. A second user input is received while the history view is displayed. The second user input requesting that the current view of the application be modified according to the earlier version, at least with regard to the first element. The current view of the application is modified in response to the second user input according to the earlier version, at least with regard to the first element.

  • Pub Date: 2010/10/12
  • Number: 08504527
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Triaxial MEMS acceleration switch

A MEMS contact acceleration switch may include a first non-conductive layer; a second, conductive layer next to the first layer; and a third, conductive layer next to the second layer. The third layer may include a generally circular, annular mass and a center anchor post disposed interior of the annular mass. At least one spiral spring may connect the annular mass to the center anchor post. The third layer may include an x-y plane detection electrode separated from the annular mass by a gap. A fourth conductive layer may be disposed next to the third layer. A fifth layer may be disposed next to the fourth layer and may include a z-axis detection electrode. A second z-axis detection electrode may be disposed on the first layer. A plurality of conductive vias may extend through the first layer and be in electrical communication with the detection electrodes.

  • Pub Date: 2010/09/12
  • Number: 08237521
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for swap contracts management with a discount curve feedback loop

A method, system, apparatus and media are directed to managing trading of financial instruments with a clearinghouse as a counter-party to trades. A plurality of inputs that includes trade data for trades executed using the computer system is received. A discount curve for projected prices of a swap contract over time based on the received plurality of inputs is determined in real-time. A swap contract price is valued based on the determined discount curve. A margin requirement is determined for a user who wishes to trade or hold a position in the swap contract in the user's account based on the swap contract price. Data about a trade of the swap contract that is executed within the computer system is incorporated into the trade data used for determining the discount curve to provide a feedback loop into the real-time determination of the discount curve.

  • Pub Date: 2010/09/12
  • Number: 08190503
  • Owner: International Derivatives Clearing Group, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and device for providing a mobile application across smartphone platforms to enable consumer connectivity and control of media

A system, method and device for providing a mobile application across smart phone platforms to enable consumer connectivity and control of media. The viewing experience of the individual is improved by the added control and the advertising experience is enhanced by ensuring advertisements are relevant and actionable. A system for providing interactivity between a mobile device and content includes a content provider providing content for presentation on a display device and a mobile device configured with a media management module communicating to provide user interactivity with the content. The media management module enables individualized consumer media services for the mobile device.

  • Pub Date: 2010/09/12
  • Number: 09277292
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Personal trend management

A method and apparatus for personal trend management is provided. A request is received to associate a template with a user. The template includes instructions that define one or more data analysis strategies. Data associated with a data collection device that includes time stamped events associated with the user is received. Based on a strategy defined in the template and the data received from the data collection device, a result that conveys information relating to one or more trends involving the events is generated.

  • Pub Date: 2010/09/12
  • Number: 09459938
  • Owner: TrendMe, Inc.
  • Location: Chandler, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of making transportation fuel

A method for producing alkylated hydrocarbons is disclosed. Formation fluid is produced from a subsurface in situ heat treatment process. The formation fluid is separated to produce a liquid stream and a first gas stream. The first gas stream includes olefins. The liquid stream is fractionated to produce at least a second gas stream including hydrocarbons having a carbon number of at least 3. The first gas stream and the second gas stream are introduced into an alkylation unit to produce alkylated hydrocarbons. At least a portion of the olefins in the first gas stream enhance alkylation. The alkylated hydrocarbons may be blended with one or more components to produce transportation fuel.

  • Pub Date: 2010/09/12
  • Number: 08151880
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for displaying, on a first machine, data associated with a drive of a second machine, without mapping the drive

Methods and systems for displaying data associated with a client drive of a client computing device in a virtualized desktop executing on a remote computing device without explicitly mapping the client drive onto the remote computing device are described. A first client agent executing on a client computing device establishes a user session with a remote computing device. The first client agent transmits data identifying the client drive of the client computing device to a second client agent executing on the remote computing device. The second client agent receives data associated with the client drive and generates a shell link using the received data associated with the client drive in the context of the user session. The second client agent displays the data associated with the client drive of the client computing device in a virtualized desktop executing on the remote computing device.

  • Pub Date: 2010/09/12
  • Number: 08667050
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for managing application state in a network interface controller in a high performance computing system

Methods related to communication between and within nodes in a high performance computing system are presented. Processing time for message exchange between a processing unit and a network controller interface in a node is reduced. Resources required to manage application state in the network interface controller are minimized. In the network interface controller, multiple contexts are multiplexed into one physical Direct Memory Access engine. Virtual to physical address translation in the network interface controller is accelerated by using a plurality of independent caches, with each level of the page table hierarchy cached in an independent cache. A memory management scheme for data structures distributed between the processing unit and the network controller interface is provided. The state required to implement end-to-end reliability is reduced by limiting the transmit sequence number space to the currently in-flight messages.

  • Pub Date: 2010/09/12
  • Number: 09436651
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent message processing

Systems, methods, and devices for intelligent message processing are presented. With regard to a message, an intelligent message processor component (IMPC) can intelligently identify a desired file folder and archive the message in the folder in response to as little as one user interface (UI) control manipulation (e.g., click), when the intelligent message processor UI (IMPUI) is activated. When the IMPUI is activated, the IMPC automatically parses the message and identifies, or allows the user to identify, a keyword/phrase in the message. The IMPC automatically identifies the desired folder based on the identified keyword/phrase, and the user can click on the identified keyword/phrase to store the message in the identified file folder. The IMPUI also can comprise other UI controls that can, e.g., forward a message to another user, archive the message or related attachment in a remote storage destination, perform a customized message process, etc.

  • Pub Date: 2010/09/12
  • Number: 09251508
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Image search using text-based elements within the contents of images

A mobile device searches for electronic content. The mobile device captures an image from a rendered document, and searches for an electronic version of the image using characteristics of the image and using text within the contents of the image. The mobile device receives a result for the search based upon the image characteristics and the text within the context of the image.

  • Pub Date: 2010/09/12
  • Number: 09323784
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid spectral domain optical coherence tomography line scanning laser ophthalmoscope

An apparatus for imaging an eye includes a housing and a system of optical components disposed in the housing. The apparatus is capable of operating in a line scanning laser ophthalmoscope (LSLO) mode and an optical coherence tomography (OCT) mode. The system of optical components can include a first source to provide a first beam of light for the OCT mode and a second source to provide a second beam of light for the LSLO mode. In the OCT mode, a first optic is used that (i) scans, using a first surface of the first optic, the first beam of light along a retina of an eye in a first dimension, and (ii) descans, using the first surface, a first light returning from the eye in the first dimension to a detection system in the OCT mode. In the LSLO mode, the first optic is used where the second beam of light passes through a second surface of the first optic.

  • Pub Date: 2010/09/12
  • Number: 08033665
  • Owner: Physical Sciences, Inc.
  • Location: Andover, US
  • Details: Visit USPTO

Visit USPTO Page


Enhancing user experience by presenting past application usage

Disclosed are various embodiments for enhancing the experience of a user with an application by presenting past usage of the application. An application is executed in a hosted environment in one or more computing devices. Multiple input commands are obtained from a client, and the input commands are provided to the application. A video signal generated by the application is encoded into real-time content, which is sent to the client. Recorded content from a library of recorded content is sent to the client. Each recorded content presents a past usage of the application.

  • Pub Date: 2010/09/12
  • Number: 08622839
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Endpoint-based parallel data processing in a parallel active messaging interface of a parallel computer

Endpoint-based parallel data processing in a parallel active messaging interface (‘PAMI’) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes coupled for data communications through the PAMI, including establishing a data communications geometry, the geometry specifying, for tasks representing processes of execution of the parallel application, a set of endpoints that are used in collective operations of the PAMI including a plurality of endpoints for one of the tasks; receiving in endpoints of the geometry an instruction for a collective operation; and executing the instruction for a collective operation through the endpoints in dependence upon the geometry, including dividing data communications operations among the plurality of endpoints for one of the tasks.

  • Pub Date: 2010/09/12
  • Number: 08650262
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications in a parallel active messaging interface of a parallel computer

Data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the parallel computer including a plurality of compute nodes that execute a parallel application, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a data communications instruction, the instruction characterized by an instruction type, the instruction specifying a transmission of transfer data from the origin endpoint to a target endpoint and transmitting, in accordance with the instruction type, the transfer data from the origin endpoint to the target endpoint.

  • Pub Date: 2010/09/12
  • Number: 08572629
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically enabling wireless communication

A telecommunication device configured to determine at least one of an occurrence of a charging event associated with the telecommunication device or presence of the telecommunication device at or proximate to a specified location is described herein. Based at least in part on the determining, the telecommunication device automatically enables a wireless communication transceiver of the telecommunication device to communicate over a wireless data network.

  • Pub Date: 2010/09/12
  • Number: 08738094
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Adding scalability and fault tolerance to generic finite state machine frameworks for use in automated incident management of cloud computing infrastructures

A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution.

  • Pub Date: 2010/09/12
  • Number: 08560887
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual electronic paymaster method and system

A virtual electronic paymaster system and method for processing a paycheck utilizing a multi-function device. A virtual paymaster application can be configured in association with an EIP (Extensible Interface Platform) enabled multi-function device in order to render the paycheck with respect to an employee. An identification card having a bar code can be placed on a platen of the multi-function device in order to obtain authentication data with respect to the employee upon providing a PIN number via a user interface. The authentication data can be further provided to a remote application server via a network in order to retrieve the payment information with respect to the employee from a payroll database. The paycheck can be locally rendered based on the rendering instructions from the remote application server thereby enhancing the payroll processing within a business environment.

  • Pub Date: 2010/08/12
  • Number: 08738480
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for seamlessly bringing external services into instant messaging session

The invention provides a framework that allows a number of software application agents to be stacked on top of an instant messenger application. Each of the software application agents establishes a connection with a third-party Web service on the Internet or a local application in the user's computer. The user can share one or more third-party services or applications with other user(s) in an instant messaging session through the application agents.

  • Pub Date: 2010/08/12
  • Number: 08103734
  • Owner: AOL Inc.
  • Location: Dulles, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for real time delivery of context based content from the cloud to mobile devices

The information in the cloud is available in the form of software-as-a-service is accessible from laptops and personal computers. The system obtains information from multiple sources in the “cloud,” correlates the information, determines a subset of information based on context, and pushes the information to at least one mobile device. An engine extracts a context based subset of information and correlates the context based subset of information based on the same context or a different context. A data push engine makes the information available in real time to a user by pushing the information to the at least one mobile device like a smartphone, tablet, and/or navigation system.

  • Pub Date: 2010/08/12
  • Number: 08606923
  • Owner: Core Mobile Networks, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for associating a universal user identification and a domain specific user identification

There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system comprising an ID association server accessible by a plurality of secure domains over a network. The system also includes an ID associator application that when executed by ID association server is configured to receive a domain specific ID that associates the user to the secure domain, enter the domain specific ID in a domain transcendent ID record created for the user, generate a unique data associated with the domain transcendent ID record and identify a network location for submission of the unique data, send the unique data and the network location to the user, and associate the domain transcendent ID and the domain specific ID.

  • Pub Date: 2010/08/12
  • Number: 08769646
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and computer program products for providing information about a user during a physical activity

In at least one embodiment, a method for execution on a portable fitness device of providing information about a first user engaged in a physical activity with the portable fitness device includes determining user performance data while the first user is engaged in the physical activity and determining whether or not to transmit the user performance data to a remotely located server computer system via a wide-area wireless network while the first user is engaged in the physical activity, wherein the determination of whether or not to transmit the user performance data is based on an indication of whether or not a remotely located second user is currently monitoring the first user.

  • Pub Date: 2010/08/12
  • Number: 08068858
  • Owner: adidas AG
  • Location: Herzogenaurach, DE
  • Details: Visit USPTO

Visit USPTO Page


Game of chance systems and methods

In various embodiments, players may compete in a gaming context.

  • Pub Date: 2010/08/12
  • Number: 08932124
  • Owner: CFPH, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Fastener for strut channel

A self-contained fastener is provided for attaching to a structure having opposing edges that flank a cavity across a gap. The fastener includes a grip member, a clamp member and a latch member. The grip member has a knob and an inner annulus disposed thereon along an axis of symmetry. The knob has a central through-hole coaxial with the inner annulus. The inner annulus has an arc tab that radially protrudes therefrom. The clamp member includes a boss and an outer annulus disposed thereon. The boss has first and second dimensions perpendicular to the axis, the first dimension being shorter than the gap. The clamp member is flanked by opposing ledges along the second dimension. Each ledge is arranged to engage a respective edge of the structure. The inner annulus is coaxially insertable into the outer annulus. The latch member includes a stud and a flange. The stud is insertable at a proximal end into the inner annulus and the through-hole. The flange is disposed at a distal end of the stud and has a third dimension shorter than the gap. The flange and the block can be inserted into the cavity along the respective third and first dimensions through the gap. In response to clockwise turning, the knob rotates the tab within the angular notch until inhibited by the outer annulus, whereby the proximal end of the stud retracts into the through-hole, thereby engaging the fastener to the structure.

  • Pub Date: 2010/08/12
  • Number: 08465242
  • Owner: The United States of America as Represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods for predicting and preventing restenosis

The present invention relates to methods and devices for predicting restenosis, and for treating atherosclerosis to prevent or reduce the incidence of restenosis. Methods of predicting restenosis in a stenosed peripheral artery may include quantitative histology of the vessel. For example, a method of treating a stenosed artery (and particularly a peripheral artery) may include the steps of determining a level of hypercellularity and one or more of the lipid-richness and extent of inflammatory cell inclusion in the tissue. An index of restenosis based on the hypercellularity and lipid richness and/or extent of inflammatory cell inclusion in the tissue may be determined. Systems for treating or preventing restenosis may include one or more imaging modalities for imaging tissue regions and determining the level of hypercellularity and one or more of the degree of lipid-richness and the extent of inflammatory cell inclusion in the tissue region.

  • Pub Date: 2010/08/12
  • Number: 08548571
  • Owner: Avinger, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Device action service

A user may operate many devices, each of which may provide a set of actions, such as installing firmware or software or viewing the contents of the device. However, in order to perform these actions, the user may have to interact with each device using a different user interface, resulting in an inconsistent user experience. Instead, a device action service may allow a user to identify his or her devices, may identify the actions available for each device (e.g., by interacting with a device source of each device, such as a manufacturer); and upon the request of the user, may present a list of the user's devices and the actions available for each device. The actions may comprise hyperlinks to various portions of the website of the device source (e.g., a driver page and a service registration page), or controls invoking the requested action upon the device.

  • Pub Date: 2010/08/12
  • Number: 09037757
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Creation and termination of component scopes

The subject disclosure relates to creation and management of component scopes in a computing system. As described herein, an automated scope generation mechanism establishes application modules and their scopes and dependencies in an application-independent manner, hiding the complexity of scope management from the corresponding applications. As additionally described herein, automated scope generation and management techniques can be implemented in the context of a variety of application types, such as document editors and network request processors. Further, techniques are described herein by which a scope manager can implement static checking for scope validity based on scope hierarchy analysis and/or other factors.

  • Pub Date: 2010/08/12
  • Number: 08793708
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic origin determination for faster route request initiation and resulting system response time

When a user enters, initializes, or otherwise starts using a navigation function, such as a navigation function on a mobile phone or a stand-alone device, a current location is automatically estimated, prior to or in the absence of a GPS fix, for use as an origin in route determination. The estimation of current location is performed using a database of GPS fixes that are mapped to cell tower identifiers. For example, the database can include one or more fixes associated with each cell tower that the mobile device has used. Thus, when navigation on the device is begun, one or more cell towers to which the device can communicate are identified. If any has a GPS fix in the database, then a location derived from such GPS fix(es) can be used as an origin for navigation functions. Such navigation functions can include estimating a time of arrival at a destination, producing a route to the destination, and checking for traffic updates.

  • Pub Date: 2010/08/12
  • Number: 08532920
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Application module injection device, computing device including application module injection function, and recording medium for recording program for executing application module injection method

Provided are an application module injection device, a computing device including an application module injection function, and a recording medium that records a program for executing an application module injection method. The application module injection device includes a function registration unit configured to register, in an operating system (OS), a first callback function for receiving a notice about whether a process corresponding to a program whose execution is instructed by a user is created from the OS and a second callback function for receiving a notice about whether an image corresponding to the program whose execution is instructed by the user is driven, a process information acquisition unit configured to receive the notice about whether the process corresponding to the program whose execution is instructed by the user is created from the OS through the first callback function, a process determination unit configured to select a process generated so as to correspond to the program whose execution is instructed by the user as an application module injection target process when the program whose execution is instructed by the user, which is determined through the second callback function, corresponds to a predetermined type of program, a context change unit configured to change a first entry point included in a context of a thread corresponding to the application module injection target process into a second entry point of an injected application module, and an application module injection unit configured to inject the application module into the application module injection target process.

  • Pub Date: 2010/08/12
  • Number: 09098701
  • Owner: FASOO.COM CO., LTD
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Weapons system and targeting method

A weapon system comprises a first, second and third sensor and a range detecting means. The weapon system further comprises a weapons platform removably mounted to a moveable vehicle. The weapons platform includes a gun. The first sensor is mechanically attached to the gun for sensing an image. The second sensor senses a position of the gun, including at least an elevation and azimuth. The third sensor detects a rate and altitude of the moveable vehicle. The range detecting means detects a range of the gun to the target. The weapon system also comprises an image processor for processing the image from the first sensor, a display for displaying the processed image and a controller. The controller calculates an expected impact point for a round of fire based upon the sensed and detected data, and superimposes the expected impact point on the processed image on the display.

  • Pub Date: 2010/07/12
  • Number: 08245623
  • Owner: BAE Systems Controls Inc.
  • Location: Johnson City, US
  • Details: Visit USPTO

Visit USPTO Page


Visual outage management tool

Described herein are systems related to a visual tool for providing a dynamic and accessible collaborative environment during a production outage or network downtime. An outage management tool comprising a server application tool receiving and storing monitoring data related to an operation of a network and application-level components of the network, wherein the monitoring data includes outage information corresponding to one of the network and the application-level components, and a visualization tool generating an interactive representation of the network including the outage information, the visualization tool and generating, in response to a request, an adjusted interactive representation of the network including application-level components affected by an outage and event traffic related to the outage.

  • Pub Date: 2010/07/12
  • Number: 08726103
  • Owner: AT & T Intellectual Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to secure transactions via mobile devices

Systems and methods are provided to improve security of payment transactions via mobile communications. In one aspect, a system includes an interchange having a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats and to communicate with the common format processor in a common format for the confirmation of payment requests, made via mobile phones. The common format processor is to determine a risk of a payment request being fraudulent based on the personal identification information associated with a mobile phone and, after the payment request is confirmed and when the risk is below a threshold, to communicate one or more premium messages to the mobile phone to collect funds to fulfill the payment request.

  • Pub Date: 2010/07/12
  • Number: 08412626
  • Owner: Boku, Inc.
  • Location: San Francsico, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating photo books using video

A system and method are described for creating photo stories using video. The method includes receiving a user request to upload a user-specified video stream; determining whether the video stream meets one or more predetermined requirements, uploading the video stream; analyzing the video stream to select video frames for extraction based on a set of predetermined frame selection criteria; extracting the selected video frames from the video image; selecting a story book template to be used with the video images; and generating a preview of the story book template with the video images within a graphical user interface (GUI), the user editing the story book template with text and/or moving or modifying the video frames within the preview.

  • Pub Date: 2010/07/12
  • Number: 08327253
  • Owner: Shutterfly, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Populating documents with user-related information

One or more techniques and/or systems are disclosed for generating a document pre-populated with user-based information. A user's authorized social network can be mined for user-based information. The user-based information mined from the user-authorized social network can be added to a document template at locations in the template of one or more information identifiers in order to generate the pre-populated document. The one or more information identifiers can be used to identify the user-based information on the user authorized social network.

  • Pub Date: 2010/07/12
  • Number: 09652447
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, apparatus, and articles of manufacture to trigger preemptive maintenance in vectored digital subscriber line (DSL) systems

Example methods, apparatus, and articles of manufacture to trigger preemptive maintenance of vectored digital subscriber line (DSL) systems are disclosed. An example method includes obtaining a value representing crosstalk coupling between a first subscriber loop and a second subscriber loop, the first and second subscriber loops belonging to a vectored DSL group of subscriber loops, determining whether to automatically perform a diagnostic test on the first subscriber loop based on the value, submitting a trouble ticket for the first subscriber loop based on a result of the diagnostic tests, and generating a maintenance report for the vectored DSL group based on the value and the results.

  • Pub Date: 2010/07/12
  • Number: 08369485
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, apparatus and articles of manufacture to allocate ports to vectored digital subscriber line (DSL) groups

Example methods, apparatus and articles of manufacture to allocate ports to vectored digital subscriber line (DSL) groups are disclosed. A disclosed example method includes obtaining data representative of a statistical distribution of service penetration for a non-vectored DSL service, estimating an expected vectored DSL group size from the data, and configuring a DSL access multiplexer (DSLAM) to reserve a number of ports of the DSLAM for a vectored DSL group based on the expected vectored DSL group size.

  • Pub Date: 2010/07/12
  • Number: 08660138
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system of providing exclusive and secure access to virtual storage objects in a virtual machine cluster

A system, method, and medium for implementing I/O fencing in a virtual machine cluster sharing virtual storage objects. A volume manager driver receives access requests from virtual machines directed to a virtual storage object such as a volume. The volume manager driver then translates the access request to point to a storage device underlying the volume. The access request includes keys and/or other group reservation data required to implement an I/O fencing method so as to prevent access to shared data by malfunctioning or non-responsive virtual machines.

  • Pub Date: 2010/07/12
  • Number: 08495323
  • Owner: Symantec Corporation
  • Location: Mountain View CA, unknown
  • Details: Visit USPTO

Visit USPTO Page


Low-latency interactive user interface

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a low latency interactive user interface. In one aspect, a method includes while individual characters in a sequence of characters are being entered into a field of an interactive user interface and before the sequence has been completely entered parsing the entered characters using a string pattern and presenting the parsed characters in a second field according to a presentation format. The method also includes sending one or more of the entered characters to a server. The method also includes receiving a different second string pattern and a different second presentation format from the server in response to the sending. The method also includes parsing one or more second entered characters using the second string pattern and presenting the parsed second entered characters in the second field according to a second presentation format.

  • Pub Date: 2010/07/12
  • Number: 09323722
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Delivering a webpage to a client

In certain embodiments, a server receives a request from a client for a webpage comprising portlets. A framework corresponding to the webpage is retrieved. The framework indicates whether a portlet is to be executed by the server or whether execution of the portlet is to be initiated by the client. The framework indicates that one or more first portlets are to be executed by the server. The server executes the first portlets to yield one or more first portlet markups. The first portlet markups are placed into the webpage. Execution of one or more second portlets is to be initiated by the client according to the framework. One or more placeholder tags for the second portlets are placed into the webpage. A placeholder tag allows the client to initiate execution of a second portlet. The webpage comprising the first portlet markups and the placeholder tags is sent to the client.

  • Pub Date: 2010/07/12
  • Number: 08667090
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Component model for analytic applications supporting parameterization

In an aspect there is provided a method. The method may include defining an application to include at least one component, the at least one component including at least one parameter; executing the application, wherein the at least one parameter receives a value to enable the application to produce data, wherein the at least one parameter is received from at least one of another component, a user interface, or another program; and providing the produced data to a user interface. Related apparatus, systems, techniques, and articles are also described.

  • Pub Date: 2010/07/12
  • Number: 08671391
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Wrapper for porting a media framework and components to operate with another media framework

A system comprises a media framework component graph, a first media framework, a second media framework, and a media framework translator. The media framework component graph comprises one or more components. The one or more components are coupled with the first media framework. The first media framework is designed to run the media framework component graph. The media framework translator enables the first media framework and the media framework component graph to both function as a component for the second media framework.

  • Pub Date: 2010/06/12
  • Number: 08621445
  • Owner: VisualOn, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for supporting multiple devices in mobile applications

Techniques for interacting with a client process on a mobile device connected to a network over a wireless link includes managing information at a mobile applications server executing on a platform connected to the network. The information includes device profile information about the mobile device. First data is received from an application. The first data describes graphical elements for display on the mobile device. It is determined whether the first data exceeds a capacity of the mobile device based on the device profile information. If it is determined that the first data exceeds the capacity, then a subset of the first data is formed that does not exceed the capacity of the mobile device. The subset of the first data is sent to the client process. If it is determined that an external converter does not convert using a particular format, then a first description of graphical elements is converted internally into a second description using the particular format. Second data including the second description is sent to the client process. These techniques allow network-based services to be made readily available to a wide range of mobile devices without having to explicitly program each application for providing one or more network-based services to support all forms of mobile devices.

  • Pub Date: 2010/06/12
  • Number: 08700993
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to securely collect data over a telephone

A computer-implemented method to securely collect data over a telephone is described. Telephone communications between a customer and a customer service representative are monitored. At least one tone from a telephone keypad of the customer is detected. The at least one tone represents sensitive data for the customer. An audio output channel directed to the customer service representative is prevented from outputting a detectable tone from the telephone keypad of the customer. An indicator is provided to the customer service representative when detection of the at least one tone occurs.

  • Pub Date: 2010/06/12
  • Number: 08619951
  • Owner: Kombea Corporation
  • Location: Lehi, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of presenting relevant application components to a user

In one embodiment the present invention includes a computer implemented method of presenting relevant application components to a user of a computer system. The method includes capturing text displayed in open applications, determining key terms in the captured text based on a key terms catalog, and determining potentially relevant components by using the key terms to search a user interface dictionary. The user interface dictionary corresponds to a map between user interface strings and user interface components. The method further includes computing relevance scores for potentially relevant components, and presenting to the user the relevant components that correspond to relevant ones of the potentially relevant components, according to the relevance scores.

  • Pub Date: 2010/06/12
  • Number: 08412716
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Smart air ventilation system

A system to control energy consumption in a building having a plurality of rooms with a wireless data transceiver; an occupancy sensor; a temperature sensor; a processor coupled to the wireless data transceiver, the occupancy sensor and the temperature sensor; and an air register including a motor coupled to the processor, the motor opening or closing one or more air vents in response to sensed motion or room temperature.

  • Pub Date: 2010/06/12
  • Number: 08249731
  • Details: Visit USPTO

Visit USPTO Page


Predicting long-term computing resource usage

Techniques are described for performing automated predictions of program execution capacity or other capacity of computing-related hardware resources that will be used to execute software programs in the future, such as for a group of computing nodes that execute one or more programs for a user. The predictions that are performed may in at least some situations be based on historical data regarding corresponding prior actual usage of execution-related capacity (e.g., for one or more prior years), and may include long-term predictions for particular future time periods that are multiple months or years into the future. In addition, the predictions of the execution-related capacity for particular future time periods may be used in various manners, including to manage execution-related capacity at or before those future time periods, such as to prepare sufficient execution-related capacity to be available at those future time periods.

  • Pub Date: 2010/06/12
  • Number: 08499066
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Non-volatile memory systems and methods including page read and/or configuration features

A high speed voltage mode sensing is provided for a digital multibit non-volatile memory integrated system. An embodiment has a local source follower stage followed by a high speed common source stage. Another embodiment has a local source follower stage followed by a high speed source follower stage. Another embodiment has a common source stage followed by a source follower. An auto zeroing scheme is used. A capacitor sensing scheme is used. Multilevel parallel operation is described.

  • Pub Date: 2010/06/12
  • Number: 08432750
  • Owner: Silicon Storage Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Multichannel connections in file system sessions

A multi-connection information system is described herein that uses multiple connections to connect to a resource in a single file system session in a way that is controllable from protocols above a transport layer. The system also allows a single connection to be shared by multiple sessions. Sessions can be bound to multiple connections to enable communication over multiple transports. During the initial negotiation of a session, a client and a server determine whether multiple connections are supported between the client and the server within a session. After establishing an initial connection, additional connections can be established and bound to the existing session. The multiple connections can be used for failover and/or load balancing. The multi-connection information system provides a protocol for discovering a capability to establish multiple channels within a session and information about the available connections between two particular resources.

  • Pub Date: 2010/06/12
  • Number: 08806030
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for managing automated identification technologies information

Computer-readable storage media and methods are described in relation to management, control, and distribution of automated identification technology (AIT) information and data associated with sensors and tags utilized for asset identification and tracking. The method includes generating a gateway for at least one of read and write access to deployed identification sensors and tags associated with a set of assets, the sensors and tags incorporating a plurality of disparate native solution formats, providing data storage and management with hierarchical functionality in a common data format for information passing through the generated gateway, the information related to the assets as provided by the deployed identification sensors and tags, executing a service framework for data delivery to and from the deployed sensors and tags via a publish and subscribe middleware service layer that provides access to the gateway through a common middleware interface, and providing a user interface through which commands to the common middleware interface are generated.

  • Pub Date: 2010/06/12
  • Number: 08463888
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Managing software packages using a version control system

A client version control system (VCS) accesses a remote VCS to retrieve the difference between current metadata stored locally representing a first version of the software packages currently installed and newer metadata representing a second version of the software packages available from a server for distribution, without having to download the entire newer metadata. The client VCS generates the newer metadata based on the current metadata and the difference of the current and newer metadata retrieved from the remote VCS. A package manager coupled to the client VCS to download the second version of the software package from the server based on the newer metadata then installs or updates newer releases of software packages as available from the distribution server.

  • Pub Date: 2010/06/12
  • Number: 08863114
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Fast computer startup

Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information.

  • Pub Date: 2010/06/12
  • Number: 09032194
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Exercise system with graphical feedback and method of gauging fitness progress

A system and method for providing visual feedback to a user of an exercise machine for gauging fitness progress of the user. The system provides a user of an exercise machine with a virtual competition in which the user competes against virtual competitors based on his past performances or those of other users, either as an individual or as a member of a team. The team may also be part of a league. For an individual competing against his own past performance(s), the system may raise the level of performance required to win the virtual competition, and may also lower the level of performance required if the user is not performing well on a particular day. For an individual competing against others in either real-time or against designated results, either as part of a team or a league, the system may reduce the isolation, disconnection, and tedium often experienced by users of cardiovascular exercise equipment and provide a social outlet. The system attempts to keep the user engaged and motivated to achieve desired fitness goals by providing real-time performance data and historical performance data displayed in a graphical manner coupled with the entertainment and excitement of competition and social interaction.

  • Pub Date: 2010/06/12
  • Number: 08012064
  • Owner: Pantometrics, Ltd.
  • Location: Falls Church, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically weighted semantic trees

Various embodiments of systems and methods for dynamically weighted semantic trees are described herein. One or more software elements of a hierarchy are identified in response to user actions in a report. The user actions are related to at least one software element of the one or more software elements of the hierarchy. A local tree is constructed for each user by assigning local weights for the one or more software elements based on user visits to the one or more software elements. A group tree is constructed for each group to which the users belong by assigning group weights for the one or more software elements based on the user visits to the one or more software elements. The local tree and the group tree are stored for use in various applications.

  • Pub Date: 2010/06/12
  • Number: 08745092
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Distributed policy enforcement with verification mode

User-specified policies may be efficiently implemented and enforced with a distributed set of policy enforcement components. User-specified policies may be transformed into a normal form. Sets of normal form policies may be optimized. The optimized policies may be indexed and/or divided and provided to the distributed set of policy enforcement components. The distributed policy enforcement may have a sandbox mode and/or verification mode enabling policy configuration verification. With appropriate authorization, substitute data may be used in verification mode to evaluate requests with respect to policies. Evaluation results, relevant policies, and decision data utilized during request evaluation may be collected, filtered and reported at a variety of levels of detail. Originating user-specified policies may be tracked during the policy normalization process to enable reference to user-specified policies in verification mode reports.

  • Pub Date: 2010/06/12
  • Number: 09258312
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed policy enforcement with optimizing policy transformations

User-specified policies may be efficiently implemented and enforced with a distributed set of policy enforcement components. User-specified policies may be transformed into a normal form. Sets of normal form policies may be optimized. The optimized policies may be indexed and/or divided and provided to the distributed set of policy enforcement components. The distributed policy enforcement may have a sandbox mode and/or verification mode enabling policy configuration verification. With appropriate authorization, substitute data may be used in verification mode to evaluate requests with respect to policies. Evaluation results, relevant policies, and decision data utilized during request evaluation may be collected, filtered and reported at a variety of levels of detail. Originating user-specified policies may be tracked during the policy normalization process to enable reference to user-specified policies in verification mode reports.

  • Pub Date: 2010/06/12
  • Number: 09237155
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration bar for launching layer for accessing user interface elements

A user-activatable dashboard (also referred to as a unified interest layer) contains any number of user interface elements, referred to herein as “widgets,” for quick access by a user. In response to a command from a user, the dashboard is invoked and the widgets are shown on the screen. The user can activate the dashboard at any time, causing the dashboard to temporarily replace the existing user interface display on the user's screen. Once the dashboard has been activated, the user can interact with any or all of the widgets, and can configure the dashboard by adding, deleting, moving, or configuring individual widgets as desired. When the user wishes to return to the normal user interface he or she was working with, the user issues a command causing the dashboard to be dismissed. Once the dashboard has been dismissed, the previous user interface state is restored, allowing the user to resume normal interactions with the operating system.

  • Pub Date: 2010/06/12
  • Number: 08464172
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and kits for quantitative methyltransferase and demethylase measurements

The invention provides methods and kits for characterizing the activity of a methyltransferase or demethylase. The method involves enzymatically methylating or demethylating in vitro a substrate that is a peptide fragment of a full-length polypeptide, and then non-enzymatically methylating the peptide substrate with methyl groups that differ in molecular weight from the enzymatically added or removed methyl groups. Typically, deuterated or C formaldehyde is used to non-enzymatically methylate the substrate. The fully methylated substrate is then characterized by mass spectrometry to determine the ratio of enzymatically produced nonmethyl, monomethyl, and dimethyl residues on the peptide.

  • Pub Date: 2010/04/12
  • Number: 08367366
  • Owner: The Board of Trustees of the University of Arkansas
  • Location: Little Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Scintillation materials with reduced afterglow and method of preparation

Scintillation materials of this invention have an alkali halide host material, a (first) scintillation dopant of various types, and a variety of second dopants (co-dopants). In another embodiment, the scintillation materials of this invention have an alkali halide host material, a (first) scintillation dopant of various types, a variety of second dopants (co-dopants), and a variety of third dopants (co-dopants). Co-dopants of this invention are capable of providing a second auxiliary luminescent cation dopant, capable of introducing an anion size and electronegativity mismatch, capable of introducing a mismatch of anion charge, or introducing a mismatch of cation charge in the host material.

  • Pub Date: 2010/03/12
  • Number: 08507878
  • Details: Visit USPTO

Visit USPTO Page


Query execution plan revision for error recovery

A computer-implemented method, apparatus and article of manufacture for performing an automatic error recovery in a database system. Automatic error recovery is performed for a query execution plan, following errors, problems or failures that occur during execution, by automatically or manually deactivating and/or activating components, features or code paths, and then re-submitting the query execution plan for execution in the computer system.

  • Pub Date: 2010/03/12
  • Number: 08938644
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for analyzing samples and collecting sample fractions

Methods and apparatus for analyzing a sample using at least one detector are disclosed.

  • Pub Date: 2010/03/12
  • Number: 08314934
  • Owner: Alltech Associates, Inc.
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Meta-application framework

The present disclosure describes a meta-application framework that enables data to be associated with a class of applications called a meta-application. A meta-application entity may store attributes in common across multiple platforms. A platform entity may store attributes in common across multiple devices and/or operating systems. A device entity may be comprised by a particular set of hardware features and an operating system entity may be comprised of a particular set of software feature. Data associated with the meta-application framework may be accessed directly via data manipulation operations or alternatively by application operations via an application programming interface or via the aforementioned data manipulation operations. Applications may then identify application specific behavior at the appropriate level of detail.

  • Pub Date: 2010/03/12
  • Number: 09424002
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic proximity based text exchange within a group session

A text exchange associated with a distance value n can be received. The text exchange can be conveyed by a text exchange application which can be linked to a group session. The group session can comprise of one or more participants each associated with a proximity value m. The text exchange can be a real-time text based communication between one or more computing devices. A participant can be determined to receive the text exchange based on the distance value of the text exchange and the proximity value associated with the participant. The text exchange can be communicated to a computing device utilized by the participant when the proximity value is equivalent to the distance value. The text exchange can be presented in a visually and/or aurally distinct manner within an interface of the text exchange application.

  • Pub Date: 2010/03/12
  • Number: 08490003
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications in a parallel active messaging interface of a parallel computer

Algorithm selection for data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and ranges of message sizes so that each algorithm is associated with a separate range of message sizes; receiving in an origin endpoint of the PAMI a data communications instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint, the data communications message characterized by a message size; selecting, from among the associated algorithms and ranges, a data communications algorithm in dependence upon the message size; and transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  • Pub Date: 2010/03/12
  • Number: 08484658
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications for a collective operation in a parallel active messaging interface of a parallel computer

Algorithm selection for data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  • Pub Date: 2010/03/12
  • Number: 08490112
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Contextual data communication platform

Systems and methods for a contextual data platform are provided. According to one embodiment, an Internet-enabled mobile device is provided, including a storage device having embodied thereon instructions and one or more processors operable to execute the instructions. An HTTP request relating to a service supported by the server device and contextual information including (a) information regarding an end user, (b) information regarding the mobile device and (c) information regarding a location of the mobile device are concurrently transmitted to the server device. Responsive to the request and the contextual information, an HTML file within which contextual menu information based on the service and the contextual information is embedded is received from the server device. Contextual menu information is extracted from the HTML file. End user interaction with the service is customized by dynamically reconfiguring a browser menu of the mobile device based on the contextual menu information.

  • Pub Date: 2010/03/12
  • Number: 08156206
  • Owner: 5o9, Inc.
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic conversion of multidimentional schema entities

In various embodiments, a system receives a multidimensional schema entity of a first type and converts the multidimensional schema entity to a second type. The system receives user input and converts the multidimensional schema entity to the second type based on the input received from the user. In various embodiments, the system creates multidimensional schema entities automatically. In various embodiments, a method for converting multidimensional schema entities from one or more types to one or more other types is described. In various embodiments, a first multidimensional schema entity is analyzed and converted to a different type based on the analysis. In various embodiments, a multidimensional schema entity is created automatically based on input from two other multidimensional schema entities. In various embodiments, two multidimensional schema entities are merged in one multidimensional schema entity.

  • Pub Date: 2010/03/12
  • Number: 08484255
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for tools for mathematics instruction

In a computer-implemented educational environment, four particular features are provided, which may be used separately or in combination, to drive the instruction of a particular curriculum, e.g. the instruction of fractions. In another implementation, educators and authors may use permutations and combinations of such features to construct in a graphical user interface a progression of interactive elements which help guide a student from visual concepts to procedures, such as equations and formulas. In a particular implementation, by using these features carefully, a curriculum author may design instructional sequences that provide careful, step-by-step sequences that help students progress from understanding the visual concepts, e.g. of fractions, to mastering procedures, e.g. fractions equations.

  • Pub Date: 2010/03/12
  • Number: 08790119
  • Owner: Conceptua Math
  • Location: Petaluma, US
  • Details: Visit USPTO

Visit USPTO Page


Wait on address synchronization interface

In a first thread of a process a determination is made that a current value at a target address is not a desired value. In response to this determination, a first application programming interface (API) is invoked to indicate that the first thread is to sleep and be woken up when a second thread modifies the value at the target address. When a second thread modifies the value at the target address, the second thread invokes a second API to indicate that the value at the target address has been modified. In response to the second API being invoked, the first thread is woken up.

  • Pub Date: 2010/02/12
  • Number: 08490118
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for network bandwidth management

Techniques for network bandwidth management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for network bandwidth management comprising determining, using at least one computer processor, a throughput measurement for a first network client of a plurality of network clients, determining if throughput for the first network client is adequate for a first task based at least on the throughput measurement, in the event throughput is not adequate, negotiating for a different amount of network bandwidth, wherein the negotiation comprises sending a first task priority for the first network client and the throughput measurement to at least one second network client of the plurality of network clients, and receiving an allocation of network bandwidth based on a comparison of the first task priority with at least one second task priority for the at least one second network client.

  • Pub Date: 2010/02/12
  • Number: 08521883
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for proactive management of an information handling system with in-situ measurement of end user actions

Dissatisfaction variables track inputs made by an end user at an information handling system that are associated with end user dissatisfaction regarding the operation of the information handling system, such as corrective actions, so that an alert issues if a dissatisfaction variable changes by a predetermined amount over a predetermined time period. Dissatisfaction variables identify a pattern of a change in behavior by an end user rather than the operational status of system components. For example, an increase in end user forced shutdowns of the information handling system indicates end user dissatisfaction with the information handling system, such as repeated freezes of the operating system so that performing a timely diagnostics will improve end user satisfaction and proactively correct and impending system failure.

  • Pub Date: 2010/02/12
  • Number: 08726095
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for counting network users

Embodiments presented herein provide methods, systems and computer program products for determining a count of network users. One method identifies one or more login access requests, from one or more server logs. Each of the one or more login access requests comprises a login cookie, and a user identifier. The method then forms one or more connected components based on the one or more login access requests. Each connected component comprises one or more user identifiers, wherein each of the one or more user identifiers is associated with one or more login cookies. The method finally determines a count of login users based, at least in part, on the user identifiers in the one or more connected components.

  • Pub Date: 2010/02/12
  • Number: 08775606
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for processing location service messages in a satellite position location system

Method and apparatus for processing location service messages in a satellite position location system is described. In one example, a mobile receiver includes a satellite signal receiver, wireless circuitry, and at least one module. The satellite signal receiver is configured to receive satellite positioning system signals, such as Global Positioning System (GPS) signals. The wireless circuitry is configured to communicate location service messages between the mobile receiver and a server through a cellular communication network. The location service messages may include any type of data related to A-GPS operation, such as assistance data, position data, request and response data, and the like. The at least one module is configured to provide a user-plane interface and a control-plane interface between the satellite signal receiver and the wireless transceiver. The at least one module is capable of processing location service messages communicated using either the control-plane signaling or user-plane signaling mechanisms.

  • Pub Date: 2010/02/12
  • Number: 08687549
  • Owner: Global Locate, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Guided problem resolution in deploying an application

Techniques are disclosed for deploying an application. In one embodiment, a packaging tool determines that an error exists in a packaged application. The packaging tool may guide a user in fixing the error by updating the packaging tool and repackaging the application using the updated packaging tool. The packaging tool may guide the user via one or more notifications output for display to the user.

  • Pub Date: 2010/02/12
  • Number: 08612963
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Bio-photonic feedback control software and database

A process, apparatus, and method for computerized detection, tracking, and feedback control of nutritional supplements in an animal, including humans relies on Raman scattering effects on skin or other tissues to determine the content of carotenoids or other nutrients as evidenced in that skin. Serum levels of nutrients may vary dramatically with time, but skin tissues may average such nutrition over time. Skin and other tissues may be scanned with light to produce accurate measurements of carotenoids or other nutrients accumulated in the skin based on the Raman scattering affect of those nutrients in the skin. A score can be derived from a properly calibrated bio-photonic scanner to reflect an averaged effective uptake of the detected nutrient (e.g. such as the carotenoid example). This feedback control is thus much more immediate than any anecdotal, long-term, report of general well being, which would vary so much between individuals as to be nearly impossible to ascertain on an individual level, and difficult, invasive, and expensive to determine individually in a conventional clinical procedure.

  • Pub Date: 2010/02/12
  • Number: 08117044
  • Owner: NSE Products, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


User authentication system and method for encryption and decryption

A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.

  • Pub Date: 2010/01/12
  • Number: 08359476
  • Owner: Empire IP LLC
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


User authentication in a mobile environment

A data channel transmission can be used to authenticate a voice channel transmission. A third party trusted authentication server can be used to authenticate the identity of one or more parties to a call where at least one of the parties to the call is using a mobile device. A PKI authentication methodology or other symmetric or asymmetric encryption/decryption methodology can be used in a mobile network environment to identify and authenticate a first user to a second user. The authentication request sent to the third party trusted server can be encrypted, signed and transmitted over a data channel (such as an internet connection or SMS or MMS connection), concurrent with the voice channel transmission. In response to validation by the third party trusted server, the third party trusted server can send an authentication indication to the second user's device, which can display identification information and other (optional) data associated with the first user.

  • Pub Date: 2010/01/12
  • Number: 09544770
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for listing items online

A system and method are provided for listing an item online. The system provides a user interface comprising a first pane for entering information pertaining to the item and a second pane for viewing said information while it is being entered. The user is provided, in the second pane, an upload tool for uploading one or more photos of the item to assist in describing the item during the listing process. Upon entering one or more characters in a field in the first pane for identifying the item, the system searches a database of items being either parts or components and displays possible choices for said item such that the user can simply type in what their item is and the system provides possible category choices to facilitate and speed up the listing process.

  • Pub Date: 2010/01/12
  • Number: 08463658
  • Owner: Just Parts Online Inc.
  • Location: Thunder Bay, CA
  • Details: Visit USPTO

Visit USPTO Page


Protecting browser-viewed content from piracy

A content server provides a browser of a client with encrypted content and with obfuscated browser-executable code for decrypting and displaying the content within the browser. Both the encrypted content and the obfuscated browser-executable code are generated based at least in part on an identity of the user requesting the content, and thus are different from encrypted content and obfuscated browser-executable code provided to other users. Further, in one embodiment the browser-executable code provided by the server changes periodically, such as weekly, thereby rendering ineffective any malicious software tools that obtain decrypted content by calling expected functions of the code. In one embodiment, the obfuscated browser-executable code for a user is pre-computed before that user makes a request for content.

  • Pub Date: 2010/01/12
  • Number: 08806187
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device and control method thereof

The mobile device includes a communication unit which performs communication through a network; and a control unit which executes an application prepared by an application programming interface (API) of the network function provided by a platform, and controls the communication unit to perform communication in accordance with a setup of a preferred network if the application includes the setup of the preferred network.

  • Pub Date: 2010/01/12
  • Number: 08904017
  • Owner: Sansung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for diagnosing or monitoring autoimmune and chronic inflammatory diseases

Methods of diagnosing or monitoring an autoimmune or chronic inflammatory disease, particularly SLE in a patient by detecting the expression level of one or more genes or surrogates derived therefrom in the patient are described. Diagnostic oligonucleotides for diagnosing or monitoring chronic inflammatory disease, particularly SLE infection and kits or systems containing the same are also described.

  • Pub Date: 2010/01/12
  • Number: 08110364
  • Owner: XDx, Inc.
  • Location: Brisbane, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for efficiently organizing hierarchical QoS policies

Consistent with embodiments of the present invention, a method may be provided comprising receiving a search string corresponding to a desired node comprising a target parameter, a policy parameter, and a class parameter. The target parameter may be referenced with a target index table to determine which interfaces to search. The policy parameter may be referenced with a policy index table to determine a node-id of a policy node corresponding to the policy parameter. A level for the desired node may be determined based on the node-id. The class parameter may be referenced with the determined node-id with a class index table to access a bucket location. The desired node may then be searched for with the determined node-id at the determined level.

  • Pub Date: 2010/01/12
  • Number: 08719253
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Media mashup system

A media mashup system functions as a virtualizable endpoint called an Intelligent Multimedia Pod, or IMP, that ensures a reliable and high-quality multimedia user-experience for a variety of mobile user devices such as intelligent phones etc. The media mashup platform uses a web 2.0 media mashup model that offers several key features including Near Real Time (NRT) service continuity, control-proxy for a mobile-friendly web-surfing experience, finely-filtered content aggregation based on meta-data, context sensors and buddy blaster content sharing/recommendation. These features are brought together using a web 2.0 service mashup model that integrates media meta-data together with various context sensors including mobility-related sensors such as location and presence, time-of-day, voice commands, as well as time-shifted playback.

  • Pub Date: 2010/01/12
  • Number: 08838748
  • Owner: Azuki Systems, Inc.
  • Location: Acton, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical software locking

A processor chip may have a built-in hardware lock and deterministic exclusive locking of the hardware lock by execution units executing in parallel on the chip. A set of software locks may be maintained, where the execution units set and release the software locks only by first acquiring a lock of the hardware lock. A first execution unit sets a software lock after acquiring a lock of the hardware lock, and other execution units, even if exclusively locking the hardware lock, are unable to lock the software lock until after the first execution unit has reacquired a lock of the hardware lock and possibly released the software lock while exclusively locking the hardware lock. An execution unit may release a software lock after and while holding a lock of the hardware lock. The hardware lock is released when a software lock has been set or released.

  • Pub Date: 2010/01/12
  • Number: 08468169
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Data store including a file location attribute

A data store including a file location attribute is described. In an embodiment, the location attribute for a data element, such as a file or database record, is stored with the bytes of data and records the geographic location of the data element. Writing to this attribute is limited to a single trusted entity, such as an operating system, to ensure that the location data can be trusted and when a data element is moved or replicated, the attribute is updated to reflect the new location of the data element. This location data is made available to users and applications by a metadata service which tracks the locations of data elements and responds to requests from users. Access control policies can been defined in terms of location and stored at the metadata service and the metadata service can then enforce these policies when responding to requests.

  • Pub Date: 2010/01/12
  • Number: 08656454
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling runtime execution from a host to conserve resources

A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms.

  • Pub Date: 2010/01/12
  • Number: 08922564
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Application specific solar cell and method for manufacture using thin film photovoltaic materials

A method for manufacture of application specific solar cells includes providing and processing custom design information to determine at least a cell size and a cell shape. The method includes providing a transparent substrate having a back surface region, a front surface region, and one or more grid-line regions overlying the front side surface region. The one or more grid regions provide one or more unit cells having the cell size and the cell shape. The method further includes forming a layered structure including photovoltaic materials overlying the front surface region. Additionally, the method includes aligning a laser beam from the back surface region to illuminate a first region within the one or more grid-line regions, subjecting a first portion of the layered structure overlying the first region to the laser beam to separate the first portion of the layered structure from the first region, and scanning the laser beam along the one or more grid-line regions to cause formation of one or more unit cells having the cell size and cell shape. The method further includes transferring the one or more unit cells.

  • Pub Date: 2010/01/12
  • Number: 08941132
  • Owner: Stion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Altering streaming video encoding based on user attention

Disclosed are various embodiments for adjusting the encoding of a video signal into a video stream based on user attention. A video signal generated by an interactive application is encoded into a video stream. A temporary lapse of attention by a user of the interactive application is predicted. The encoding of the video signal into the video stream is adjusted from an initial state to a conservation state in response to predicting the temporary lapse of attention by the user. The conservation state is configured to conserve one or more resources used for the video stream relative to the initial state.

  • Pub Date: 2010/01/12
  • Number: 08902970
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing power distribution

In accordance with particular embodiments, a method for adjusting power distribution includes establishing a connection between a base station and a plurality of remote transceivers. The method also includes establishing a plurality of wireless connections with a plurality of endpoints via one or more of the plurality of remote transceivers. The method further includes determining a plurality of signal quality indications. Each signal quality indication is associated with a different one of a plurality of unique endpoint-remote transceiver pairs. The method additionally includes determining a power distribution for the plurality of remote transceivers based on the plurality of signal quality indications and an optimization equation. The optimization equation is configured to optimize a data throughput associated with the plurality of wireless connections by determining a power gain for each of the wireless connections.

  • Pub Date: 2010/30/11
  • Number: 09178575
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


System and method for cloud-based text-to-speech web services

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating speech. One variation of the method is from a server side, and another variation of the method is from a client side. The server side method, as implemented by a network-based automatic speech processing system, includes first receiving, from a network client independent of knowledge of internal operations of the system, a request to generate a text-to-speech voice. The request can include speech samples, transcriptions of the speech samples, and metadata describing the speech samples. The system extracts sound units from the speech samples based on the transcriptions and generates an interactive demonstration of the text-to-speech voice based on the sound units, the transcriptions, and the metadata, wherein the interactive demonstration hides a back end processing implementation from the network client. The system provides access to the interactive demonstration to the network client.

  • Pub Date: 2010/30/11
  • Number: 09009050
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Records management of database tables

Systems, methods, and other embodiments associated with records management are described. One example method includes managing a relational database for compliance with record retention rules, where the relational database includes a table organized with rows and columns. The relational database provides options for designating rows for records management.

  • Pub Date: 2010/30/11
  • Number: 08386533
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting likelihood of a successful connection between unconnected users within a social network using a learning network

A system and method for suggesting love interests and friendships based on inferred information to users within a social network is disclosed. Data is retrieved from a database. The database includes data from users that achieved relationships. The data also includes a list of each user's connections, the user's activities on the social network and the user's interests. The data is input into a network and the network is trained to predict a likelihood of a successful connection. Data from unconnected users is retrieved and put into the trained network to predict a possible relationship. A connection suggestion is sent to the two unconnected users.

  • Pub Date: 2010/30/11
  • Number: 08595167
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Network calling privacy with recording

Compliance with a privacy database and call-specific applications is provided within a network. A service control function (SCF), in communication with a privacy database, selectively establishes a call between an origin and a destination. Based on origin or destination identifiers, call parameters are determined for further operations associated with the call. A server, responsive to the call parameters, performs monitoring of the call or post-call disposition to update the privacy database.

  • Pub Date: 2010/30/11
  • Number: 08732190
  • Owner: Gryphon Networks Corp.
  • Location: Norwood, US
  • Details: Visit USPTO

Visit USPTO Page


Migrating virtual machine operations

Embodiments relate to systems and methods for reclassifying a set of virtual machines in a cloud-based network. The systems and methods can analyze virtual machine data to determine performance metrics associated with the set of virtual machines, as well as target data to determine a set of target machines to which the set of virtual machines can be reassigned or reclassified. In embodiments, benefits of reassigning any of the set of virtual machines to any of the set of target virtual machines can be determined. Based on the benefits, the systems and methods can reassign or reclassify appropriate virtual machines to appropriate target virtual machines.

  • Pub Date: 2010/30/11
  • Number: 09606831
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for storing secured sent message data

Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device via a server. The method includes compiling a first portion of the message which has a plurality of components; applying security encoding to the first portion; and storing the first portion. The first portion includes at least one but not all of the plurality of components in the message, and pointers to the components not included in the first portion.

  • Pub Date: 2010/30/11
  • Number: 08566577
  • Owner: Blackberry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing a publish/subscribe mechanism over an ad-hoc mesh network

An approach is provided for a publish/subscribe mechanism over an ad-hoc mesh network. A module receives a request to either publish or subscribe to information provided over an ad-hoc mesh network. The module then determines at least one data schema associated with the information, wherein an identification of the information for publication or subscription is based, at least in part, on the at least one data schema.

  • Pub Date: 2010/30/11
  • Number: 08515409
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Keywords filtering based on combined scores

A system and method for filtering keywords. The method may include receiving a first set of keywords. The method may include determining a first set of numbers associated with a first metric relating to the first set of keywords and a second set of numbers associated with a second metric relating to the first set of keywords. The method may include receiving at least one metric rule relating to the first and the second metric. The method may include determining a respective combination number for each keyword in the first set of keywords based on the first set of numbers, the second set of numbers, and the metric rule. The method may include filtering the first set of keywords based on the respective combination numbers to produce a second set of keywords.

  • Pub Date: 2010/30/11
  • Number: 08239405
  • Owner: Conductor, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for system communication for handling data

Techniques for making internal data from a source application available through an application programming interface (“API”). Embodiments may analyze a source application to determine a storage location and a first storage format of internal data, wherein the source application does not provide an API through which the internal data is accessible. Embodiments may then extract the internal data from the storage location, and convert the extracted data from the first storage format to a common storage format. Embodiments may then provide an API to make the converted data available.

  • Pub Date: 2010/30/11
  • Number: 08904411
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Efficiently registering a relational schema

A method, device, and non-transitory computer-readable storage medium are provided for efficiently registering a relational schema. In co-compilation and data guide approaches, a subset of entities from schema descriptions are selected for physical registration, and other entities from the schema descriptions are not physically registered. In the co-compilation approach, a first schema description references a second schema description, and the subset includes a set of entities from the second schema description that are used by the first schema description. In the data guide approach, the subset includes entities that are used by a set of structured documents. In a pay-as-you-go approach, schema registration includes logically registering entities without creating relational database structures corresponding to the entities. A database server may execute database commands that reference the logically registered entities. A request to store data for the entities may be executed by creating relational database structures to store the data.

  • Pub Date: 2010/30/11
  • Number: 08583652
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications in a parallel active messaging interface of a parallel computer

Data communications in a parallel active messaging interface (‘PAMI’) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a SEND instruction, the SEND instruction specifying a transmission of transfer data from the origin endpoint to a first target endpoint; transmitting from the origin endpoint to the first target endpoint a Request-To-Send (‘RTS’) message advising the first target endpoint of the location and size of the transfer data; assigning by the first target endpoint to each of a plurality of target endpoints separate portions of the transfer data; and receiving by the plurality of target endpoints the transfer data.

  • Pub Date: 2010/30/11
  • Number: 08949453
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Browsing and retrieval of full broadcast-quality video

A method includes steps of indexing a media collection, searching an indexed library and browsing a set of candidate program segments. The step of indexing a media collection creates the indexed library based on a content of the media collection. The step of searching the indexed library identifies the set of candidate program segments based on a search criteria. The step of browsing the set of candidate program segments selects a segment for viewing.

  • Pub Date: 2010/30/11
  • Number: 09171545
  • Owner: AT&T Intellectual Property II, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Brokering optimized resource supply costs in host cloud-based network using predictive workloads

Embodiments relate to brokering optimized resource supply costs in a host cloud-based network using predictive workloads. In aspects, a set of usage histories can store patterns for users in a host cloud-based network recording the consumption of processor, memory, storage, operating system, application, or other resources subscribed to by the user. The operator of the cloud management system hosting the workloads of one or more users can track the aggregate user histories reflecting those workloads, and analyze them in terms of different time periods over which demands for resources may intensity or relax. The cloud management system can examine those workload patterns, and generate a set of predictively re-assigned workloads to be supported by different sets of resource servers during offpeak and/or other periods. The workload realignment to different resource servers can permit the operator of the cloud management system and/or other cloud provider to realize cost savings or other benefits by procuring resources on a predictive basis.

  • Pub Date: 2010/30/11
  • Number: 09563479
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Behavior monitoring and compliance for multi-tenant resources

The behavior of multiple users with access to a multi-tenant resource can be monitored and compliance enforced by monitoring state information for each user. The state information can be captured across a level of a network environment, such that any activity across that layer can be monitored and the data aggregated to give a global view of user behavior. If user behavior is determined to fall outside an acceptable range of behavior, any of a number of remedial actions can be taken, which can include notifying the user, billing the user for the inappropriate behavior, or modifying that behavior outside of the control of the user.

  • Pub Date: 2010/30/11
  • Number: 08706864
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Attention misdirection for streaming video

Disclosed are various embodiments that implement attention misdirection to conceal errors in streaming video. A video stream quality monitor executed in one or more computing devices determines that an error in a video stream may be user perceivable. The video stream is then configured to include a distraction to mask the error. The distraction is designed to induce a saccade in a user, which interferes with perception of the error by the user.

  • Pub Date: 2010/30/11
  • Number: 08565323
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Accelerating data communication using tunnels

Methods and systems are provided for increasing application performance and accelerating data communications in a WAN environment. According to one embodiment, packets are received at a flow classification module operating at the Internet Protocol (IP) layer of a first wide area network (WAN) acceleration device via a shared connection-oriented tunnel, which is operable to convey application layer data for connection-oriented applications between WAN acceleration devices. Packets that are classified as being associated with an existing connection-oriented flow are passed to a WAN socket operating at the transport layer. Based on the application protocol, the packets are passed to an application handler of multiple application handlers operating at the application layer each of which implements one or more application acceleration techniques for a particular poorly behaved WAN protocol. The existing connection-oriented flow is securely accelerated by performing one or more application acceleration techniques and applying one or more security functions.

  • Pub Date: 2010/30/11
  • Number: 08503332
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Treating vascular events with statins by inhibiting PAR-1 and PAR-4

The present invention relates to new methods for treating and/or preventing vascular events by inhibiting G-coupled Protease Activating Receptor (PAR)-1 and/or PAR-4 with the administration of statins. In one embodiment, individuals who are at risk for vascular events, but have cholesterol levels (e.g., total cholesterol or Low Density Lipoprotein) in normal ranges, are treated with statins.

  • Pub Date: 2010/29/11
  • Number: 08232295
  • Owner: Heartdrug Research, L.L.C.
  • Location: West Friendship, US
  • Details: Visit USPTO

Visit USPTO Page


Traffic barrier pop-up bollard system

Disclosed is a self-contained, pop-up bollard barrier system () that is capable of working from a single electromechanical actuator () with a series of belts () and pulleys (A). The system () is built in two parts that once the foundation vault () is in place, the internal apparatus or bollard assembly () can be removed as a unit for maintenance or can be completely replaced with another assembly to have a brand new barrier without the need of replacing or moving any of the initial foundation. The system () enhances the ability of the contractor on site to have a self contained product that only needs wiring and requires no grease while minimizing the installation cost, which is passed on to the end user.

  • Pub Date: 2010/29/11
  • Number: 08226322
  • Details: Visit USPTO

Visit USPTO Page


Techniques for image duplication optimization

Techniques for image copying optimization are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for image copying optimization comprising receiving a request to copy a plurality of images, copying one or more of the plurality of images, deferring synchronization for each of the one or more of the plurality of images, receiving an indication to stop deferring synchronization, and synchronizing the one or more copied images of the plurality of images.

  • Pub Date: 2010/29/11
  • Number: 08941863
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for mapping platform configuration human interface infrastructure data to system attributes for local and remote system management

A first portion of a Unified Extensible Firmware Interface (UEFI) configuration language string is determined, the first portion identifying an Human Interface Infrastructure (HII) configuration attribute. A second portion of the string is determined and includes a first attribute modifier. The first attribute modifier includes a first name-value pair identifying a first name and a first value. The first name and the first value are individually parsable, and the meaning of the first value is determined based on the first name. The string is stored at a HII string package of an HII database. An HII string identifier uniquely references the string.

  • Pub Date: 2010/29/11
  • Number: 08522005
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Social event recommendations

In one embodiment, a method includes accessing a plurality of event listings, accessing event information associated with the event listings, accessing social network information associated with a particular user, and ranking the event listings for the particular user based at least in part on the social network information and event information.

  • Pub Date: 2010/29/11
  • Number: 08700540
  • Owner: Eventbrite, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Processing network traffic

A system adapted to process network traffic includes at least one processing engine configured to receive network data being transferred over a network and generate metadata relating to the data. The system includes at least one rule engine configured to receive and process the metadata to generate an output, and at least one selection engine configured to receive and process the rule engine output to determine whether the network data is to be processed by a further component and/or whether the network data is to continue to be transferred over the network. The processing engine, rule engine and selection engine can be implemented in system hardware or firmware, and the further component can be software for execution on another processor.

  • Pub Date: 2010/29/11
  • Number: 08923159
  • Owner: BAE SYSTEMS plc
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Network protocol proxy

A network proxy can be provided as a layer between an application layer protocol (such as the Remote Desktop Protocol) and a transport layer protocol (such as TCP). The network proxy can intercept communications between the application layer protocol and the transport layer protocol. The network proxy can transmit communications on multiple connections, without the application layer or transport layer protocols being aware of the parallelization.

  • Pub Date: 2010/29/11
  • Number: 09054913
  • Owner: Dell Software Inc.
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-plane activation side key for a mobile electronic device

An input mechanism for a mobile electronic device is disclosed. A cap shaped to wrap around an edge of the mobile electronic device is moveable in a first direction and a second direction. A first switch for activating a first function is covered by the cap and actuatable upon movement of the cap in the first direction toward the first switch. A second switch for activating a second function is covered by the cap and actuatable upon movement of the cap in the second direction toward the second switch.

  • Pub Date: 2010/29/11
  • Number: 08564937
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Multifactor authentication for programmatic interfaces

Systems and methods provide logic that validates a code generated by a user, and that executes a function of a programmatic interface after the user code is validated. In one implementation, a computer-implemented method performs a multifactor authentication of a user prior to executing a function of a programmatic interface. The method includes receiving, at a server, a user code through a programmatic interface. The server computes a server code in response to the user code, and compares the user code to the server code to determine that the user code corresponds to the server code. The server validates the user code and executes a function of the programmatic interface, after the user code is validated.

  • Pub Date: 2010/29/11
  • Number: 08776190
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for improved multi-cell support on a single modem board

A system for providing multi-cell support within a single SMP partition in a telecommunications network is disclosed. The typically includes a modem board and a multi-core processor having a plurality of processor cores, wherein the multi-core processor is configured to disable non-essential interrupts arriving on a plurality of data plane cores and route the non-essential interrupts to a plurality of control plane cores. Optionally, the multi-core processor may be configured so that all non-real-time threads and processes are bound to processor cores that are dedicated for all control plane activities and processor cores that are dedicated for all data plane activities will not host or run any threads that are not directly needed for data path implementation or Layer 2 processing.

  • Pub Date: 2010/29/11
  • Number: 08861434
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Information search, retrieval and distillation into knowledge objects

Embodiments of the invention provide for various methods and apparatuses for searching bodies of knowledge, such as previously indexed source documents reachable over a network, search results from previous searches, and results from performing meta-searches. Search criteria is received from a client, and the bodies of knowledge are searched based on the search criteria, and search results provided responsive to said searching. Search results may be configured to have associated distillation triggers, where selecting a trigger causes its associated search result to be distilled in real-time. Distilled search results can be indexed into portions of the source document for focused entry, and can also be grouped and analytically presented on mid-menus to allow the user to review distilled data in summary form. Results may also have associated status symbols indicating by symbol a particular topic area to which a result is related, and by opacity or other indicator the apparent relevance of a result to the particular topic area. Search and viewing preferences may be determined according to psychometrics, user selection of a default user category, through a question/answer session, or based on monitoring user activity which incrementally defines a profile.

  • Pub Date: 2010/29/11
  • Number: 08204881
  • Owner: Vision Point Services, LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Coded pulse data transmission using a look-up table

Input data is encoded using a look-up table and then transmitted over a transmission medium as a series of pulses. The look-up table includes data elements. The length of each pulse is calibrated to correspond to one of the data elements in the look-up table. Upon receipt at another end of the transmission medium, the data is decoded using a look-up table. This decoding includes measuring the length of each received pulse to match the measured length to a corresponding one of data elements in the look-up table.

  • Pub Date: 2010/29/11
  • Number: 09049093
  • Owner: Seagate Technology LLC
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Centralized service for awakening a computing device

Various technologies and techniques are disclosed for providing and interacting with a centralized wake service. A server-side wake service is provided that is operable to allow applications to subscribe to the wake service. The wake service receives a wake request directed to a particular computing device from a particular one of the applications. The wake request is forwarded from the wake service to a client-side communication service on the particular computing device if forwarding is determined to be appropriate. When the client-side communication service on the particular computing device receives the wake request while in a reduced power mode, the computing device wakes up and an appropriate response is determined.

  • Pub Date: 2010/29/11
  • Number: 09164567
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Accessing vendor-specific drivers for configuring and accessing a self-virtualizing input/output device

A vendor independent interface is provided between a hypervisor and an adjunct partition associated with a self-virtualizing IO resource to effectively abstract away vendor-specific interface details for the self-virtualizing IO resource and its adjunct partition. By doing so, vendor-specific implementation details may be isolated from the configuration and management functionality in a hypervisor, thus minimizing the changes to vendor specific firmware in order to manage new or revised self-virtualizing IO resources.

  • Pub Date: 2010/29/11
  • Number: 08839240
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Storage gateway configuring and traffic processing

In one aspect, initial storage system control information is received, and in response a configuration of a storage interface is determined in accordance with the initial storage system control information. Then final storage system control information is accessed via the storage interface and the storage interface is reconfigured in accordance with the final storage system control information. In another aspect, one of a plurality of physical partitions of a physically partitionable symmetric multiprocessor executes a storage control process to control storage traffic, and another one of the physical partitions executes a program to process the storage traffic. The physical partitions are enabled to communicate the storage traffic at least in part via respective input/output controllers coupled to a switch fabric. The partitionable symmetric multiprocessor has programmatically configurable links for selectively isolating shared memory coherency and cache memory coherency transactions between at least some included processors.

  • Pub Date: 2010/25/11
  • Number: 08218538
  • Owner: Habanero Holdings, Inc.
  • Location: Saratoga, US
  • Details: Visit USPTO

Visit USPTO Page


Typed-data translation for platform independence

A method, computer program and device for the translation of typed data objects in a heterogeneous computational environment is described. The operating system (or installed shared code libraries) translates typed data objects from a first format (e.g., big-endian) to a second format (e.g., little-endian) if the application sending the object and the application receiving the object utilize different formats. By placing data object format translation capabilities into the operating system, the software development effort required to permit an application (e.g., a user-level application) to execute in a heterogeneous environment is significantly reduced.

  • Pub Date: 2010/24/11
  • Number: 08230403
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for client IP address insertion via TCP options

The present disclosure presents systems and methods for maintaining identification of network devices sending or traversing a network packet en route to an intermediary device deployed between a source and a destination network device. An intermediary may receive an acknowledgement packet comprising an option field identified by an option number for a transport layer connection established via the intermediary, comprising overlay network data that identifies IP addresses of the originating network device and host network devices intercepting and forwarding the network packet to the intermediary, and may determine the option number for the option field from which to obtain the overlay network data identifying IP addresses. The intermediary device may receive a second request of the client to access the server via the transport layer connection and insert IP addresses from the overlay network data into an application layer protocol header of the second request forwarded to the server.

  • Pub Date: 2010/24/11
  • Number: 09088611
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Resonant controller circuit and system with reduced peak currents during soft-start

A circuit includes a first control output adapted to couple to a control terminal of a first transistor and a second control output adapted to couple to a control terminal of a second transistor. The circuit further includes a feedback input for receiving a signal and a control circuit. The control circuit is configured to independently control first and second on-times of control signals applied to the first and second control outputs, respectively, in response to receiving the signal to limit a current at an output node.

  • Pub Date: 2010/24/11
  • Number: 08804382
  • Owner: Semiconductor Components Industries, LLC
  • Location: Phoenix, US
  • Details: Visit USPTO

Visit USPTO Page


Recording and analyzing data on a 3D avatar

In particular embodiments, a method includes generating a 3D display of an avatar of a person, where the avatar can receive inputs identifying a type of a physiological event, a location of the physiological event in or on a person's body in three spatial dimensions, a time range of the physiological event, a quality of the physiological event, and rendering the physiological event on the avatar based on the inputs.

  • Pub Date: 2010/24/11
  • Number: 08928671
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Providing context-aware input data

External constraints with respect to at least one input field of at least one application are generated. Context-aware input data is provided to at least one input field of a currently used application, based on the external constraints.

  • Pub Date: 2010/24/11
  • Number: 09104439
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and computer program for bytecode weaving

A method, computer apparatus and computer program product for bytecode weaving is described herein. The method includes determining when a code module such as an OSGi bundle that requires bytecode weaving becomes available for loading into a system. Code associated with the code module is loaded. This code may be part of the module itself or part of a separate entity, such as an OSGI bundle fragment, but does not require weaving. Responsive to loading the code associated with the code module, a reference is received to the entity responsible for loading the code associated with the code module. A code entity (which does require weaving) within the code module is identified and a woven set of bytes are provided to the code loading entity identified via the returned reference. Consequently, the woven set of bytes represents a transformed version of the identified code entity.

  • Pub Date: 2010/24/11
  • Number: 09652205
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for decomposing complex shapes into curvy RHTs for rasterization

A complex curved primitive is decomposed into curvy RHTs comprising a curved portion and horizontal and vertical lines. Pixel rows covered by curvy RHTs are determined. RHT pixels covered by the curved primitive are determined with counters. Tile based color rendering is performed for covered pixels. The primitive path is decomposed into Bezier curves. Curvy RHTs may overlap and may cover pixels that are not covered by the curved primitive. Pixel rows are located by traversing an RHT path and the direction of traversing may determine pixel counts. Pixel coverage and tile coverage information is stored in memory. Pixels may be rendered in parallel. The curved primitive is rendered in a tile binning phase and a tile rendering phase. Tile rendering comprises a pixel coverage first pass which determines pixels covered by said curved primitive and a color rendering second pass.

  • Pub Date: 2010/24/11
  • Number: 08797325
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Matching a usage history to a new cloud

Embodiments relate to systems and methods for identifying usage histories and end users that may benefit from being redeployed to a new cloud-based network. In particular, a new cloud can receive usage histories corresponding to end user usage in a respective set of other pre-existing clouds. In embodiments, the new cloud can determine whether the new cloud provides sufficient resources to properly host each end user recorded in the usage histories. Further, the new cloud can determine whether there is a cost benefit or other advantage for a user to move to the new cloud. In embodiments, a deployment recommendation may be sent to an administrator of the cloud associated with the desirable usage history.

  • Pub Date: 2010/24/11
  • Number: 08713147
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Generating configurable subscription parameters

Implementations relate to accessing a set of usage history data associated with a user account operating a workload on a set of virtual machines in a default deployment, generating, by a hardware processor, a predictive workload associated with the user account in view of the set of usage history data associated with the user account, responsive to generating the predictive workload, identifying a set of available resources in a set of host clouds of virtual machines provided by a cloud provider over the first period of time, accessing a set of deployment criteria received from the cloud provider, and generating a set of subscription parameters in view of the predictive workload, the set of available resources, and the set of deployment criteria to migrate the predictive workload to the set of host clouds of virtual machines.

  • Pub Date: 2010/24/11
  • Number: 09442771
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Distribution of network communications based on server power consumption

A network device is described that load-balances network traffic among a set of network servers based on electrical power consumption of the network servers. The network device may measure electrical power consumption in a variety of ways, and may generate and maintain a power consumption profile for each of the network server. The power consumption profile may describe the respective server power consumption in increasing granularity. For instance, each power consumption profile may specify electrical power consumption according to watts consumed by a server per average transaction, watts consumed per transaction for a specific type of software application, watts consumed per transaction for a software application for individual network resources, and so on. Furthermore, the profiles may be maintained for individual servers or aggregated for groups or sequences of servers.

  • Pub Date: 2010/24/11
  • Number: 08261116
  • Owner: Juniper Networks, Inc.
  • Location: Sunnnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Detection and display of semantic errors in a reporting tool

Various embodiments of systems and methods for providing a semantic guidance in a report are described herein. A mismatch is identified between a report object positioned at a location on the report and the area with which the location is associated. The mismatch is identified based on the metadata of the report object and the attribute of the area with which the location is associated. In one embodiment, the identified mismatch is displayed to a user in a tooltip. In one embodiment, if an attribute of an area of the report is changed, the mismatch is identified between the report object present in the area and the changed attribute.

  • Pub Date: 2010/24/11
  • Number: 08775463
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Combinatorial optimization of multiple resources across a set of cloud-based networks

Embodiments relate to combinatorial optimization of multiple resources across a set of cloud-based networks. In aspects, a set of usage histories can store patterns for users in a host cloud-based network recording the consumption of processor, memory, storage, operating system, application, or other resources subscribed to by the user. The user can be a corporation or other collective user. A deployment engine can identify similar target resources available in a set of target clouds. The engine can receive selection criteria for selecting target clouds for a migration of the user's deployment. In the combinatorial selection, each target cloud can independently supply one or more target resources. The engine can thus identify a series of combinations of target resources and target clouds supplying those resources to discover combinations of target clouds and target resources that can satisfy or optimize the selection criteria, such as cost or others.

  • Pub Date: 2010/24/11
  • Number: 08924539
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Client-server input method editor architecture

In general, one innovative aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving an input method editor (IME) server request, the IME server request including one or more tokens and requesting that an IME server be instantiated, the IME server executing one or more IME functions based on a key event sent from an IME client, wherein the IME server is a stateful server that stores both requests and responses of a communication session between the IME server and the IME client, determining that the IME server can be instantiated in a restrictive environment based on the one or more tokens, and instantiating the IME server in the restrictive environment. Other embodiments of this aspect include corresponding systems, apparatus, and computer programs, configured to perform the actions of the methods, encoded on computer storage devices.

  • Pub Date: 2010/24/11
  • Number: 08904012
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-IL-6 antibodies or fragments thereof to treat or inhibit cachexia, associated with chemotherapy toxicity

The present invention is directed to therapeutic methods and compositions, especially subcutaneous and intravenous composition using antibodies and fragments thereof having binding specificity for IL-6 to prevent or treat cachexia, fever, weakness and/or fatigue in a patient in need thereof. In preferred embodiments, the anti-IL-6 antibodies will be humanized and/or will be aglycosylated. Also, in preferred embodiments these patients will comprise those exhibiting (or at risk of developing) an elevated serum C-reactive protein level. In another preferred embodiment, the patient's survivability or quality of life will preferably be improved.

  • Pub Date: 2010/24/11
  • Number: 08992904
  • Owner: Alderbio Holdings LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Antagonists of IL-6 to prevent or treat thrombosis

The present invention is directed to therapeutic methods using IL-6 antagonists such as antibodies and fragments thereof having binding specificity for IL-6 to prevent or treat thrombosis or hypercoagulation in patients having, or at risk of developing, diseases associated with abnormal blood coagulation or fibrinolysis and/or patients which are at increased risk or are being treated by a regimen that renders the patient at increased susceptibility to hypercoagulation or thrombosis such as patients who have previously had a stroke or heart attack or persons on a treatment regimen with a drug or chemotherapy and/or radiation that is associated with increased risk of thrombosis or hypercoagulation. In preferred embodiments these patients will comprise those exhibiting elevated D-dimer or other coagulation cascade related proteins and optionally will further exhibit elevated C reactive protein prior to treatment. The subject therapies also may include the administration of other actives such as chemotherapeutics, anti-coagulants, statins, et al.

  • Pub Date: 2010/24/11
  • Number: 09468676
  • Owner: ALDERBIO HOLDINGS LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Aggregation of marginal subscription offsets in set of multiple host clouds

Embodiments relate to systems and methods for aggregating marginal subscription offsets in a set of multiple host clouds. A set of aggregate usage history data can record consumption of processor, memory, operating system, or other resources subscribed to by a user across multiple host clouds. An entitlement engine can analyze the aggregate usage history data to identify a short-term subscription margin for one or more subscribed resources, such as processor throughput, operating system instances, or other resources reflecting the under or over-consumption of a cloud resource against subscription limits on an hourly or other basis across multiple clouds. The entitlement engine can track the short-term subscription margin for one or multiple resources each hour of a day, and/or over other intervals, and determine the positive or negative subscription offset cost for each interval. The offsets can be combined to generate a net or aggregate subscription offset cost, or to provide other subscription adjustments.

  • Pub Date: 2010/24/11
  • Number: 08949426
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Test system for voice communications systems

Systems, methods, and computer program products are provided for testing a voice communication system. A job instruction is transmitted from an application server to a turret via a communications network. The application server causes the turret to execute at least one diagnostic test based on the job instruction. The application server receives, from the turret via the communications network, a message including a result of the at least one diagnostic test.

  • Pub Date: 2010/23/11
  • Number: 08594278
  • Owner: IPC Systems, Inc.
  • Location: Jersey City, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for migrating software modules into one or more clouds

Embodiments relate to systems and methods for migrating software modules into one or more target clouds. The systems and methods can analyze system data to determine software modules supported by the system, and target cloud data to determine which target clouds have a capacity to support a migration of the software modules. In embodiments, benefits of migrating any or all of the software modules to the target clouds can be determined. Based on the benefits, the software modules of the system can be segmented and migrated into systems associated with the multiple target clouds.

  • Pub Date: 2010/23/11
  • Number: 08612577
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for identifying usage histories for producing optimized cloud utilization

Embodiments relate to systems and methods for identifying usage histories for producing optimized utilization in a cloud-based network. In particular, a target cloud can receive usage histories corresponding to end user usage in a respective set of other clouds. In embodiments, the target cloud can simulate an execution of the usage histories on resources in the target cloud to generate a set of utilization ratios. Further, the target cloud can determine a desirable usage history from the set of utilization ratios based on highly optimized resource usage within the target cloud. In embodiments, an administrator of the target cloud can provide a deployment recommendation to an administrator of the cloud associated with the desirable usage history.

  • Pub Date: 2010/23/11
  • Number: 08612615
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing airline seat reservations

This invention relates to an electronic means by which people can select the exact seat or seats they want for any type of event or reserve an appointment for any activity. More specifically, a customer or a ticket re-seller or a venue operator can go, for example, to the internet and select the event or activity for which he wants a ticket or tickets or reserve a time and reserve and order the exact seat or seats or the time of his choosing directly online. The seat or seats or reserved time he selects is then removed from the inventory for that activity or event and made not available for any other buyer and such is so indicated by a graphical representation or other such indicator on the online map or picture representing availability of seating or time for that event.

  • Pub Date: 2010/23/11
  • Number: 08219448
  • Owner: CEATS, Inc.
  • Location: Tyler, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for determining fuzzy cause and effect relationships in an intelligent workload management system

The system and method for determining fuzzy cause and effect relationships in an intelligent workload management system described herein may combine potential causes and effects captured from various different sources associated with an information technology infrastructure with substantially instantaneous feedback mechanisms and other knowledge sources. As such, fuzzy correlation logic may then be applied to the combined information to determine potential cause and effect relationships and thereby diagnose problems and otherwise manage interactions that occur in the infrastructure. For example, information describing potential causes and potential effects associated with an operational state of the infrastructure may be captured and combined, and any patterns among the information that describes the multiple potential causes and effects may then be identified. As such, fuzzy logic may the be applied to any such patterns to determine possible relationships among the potential causes and the potential effects associated with the infrastructure operational state.

  • Pub Date: 2010/23/11
  • Number: 08620851
  • Owner: Novell, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


Selectively granting a floor during set-up of a communication session within a wireless communications system

An embodiment is directed to an application server configured to set-up a communication session within a wireless communications system. The application server receives, from a session originator, a request to initiate the communication session with a set of session targets, and then transmits one or more call announcement messages for announcing the communication session to the set of session targets. The application server determines information associated with a probability that the set of session targets will fail to accept the announced communication session, and/or delay information associated with when call responses will arrive from the set of session targets in response to the one or more call announcement messages. The application server selectively grants a floor of the communication session to the session originator based on the determined information.

  • Pub Date: 2010/23/11
  • Number: 08688843
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Searching for mobile content

Methods and apparatus, including computer systems and program products, for searching for mobile content. A method includes receiving, via a user interface, at a computer system independent of the mobile device, information identifying the mobile device to receive computer data; receiving, at the computer system, information identifying the computer data to be downloaded to the mobile device; using the computer system to search computer data offerings from mobile device content providers for the computer data; and wirelessly transmitting to the mobile device data corresponding to a search result. Another method includes an application, on a mobile device, querying a computer system independent of the mobile device for a result of a search for the computer data, and causing the downloading of the computer data.

  • Pub Date: 2010/23/11
  • Number: 08170541
  • Owner: Single Touch Interactive, Inc.
  • Location: Encinitas, US
  • Details: Visit USPTO

Visit USPTO Page


Scripting web services

A process performed on a server includes configuring the server to enable script for a Web service to be defined dynamically, where the Web service includes an application program interface (API) for enabling access by, and interaction with, a computer program executing on a device other than the server. The process also includes compiling the script to produce machine-executable code for the Web service, receiving a call from the computer program to the Web service, executing the machine-executable code in response to the call to produce an output, and sending the output to the device.

  • Pub Date: 2010/23/11
  • Number: 08689181
  • Owner: Axeda Corporation
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Providing customized visualization of application binary interface/application programming interface-related information

A mechanism for providing customized visualization of Application Binary Interface-related information is described. A method of embodiments of the invention includes querying a database storing interface provisioning details and interface usage details relating to application binary interfaces (ABIs) associated with shared libraries provided by an operating system running on a computer system. The database further stores comparison results obtained from comparing the interface provisioning details with the interface usage details. The method further includes extracting a set of information from the database, and customizing visualization representation of the set of information. The set of information is composed of any part or all of the interface provisioning details, the interface usage details, and the comparison results.

  • Pub Date: 2010/23/11
  • Number: 08938706
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Preconcentrator for analysis instruments

An interchangeable preconcentrator assembly for delivering an analyte to an analysis instrument. The assembly includes a housing defining an inner chamber. An inlet is in fluid communication with the inner chamber, an outlet is in fluid communication with the inner chamber for delivering fluid to the inlet of the analysis instrument, and an exhaust outlet is in fluid communication with the inner chamber. A plurality of removable preconcentrator packages are disposed within the inner chamber. Each of the removable preconcentrator packages including a microscale preconcentrator. A fluid flow path is defined between the inlet and the inner chamber. A first fluid flow path is defined between the preconcentrators and the exhaust outlet, and a second fluid flow path is defined between the preconcentrators and the outlet. A selectably operable valve directs fluid flow from the inner chamber into either the first fluid flow path or the second fluid flow path.

  • Pub Date: 2010/23/11
  • Number: 08569691
  • Owner: University of Louisville Research Foundation
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Online logo tool

An online tool allows a user, such as an online merchant, to access a page of a service provider, select a format, customize funding sources and designs, and copy and paste the code to the merchant page to quickly and easily create a customized funding source graphic.

  • Pub Date: 2010/23/11
  • Number: 08977973
  • Owner: Ebay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Object-based transport protocol

Methods and apparatuses are provided that facilitate providing an object-based transport protocol that allows transmission of arbitrarily sized objects over a network protocol layer. The object-based transport protocol can also provide association of metadata with the objects to control communication thereof, and/or communication of response objects. Moreover, the object-based transport protocol can maintain sessions with remote network nodes that can include multiple channels, which can be updated over time to seamlessly provide mobility, increased data rates, and/or the like. In addition, properties can be modified remotely by network nodes receiving objects related to the properties.

  • Pub Date: 2010/23/11
  • Number: 08862769
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Network device

A network multifunction peripheral includes an NIC that conducts communication with a LAN and a recording unit that can be put in a normal power state and a low-power consumption state. The recording unit processes received data when the recording unit is in the normal power state. The NIC includes a transmit-receive unit that transmits and receives data, a power state determining unit that determines the power state of the recording unit, a start-up signal output unit that outputs a start-up signal when a session establishment request signal is received from a PC and when determined that the recording unit is in the low-power consumption state, and a persistent connection control unit that performs persistent connection control to prohibit the PC from transmitting the data while a session is maintained with the PC until the recording unit is started up.

  • Pub Date: 2010/23/11
  • Number: 08793513
  • Owner: Murata Machinery, Ltd
  • Location: Kyoto, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for risk visualization and remediation

A method and apparatus provides techniques for providing complete solutions for role-based, rules-driven access enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, and physical systems from a single analytic dashboard, with auto-remediation capabilities. Further, an embodiment provides capability and functionality for providing visual risk and event monitoring, alerting, mitigation, and analytics displayed on a geospatial map.

  • Pub Date: 2010/23/11
  • Number: 08769412
  • Owner: Alert Enterprise, Inc.
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Ink jet printing apparatus and printing method

By suppressing deviation of dot-formation positions stemming from insufficient accuracy in conveying a printing medium due to eccentricity of a conveying roller, a printed image in which unevenness is less visible is obtained. An accumulated amount of conveyance errors is decreased by narrowing a nozzle-use range and reducing a conveyance amount over an entire printing region according to a mode used for printing an image in which the coverage of a printing medium is low due to a small number of ink colors to be used, for example, a mode used for printing a monochrome image by using a black ink dominantly in all of the density regions.

  • Pub Date: 2010/23/11
  • Number: 08511779
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Indentifying service dependencies in a cloud deployment

Embodiments relate to systems and methods for identifying service dependencies in a cloud deployment. In particular, a deployment module can receive usage data from a host cloud comprising data related to end user operation of a set of services in the host cloud as well as service dependencies among the set of services. In embodiments, the deployment module can determine candidate target clouds in which to deploy the set of services. Further, in embodiments, the deployment module can determine whether the candidate target clouds have a capacity to support the set of services, as well as whether services within the candidate target clouds are compatible based on the service dependencies.

  • Pub Date: 2010/23/11
  • Number: 08904005
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Determining support criteria for shared libraries based on their priority levels

A mechanism for determining support criteria for shared libraries based on their priority levels is described. A method of embodiments of the invention includes extracting interface provisioning detail relating to interfaces associated with shared libraries provided by an operating system running on a computer system. The interfaces include application binary interfaces (ABIs). The method further includes detecting interface usage detail associated with the interfaces. The interface usage detail is based on a frequency at which one or more interfaces are used by one or more third-party software programs running on the operating system. The method further includes comparing the interface provisioning detail with the interface usage detail to determine an importance level of each shared library, and analyzing comparison results obtained from the comparison. The analyzing includes assigning a priority level to each shared library based on its importance level.

  • Pub Date: 2010/23/11
  • Number: 08776036
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Conflict switches for implementation guide node changes

An enhancement implementation analysis method and system are provided. A processor may determine a node in an implementation guide hierarchy to be analyzed for conflicts. Based on the determination, a list of all switches assigned to the node in the implementation guide hierarchy may be retrieved from a data store. The list of retrieved switches may be checked by a processor to determine whether the switch is an active conflict switch. Upon a determination that the conflict switch is an inactive conflict switch, the conflict switch may be deleted from the retrieved list of all switches. If the conflict switch is determined to be an active conflict switch, the conflict switch may be added to a list of relevant switches, and the list of relevant switches may be processed to resolve conflicts, and a corresponding implementation guide may be presented.

  • Pub Date: 2010/23/11
  • Number: 08473867
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Compact fiber-based scanning laser detection and ranging system

A system for short-range laser detection and ranging of targets can provides rapid three-dimensional, e.g., angle, angle, range, scans over a wide field-of-view. Except for the final transmit/receive lens, the disclosed LADAR system can be implemented in an all-fiber configuration. Such system is compact, low cost, robust to misalignment, and lends itself to eye-safe operation by making use of available pulsed 1550 nm fiber lasers and amplifier sources. The disclosed LADAR system incorporates many novel features that provide significant advantages compared to current LADAR systems. The disclosed system uses a monostatic fiber-based transmitter/receiver, a fiber beam scanner based on a laterally vibrating fiber, and a position sensor to monitor the transmitted beam position.

  • Pub Date: 2010/23/11
  • Number: 08946637
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual collection of entities in sync process

Apparatus and methods to control selection of media content provide a mechanism to enhance user interaction with multimedia devices. Additional apparatus, systems, and methods are disclosed.

  • Pub Date: 2010/22/11
  • Number: 09606993
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


UE antenna tuner control via node-B inner power control loop

A user equipment (UE) antenna tuner control system and method that utilize a base transceiver station (BTS) inner power control loop, and in particular utilize a Node-B inner power control loop, are provided. The UE antenna tuner control system and method of the present disclosure include an antenna impedance matching algorithm and a power amplifier (PA) input drive control that are digitally controlled by the BTS. Therefore, each UE having a digitally controllable antenna tuner unit (ATU) and operating within a network that is controllable by the BTS will have increased power efficiency.

  • Pub Date: 2010/22/11
  • Number: 09420395
  • Owner: Qorvo US, Inc.
  • Location: Greensboro, US
  • Details: Visit USPTO

Visit USPTO Page


Social commerce relationship management system

A method and system is disclosed for conducting electronic commerce within a social media environment. A user performs social media interactions within a social media environment and elects to consider purchasing a vendor's product that is referenced in an activity stream. The user then proceeds to a social commerce site while they are still within the social media environment. The user then accesses the social commerce site and performs social commerce operations, such as selecting and purchasing the product referenced in the activity stream.

  • Pub Date: 2010/22/11
  • Number: 09619834
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Silent sign-in for offline games

Techniques are disclosed to silently sign in a user of an offline game title onto an online service. The user is afforded access to select online services to facilitate future online gaming. In a described implementation, a method is disclosed. The method silently signs in a user of an offline game title onto an online gaming service. As a result, the signed-in user may receive one or more online services such as an in-game notification, a friend request (e.g., inviting a user to become a friend), a cross-title game invitation, and/or data corresponding to a friends list.

  • Pub Date: 2010/22/11
  • Number: 08719168
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Scripted dynamic document generation using dynamic document template scripts

A dynamic document template having static data, dynamic data, and/or procedural statements may be called by an application on a server. The dynamic document template is separate from the application program and is processed to form an interim script, which is then executed by a host computer system. The script generates document records in HTML or XML format that are output to a document. The data and procedural statements in the dynamic document template may be distinguished through interpreting mark-up language surrounding the data and procedural statements. The dynamic document templates execute in a separate namespace from the application and preserve the state of data in the application. A given application may call more than one dynamic document template to generate different portions of the output document. Additionally, the dynamic document templates may be replaced with new templates without affecting the application.

  • Pub Date: 2010/22/11
  • Number: 09262185
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for treating restenosis

Restenosis in a subject can be treated by administering to a tissue, e.g., a blood vessel, of the subject an agent that increases SERCA activity. For example, a stent that is coated with the agent can be introduced into a blood vessel.

  • Pub Date: 2010/22/11
  • Number: 08133878
  • Owner: The General Hospital Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for enhancing television applications using 3D pointing

Systems and methods according to the present invention provide a control framework for organizing, selecting and launching media items including graphical user interfaces coupled with an optional 3D control device for collection of the basic control primitives of point, click, scroll, hover and zoom which permit for easy and rapid selection of media items, e.g., movies, songs etc., from large or small collections. The remote control maps natural hand movements and gestures into relevant commands while the graphical display uses images, zooming for increased/decreased levels of detail and continuity of GUI objects to provide easy organization, selection and navigation among the media items by a user.

  • Pub Date: 2010/22/11
  • Number: 08169405
  • Owner: Hillcrest Laboratories, Inc.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated automatic user support and assistance

A method of integrated automatic support and assistance includes identifying a user and retrieving models representing the user's device, apparatus, service, or system, receiving a query from the user, as necessary refining the query, determining if the received query is a machine translatable query, restructuring machine translatable terms of the received query into semantic components based upon the retrieved models, determining a set of candidate knowledge bases both related to the semantic components, submitting the machine translatable query to each knowledge base of the set of candidate knowledge bases, receiving a set of responses from each knowledge base of the set of knowledge bases in response to the submitting, formatting the set of responses, submitting the formatted set of responses to the user, determining if a response of the submitted formatted set of responses is accepted by the user, applying updated weights within the formatted set of responses, and storing the updated weights for future queries.

  • Pub Date: 2010/22/11
  • Number: 08521675
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Assigning tags to digital content

Assigning tags to content on a page stored within a digital document environment is described. An activity log is received for a document including data indicating search queries resulting in the location of the document by a search engine. One or more keywords are determined from the activity log, and the document is tagged with a tag associated with the keywords.

  • Pub Date: 2010/22/11
  • Number: 09396188
  • Owner: CBS Interactive Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Virtualization of non-volatile memory and hard disk drive as a single logical drive

Systems and techniques relating to storage technologies are described. A described technique includes operating drives such as a solid state drive (SSD) and a disk drive, where the SSD and the disk drive are virtualized as a single logical drive having a logical address space, where the logical drive maps logical block addresses to the SSD and to the disk drive. The technique includes determining, based on a file to be written to the logical drive, a target logical address that corresponds to one of the SSD and the disk drive, and writing the file to the logical drive at the target logical address to effect storage on one of the SSD and the disk drive.

  • Pub Date: 2010/19/11
  • Number: 08769241
  • Owner: Marvell World Trade Ltd.
  • Location: St. Michael, BB
  • Details: Visit USPTO

Visit USPTO Page


System, devices and method for secure authentication

A system, devices and method for authenticating a user requesting access, through a computing device connected to a network, to an on-line resource hosted by a server in communication with the network. The system, devices and method employing an authentication server and a mobile communications device in communication over a wireless network. The authentication server forwarding an authentication to the mobile communications device. Optionally, the authentication server also returning security information related to the authentication in response to the request. The mobile communications device operative to receive and process the authentication, and forward the processed authentication to the computing device over a short-range communications link.

  • Pub Date: 2010/19/11
  • Number: 08689297
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for motor and cognitive analysis

A cognitive and/or motor skill testing system and method may include a processor that records respective time information for each of multiple positions of a display device that are traced during administration of a test, that determines speed and/or velocity values based on the recorded time information, and that outputs test result information based on the determined values. The test result information may be based on a comparison between a graphed curve of such values to an ideal curve. The positions may correspond to a path between displayed targets whose size and/or distance therebetween depend on past test performance. The system and/or method may output a change expected with a change to therapy parameters for a patient, where the expected change is determined based on changes which occurred in other patients having similar test results and therapy parameters as those of the patient.

  • Pub Date: 2010/19/11
  • Number: 09653002
  • Owner: The Cleveland Clinic Foundation
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Selectively formatting media during a group communication session

In an embodiment, during a group communication session, media is received from a first set of access terminals that belong to a communication group, wherein the received media corresponds to content for presentation to a second set of access terminals that belong to the communication group. In an example, the media can be received either at an application server arbitrating the group communication session, or alternatively at a target access terminal for the received media that belongs to the second set of access terminals. Location information associated with an access terminal among the first or second sets of access terminals is determined, and the received media is selectively reformatted based on the determined location information.

  • Pub Date: 2010/19/11
  • Number: 09084079
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Predictive governing of dynamic modification of program execution capacity

Techniques are described for managing program execution capacity or other capacity of computing-related hardware resources used to execute software programs, such as for a group of computing nodes that is in use executing one or more programs for a user. Dynamic modifications to the program execution capacity of the group may include adding or removing computing nodes, such as in response to automated determinations that previously specified triggers are currently satisfied, and may be automatically governed at particular times based on automatically generated predictions of program execution capacity that will be used at those times by the group, such as to verify that requested dynamic execution capacity modifications at a time are within the predicted execution capacity values for that time. In some situations, the techniques are used in conjunction with a fee-based program execution service that executes multiple programs on behalf of multiple users of the service.

  • Pub Date: 2010/19/11
  • Number: 08346921
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile posture-based policy, remediation and access control for enterprise resources

A mobile device management system that monitors the security state of one or more mobile devices and sets indicators related to such security state. Enterprise network applications, such as an email application, can access the security state information when making access control decisions with respect to a given mobile device.

  • Pub Date: 2010/19/11
  • Number: 08869307
  • Owner: Mobile Iron, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for cell recovery in telecommunication networks

A method and system that helps to ensure that any cell crash (i.e., an involuntarily action occurring as a result of a software bug or malfunction) is localized to a single cell on a single modem board that supports multi-cell configuration. In this regard, the control plane and the remaining cells that are configured on the modem board should remain operational. Further the operator should be able to choose to take corrective action (i.e., reboot, reconfigure, delete, or create) with regard to a cell on the modem board without impacting the operations of the other configured cells.

  • Pub Date: 2010/19/11
  • Number: 08730790
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for identifying video program material or content via differential signals

A system for identification of video content in a video signal is provided by providing a difference signal between an input signal and the delayed input signal. An alternative embodiment includes providing frequency coefficients from one or more video frames along a curve, or from a region of the video frame. In another embodiment a filter bank provides a real time or near real time frequency analysis of a video signal to provide identification. Other attributes of the video signal or transport stream may be combined with closed caption data or closed caption text for identification purposes. Example attributes include DVS/SAP information, time code information, histograms, and or rendered video or pictures.

  • Pub Date: 2010/19/11
  • Number: 08761545
  • Owner: Rovi Technologies Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for content aware optimized tunneling in a mobility environment

A method, computer readable medium and apparatus for performing content aware optimized tunneling in a communication network are disclosed. For example, the method authenticates a user endpoint device, establishes a tunnel to the user endpoint device if the user endpoint device is authenticated, analyzes content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed, and re-directs the tunnel to a gateway general packet radio services support node light based upon the content of the data packet.

  • Pub Date: 2010/19/11
  • Number: 08578447
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Managing automated and manual application testing

An application for which approval is requested is identified and multiple automated tests are applied to the application in groups of automated tests. Each of the groups of automated tests includes multiple ones of the multiple automated tests. If one or more automated tests in a group of automated tests returns an inconclusive result, then a manual check is initiated for the application based on the one or more automated tests that returned the inconclusive result. If one or more automated tests in a group, or a manual test applied in the manual check, returns a fail result then an indication that the application is rejected is returned, the indication that the application is rejected including an identification of why the application is rejected. If none of the multiple automated tests returns a fail result, then a manual testing phase is initiated.

  • Pub Date: 2010/19/11
  • Number: 08661412
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Management of mobile applications

In particular implementations, a mobile device management system allows network administrators to control the distribution and publication of applications to mobile device users in an enterprise network.

  • Pub Date: 2010/19/11
  • Number: 08359016
  • Owner: Mobile Iron, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic detection and reduction of unaligned I/O operations

Detection and reduction of unaligned input/output (“I/O”) requests is implemented by a storage server determining an alignment value for data stored by the server within a storage system on behalf of a first client, writing the alignment value to a portion of the volume that stores the data for the first client, but not to a portion of the volume that stores data for a second client, and changing a location of data within the portion of the volume that stores the data for the first client, but not a location of data in the portion of the volume that stores data for the second client, to an alignment corresponding to the alignment value. The alignment value is applied to I/O requests directed to the portion of the volume that stores the data blocks for the first client after the location of the data blocks has been changed.

  • Pub Date: 2010/19/11
  • Number: 08484433
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Behavior-based inferences and actions

The position and/or movement of at least one device for a user can be monitored over time, and various types of information inferred based on patterns in that user behavior. A device can determine various locations where a user typically stays for a period of time, as well as the routes the user takes to get to those locations. Based upon time, date, and various other information, the device can infer the type of location and/or route, as well as the likelihood that the user will take a given route to one of those locations at any time. By being able to infer future actions and locations of the user at certain times, a device can proactively provide a variety of functionality to the user, such as to provide suggested alternative routes, move meetings, notify others of estimated times of arrival, and perform other such tasks.

  • Pub Date: 2010/19/11
  • Number: 09574894
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for selection of a gateway of a local area network

A provided apparatus is caused to direct establishment of a connection of the apparatus with a core network via a wide area radio access network (RAN), where the core network is coupled to an external network. The apparatus is also caused to select or receive selection of a local area network that is coupled to the same or different external network via one or more local gateways (L-GWs). The apparatus is caused to request selection of a L-GW of the one or more L-GWs from the core network via the wide area RAN, and in response, receive an identity of a selected L-GW. Further, the apparatus is caused to direct contact with the selected L-GW based on the identity, and establishment of a connection of the apparatus with the selected L-GW. The apparatus may thereby be connected to the external network via the local area network and selected L-GW.

  • Pub Date: 2010/19/11
  • Number: 08649359
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Verification of a computer program in respect to an unexpected response to an access request

Testing a computer program comprises identification of resource access requests by the computer program to a resource provided by an underlying host. The resource access requests may be intercepted and a determined response may be returned instead of the actual response of the underlying host. In some exemplary embodiments, the resource may a clock of the underlying host and the response may be the time of the clock. In some exemplary embodiments, the computer program may be tested to check for validity during execution on a cloud computing environment, in which access to resources may yield results that on a non-cloud computing environments are generally not expectable. The testing may be performed on a non-cloud computing environments and simulate scenarios applicable to cloud computing environments.

  • Pub Date: 2010/18/11
  • Number: 09612942
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Transmitting keep-alive packets on behalf of a mobile communications device within a wireless communications system

In an embodiment, a mobile communications device (MCD) is positioned within an internal network that is separated from an external network by network address translation (NAT) and/or a firewall. The MCD establishes settings with the NAT and/or firewall by which the MCD can be contacted through from the external network. The settings are configured to be disabled by the NAT and/or firewall after a threshold period of traffic inactivity. An application server receives information associated with the settings, and instructs an assisting application server (AAS) within the internal network to transmit keep-alive packets on behalf of the MCD so as to maintain the settings for the MCD. The AAS receives the instructions from the application server, and instructs an assisting wireless communications device (WCD) within the internal network to transmit keep-alive packets on behalf of the MCD. The WCD then transmits the keep-alive packets in accordance with the instructions.

  • Pub Date: 2010/18/11
  • Number: 08490174
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for statistical control and fault detection in a building management system

A building management strategy includes using exponentially weighted moving averages with statistical models to detect changes in the behavior of the building management system. Detected changes in the behavior of the system may indicate a detected fault, a change in a predicted behavior, or a need for the statistical models to be updated.

  • Pub Date: 2010/18/11
  • Number: 08532839
  • Owner: Johnson Controls Technology Company
  • Location: Holland, US
  • Details: Visit USPTO

Visit USPTO Page


Rotatable gun mount

A gun mount for spanning an opening, such as a door or window, may include a generally tubular bar having a pivot and lock structure on one end. The bar may include a pair of slots formed on opposing sides of the bar. A locking sleeve may be slidable on the bar. A fastener may be fixed to the locking sleeve and translatable in the pair of slots in the bar. A second generally tubular bar may include a yoke at one end and a hinge assembly at another end. The yoke may be rotatably engaged with the pivot and lock structure. The pivot and lock structure may include a locking groove. A spring-loaded locking plunger may be translatably disposed in the yoke and may include a protrusion that is selectively engagable with the locking groove.

  • Pub Date: 2010/18/11
  • Number: 08336441
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-step search result retrieval

A method for providing search results to a user operating a third-party web page includes receiving a search request from the third-party web page. One or more search results may be identified that satisfy the search request. The one or more search results each have identifying information to be presented to a user, as well as substantive content. A unique identifier, such as an opaque token, is associated with each of the search results. The identification of the one or more results is provided to the third-party web page in a pop-up window or a widget. A request for the content for a selected search result of the one or more search results is received. The unique identifier may be used to validate the request, and the content is provided to the user, either directly or through the widget, on the third-party webpage.

  • Pub Date: 2010/18/11
  • Number: 09177058
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for autonomic discovery of sensitive content

A data loss prevention (DLP) system provides a policy-based mechanism for managing how data is discovered and classified on an endpoint workstation, file server or other device within an enterprise. The technique described herein works in an automated manner by analyzing file system activity as one or more endpoint applications interact with a file system to build a statistical model of which areas of the file system are (or will be deemed to be) active or highly active. Using this information, scanning to those areas by the DLP software is then prioritized appropriately to focus compute resources on scanning and classifying preferably only those files and folders that are necessary to be scanned, i.e., the file system portions in which the user is applying the majority of his or her activity. As a result, the technique limits scanning to only those areas that have meaningful activity (thereby conserving compute resources with respect to files or folders that have not changed), improving scanning efficiency.

  • Pub Date: 2010/18/11
  • Number: 09569449
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated circuits design

This invention concerns an automated method of generating a design for an I/O fabric of a target integrated circuit having a core and pins. A process tool executes algorithms to generate a synthesizable representation of the I/O fabric ring in hardware description language. It imports integrated circuit design data, and from it captures I/O specification data for a circuit core, library of cells, pin, I/O control, BSR and I/O cell chaining, and die. The tool validates the specification data, and generates the I/O fabric design by configuring and inter-connecting a pin multiplexing and control matrix structures according to constraints for signal control, and timing. The structures includes on both the input and output paths of each pin a functional multiplexer matrix structure, a test multiplexer matrix structure, an override matrix structure, a multiplex select and control matrix structure, and an I/O Cell control logic. A required pin output circuit is configurable by modification of the I/O specification data, and/or, modification of a manner of wiring the algorithms, and/or by modification of the algorithms. The tool wires algorithms according to a wiring framework, and said wiring framework is modifiable.

  • Pub Date: 2010/18/11
  • Number: 08386980
  • Owner: Duolog Research Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Hardware-based credential distribution

This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile.

  • Pub Date: 2010/18/11
  • Number: 08572699
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Executing a kernel device driver as a user space process

A method, including receiving, by a user space driver framework (UDF) library executing from a user space of a memory over a monolithic operating system kernel, a kernel application programming interface (API) call from a device driver executing from the user space. The UDF library then performs an operation corresponding to the kernel API call.

  • Pub Date: 2010/18/11
  • Number: 08806511
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Central counterparty for data management

A central counterparty for data management (CCDM) receives data relating to financial transactions, associates the data with metadata to create reference data, stores the reference data and provides the reference data in “push” and “pull” ways. The “push” techniques for providing the data include distributing on a data feed, sending the data to parties known to be relevant to the transaction, and sending the data to parties who have a standing query that is satisfied by the data. The “pull” techniques for providing the data include responding to queries received from a variety of parties. The CCDM generates and distributes unique, unambiguous and universal identifiers (U3id's) and associates the U3id identifiers with the reference data.

  • Pub Date: 2010/18/11
  • Number: 08055575
  • Owner: Financial Intergroup Holdings, Ltd.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Analytic dashboard with user interface for producing a single chart statistical correlation from source and target charts during a load test

A processor-implemented method includes providing an analytic dashboard with a graphical user interface (GUI) that outputs aggregated results streaming in real-time of a load test performed on a target website. Responsive to input of a user on the GUI, the input comprising selection of a source chart and a target chart, a single chart is automatically generated that represents either a combination or a statistical correlation of the source and target charts. The single chart has a left y-axis and an x-axis. The combination or the statistical correlation of the single chart changing in real-time as the load test progresses. A visual representation of the single chart is then produced on the analytic dashboard.

  • Pub Date: 2010/18/11
  • Number: 09495473
  • Owner: SOASTA, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless bidirectional communications between a mobile device and associated secure element

In some embodiments, a system includes a mobile communication device and a secure element physically coupled to the mobile communication device. The mobile communication device includes a first wireless transceiver, first processor, and first memory. The secure element includes a second wireless transceiver, second processor, and second memory. The mobile communication device is configured to transmit data via the first wireless transceiver to the secure element in packets, using a packet protocol. The secure element is configured to transmit data via the second wireless transceiver to the mobile communication device in messages, using a messaging protocol distinct from the packet protocol.

  • Pub Date: 2010/17/11
  • Number: 08559987
  • Owner: Blaze Mobile, Inc.
  • Location: Berkeley, US
  • Details: Visit USPTO

Visit USPTO Page


Weighted request rate limiting for resources

Methods and systems to automatically respond to consider the weight of a request when responding to requests associated with resources are described. In one embodiment, an interface module may be configured to receive a request associated with consumer identifier and a resource. A calculator module may be configured to determine a weight of the request and a usage module configured to calculate, using a processor, a usage level associated with the consumer identifier, the usage level based on a usage history associated with the consumer identifier. An enforcer module may also be configured to respond to the request based on the usage level and the weight of the request. In one embodiment, the usage module may also be configured to update the usage level associated with the consumer identifier based on the weight of the request.

  • Pub Date: 2010/17/11
  • Number: 09058210
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


User customized animated video and method for making the same

A customized animation video system and method generate a customized or personalized animated video using user input where the customized animated video is rendered in a near immediate timeframe (for example, in less than 10 minutes). The customized animation video system and method of the present invention enable seamless integration of an animated representation of a subject or other custom object into the animated video. That is, the system and method of the present invention enable the generation of an animated representation of a subject that can be viewed from any desired perspective in the animated video without the use of multiple photographs or other 2D depictions of the subject. Furthermore, the system and method of the present invention enables the generation of an animated representation of a subject that is in the same graphic style as the rest of the animated video.

  • Pub Date: 2010/17/11
  • Number: 08963926
  • Owner: Pandoodle Corporation
  • Location: Lexington, US
  • Details: Visit USPTO

Visit USPTO Page


System for executing 3D propagation for depth image-based rendering

A system is disclosed for executing depth image-based rendering of a 3D image by a computer having a processor and that is coupled with one or more color cameras and at least one depth camera. The color cameras and the depth camera are positionable at different arbitrary locations relative to a scene to be rendered. In some examples, the depth camera is a low resolution camera and the color cameras are high resolution. The processor is programmed to propagate depth information from the depth camera to an image plane of each color camera to produce a propagated depth image at each respective color camera, to enhance the propagated depth image at each color camera with the color and propagated depth information thereof to produce corresponding enhanced depth images, and to render a complete, viewable image from one or more enhanced depth images from the color cameras. The processor may be a graphics processing unit.

  • Pub Date: 2010/17/11
  • Number: 08643701
  • Owner: University of Illinois at Urbana-Champaign
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of sharing in a plurality of networks

A system for transmission, reception and accumulation of the knowledge packets to plurality of channel nodes in the network operating distributedly in a peer to peer environment via installable one or more role active Human Operating System (HOS) applications in a digital devise of each of channel node, a network controller registering and providing desired HOS applications and multiple developers developing advance communication and knowledge management applications and each of subscribers exploiting the said network resources by leveraging and augmenting taxonomically and ontologically classified knowledge classes expressed via plurality search macros and UKID structures facilitating said expert human agents for knowledge invocation and support services and service providers providing information services in the preidentified taxonomical classes, wherein each of channel nodes communicating with the unknown via domain specific supernodes each facilitating social networking and relationships development leading to human grid which is searchable via Universal Desktop Search by black box search module.

  • Pub Date: 2010/17/11
  • Number: 08856075
  • Owner: