API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

Streamdata.io

Efficiently turn APIs into real-time experiences, using a proxy-as-a-service that turns any request-answer API into real-time event-driven data feeds without a line of server-side code.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Update mask for handling interaction between fills and updates

A multi core processor implements a cash coherency protocol in which probe messages are address-ordered on a probe channel while responses are un-ordered on a response channel. When a first core generates a read of an address that misses in the first core's cache, a line fill is initiated. If a second core is writing the same address, the second core generates an update on the addressed ordered probe channel. The second core's update may arrive before or after the first core's line fill returns. If the update arrived before the fill returned, a mask is maintained to indicate which portions of the line were modified by the update so that the late arriving line fill only modifies portions of the line that were unaffected by the earlier-arriving update.

  • Pub Date: 2012/31/12
  • Number: 09251073
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Touch-screen input/output device touch sensing techniques

A touch-screen input/output device including a touch sensor, a display, a display control module, a touch sensor control module and a synchronizer module. The touch sensor is overlaid on a display. The display control module is communicatively coupled to the display and converts video data into a serial bit stream video display signal including one or more blanking intervals. The touch sensor control module is communicatively coupled to the touch sensor and determines touch events and location of the touch event on the touch sensor during one or more touch sensor scan cycles. The synchronizer module is communicatively coupled between the display control module and the touch sensor control module, and interleaves the one or more touch sensor scan cycles with the one or more blanking intervals of the video display signal.

  • Pub Date: 2012/31/12
  • Number: 09342181
  • Owner: NVIDIA CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for synchronizing non-destructive testing devices

A non-transitory computer readable medium may include executable instructions which, when executed by a processor, cause the processor to transmit device identification information and to receive a space requirement based on a digital content. The instructions further cause the processor to compare a memory space to the space requirement, and if the memory space is greater than the space requirement, receive a digital content based on the device identification, wherein the digital content is configured to be executed by, used by, or displayed by a non-destructive testing (NDT) device, or a combination thereof.

  • Pub Date: 2012/31/12
  • Number: 09185161
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for non-destructive testing user profiles

A non-transitory computer readable medium may include executable instructions which, when executed by a processor, cause the processor to authenticate a user, and to retrieve a user profile based on the user. The instructions further cause the processor to apply the user profile to restrict an operation of a non-destructive testing (NDT) device.

  • Pub Date: 2012/31/12
  • Number: 09218470
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for licensing non-destructive testing content

A non-transitory computer readable medium may include executable instructions which, when executed by a processor, cause the processor provide for a repository of digital content and to create a first license based on the digital content. The instructions further cause the processor to transmit the first license and the digital content to a non-destructive testing (NDT) device, and wherein the digital content is configured to be executed by, used by, or displayed by the NDT device, or a combination thereof, based on the first license.

  • Pub Date: 2012/31/12
  • Number: 08950004
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for increasing application compute client data I/O bandwidth performance from data file systems and/or data object storage systems by hosting/bundling all of the data file system storage servers and/or data object storage system servers in the same common global shared memory compute system as the application compute clients

Compute client processes are currently limited to a small percentage of the data I/O bandwidth available from a parallel file system's total aggregate I/O bandwidth. I/O bandwidth is limited by the pathways linking the parallel file system's data storage servers to the clients process's computer system and the number of stops the data makes in route before arriving in the client's memory space. Both of these limitations are overcome by hosting the entire set of file system storage servers or object storage servers within the same common global shared memory, parallel computer system, as the requesting client process. The data moves once, in parallel, from the storage devices, directly to the storage servers memory, which is the same memory address space as the compute client. This provides the compute client with low-latency access to the “Entire Aggregate I/O Bandwidth” provided by all of the File System Data Storage Servers.

  • Pub Date: 2012/31/12
  • Number: 09152603
  • Details: Visit USPTO

Visit USPTO Page


Storage quality-of-service control in distributed virtual infrastructure

Techniques for delivering and measuring storage quality-of-service to virtual machines in a distributed virtual infrastructure. In one example, a method comprises the following steps. A controller obtains quality-of-service data from at least a portion of components of a distributed virtual infrastructure, wherein the components of the distributed virtual infrastructure comprise one or more storage units, one or more processing units, and one or more switches operatively coupled to form the distributed virtual infrastructure. The controller manages at least one input/output request throughout a path defined by at least one of the one or more processing units, at least one of the one or more switches, and at least one of the one or more storage units, based on at least a portion of the collected quality-of-service data.

  • Pub Date: 2012/31/12
  • Number: 09274817
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Software development and distribution workflow employing meta-object time stamping

A method and system facilitating the development and distribution of software is provided. The system includes tracking revisions to elements of a database on the computing device by establishing time stamps for each stored element changed at a specified time, enabling a user to select an applicable time period comprising a beginning time point and an end time point, and assembling elements for execution based on time stamps limited to the selected applicable time period.

  • Pub Date: 2012/31/12
  • Number: 09063823
  • Owner: Apollo Enterprise Solutions Ltd.
  • Location: Long Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Slabbed core format for borehole image data

A method can include providing borehole data organized with respect to a cylindrical surface, defining one or more bedding planes based at least in part on the borehole data, and transforming at least a portion of the borehole data to a planar slab format for a plane interior to the cylindrical surface. Various other apparatuses, systems, methods, etc., are also disclosed.

  • Pub Date: 2012/31/12
  • Number: 09494707
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Redundant execution for reliability in a super FMA ALU

A system, processor and method to increase computational reliability by using underutilized portions of a data path with a SuperFMA ALU. The method allows the reuse of underutilized hardware to implement spatial redundancy by using detection during the dispatch stage to determine if the operation may be executed by redundant hardware in the ALU. During execution, if determination is made that the correct conditions exists as determined by the redundant execution modes, the SuperFMA ALU performs the operation with redundant execution and compares the results for a match in order to generate a computational result. The method to increase computational reliability by using redundant execution is advantageous because the hardware cost of adding support for redundant execution is low and the complexity of implementation of the disclosed method is minimal due to the reuse of existing hardware.

  • Pub Date: 2012/31/12
  • Number: 09329936
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Providing users access to applications during video communications

The present disclosure, in some implementations comprises systems and methods for providing applications during video communication, via online communities or services, for example, social networks. Video communication may be video conferencing or “video chat” sessions among a plurality of users of the online services. Users may engage in a video conference or “video chat,” yet at the same time, use or obtain different applications, designated as either “personal” or “shared” applications. A “personal” application is one that does not involve others and is configured to enhance an individual user's personal experience during a group video communication. A “shared” application is one that involves at least one of multiple users during a group video communication, for example, users may participate in a card or trivia game, watch videos together, collaborate and share documents, or the like.

  • Pub Date: 2012/31/12
  • Number: 09503683
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Partitioning processes across clusters by process type to optimize use of cluster specific configurations

A system and method for virtualization and cloud security are disclosed. According to one embodiment, a system comprises a first multi-core processing cluster and a second multi-core processing cluster in communication with a network interface card and software instructions. When the software instructions are executed by the second multi-core processing cluster they cause the second multi-core processing cluster to receive a request for a service, create a new or invoke an existing virtual machine to service the request, and return a desired result indicative of successful completion of the service to the first multi-core processing cluster.

  • Pub Date: 2012/31/12
  • Number: 09477524
  • Owner: NeoDana, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Natural-language rendering of structured search queries

In one embodiment, a method includes accessing a social graph that includes a plurality of nodes and edges, receiving an unstructured text query, identifying nodes and edges that correspond to portions of the text query, accessing a context-free grammar model, identifying query tokens from the grammar model that correspond to the identified nodes and edges, selecting grammars having query tokens that corresponding to each of the identified nodes and edges, and generating structured queries based on the selected grammars, where the structure queries are based on strings generated by the grammars.

  • Pub Date: 2012/31/12
  • Number: 09367607
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Modifying structured search queries on online social networks

In one embodiment, a method includes accessing a social graph that includes a plurality of nodes and edges, receiving a structured query that includes references to selected nodes and edges, and generating one or more query modification for the structured query, where each query modification includes references to modified nodes or modified edges from the plurality of nodes and edges.

  • Pub Date: 2012/31/12
  • Number: 09361363
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile enterprise server and client device interaction

A system includes an application server that hosts a plurality of enterprise applications and stores enterprise data associated with each of the enterprise applications. A client device executes a client application that can provide access to each of the enterprise applications. The client application includes a memory protection engine that allocates a first memory location for the enterprise data transmitted to the client device so the enterprise data is accessible to each of the plurality of enterprise applications through the client application. A second allocated memory location is allocated for non-enterprise data. A mobile enterprise server transmits the enterprise data to the client device.

  • Pub Date: 2012/31/12
  • Number: 08839354
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Mixed type text extraction and distribution

Systems, methods, and devices for extracting and distributing text of mixed types from displayed graphical data from a display of an electronic device are disclosed. The text types can include rendered text and text represented in rendered images. Displayed graphical data can be captured from data being displayed by an application on a display device. Text data can be extracted from the captured graphical data as text data at the rendering tree level, or by an optical character recognition process. In response to the extracted text data, a text selection tool with visual representations of selectable text can be applied to the displayed text data. Using the text selection tool, a user can select a subset of the text. In response to the user selection, one or more other applications can be determined and the selected text can be passed to at least one of the other applications for execution.

  • Pub Date: 2012/31/12
  • Number: 09170714
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for selecting accounts and offers in payment transactions

Embodiments provide systems, methods, processes, computer program code and means for using mobile devices to conduct payment transactions at merchant locations including brick and mortar locations and remote locations as well as for person to person transactions.

  • Pub Date: 2012/31/12
  • Number: 09400978
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for managing services and device data

Computationally implemented methods and systems include acquiring property data regarding at least one property of one or more devices, generating anonymized data by altering the acquired property data to obscure one or more portions of the acquired property data that uniquely identify the one or more devices and/or one or more users of the one or more devices, presenting the anonymized data to one or more service providers configured to generate one or more services, and acquiring the generated one or more services, said generated one or more services at least partly based on the anonymized data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.

  • Pub Date: 2012/31/12
  • Number: 09626503
  • Owner: Elwha LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for managing one or more services and/or device data

Computationally implemented methods and systems include acquiring obscured data, said obscured data including property data regarding at least one property of one or more devices, wherein said obscured data has been obscured to avoid uniquely identifying the one or more devices, acquiring one or more services configured to be carried out on the one or more devices, said acquiring at least partly based on the acquired obscured data including the property data regarding at least one property of the one or more devices, and offering the one or more services in exchange for access to identifying data configured to uniquely identify the one or more devices associated with the property data. In addition to the foregoing, other aspects are described in the claims, drawings, and text.

  • Pub Date: 2012/31/12
  • Number: 09619497
  • Owner: Elwah LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for location-based authorization to access online user groups

An approach is provided for determining a request from a user for an access to at least one user group. The at least one user group is associated with at least one reference location. Consequently, the point of interest platform determines location information associated with the user and/or the device associated with the user. Subsequently, the point of interest platform causes, at least in part, a granting of the access to the user group if the location information indicates that the user and/or the device associated with the user is within a predetermined proximity of the reference location.

  • Pub Date: 2012/31/12
  • Number: 09197618
  • Owner: HERE Global B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for ad-hoc content sharing

An approach is provided for discovering proximity-based and/or location-based services over an ad-hoc network. A request to share at least one content item from at least one device is determined. Further, one or more compressed representations of the at least one content item are generated, where the one or more compressed representations include at least one link for retrieving the at least one content item. Furthermore, the one or more compressed representations are broadcast in one or more broadcast messages over an ad-hoc network to one or more other devices.

  • Pub Date: 2012/31/12
  • Number: 09100989
  • Owner: NOKIA TECHNOLOGIES OY
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Managing task approval

A method is used in managing approval of a data storage management operation. An approval module is provided. A request to perform a management operation is received from a first user where the first user is associated with a first user access level. The management operation is forwarded to the approval module. The management operation is evaluated to determine an approval status, the evaluation based on the first user access level and the management operation. Based on the evaluation, an approval status is provided.

  • Pub Date: 2012/31/12
  • Number: 09250955
  • Details: Visit USPTO

Visit USPTO Page


Mail object migration

A mail enabled object may be migrated from one hosting server to another by using a temporary buffer that may capture incoming mail during the migration operation. A new mail enabled object may be created and enabled on a target server, and the old mail object may be disabled and forwarded to a buffer that may collect incoming messages. While the buffer receives incoming messages, the contents of the old mail object may be copied to the new mail object. After verifying the transfer of the contents, the buffer may be released to forward any collected messages to the new mail object. The old mail object may then be cleaned up. The migration may be performed from one server to another, from one forest to another, and to and from a remotely hosted messaging service.

  • Pub Date: 2012/31/12
  • Number: 08661088
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Jellyfish-inspired tilt sensor and artificial mesoglea

Components of an unmanned undersea vehicle are inspired by jellyfish that uses its flexible body and tilt sensing to achieve efficient swimming and turning. A tilt sensor, based on a statocyst, has a metal ball in a chamber lined with resistors. The tilt is sensed in accordance with which resistors the ball contacts. A composition of polyvinyl alcohol hydrogel with ferritin particles dispersed therein mimics the qualities of a jellyfish's mesoglea.

  • Pub Date: 2012/31/12
  • Number: 09146104
  • Owner: Virgina Tech Intellectual Properties, Inc.
  • Location: Blacksburg, US
  • Details: Visit USPTO

Visit USPTO Page


Interpretation and feature detection in a seismic volume using bump mapping and lighting

Example embodiments of the present disclosure include one or more of a method, computing device, computer-readable medium, and system for creating a heightmap based on at least a portion of seismic data, rendering the heightmap, and illuminating at least a portion of the rendered heightmap.

  • Pub Date: 2012/31/12
  • Number: 09625595
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Flexible architecture for acoustic signal processing engine

A disclosed speech processor includes a front end to receive a speech input and generate a feature vector indicative of a portion of the speech input and a Gaussian mixture (GMM) circuit to receive the feature vector, model any one of a plurality of GMM speech recognition algorithms, and generate a GMM score for the feature vector based on the GMM speech recognition algorithm modeled. In at least one embodiment, the GMM circuit includes a common compute block to generate feature a vector sum indicative of a weighted sum of differences squares between the feature vector and a mixture component of the GMM speech recognition algorithm. In at least one embodiment, the GMM speech recognition algorithm being modeled includes a plurality of Gaussian mixture components and the common compute block is operable to generate feature vector scores corresponding to each of the plurality of mixture components.

  • Pub Date: 2012/31/12
  • Number: 09653070
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Extending a development environment

Concepts and technologies are described herein for extending the behavior of a software development tool. An extension can be accessed and consumed by a software development tool to configure the software development tool to perform an operation in an extended mode. In one example, an extension can extend a compiler based on the input source code. In one configuration, the compiler extension can provide a compiler with one or more runtime semantics of various source code elements for a particular programming language. The compiler can access an extensions list to determine if the compiler is to perform a compilation operation on a particular source code element or logical unit in an extended mode.

  • Pub Date: 2012/31/12
  • Number: 08954939
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced security for accessing virtual memory

A disclosed method includes obtaining a physical address corresponding to a virtual address responsive to detecting a virtual address associated with a memory access instruction and, responsive to identifying a memory page associated with the physical address as a sensitive memory page, evaluating sensitive access information associated with the memory page. If the sensitive access information satisfies a sensitive access criteria, invoking a sensitive access handler to control execution of the memory access instruction.

  • Pub Date: 2012/31/12
  • Number: 08935800
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic cache write policy

A system, processor and method to monitor specific cache events and behavior based on established principles of quantized architectural vulnerability factor (AVF) through the use of a dynamic cache write policy controller. The output of the controller is then used to set the write back or write through mode policy for any given cache. This method can be used to change cache modes dynamically and does not require the system to be rebooted. The dynamic nature of the controller provides the capability of intelligently switching from reliability to performance mode and back as needed. This method eliminates the residency time of dirty lines in a cache, which increases soft errors (SER) resiliency of protected caches in the system and reduces detectable unrecoverable errors (DUE), while keeping implementation cost of hardware at a minimum.

  • Pub Date: 2012/31/12
  • Number: 09058282
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Determining instances to maintain on at least one cloud responsive to an evaluation of performance characteristics

A method includes the step of running a set of instances on at least one cloud for a first time interval, each of the instances comprising a bundle of virtualized resources. The method also includes the step of evaluating one or more performance characteristics of each of the instances in the set of instances over the first time interval. The method further includes the step of determining a first subset of the set of instances to maintain for a second time interval and a second subset of the set of instances to terminate for the second time interval responsive to the evaluating step. The steps are performed by at least one processing device comprising a processor coupled to a memory.

  • Pub Date: 2012/31/12
  • Number: 09128739
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Default structured search queries on online social networks

In one embodiment, a method includes accessing a social graph that includes a plurality of nodes and edges, identifying a nodes corresponding to a page currently accessed by a first user, generating one or more structured queries, where each structured query comprises a reference to the identified node and one or more edges that are connected to the identified node, and transmitting one or more of the structured queries to the first user for display on the page.

  • Pub Date: 2012/31/12
  • Number: 08918418
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Cursor assist mode

Described herein are implementations of various technologies for a method and apparatus for providing marine electronic data. In one implementation, a screen may display marine electronic data. A cursor may be provided that is movable by placement of a finger over the cursor. A request to display the cursor at a position such that the cursor is not obstructed from view by the finger may be received. The requested cursor may be displayed at the position on the screen.

  • Pub Date: 2012/31/12
  • Number: 09495065
  • Owner: NAVICO HOLDING AS
  • Location: Egersund, false
  • Details: Visit USPTO

Visit USPTO Page


Control pool based enterprise policy enabler for controlled cloud access

A method for controlling access to a Cloud, comprising receiving traffic from an Enterprise user at a gateway, wherein the traffic carries a first key specific to the Enterprise user for use internal to the gateway, replacing the first key with a second key, wherein the second key is a Cloud-negotiated key generic to a plurality of Enterprise users which permits access to the Cloud, and sending traffic to the Cloud.

  • Pub Date: 2012/31/12
  • Number: 09167050
  • Owner: Futurewei Technologies, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Continuous change data capture without disruption of DDL

A system, method and computer-readable medium for data capture for replication are provided. A data record from a transaction log of a source database indicative of a data element change is retrieved. A DDL command is generated from the retrieved data record. Once generated, the DDL command is distributed for replication to a target database such that the source database and the target database are synchronized.

  • Pub Date: 2012/31/12
  • Number: 09305070
  • Owner: Sybase, Inc.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Confounder generation in knowledge-based authentication for an enterprise

An improved technique generates confounders for KBA questions from personal information management (PIM) data created from within an organization. An enterprise KBA (eKBA) server collects PIM data such as email data for a particular member of the organization. For email data, the eKBA server extracts facts from the headers of emails and generates queries having a corresponding correct answer from a first subset of the facts. Moreover, the eKBA server extracts a set of confounders from a second subset of the facts. The eKBA server then forms a multiple-choice KBA question from the query, the corresponding correct answer, and selected confounders.

  • Pub Date: 2012/31/12
  • Number: 09177127
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Communications system providing mobile wireless communications device application module associations for respective wireless communications formats and related methods

A communications system may include a plurality of electronic devices having respective different device types and each configured to wirelessly communicate via a plurality of different wireless communications formats. The system may also include a mobile wireless communications device including a plurality of application modules associated with respective electronic device types and configured to communicate via a first one of the wireless communications formats. The mobile wireless communications device may further include a control module configured to establish an initial wireless communications link with a given electronic device using a second one of the wireless communications formats, determine a respective device type for the given electronic device based upon the established initial wireless communications link, and cause a respective application module to establish a subsequent wireless communications link with the given electronic device using the second wireless communications format based upon the determined respective device type.

  • Pub Date: 2012/31/12
  • Number: 08730845
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Bootstrap social network using event-related records

Event-related data including at least one event-related record belonging to a first user is received. The event-related record is processed for an event. The event is classified into an event type using a plurality of predefined event types. A post for the event based on the event type is generated and a content stream of the first user is populated with the post.

  • Pub Date: 2012/31/12
  • Number: 09596207
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and methods for portable device tracking using temporary privileged access

A computer-implemented system, apparatus and method for accessing a portable device to execute monitoring capabilities. The monitoring capabilities include packet detection, which in turn may be processed to produce media exposure data. The monitoring capabilities are installed using privileged access in order to obtain data from a kernel layer of the portable device, and the device is returned to an original state following installation, in order to comply with operating system requirements. Audio media exposure data may further be integrated with the packet-detected media exposure data.

  • Pub Date: 2012/31/12
  • Number: 09473555
  • Owner: The Nielsen Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Anomaly sensor framework for detecting advanced persistent threat attacks

A threat detection system for detecting threat activity in a protected computer system includes anomaly sensors of distinct types including user-activity sensors, host-activity sensors and application-activity sensors. Each sensor builds a history of pertinent activity over a training period, and during a subsequent detection period the sensor compares current activity to the history to detect new activity. The new activity is identified in respective sensor output. A set of correlators of distinct types are used that correspond to different stages of threat activity according to modeled threat behavior. Each correlator receives output of one or more different-type sensors and applies logical and/or temporal testing to detect activity patterns of the different stages. The results of the logical and/or temporal testing are used to generate alert outputs for a human or machine user.

  • Pub Date: 2012/31/12
  • Number: 09378361
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Ambiguous structured search queries on online social networks

In one embodiment, a method includes accessing a social graph that includes a plurality of nodes and edges, receiving an unstructured text query comprising an ambiguous n-gram, identifying nodes and edges that correspond to the ambiguous n-gram, generating a first set of structured queries corresponding to the identified second nodes and edges, receiving from the first user a selection of a first structured query form the first set, and generating a second set of structured queries based on the selected first structured query.

  • Pub Date: 2012/31/12
  • Number: 08868603
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Targeting review placement

An existing distribution of reviews for an entity across a plurality of review sites is evaluated. A determination is made, on behalf of the entity, that the existing distribution should be adjusted. An indication of at least one review site on which the placement of at least one additional review should be targeted is provided as output.

  • Pub Date: 2012/30/12
  • Number: 08494973
  • Owner: Reputation.com, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


System-initiated interactions and notifications in a chat information system on mobile devices

A method for push interaction with a mobile device using a chat interface includes establishing a chat protocol connection between a server and the mobile device, wherein the chat protocol format is used as a part of the push protocol; generating an event on the server; sending a push protocol command relating to the event from the server to the mobile device using the chat protocol connection; in the background, processing the chat protocol request that was packaged within the push protocol command; receiving the response from the mobile device through the chat protocol connection using the pull protocol mode; sending media contents from the server to the client using pull protocol mode; and displaying the media contents on the mobile device.

  • Pub Date: 2012/30/12
  • Number: 09386113
  • Owner: Speaktoit, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for semiautomatic generation and tuning of natural language interaction applications

A system for supervised automatic code generation and tuning for natural language interaction applications, comprising a build environment comprising a developer user interface, automated coding tools, automated testing tools, and automated optimization tools, and an analytics framework software module. Text samples are imported into the build environment and automated clustering is performed to assign them to a plurality of input groups, each input group comprising a plurality of semantically related inputs. Language recognition rules are generated by automated coding tools. Automated testing tools carry out automated testing of language recognition rules and generate recommendations for tuning language recognition rules. The analytics framework performs analysis of interaction log files to identify problems in a candidate natural language interaction application. Optimizations to the candidate natural language interaction application are carried out and an optimized natural language interaction application is deployed into production and stored in the solution data repository.

  • Pub Date: 2012/30/12
  • Number: 08892419
  • Owner: Artificial Solutions Iberia SL
  • Location: , ES
  • Details: Visit USPTO

Visit USPTO Page


Stimulating reviews at a point of sale

A user is prompted to provide a review at a point of sale. Review data is received from the user. The review data is transmitted to a reputation platform configured to evaluate the received review data. If the review data indicates a positive review, a review request action is commenced. If the review data indicates a negative review, a remedial action is commenced.

  • Pub Date: 2012/30/12
  • Number: 08676596
  • Owner: Reputation.com, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Non-invasive magnetic or electrical nerve stimulation to treat gastroparesis, functional dyspepsia, and other functional gastrointestinal disorders

Devices, systems and methods are disclosed for treating or preventing gastroparesis, functional dyspepsia, and other functional gastrointestinal disorders. The methods comprise transmitting impulses of energy non-invasively to selected nerve fibers, particularly those in a vagus nerve. The methods provide damaged interstitial cells of Cajal (ICC) with trophic factors via vagal afferent nerve fibers, thereby reversing ICC damage, and as a consequence improving gastric motility. The methods also increase levels of inhibitory neurotransmitters in the brain so as to decrease neural activity within the area postrema, or they deactivate a resting state neural network containing parts of the anterior insula and anterior cingulate cortex, which will thereby reduce abnormal interoception and visceral hypersensitivity.

  • Pub Date: 2012/30/12
  • Number: 09403001
  • Owner: Electrocore, LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Follow-up determination

Determining a follow-up action to take with respect to a review request is disclosed. The transmission of a review request to a potential reviewer is facilitated. A determination is made that the potential reviewer has not, subsequent to the transmission, created a review. A follow-up action to take regarding the review request is determined.

  • Pub Date: 2012/30/12
  • Number: 08595022
  • Owner: Reputation.com, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to build and utilize a search infrastructure

Methods and systems to build and utilize a search infrastructure are described. The system generates index information components in real-time based on a database that is time-stamped. The system updates index information at a plurality of query node servers based on the index information components. A query engine receives a search query from a client machine and identifies search results based on the query and the index information. The system communicates the search results, over the network, to the client machine.

  • Pub Date: 2012/28/12
  • Number: 09607049
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product implementing an image processing pipeline for high-dynamic range images

A system, method, and computer program product for generating high-dynamic range image data is disclosed. The method includes the steps of receiving image sensor data from an interleaved image sensor. The interleaved the image sensor includes a first portion of pixels exposed for a first exposure time and a second portion of pixels exposed for a second exposure time that is shorter than the first exposure time. The method further includes the steps of identifying a first subset of pixels in the second portion having an intensity value above a first threshold value, identifying a second subset of pixels in the first portion having an intensity value below a second threshold value, and generating high-dynamic range (HDR) data based on the first subset and the second subset.

  • Pub Date: 2012/28/12
  • Number: 09071765
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for implementing a spatially varying unsharp mask noise reduction filter

A system, method, and computer program product for applying a spatially varying unsharp mask noise reduction filter is disclosed. The spatially varying unsharp mask noise reduction filter generates a low-pass filtered image by applying a low-pass filter to a digital image, generates a high-pass filtered image of the digital image, and generates an unsharp masked image based on the low-pass filtered image and the high-pass filtered image. The filter also blends the low-pass filtered image with the unsharp masked image based on a shaping function.

  • Pub Date: 2012/28/12
  • Number: 09082180
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for detecting network activity of interest

Systems and methods for detecting a visual characteristic of interest within an image are disclosed. An example method involves obtaining an image that includes at least one pixel representing a visual characteristic of interest, creating a first sequence and a second sequence of bitwise data from values associated with the pixel, and converting these bitwise sequences into a first sequence of integers and a second sequence of integers. Using a distance function, a similarity metric is determined between the first sequence of integers and the second sequence of integers. Based on the similarity metric, a third sequence of integers is created and stored. The third sequence of integers can be used to facilitate the identification of the visual characteristic of interest in other images.

  • Pub Date: 2012/28/12
  • Number: 09548992
  • Owner: TRUSTPIPE LLC
  • Location: Healdsburg, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for conveying service latency requirements for devices connected to low power input/output sub-systems

In at least one embodiment described herein, an apparatus is provided that can include means for communicating a latency tolerance value for a device connected to a platform from a software latency register if a software latency tolerance register mode is active. The apparatus may also include means for communicating the latency tolerance value from a hardware latency register if a host controller is active. The latency tolerance value can be sent to a power management controller. More specific examples can include means for communicating a latency tolerance value from the software latency register if the software latency tolerance register mode is not active and the host controller is not active. The apparatus can also include means for mapping a resource space in the software latency register for the device using a BIOS/platform driver. The mapping can be achieved using an advanced configuration and power interface device description.

  • Pub Date: 2012/28/12
  • Number: 09158357
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Service system and method of providing service in digital receiver thereof

Disclosed are a service system and a method of providing a service in a digital receiver. The service providing method includes selecting content including an identifier with respect to an SNS or a data exchange space that is opened in linkage with content from a service guide, and outputting the selected content and the SNS or the data exchange space linked to the content in respective areas of a screen. The SNS linked to the content includes a data exchange space configured to allow one or more SNS users to simultaneously access the data exchange space using an open API from the server, and also includes a SNS identifier having a format as access information for the corresponding data exchange space.

  • Pub Date: 2012/28/12
  • Number: 09497269
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Seamlessly playing a composite media presentation

A computer-implemented method for seamlessly playing a composite media presentation, includes receiving, by a sequencer, a sequential playlist provided by a scheduler. The sequential playlist refers to a sequence of one or more streaming media content items. The sequencer receives calls from a native player application at regular intervals, and sends playback segments and seekbar update information to the native player application based on the sequential playlist in response to the calls. The native player application is configured to play the composite media presentation using at least one core player and generate a corresponding seekbar for the presentation based on the playback segments and the seekbar update information sent by the sequencer.

  • Pub Date: 2012/28/12
  • Number: 09344472
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Saved queries in a social networking system

A user saves a structured query defining connections between two or more objects maintained by a social networking system. The social networking system finds objects matching the structured query, either by periodically performing searches for new objects or by analyzing objects as they are added or modified. The user creating the saved query can subsequently view the matching objects.

  • Pub Date: 2012/28/12
  • Number: 08954455
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing interference between subsystem blocks at a design time

A method of preventing interference between subsystem blocks includes obtaining an integrity level for a first subsystem block, obtaining an integrity level for a second subsystem block, assigning an integrity level property to at least one input port of the first block, the integrity level property assigned to the input port of the first block being based on the integrity level defined for the first block, and assigning an integrity level property to at least one output port of the second block, the integrity level property assigned to the output port of the second block being based on the integrity level defined for the second block. The method further includes evaluating the integrity level property of at least one input/output pair to determine whether an inappropriate connection exists, and performing a first action when an inappropriate connection exists, or performing a second action when an appropriate connection exists.

  • Pub Date: 2012/28/12
  • Number: 08938710
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Policy-based secure containers for multiple enterprise applications

Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.

  • Pub Date: 2012/28/12
  • Number: 09276963
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for synchronization of dial testing and audience response utilizing automatic content recognition

Systems, methods and/or techniques for synchronization of dial testing and audience response utilizing automatic content recognition (ACR) are described. Synchronized dial testing and audience response techniques may utilize a system that is operable to perform ACR and that may implement an abstraction layer. An ACR system may be operable to detect a desired portion (e.g., a frame or scene) of a program that is streaming or communicated over a live network or broadcast feed, to a smart TV for example. Synchronized dial testing and audience response techniques may be employed to initiate an interactive event or application that appears on a smart TV in response to a detected point or portion of a program, such that the content presented by the application is synchronized to the content of the live network or broadcast feed.

  • Pub Date: 2012/28/12
  • Number: 08893168
  • Owner: Turner Broadcasting System, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for logo identification based on automatic content recognition

A method and system for logo identification based on automatic content recognition (ACR) are described in which a connected television (TV) or other end-user device may be provided with instructions to fingerprint certain regions in a video frame to identify the source of the content being displayed. Such instructions may be provided when, for example, fingerprint matching is able to identify content that is provided by multiple sources but is unable to identify the particular source of the content. In those instances, one or more additional locations may be determined for taking fingerprints in the video frame. These locations correspond to region of the video frame in which a graphical item that represents the network television station is typically displayed. A profile with these locations is generated and sent to the connected TV to take additional fingerprints to enable the identification of the network television station providing content.

  • Pub Date: 2012/28/12
  • Number: 09137568
  • Owner: TURNER BROADCASTING SYSTEM, INC.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for automatic content recognition protocols

Systems, methods and/or techniques for automatic content recognition protocols are described. A method may be executed in a media device having an automatic content recognition application programming interface. The method may include generating one or more video fingerprints that correspond to video content that displays on the media device. The method may include communicating the one or more video fingerprints to an automatic content recognition backend system. The automatic content recognition backend system compares the one or more video fingerprints with one or more stored video fingerprints and determines whether a match occurs. If the match occurs, one or more event identifiers associated with the one or more video fingerprints may be received from the automatic content recognition backend system. The one or more event identifiers may be communicated to an application server, and one or more interactive events may be received from the application server.

  • Pub Date: 2012/28/12
  • Number: 08776105
  • Owner: Tuner Broadcasting System, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for an automatic content recognition abstraction layer

A method and system for an automatic content recognition (ACR) abstraction layer are described in which real-time event manager in an ACR system may be utilized to receive interactive event identifiers and to assign those identifiers to sets of video fingerprints generated by multiple real-time fingerprint servers (RTFSs). The video fingerprints may be generated from a network television feed by utilizing video fingerprint technologies that are different for each RTFS. The interactive event identifiers may be determined from different sources. When determined from content ingested by the ACR system, for example, the interactive event identifiers may be based on a video fingerprinting process separate from those utilized by the RTFSs. The RTFSs may communicate the sets of video fingerprints and interactive event identifiers to corresponding fingerprint match systems, which in turn may communicate with devices that utilize the same video fingerprint technology as the corresponding RTFS.

  • Pub Date: 2012/28/12
  • Number: 09172994
  • Owner: Turner Broadcasting System, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for a universal remote control

A method and system for a universal remote control used with display devices that support automatic content recognition (ACR) are described. The remote control may be paired to the display device and may receive a trigger signal from the display device that corresponds to an interactive event overlay displayed on the display device as a result of the ACR operations. The pairing may occur through the use of near field communication (NFC) signals and/or WiFi signals. A graphical user interface (GUI) may be generated for display on a screen of the remote control device that corresponds to the interactive event overlay. The screen may be a touch-screen that enables the user to interact with the remote control through the GUI. The remote control may communicate one or more signals to the display device in response to user input received by the remote control device from information provided through the GUI.

  • Pub Date: 2012/28/12
  • Number: 09210467
  • Owner: TURNER BROADCASTING SYSTEM, INC.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for a synchronous event manager for automatic content recognition

A method and system for a synchronous event manager for automatic content recognition (ACR) are described. A display device, such as a connected television or mobile device, may be operable to perform ACR and may utilize a synchronous event manager comprising a software layer that may continuously be executed as a background process. The software layer may comprise a single framework or framework from which to execute one or more user-interaction applications. The software layer may monitor internal and external events and may detect an event trigger produced in response to a match resulting from the ACR. After receiving a user-interaction application corresponding to the detected event trigger, the software layer may launch or invoke the user-interaction application from the single framework. In some instances, multiple user-interaction applications may be launched concurrently from the single framework. These user-interaction applications may interface with each other through the single framework.

  • Pub Date: 2012/28/12
  • Number: 08832723
  • Owner: Turner Broadcasting System, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Intent-based clustering of medical information

A medical information navigation engine (“MINE”) includes a medical information interface, a reconciliation engine and an intent-based presentation engine. The medical information interface receives medical information from a plurality of medical sources, which is subsequently reconciled by the reconciliation engine. The intent-based presentation engine clusters the reconciled medical information by applying at least one clustering rule to the reconciled medication information. The clustered reconciled medical information can be presented to a user.

  • Pub Date: 2012/28/12
  • Number: 09043901
  • Owner: APIXIO, INC.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent automated testing method for restful web services

A generalized testing framework for testing a RESTful web service defines test cases that described RESTful operations on resource object and associated data in configuration files generates HTTP requests to the web service based upon a test case and receives corresponding responses, creates expected responses, and filters fields of interest from the actual and expected responses, and compares the filtered responses to determine whether they match. Expected responses are automatically created during runtime by mapping input data and RESTful API operations to a resource object based upon the test case, avoiding the necessity of predicting responses in advance. Test cases may be readily changed or adapted to different Restful web services by changing configuration files.

  • Pub Date: 2012/28/12
  • Number: 09419884
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Fraud detection system automatic rule manipulator

Embodiments of the invention are directed to a fraud detection system that automatically converts the currency and value of received transaction data to correspond to the currency in fraud detection rules established by a merchant. The converted transaction data is then analyzed against the fraud detection rules to determine whether the transaction data indicates fraudulent activity.

  • Pub Date: 2012/28/12
  • Number: 08949150
  • Owner: Visa International Service Association
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Federation of indices

A method, article of manufacture, and apparatus for processing data. In some embodiments, this includes analyzing a first container at a block level, determining a first text index of the first container, analyzing a second container at a block level, determining a second text index of the first container, and storing the first text index and the second text index in a backup catalog, wherein the backup catalog is stored in a storage device.

  • Pub Date: 2012/28/12
  • Number: 08949661
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Designation of classes for certificates and keys

Plural modes of operation may be established on a mobile device. Specific modes of operation of the mobile device may be associated with specific spaces in memory. By using a “class” designation within the existing certificate store structure and key store structure, certificates and keys can be assigned to one space among plural spaces. Accordingly, a personal certificate store and a personal key store may exist in a personal space. Similarly, a corporate certificate store and a corporate key store may exist in a corporate space. APIs designed to work within such a system may be arranged to employ a “class” attribute when managing certificates and cryptographic keys.

  • Pub Date: 2012/28/12
  • Number: 09426145
  • Owner: 2236008 Ontario Inc.
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Data storage system modeling

Described are modeling techniques. In accordance with one or more criteria, a determination may be made as to whether to use a dynamic model or a static model to model performance of components, such as storage devices, of a data storage system. A system may include first and second data storage systems where the first data storage system includes a computer readable medium with first code that performs processing in connection with data storage movement optimizations using one or more models including a dynamic model, and second code that generates and maintains the dynamic model used to model performance of storage devices. The second code may include code for performing first processing to determine device sets each of which does not share back-end resources of the second data storage system with any other device sets, and performing second processing to determine sets of performance curves corresponding to the device sets.

  • Pub Date: 2012/28/12
  • Number: 09354813
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Content creation

A system for facilitating content creation includes collecting profiles which are analyzed to build a profile parameter index. A dummy profile is created based on the profile parameter index. The dummy profile is a fictitious character having profile parameters based on input from a user of the profile parameter index. The control of the dummy profile is under the user.

  • Pub Date: 2012/28/12
  • Number: 09213757
  • Owner: SAP SE
  • Location: , DE
  • Details: Visit USPTO

Visit USPTO Page


Compliance testing engine for integrated computing system

A technique tests whether an integrated computing system having server, network and storage components complies with a configuration benchmark expressed as rules in first markup-language statements such as XML. The rules are parsed to obtain test definition identifiers identifying test definitions in a second set of markup-language statements, each test definition including a test value and an attribute identifier of system component attribute. A management database is organized as an integrated object model of all system components. An interpreter invoked with the test definition identifier from each rule process each test definition to (a) access the management database using the attribute identifier obtain the actual value for the corresponding attribute, and (b) compare the actual value to the test value of the test definition to generate a comparison result value that can be stored or communicated as a compliance indicator to a human or machine user.

  • Pub Date: 2012/28/12
  • Number: 09065746
  • Owner: VCE Company, LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud object store for checkpoints of high performance computing applications using decoupling middleware

Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  • Pub Date: 2012/28/12
  • Number: 09317521
  • Owner: Los Alamos National Security, LLC
  • Location: Los Alamos, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud object store for archive storage of high performance computing data using decoupling middleware

Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  • Pub Date: 2012/28/12
  • Number: 09069778
  • Owner: Los Alamos National Security, LLC
  • Location: Los Alamos, US
  • Details: Visit USPTO

Visit USPTO Page


Chlorophyll c containing degranulation suppressor

Degranulation suppressors are provided that are effective against allergic disease and osteoarthritis. The degranulation suppressors contain chlorophyll c.

  • Pub Date: 2012/28/12
  • Number: 09636326
  • Owner: MARUHA NICHIRO CORPORATION
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Associating received contact information with user profiles stored by a social networking system

A social networking system receives contact information from a social networking system user. The received contact information is stored and associated with a user profile in the social networking system including information matching at least a portion of the stored content information. This increases the information associated with the user profile. Subsequently received content information is compared to user profiles and stored contact information associated with one or more user profiles. User profiles including information matching at least a portion of the subsequently received content information or associated with stored contact information matching at least a portion of the subsequently received content information are identified as potential connections for the user providing the subsequently received contact information.

  • Pub Date: 2012/28/12
  • Number: 09338250
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for transit industry vehicle hardware-agnostic communication

Systems and methods for hardware-agnostic communication between one or more mobile data terminals and one or more vehicle logic units, where a vehicle logic unit can communicate with one or more inputs from a transit industry vehicle and create an abstraction interface capable of being processed by multiple mobile data terminal hardware platforms—meaning that each vehicle logic unit can communicate with multiple mobile data terminals, and each mobile data terminal can communicate with multiple vehicle logic units.

  • Pub Date: 2012/27/12
  • Number: 09424692
  • Owner: TRAPEZE SOFTWARE ULC
  • Location: Mississauga, CA
  • Details: Visit USPTO

Visit USPTO Page


Supporting measurments and feedback for 3D MIMO with data transmission optimization

Technology is discussed for supporting wireless communication paths from an antenna array with a vertical directional component. Examples reduce training feedback for increased numbers of communication paths by only reporting on a subset of Reference Signals (RSs) provided for various vertical beam configurations. Additional examples reduce feedback with virtual measurements based on a difference between RS measurements. One such measurement can come from full set of RSs for a reference beam configuration and another from a partial set of RSs for an additional beam configuration. Such virtual measurements can also be based on cross correlation for beamforming weights associated with the two configurations. Several examples of preparing and sending measurement reports consistent with Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) standards are discussed. The supporting technology also increases diversity and reduces a power differential between spatially multiplexed layers transmitting a common codeword.

  • Pub Date: 2012/27/12
  • Number: 09225478
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system

Systems and methods for restoring a database in an information management system that does not include a secondary copy of the database, are disclosed. The systems and methods may include using metadata stored in non-production storage devices to restore the database. In some implementations the methods are used to consolidate multiple information management systems. In other implementations, the systems and methods are used for reviewing content of archived storage media. Other implementations are disclosed.

  • Pub Date: 2012/27/12
  • Number: 09069799
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Notifying a multipathing driver of fabric events and performing multipathing management operations in response to such fabric events

A technique manages operation of a host computer having access to a storage volume on a storage system via two or more distinct paths. The technique involves operating a multipathing driver within the host computer, the multipathing driver controlling path access from the host computer to the storage volume. The technique further involves operating a host bus adaptor (HBA) driver within the host computer to interface the host computer to a fabric connecting the host computer to the storage system. The technique further involves conveying fabric topology state change event information from the HBA driver to the multipathing driver to enable the multipathing driver to take action in response to fabric topology state change events. In some arrangements, an event monitoring handler receives fabric event information from registered state change notifications (RSCNs) containing fabric event information from the HBA driver, and forwards that information on to the multipathing driver.

  • Pub Date: 2012/27/12
  • Number: 09483331
  • Owner: EMC IP Holding Company, LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Non-disruptive and minimally disruptive data migration in active-active clusters

Data migration is performed in a cluster of host computers each using a mechanism associating data with a source LUN. During a synchronization operation the contents of the source LUN are copied to the target LUN while ongoing normal source LUN writes are cloned to the target LUN. A datapath component of an agent coordinates the writes at the target LUN to maintain data consistency. Upon completion of synchronization, each host stops the write cloning and disables access to the source LUN, in conjunction with a modification of the mechanism to newly associate the data with the target LUN. Depending on the type of mechanism and system, the modification may be done either disruptively or non-disruptively, i.e., with or without stopping normal operation of software of the host computers.

  • Pub Date: 2012/27/12
  • Number: 09460028
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Multisegment fractures

A method can include identifying a discrete natural fracture in a three-dimensional environment that includes a reservoir modeled by a three-dimensional grid model, representing the discrete natural fracture via a multisegment model in a two-dimensional region within the three-dimensional grid model, defining at least one connection for fluid communication between the multisegment model and the three-dimensional grid model, defining boundary conditions for the multisegment model, and solving the multisegment model subject to the at least one connection and the boundary conditions to provide values for fluid flow in the two-dimensional region. Various other apparatuses, systems, methods, etc., are also disclosed.

  • Pub Date: 2012/27/12
  • Number: 09390204
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus to manage power consumption of a graphics engine

Methods and apparatus are disclosed to manage power consumption at a graphics engine. An example method to manage power usage of a graphics engine via an application level interface includes obtaining a policy directive for the graphics engine via the application level interface, the policy directive identifying a threshold corresponding to power consumed by the graphics engine operating in a first graphics state. The example method also includes determining a power consumed by the graphics engine during operation. The example method also includes comparing the power consumed to the threshold of the policy directive, and when the threshold is met, setting the graphics engine in a second graphics state to cause the graphics engine to comply with the policy directive.

  • Pub Date: 2012/27/12
  • Number: 09098282
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Clustering for parallel processing

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for clustering for parallel processing. One of the methods includes providing virtual machines with an interface to a shuffle service, the shuffle service executing external of the virtual machines. The method includes receiving data records through the interface, each data record having a key and a value. The method includes partitioning the data records, using the shuffle service, according to the respective keys. The method includes providing a part of the partitioned data records through the interface to the virtual machines, wherein data records having the same key are provided to the same virtual machine. Each of the virtual machines can execute on a host machine and each of the virtual machine is a hardware virtualization of a machine.

  • Pub Date: 2012/27/12
  • Number: 09336024
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Certificate of deposit consolidation

A method of monitoring a certificate of deposit includes providing a computer having a processor and receiving information related to a certificate of deposit of a user. The method also includes monitoring, using the processor, the certificate of deposit as it matures, and advising the user regarding maturity of the certificate of deposit.

  • Pub Date: 2012/27/12
  • Number: 08626635
  • Owner: United Services Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically managing the storage of a virtual machine

Mechanisms are provided for automatically expanding a virtual storage of a virtual machine. The virtual machine monitors a usage of the virtual storage of the virtual machine. The virtual machine determines, based on the monitoring of the usage of the virtual storage, whether to expand the virtual storage of the virtual machine. In response to the virtual machine determining to expand the virtual storage of the virtual machine, a virtual machine manager executes one or more operations to expand the virtual storage. The monitoring and determining may be performed by a virtual storage management agent executing within the virtual machine and which may send an expansion request to an authorization engine to request expansion of the virtual storage.

  • Pub Date: 2012/27/12
  • Number: 09128745
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic PIN creation using password

A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.

  • Pub Date: 2012/27/12
  • Number: 09009802
  • Owner: Ebay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Application of information management policies based on operation with a geographic entity

Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is applied to production data of the computing device based on regulations of the geographic entity. Other aspects are also disclosed.

  • Pub Date: 2012/27/12
  • Number: 09633216
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Resource adapter capable of concurrent establishing of plural connections between an executive information system and at least one client

Certain example embodiments relate to a resource adapter configured to establish connections between an executive information system (EIS) and one or more clients. The resource adapter includes at least a first and a second connection pool, both maintaining a plurality of connection objects. Each connection object defines a channel of communication between the EIS and the resource adapter. A cluster coordinator is configured to assign a first connection object in a first connection pool and a second connection object in a second connection pool to the one or more clients to create at least two coexisting connections between the one or more clients and the EIS.

  • Pub Date: 2012/26/12
  • Number: 09369530
  • Owner: SOFTWARE AG
  • Location: Darmstadt, DE
  • Details: Visit USPTO

Visit USPTO Page


Replication timing profiles for leukemia and other cancers

Described is a method for determining that a population of cells are a specific type of leukemic cell based on the replication timing fingerprint for the population of cells.

  • Pub Date: 2012/26/12
  • Number: 08725423
  • Owner: Florida State University Research Foundation
  • Location: Tallahassee, US
  • Details: Visit USPTO

Visit USPTO Page


Render-assisted compression for remote graphics

A technique for efficiently compressing rendered three-dimensional images in a remote rendering system adds a novel render-assisted prediction function to an existing video compression framework, such as the standard H.264/5 framework. Auxiliary rendering information is separated from rendering information used to describe a reference image by a server system. A client system may alter the auxiliary data and generate a new image based on the reference image and rendered scene information from the auxiliary data without creating additional network bandwidth or server workload.

  • Pub Date: 2012/26/12
  • Number: 09576340
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


OxyVu-1 hyperspectral tissue oxygenation (HTO) measurement system

The invention is directed to a hyperspectral/multispectral system referred to as the OxyVu-1 system. The hyperspectral imaging technology performs spectral analysis at each point in a two-dimensional scanned a producing an image displaying information derived from the analysis. For the OxyVu-1 system, the spectral analytical methods determined in superficial tissues approximate values of oxygen saturation (HT-Sat), oxyhemoglobin levels (HT-oxy), and deoxyhemoglobin levels (HT-deoxy). The OxyVu-1 system displays the tissue oxygenation in a two-dimensional, color-coded image. The system contains a system console, a cart, system electronics, CPU, monitor, keyboard, pointing device and printer. The hyperspectral instrument head with support arm contains broadband illuminator, camera and spectral filter for collecting hyperspectral imaging cube. The single use OxyVu Check Pads and Targets are used to perform an instrument check prior to patient measurements. The OxyVu Target is placed within the intended field of view and is used as a fiduciary mark for image registration and for focusing.

  • Pub Date: 2012/26/12
  • Number: 09326715
  • Owner: Hypermed Imaging, Inc.
  • Location: Memphis, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus to input workflow steps and parameters

An image forming method and apparatus, and a host in which the image forming method includes setting a processing order of a plurality of operations of a same image data and detailed setup information of the plurality of operations, and executing the plurality of operations using the detailed setup information according to the set processing order.

  • Pub Date: 2012/26/12
  • Number: 09525788
  • Owner: SAMSUNG ELECTRONICS CO., LTD.
  • Location: Suwon-Si, KR
  • Details: Visit USPTO

Visit USPTO Page


Generating information models in an in-memory database system

Various embodiments of systems and methods for generating information models in an in-memory database system by importing data foundation from existing Semantic layer files are described herein. The method includes specifying a type of information view to be generated to model content data. Further the method includes invoking the content data from existing semantic layer files using an import option of a content data editor interface. Subsequent to selecting one or more semantic layer files, automatically extracting table objects corresponding to the selected semantic layer files along with data foundation objects from a file source.

  • Pub Date: 2012/26/12
  • Number: 09519701
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Encrypting files within a cloud computing environment

A system, computer readable medium and a method for encrypting a file, the method may include retrieving the file from a storage service; segmenting the file into multiple file segments; calculating a file segment signature for each of the multiple file segments to provide multiple file segment signatures; encrypting each of the multiple file segments to provide multiple encrypted file segments by using encryption keys that are in response to the multiple file segment signatures; wherein the multiple encrypted file segments form an encrypted file; and sending the multiple encrypted file segments to the storage service.

  • Pub Date: 2012/26/12
  • Number: 09262643
  • Owner: SOOKASA INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive recommendation explanations

A method and system for generating adaptive explanations for associated recommendations is disclosed. The adaptive explanations comprise a syntactical structure and associated phrases that are selected in accordance with usage behaviors and/or inferences associated with usage behaviors. The phrases included in an adaptive explanation may be selected through application of a non-deterministic process. The adaptive explanations may be beneficially applied to recommendations that are associated with content, products, and people, including recommendations that comprise advertisements.

  • Pub Date: 2012/26/12
  • Number: RE045770
  • Owner: WORLD ASSETS CONSULTING AG, LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Utilizing multiple access control objects to manage access control

Access control systems and methods are described, including receiving a request from a user to access a first object, where first access-control information is associated with the first object; determining that the first object is referenced by a second object; determining second access-control information associated with the second object, where the second access-control information identifies the user as having access to the second object; and providing to the user access to the first object based on to the second access-control information.

  • Pub Date: 2012/24/12
  • Number: 09460300
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile terminal and controlling method thereof

A mobile terminal and controlling method thereof are disclosed, by which restoration and backup operations are performed for the mobile terminal. For example, the mobile terminal includes a controller performing a backup operation and a restoration operation on the mobile terminal, the controller including an application module for activating a backup restoration application and at least one or more applications; and a Linux kernel module for managing a basic hardware function of the mobile terminal, the Linux kernel module including a backup restoration service unit having an access authority for accessing a file system of each of the at least one or more applications, wherein the backup restoration application accesses the file system of each of the at least one or more applications and then performs the backup and restoration operations on data of each of the at least one or more applications.

  • Pub Date: 2012/24/12
  • Number: 09588846
  • Owner: LG ELECTRONICS INC.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for automated document registration with cloud computing

A method and system for automated document registration with cloud computing. The method and system described herein provide an automatic cloud document registration system that creates a secure cloud transformed electronic document with an unalterable time and date stamp stored in a cloud storage object. The cloud storage object comprises plural separate portions stored in plural separate secure storage locations on plural other different server network devices distributed across the cloud communications network but functions as a single secure cloud storage object. Target and server network devices cannot determine where on the cloud communications network the cloud storage object is stored thereby providing additional security and privacy for the secure cloud transformed electronic document. Multiple third-parties are provided an ability to view a given original document in the secure cloud transformed electronic document format from anywhere on the cloud communications network.

  • Pub Date: 2012/24/12
  • Number: 08589372
  • Details: Visit USPTO

Visit USPTO Page


Metadata-driven switch network control

Disclosed are systems and methods to automatically and continuously control a switch network using a metadata-driven switch apparatus. In particular, a switch apparatus, comprised of multiple server-grade processors and co-processors coupled with a switch silicon, has a metadata-driven control program running on the switch apparatus to monitor and control the switch apparatus itself and the network traffic running through the switch apparatus. Furthermore, the switch apparatus and metadata-driven control program monitors the network state (health, behavior, and performance) of the entire switch network and receives feedback from the network to improve switch and network controls. The switch network may be composed of one metadata-driven switch apparatus coupled with one or more other metadata-driven switch apparatuses and may also be composed of one metadata-driven switch apparatus coupled with one or more foreign switch apparatuses.

  • Pub Date: 2012/24/12
  • Number: 08441961
  • Owner: Sideband Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Adjusting intensity of laser beam during laser operation on a semiconductor device

Among other things, a system and method for adjusting the intensity of a laser beam applied to a semiconductor device are provided for herein. A sensor is configured to measure the intensity of a laser beam reflected from the semiconductor device. Based upon the reflection intensity, an intensity of the laser beam that is applied to the semiconductor device is adjusted, such as to alter an annealing operation performed on the semiconductor device, for example.

  • Pub Date: 2012/24/12
  • Number: 09070591
  • Owner: Taiwan Semiconductor Manufacturing Company Limited
  • Location: Hsin-Chu, TW
  • Details: Visit USPTO

Visit USPTO Page


Trusted container

A secure identifier is derived, using a secured microcontroller of a computing device, that is unique to a pairing of the computing device and a particular domain. Secure posture data corresponding to attributes of the computing device is identified in secured memory of the computing device. The secure identifier and security posture is sent in a secured container to a management device of the particular domain. The particular domain can utilize the information in the secured container to authenticate the computing device and determine a security task to be performed relating to interactions of the computing device with the particular domain.

  • Pub Date: 2012/23/12
  • Number: 09419953
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive reality augmentation for natural interaction

Embodiments of the invention provide apparatus and methods for interactive reality augmentation, including a 2-dimensional camera () and a 3-dimensional camera (), associated depth projector and content projector (), and a processor () linked to the 3-dimensional camera and the 2-dimensional camera. A depth map of the scene is produced using an output of the 3-dimensional camera, and coordinated with a 2-dimensional image captured by the 2-dimensional camera to identify a 3-dimensional object in the scene that meets predetermined criteria for projection of images thereon. The content projector projects a content image onto the 3-dimensional object responsively to instructions of the processor, which can be mediated by automatic recognition of user gestures.

  • Pub Date: 2012/23/12
  • Number: 09158375
  • Owner: APPLE INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware-based device authentication

An opportunity for a computing device to participate in a secure session with a particular domain is identified. A secured microcontroller of the computing device is used to identify a secured, persistent seed corresponding to the particular domain and stored in secured memory of the computing device. A secure identifier is derived based on the seed and sent for use by the particular domain in authenticating the computing device to the particular domain for the secure session. The particular domain can further apply security policies to transactions involving the computing device and particular domain based at least in part on the secure identifier.

  • Pub Date: 2012/23/12
  • Number: 08955075
  • Owner: McAfee Inc
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device safe driving

In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated.

  • Pub Date: 2012/22/12
  • Number: 08874162
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device child share

In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits.

  • Pub Date: 2012/22/12
  • Number: 09230076
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Three-dimensional audio sweet spot feedback

A method for providing three-dimensional audio is provided. The method includes receiving a depth map imaging a scene from a depth camera and recognizing a human subject present in the scene. The human subject is modeled with a virtual skeleton comprising a plurality of joints defined with a three-dimensional position. A world space ear position of the human subject is determined based on the virtual skeleton. Furthermore, a target world space ear position of the human subject is determined. The target world space ear position is the world space position where a desired audio effect can be produced via an acoustic transducer array. The method further includes outputting a notification representing a spatial relationship between the world space ear position and the target world space ear position.

  • Pub Date: 2012/21/12
  • Number: 09522330
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for enabling a plurality of software components to communicate in a software component matrix environment

A technique for enabling a plurality of software components to communicate in a software component matrix environment is disclosed. In one particular exemplary embodiment, the technique may be realized by a method for enabling a plurality of software components to communicate in a software component matrix environment comprising the steps of encoding a request at a client side; communicating the request to a server at a server side via a communication interface; comparing the request to a plurality of operations supported at the server side; determining whether a function match exists at the server side; and returning a response comprising the function match to the client side in response to the request via the communication interface wherein the response is mapped to a data model of a client.

  • Pub Date: 2012/21/12
  • Number: 08706806
  • Owner: Rockstar Consortium US LP
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for newsroom management with electronic-publish-point integration

Presently described are systems and methods for newsroom management with electronic-publish-point integration. One example embodiment takes the form of a non-transitory computer-readable medium containing instructions that, when executed by a processor, cause a set of steps to be carried out for submitting content to an electronic publish point. The set of steps includes providing a newsroom script to a user via a user interface; receiving a selected portion of an on-air text portion of the newsroom script from the user via the user interface; and retrieving, from a media database, media associated with the newsroom script. The set of steps further includes submitting content to the publish point, wherein the content includes text associated with the selected portion of the on-air text portion, and wherein the content further includes the retrieved media.

  • Pub Date: 2012/21/12
  • Number: 09360983
  • Owner: Tribune Broadcasting Company, LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System, process, and computer program product for implementing a document scanner in a hand-held device

A system, process, and computer program product are provided for scanning a document with a hand-held device. An approach for scanning the document includes the steps of sampling one or more values from an array of sensors integrated into a hand-held device, determining whether the device has moved at least a threshold distance, and sampling one or more additional values from the array of sensors.

  • Pub Date: 2012/21/12
  • Number: 09148544
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System for generating test scenarios and test conditions and expected results

A requirements testing system facilitates the review and analysis of requirement statements for software applications. The requirements testing system automatically generates test artifacts from the requirement statements, including test scenarios, test conditions, test hints, and expected results. These test artifacts characterize the requirements statements to provide valuable analysis information that aids understanding what the intentions of the requirement statements are. The automation of the generation of these test artifacts produces numerous benefits, including fewer errors, objectivity, and no dependency on the skills and experience of a creator.

  • Pub Date: 2012/21/12
  • Number: 09262404
  • Owner: ACCENTURE GLOBAL SERVICES LIMITED
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service

A method and system configured for detecting availability of destination port associated with a virtual connection between a client and server communicating using SCSI over a fiber channel network by a server fiber channel adapter, reading data from a head of a singly linked list of a data stream storing data to be forwarded by the virtual connection engine executing the virtual connection without a lock by a consumer process thread while a producer process thread has access to the linked list of the data stream, and forwarding the data read from the head of the linked list to the destination port.

  • Pub Date: 2012/21/12
  • Number: 09563423
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for proxying TCP connections over a SCSI-based transport

A system and method for executed by a server for communicating between the server and a client over a Fiber Channel (FC) network. The method includes receiving, from the client, a first SCSI request including an identifier for a virtual connection and a descriptor for a server process at the server, creating a socket to the server process using the process descriptor, associating the socket with the virtual connection, receiving, from the client, a second SCSI request, including the virtual connection identifier and a call message, and writing the call message to the socket associated with the virtual connection.

  • Pub Date: 2012/21/12
  • Number: 09270786
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for optimized management of statistics counters, supporting lock-free updates, and queries for any to-the-present time interval

A method and system for monitoring computer and networking performance. The method includes receiving a request for a tracked statistical item over a specified interval, calculating a result value for the request by adding accrued values recorded within specified interval with interpolated value between last value in the specified interval and most recent value outside the interval using available recorded data for the statistical item organized in ranges with varied granularity, and returning the result value to a requestor.

  • Pub Date: 2012/21/12
  • Number: 09647905
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for maximizing system data cache efficiency in a connection-oriented data proxy service

A method and system that is configured for receiving a connection request at a server over a fiber channel network from a client using SCSI, generating a virtual connection to service the connection request by the server, determining a load of each one of a set of virtual connection engines executed by the server, set of virtual connection engines to manage resources of a locality domain, and assigning the virtual connection to a virtual connection engine with a minimum load amongst the set of virtual connection engines.

  • Pub Date: 2012/21/12
  • Number: 09531765
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for management of network-based services

In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the first service provider to provide the first service in response to receiving the first request using the first set of configuration parameters.

  • Pub Date: 2012/21/12
  • Number: 09450836
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for importing and merging content items from different sources

Systems, methods, and computer-readable storage media for importing and merging photos from different sources are disclosed. The system receives credentials from a user, who has an account with a content management system. The credentials are associated with content item storage entities such as photo repositories. The system accesses the photo repositories, using the plurality of credentials if authorization is required for data access. The system identifies source photo data in each of the photo repositories, and duplicates the source photo data in the content management system account to create consolidated photo data.

  • Pub Date: 2012/21/12
  • Number: 09325709
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Server connection establishment over fibre channel using a block device access model

A system and method executed by a server for connecting with a client over a Fiber Channel (FC) network. The method includes receiving, from the client over the FC network, a first Small Computer System Interface (SCSI) request to establish a virtual connection, assigning an identifier to the virtual connection, responding to the first SCSI request by sending a first SCSI response, including the virtual connection identifier to the client over the FC network, receiving, from the client, a second SCSI request including the virtual connection identifier and a descriptor for a server process at the server, and associating the virtual connection with a server process at the server corresponding to the server process descriptor.

  • Pub Date: 2012/21/12
  • Number: 09591099
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Server communication over fibre channel using a block device access model

A system and method executed by a server for communicating between the server and a client over a Fiber Channel (FC) network. The method includes receiving, from the client over the FC network, a first Small Computer System Interface (SCSI) request including a client call message and a virtual connection identifier. A server process is identified that is associated with the virtual connection identifier. The client call message is extracted from first SCSI request and provides the client call message to the identified server process.

  • Pub Date: 2012/21/12
  • Number: 09473589
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Ring-shaped transistors providing reduced self-heating

A ring-shaped transistor includes a set of gates. Each gate of the set is disposed between a corresponding source and a corresponding drain. The set of gates are arranged such that all of the set of gates cannot be aligned with fewer than three imaginary straight lines drawn through the gates, with one of the imaginary straight lines passing only once though each of the set of gates.

  • Pub Date: 2012/21/12
  • Number: 08816397
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Reputation report with score

An online reputation assessment of an individual is performed. A reputation score is determined based on the performed online reputation assessment. The reputation score is provided as output. In some cases, the reputation score is provided to an entity that is not the individual, for example, based on the receipt of an authorization from the individual to disclose the score to the entity.

  • Pub Date: 2012/21/12
  • Number: 08805699
  • Owner: Reputation.com, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Reputation report with recommendation

The generation of an online reputation report for an individual is disclosed. First, an online reputation assessment is performed for an individual. Then, a report is generated. The report includes an individualized recommendation based on the online reputation assessment. The recommendation can be directed to the individual and can also be directed to an entity other than the individual.

  • Pub Date: 2012/21/12
  • Number: 08744866
  • Owner: Reputation.com, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Reliable server transport over fibre channel using a block device access model

A system and method for executed by a server for reliably communicating between the server and a client over a Fiber Channel (FC) network. The method includes receiving, from the client over the FC network, a first Small Computer System Interface (SCSI) request, including a virtual connection identifier in a logical block address field of a command descriptor block of the first SCSI request, validating the first SCSI request using the virtual connection identifier included in the first SCSI request, and responding to the first SCSI request by sending a first SCSI response, based on the validity of the first SCSI request, to the client over the FC network.

  • Pub Date: 2012/21/12
  • Number: 09473591
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Reliable client transport over fibre channel using a block device access model

A system and method executed by a client for reliably communicating between the client and a server over a Fiber Channel (FC) network. The method creating a first Small Computer System Interface (SCSI) request, including a virtual connection identifier, sending the first SCSI request to the server over the FC network, determining an action based on a status of the first SCSI request, creating a second SCSI request, including the virtual connection identifier, wherein the second SCSI request is based on the determined action, and sending the second SCSI request to the server over the FC network.

  • Pub Date: 2012/21/12
  • Number: 09407601
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Recommending electronic content based upon user availability

Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval.

  • Pub Date: 2012/21/12
  • Number: 09183523
  • Owner: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Reassignment of a virtual connection from a busiest virtual connection or locality domain to a least busy virtual connection or locality domain

A method and system for load balancing for virtual connections over a fiber channel network, the virtual connections using SCSI. The method including finding a one-way reassignment of a virtual connection (VC) from busiest VCE or locality domain to least busy VCE or locality domain placing the busiest VCE or locality domain and least busy VCE or locality domain in a target load range without reversing a load order, and executing the reassignment by a server fiber channel adapter.

  • Pub Date: 2012/21/12
  • Number: 09237057
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable blending via multiple pixel shader dispatches

Techniques are disclosed for dispatching pixel information in a graphics processing pipeline. A fragment processing unit in the graphics processing pipeline generates a pixel that includes multiple samples based on a portion of a graphics primitive received by a thread. The fragment processing unit calculates a set of source values, where each source value corresponds to a different sample of the pixel. The fragment processing unit retrieves a set of destination values from a render target, where each destination value corresponds to a different source value. The fragment processing unit blends each source value with a corresponding destination value to create a set of final values, and creates one or more dispatch messages to store the set of final values in a set of output registers. One advantage of the disclosed techniques is that pixel shader programs perform per-sample operations with increased efficiency.

  • Pub Date: 2012/21/12
  • Number: 09082212
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Points from focus operations using multiple light settings in a machine vision system

A method of automatically adjusting lighting conditions improves the results of points from focus (PFF) 3D reconstruction. Multiple lighting levels are automatically found based on brightness criteria and an image stack is taken at each lighting level. In some embodiments, the number of light levels and their respective light settings may be determined based on trial exposure images acquired at a single global focus height which is a best height for an entire region of interest, rather than the best focus height for just the darkest or brightest image pixels in a region of interest. The results of 3D reconstruction at each selected light level are combined using a Z-height quality metric. In one embodiment, the PFF data point Z-height value that is to be associated with an X-Y location is selected based on that PFF data point having the best corresponding Z-height quality metric value at that X-Y location.

  • Pub Date: 2012/21/12
  • Number: 09060117
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods of analyzing a cellular network

A method of managing a load within a cellular network. The method includes obtaining network usage records from the cellular network; extracting cell information from the network usage records; establishing terminal carrier routes for cellular terminals that have changed location as determined from the extracted cell information; deriving terminal carrier profile attributes for the cellular terminals that have changed location, based on the established terminal carrier routes; determining a load on a resource of the cellular network, based on the established terminal carrier routes and the derived terminal carrier profile attributes; and controlling resources of the cellular network in response to the determined load, so as to manage the load within the cellular network. By combining established terminal carrier routes with derived terminal carrier profile attributes, it is possible to anticipate areas where cellular terminal carriers are likely to be concentrated at specific times during the day and allocate resources accordingly.

  • Pub Date: 2012/21/12
  • Number: 09357553
  • Owner: International Business Machines
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for electronic management of recruiting

A terminal may be configured to display a list of recruiting events. In response to selection of one of the recruiting events, the terminal may be configured to display a list of a plurality of candidates associated with the selected one of the recruiting events. The terminal may be configured to select one of said candidates from the list of candidates based on an identifier read, by the terminal, from a computing device associated with the selected candidate. The terminal may be configured to, subsequent to the selection of the candidate, display a profile of the selected candidate. The terminal may be configured to display an interactive form via which a user of the terminal can input an assessment of the selected particular candidate.

  • Pub Date: 2012/21/12
  • Number: 08572000
  • Owner: Recsolu LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for balancing load across target endpoints on a server and initiator endpoints accessing the server

A method and system for balancing load across a set of target endpoints available on a server, and initiator endpoints accessing the server. The method including starting rebalancing of target endpoints at a defined interval, receiving monitored load data for a set of target endpoints, disqualifying target endpoints in the set of target endpoints that have a low load, selecting a next most busy target endpoint, marking the selected target endpoint as disqualified, classifying alternate paths of virtual connections assigned to the selected target endpoint according to busyness of endpoints of the alternate paths, load order and load imbalance, examining a load reduction offered by the alternate paths in order of classification, and returning an alternate path that has a highest load reduction for target endpoint.

  • Pub Date: 2012/21/12
  • Number: 09232000
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Memory heaps in a memory model for a unified computing system

A method and system for allocating memory to a memory operation executed by a processor in a computer arrangement having a first processor configured for unified operation with a second processor. The method includes receiving a memory operation from a processor and mapping the memory operation to one of a plurality of memory heaps. The mapping produces a mapping result. The method also includes providing the mapping result to the processor.

  • Pub Date: 2012/21/12
  • Number: 09116809
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Management of variants in a graphical modeling environment

A device receives variants associated with a model generated in a graphical modeling environment, and determines a hierarchy of the variants based on a hierarchy of the model. The device receives mode information for the variants, where the mode information includes a subset of a number of variant permutations. For each mode, the device receives control variables for the variants and optional constraints for the variants in the mode. The control variables define which variants are active, and the optional constraints ensure modeling correctness by enabling identification of conflicts between the variants. The device generates a variant manager tool based on the hierarchy of the variants, the mode information, the control variables, and the optional constraints, and outputs or stores variant information via the variant manager tool.

  • Pub Date: 2012/21/12
  • Number: 09378562
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Lightweight three-dimensional display

A computer-implemented imaging process method includes generating a progression of images of a three-dimensional model and saving the images at a determined location, generating mark-up code for displaying image manipulation controls and for permitting display of the progression of images in response to user interaction with the image manipulation controls, and providing the images and mark-up code for use by a third-party application.

  • Pub Date: 2012/21/12
  • Number: 08614706
  • Owner: Trimble Navigation Limited
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Lifestyle application for consumers

A user device receives consumer information from a consumer, where the consumer information includes preference information, demographic information, identity information, relationship information, and location information associated with the consumer. The user device provides the consumer information to a lifestyle application platform, and receives, from the lifestyle application platform, a consumer profile for the consumer based on the consumer information. The user device receives, from the lifestyle application platform, notifications, reports, and offers, associated with an enterprise and relevant to the consumer, based on the consumer profile, and provides the notifications, reports, and offers for display to the consumer.

  • Pub Date: 2012/21/12
  • Number: 08983858
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware management interface

A management controller of a computing device is identified on a network and queried for attributes of the computing device. The management controller is securely implemented in hardware of the computing device and is independent of a central processing unit (CPU) of the computing device. Data is received from the management controller that identifies one or more attributes of the computing device. A security policy of the network is implemented for the computing device based on the one or more attributes.

  • Pub Date: 2012/21/12
  • Number: 09015793
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Fixed position interactive advertising

Computer-based systems and methods for an advertisement displayed on a fixed position on a web browser window displaying a visible portion of a web page. The fixed position advertisement remains in its fixed position in view of the user as the user scrolls the web page in various directions. The advertisement may be sized, shaped, or formatted based on the available space on the web page and on the content of the advertisement. The advertisement may include a variety of static and dynamic content, including interaction prompts and other elements, which may enable an engagement-based revenue generation model.

  • Pub Date: 2012/21/12
  • Number: 09607321
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient super-sampling with per-pixel shader threads

Techniques for dispatching pixel information in a graphics processing pipeline. A fragment processing unit generates a pixel that includes multiple samples based on a first portion of a graphics primitive received by a first thread. The fragment processing unit calculates a first value for the first pixel, where the first value is calculated only once for the pixel. The fragment processing unit calculates a first set of values for the samples, where each value in the first set of values corresponds to a different sample and is calculated only once for the corresponding sample. The fragment processing unit combines the first value with each value in the first set of values to create a second set of values. The fragment processing unit creates one or more dispatch messages to store the second set of values in a set of output registers.

  • Pub Date: 2012/21/12
  • Number: 09495721
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Coordinated dynamic point selection (DPS) with cell range expansion in a coordinated multipoint (CoMP) system

Technology for mitigating edge effect interference in a Coordinated MultiPoint (CoMP) system having multiple CoMP clusters is disclosed. In an example, a method can include a macro node transmitting a cell range expansion request to user equipments (UEs) within a cell. A CoMP cluster for nodes within the cell that includes UEs operating with the cell range expansion can be generated. Blanked resources between a plurality of macro nodes for the CoMP clusters in the CoMP system can be coordinated using a muting preference including a blanked resource.

  • Pub Date: 2012/21/12
  • Number: 09231723
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Contextual breadcrumbs during navigation

A system and method of providing contextual breadcrumbs is disclosed. A current page may be caused to be displayed on a device. Contextual breadcrumbs may be caused to be displayed on the current page. The contextual breadcrumbs may comprise a simplified representation of a first different page. The first different page may be different from the current page. The simplified representation of the first different page may comprise context information regarding a function of the first different page. The context information regarding a function of the first different page may comprise a visual representation of functional options of the first different page. At least one of the contextual breadcrumbs may be configured to enable the user to act upon the functional options of the first different page from the current page.

  • Pub Date: 2012/21/12
  • Number: 09411899
  • Owner: PayPal, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Client connection establishment over fibre channel using a block device access model

A system and method executed by a client for connecting with a server over a Fiber Channel (FC) network. The method including creating a first Small Computer System Interface (SCSI) request to establish a virtual connection, sending the first SCSI request to the server over the FC network, receiving, from the server over the FC network, a first SCSI response responsive to the first SCSI request, wherein the first SCSI response includes an identifier for the virtual connection, creating a second SCSI request, including the virtual connection identifier and a descriptor for a server process at the server, and sending the second SCSI request to the server over the FC network.

  • Pub Date: 2012/21/12
  • Number: 09473590
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Client communication over fibre channel using a block device access model

A system and method executed by a client for communicating between the client and a server over a Fiber Channel (FC) network. The method creates a first Small Computer System Interface (SCSI) request, including a virtual connection identifier and a call message for a server process at the server, sends the first SCSI request to the server over the FC network, creates a second SCSI request, including the virtual connection identifier, sends the second SCSI request to the server over the FC network, and receives, from the server over the FC network, a second SCSI response responsive to the second SCSI request, wherein the SCSI response includes a reply message from the server process.

  • Pub Date: 2012/21/12
  • Number: 09509797
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic routing of electronic mail file attachments to a user directory in a file management system, by a recipient electronic mail server, based on email sender defined processing rules

Attachments received at an email account are processed according to a processing rule that is selected using, for example, a sender's email address, the sender's domain, or metadata in the email. A feature triggers the processing rule that then removes the attachment from the received email and stores the attachment in a rule-indicated directory. Processing rules can be defined by the email sender or by the email recipient. Changes to the attachment can be synchronized across multiple user devices and user accounts using a file sharing application.

  • Pub Date: 2012/21/12
  • Number: 09385980
  • Owner: Dropbox, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Automated access, key, certificate, and credential management

Certain embodiments provide means for managing automated access to computers, e.g., using SSH user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.

  • Pub Date: 2012/21/12
  • Number: 09515999
  • Owner: SSH Communications Security OYJ
  • Location: Helsinki, FI
  • Details: Visit USPTO

Visit USPTO Page


Associative search engine

This invention relates to an advertisement machine which provides advertisements to a user searching for desired information within a data network. The machine receives, from a user, a search request including a search argument corresponding to the desired information and searches, based upon the received search argument, a first database having data network related information to generate search results. It also correlates the received search argument to a particular advertisement in a second database having advertisement related information. The search results together with the particular advertisement are provided by the machine to the user.

  • Pub Date: 2012/21/12
  • Number: 09129019
  • Owner: RPX CLEARINGHOUSE LLC
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Architecture for variable pressure mouse

User input devices with variable pressure buttons are configured. A user may specify a range of pressure to be associated with a pressure level. In some embodiments, a user may also associate a command or other instruction to an application with an identity of a variable pressure button and a pressure level of the button. In some embodiments, the associations may be represented in a configuration profile. In further embodiments, a microcontroller for a mouse may translate signals from variable pressure buttons into pressure levels based upon the configuration file. In many embodiments, a user may associate a reporting rate with a variable pressure button. A legacy application may receive reports of the state of the variable pressure button at the associated reporting rate.

  • Pub Date: 2012/21/12
  • Number: 09389711
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Anti-cancer compounds targeting Ral GTPases and methods of using the same

The invention provides methods of inhibiting the growth or metastasis of a cancer in a mammal by inhibiting a Ral GTPase in the mammal. The invention also provides small molecule inhibitors of Ral GTPases useful in the methods of the invention and pharmaceutical compositions containing the therapeutically effective compounds of the invention, and methods of using the same.

  • Pub Date: 2012/21/12
  • Number: 09353121
  • Details: Visit USPTO

Visit USPTO Page


Unified resource manager providing a single point of control

An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.

  • Pub Date: 2012/20/12
  • Number: 09086918
  • Owner: INTERNATIONAL BUSINESS MACHINESS CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for storing shared vertices

A graphics processing unit includes a set of geometry processing units each configured to process graphics primitives in parallel with one another. A given geometry processing unit generates one or more graphics primitives or geometry objects and buffers the associated vertex data locally. The geometry processing unit also buffers different sets of indices to those vertices, where each such set represents a different graphics primitive or geometry object. The geometry processing units may then stream the buffered vertices and indices to global buffers in parallel with one another. A stream output synchronization unit coordinates the parallel streaming of vertices and indices by providing each geometry processing unit with a different base address within a global vertex buffer where vertices may be written. The stream output synchronization unit also provides each geometry processing unit with a different base address within a global index buffer where indices may be written.

  • Pub Date: 2012/20/12
  • Number: 09418616
  • Owner: NVIDIA CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for quality assurance automation

A method and a system for quality assurance automation are described. A system comprises a requirements service to generate requirements artifacts from one or more sources. The requirement artifacts are of a standardized format that is referenced in tested software code. A data provider service standardizes and distributes various types of common test data across multiple business disciplines. An execution service manages test executions across and multiple environments where test software code is installed. An evaluation service analyzes data resulting from the test executions. A reporting service reports the analyzed data.

  • Pub Date: 2012/20/12
  • Number: 09411575
  • Owner: eBay Enterprise, Inc.
  • Location: King of Prussia, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for debugging model based message sequences

A system for simplifying message sequences is disclosed. The system includes a shrink component and a message simplification component. The shrink component is configured to receive a failure inducing message sequence and to provide a shrunk sequence based on the failure inducing message sequence. The shrunk sequence has less or equal number of messages than the failure inducing message sequence. The message simplification component is configured to receive the shrunk sequence and to simplify messages within the shrunk sequence to generate a simplified message sequence including debugging hints.

  • Pub Date: 2012/20/12
  • Number: 08914678
  • Owner: Intel Mobile Communications GmbH
  • Location: Neubiberg, DE
  • Details: Visit USPTO

Visit USPTO Page


System for testing markup language applications

A system is described for remotely testing markup language and script language based applications executing on a computing device. A development device such as a desktop computer executes one or more development tool modules. A communication module and an unpack module are deployed to a computing device which executes the application under test. These modules serve to connect the development tool module executing on the development device to an embedded test tool executing on the computing device. Using this connection, the development tool module is able to interactively test and interact with the application executing on the computing device.

  • Pub Date: 2012/20/12
  • Number: 09268668
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for estimating order position

A system and method for providing order queue position information are disclosed. In this application, market updates are received for a tradeable object from at least one exchange. To the extent that the market updates do not include enough details to compute the queue position of a trader's working orders, estimation may be used. As a result, an order queue is generated to approximate a trader's order position in an exchange price order queue. An interface may be used to display the generated order queue estimation to the trader which provides valuable trading information.

  • Pub Date: 2012/20/12
  • Number: 08762254
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Set top box application in a concurrent dual environment

A set top box or like device utilizing virtualization techniques to isolate secure device resources from an untrusted software framework incorporated in the device. In one implementation, a first virtual machine container is provided for secure execution of a traditional set top box application, while a second virtual machine container is utilized to host a software framework or untrusted portions of a software framework. A secure access client/server interface is provided to support interactions between the first and second virtual machine containers. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment and isolated in a Linux resource container. Virtual container constructs in various embodiments may employ varying levels of hardware sandboxing, including use of dedicated processing resources in multi-processor environments. In further embodiments, the software framework may be partitioned into trusted and untrusted portions that are executed in separate virtual containers.

  • Pub Date: 2012/20/12
  • Number: 09405562
  • Owner: BROADCOM CORPORATION
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Services and management layer for diverse data connections

A method relates to quality of services and management of diverse data connections to and from an application launched on a computing platform. The diverse types of data connections to and from the application may include, for example, one or more of HTTP, Web Services, OData/REST, OData/HTTP, SAP RFC, and SAP ALE types of data connections. The method includes providing a layer, in the computing platform, for quality of services and management of diverse types of data connections to and from the application and providing a common entry point to receive data destined for external receivers over the diverse types of data connections to and from the application.

  • Pub Date: 2012/20/12
  • Number: 09009354
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Scalable compute fabric

A method and apparatus for providing a scalable compute fabricare provided herein. The method includes determining a workflow for processing by the scalable compute fabric, wherein the workflow is based on an instruction set. A pipeline in configured dynamically for processing the workflow, and the workflow is executed using the pipeline.

  • Pub Date: 2012/20/12
  • Number: 09465620
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy queue pair for offloading

A method for offloading includes a host channel adapter (HCA) receiving a first work request identifying a queue pair (QP), making a first determination that the QP is a proxy QP, and offloading the first work request to a proxy central processing unit (CPU) based on the first determination and based on the first work request satisfying a filter criterion. The HCA further receives a second work request identifying the QP, processes the second work request without offloading based on the QP being a proxy QP and based on the first work request failing to satisfy the filter criterion. The HCA redirects a first completion for the first work request and a second completion for the second work request to the proxy CPU based on the first determination. The proxy CPU processes the first completion and the second completion in order.

  • Pub Date: 2012/20/12
  • Number: 09069633
  • Owner: Oracle America, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable blending in multi-threaded processing units

A technique for efficiently rendering content reduces each complex blend mode to a series of basic blend operations. The series of basic blend operations are executed within a recirculating pipeline until a final blended value is computed. The recirculating pipeline is positioned within a color raster operations unit of a graphics processing unit for efficient access to image buffer data.

  • Pub Date: 2012/20/12
  • Number: 09183609
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel log structured file system collective buffering to achieve a compact representation of scientific and/or dimensional data

Collective buffering and data pattern solutions are provided for storage, retrieval, and/or analysis of data in a collective parallel processing environment. For example, a method can be provided for data storage in a collective parallel processing environment. The method comprises receiving data to be written for a plurality of collective processes within a collective parallel processing environment, extracting a data pattern for the data to be written for the plurality of collective processes, generating a representation describing the data pattern, and saving the data and the representation.

  • Pub Date: 2012/20/12
  • Number: 09122700
  • Owner: Los Alamos National Security, LLC
  • Location: Los Alamos, US
  • Details: Visit USPTO

Visit USPTO Page


On-device attribution of network data usage

Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review.

  • Pub Date: 2012/20/12
  • Number: 09264556
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Obtaining information from data items

Methods and apparatus are disclosed for obtaining information from one or more headers of a data item transmitted via a communication network, a predetermined portion of at least one header carrying a symbol or combination of symbols having a first pre-defined meaning according to a first pre-defined communication protocol. The method comprises inspecting at least one header of a received data item whereby to identify the symbol or combination of symbols carried by the predetermined portion thereof; identifying whether at least one other portion of a header of the data item is carrying the same symbol or combination of symbols; and in the event that it is identified that at least one other portion of a header of the data item is carrying the same symbol or combination of symbols, ‘interpreting and/or processing at least one of the one or more headers according to a second pre-defined communication protocol, the second communication protocol differing from the first communication protocol.

  • Pub Date: 2012/20/12
  • Number: 08964755
  • Owner: BRITISH TELECOMMUNICATIONS public limited company
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Methods for ionophorically screening pore forming bacterial protein toxins and receptors

A method for determining the amount of live pore forming bacterial toxin protein in a sample is provided, the method including the steps of a) forming a membrane comprising a lipid bilayer and a receptor, b) contacting the membrane with an ion solution and the sample, c) measuring ion flow through the membrane, d) comparing the ion flow through the membrane to a standard curve, and e) determining the amount of pore forming bacterial toxin protein in the sample. A kit for determining the amount of live pore forming bacterial toxin protein present in the sample is also provided.

  • Pub Date: 2012/20/12
  • Number: 08835181
  • Details: Visit USPTO

Visit USPTO Page


Method and system to provide user-level multithreading

A method and system to provide user-level multithreading are disclosed. The method according to the present techniques comprises receiving programming instructions to execute one or more shared resource threads (shreds) via an instruction set architecture (ISA). One or more instruction pointers are configured via the ISA; and the one or more shreds are executed simultaneously with a microprocessor, wherein the microprocessor includes multiple instruction sequencers.

  • Pub Date: 2012/20/12
  • Number: 09442721
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for Infiniband host channel adapter multicast packet replication mechanism

A method for multicast replication by a host channel adapter (HCA) involving receiving a multicast packet, by a receive pipeline for processing packets of the HCA, storing, in a payload RAM within the HCA, a multicast packet payload corresponding to a data portion of the multicast packet, identifying, from a multicast header of the multicast packet, a plurality of destination underlying functions and a plurality of corresponding destination QPs to which the multicast packet is directed, wherein each destination underlying function of corresponds to a virtual machine located on a host, identifying, from the multicast header, information to be replicated for each multicast packet destination, injecting, by the HCA, a number of multicast packet descriptors corresponding to a number of the corresponding destination QPs into the receive pipeline of the HCA, and copying, from the payload RAM, the multicast packet payload to each of the corresponding destination QPs.

  • Pub Date: 2012/20/12
  • Number: 08937949
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Managing technology resources across multiple platforms

The present invention extends to methods, systems, and computer program products for managing technology resources across multiple platforms. Embodiments of the invention can be used to manage the configuration of a plurality of different devices. A management server/service can utilize native management capabilities of different devices to provide configuration management without requiring agents to be installed on the devices. In general, the management server/service adapts to the unique characteristics and behaviors of different devices, platforms, and external systems to provide configuration management for the different devices, platforms, and external systems. As such, configuration management can be provided in a unified fashion across different platforms, both on-premise and off-premise, and indirectly. When client agents are present, the management server/service can adjust to compatibly operate with the client agents.

  • Pub Date: 2012/20/12
  • Number: 09172773
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Inferring contextual user status and duration

In one embodiment, a method includes one or more server computing devices receiving first data associated with an activity recently performed or currently being performed by a user of one or more client computing devices. A current state of the user is inferred at least in part by analyzing at least the first data, and second data associated with one or more historical durations associated with the inferred current state is accessed. An end time associated with the inferred current state is estimated based at least in part on the second data.

  • Pub Date: 2012/20/12
  • Number: 09098802
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Familiar dynamic human challenge response test content

Embodiments of the invention are directed to human challenge response test delivery systems and methods. Specifically, embodiments of the present invention are directed to secure human challenge response test delivery services of configurable difficulty for user devices. One embodiment of the present invention is directed to methods and systems for implementing a familiar and dynamic human challenge response test challenge repository created from transaction data. The dynamic human challenge response test challenge repository may be created by a server computer receiving a plurality of transaction data. Challenge items may be extracted from the transaction data using an extraction algorithm. Furthermore, in some embodiments a challenge message may be sent to a requestor, a verification request may be received, and the verification request may be compared to the challenge message. Another embodiment may be directed at using user information in a human challenge response test to mutually authenticate a user and a service provider.

  • Pub Date: 2012/20/12
  • Number: 09195822
  • Owner: VISA INTERNATIONAL SERVICE ASSOCIATION
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Educator effectiveness

Various implementations for managing, monitoring, and promoting user development and effectiveness are described. In one example implementation, a system includes a management module, an assessment module, a content module, and a reporting module. The management module determines a goal for a plurality of users of an organization to meet and a workflow for achieving the goal. The assessment module determines an assessment of a first performance of the first user based on the workflow and personalizes an electronic resource to a need of the first user based on the assessment of the performance. The content module provides the first electronic resource to the first user for interaction and the reporting module generates a report describing the electronic resource and the assessment of the first performance.

  • Pub Date: 2012/20/12
  • Number: 09575616
  • Owner: SCHOOL IMPROVEMENT NETWORK, LLC
  • Location: Midvale, US
  • Details: Visit USPTO

Visit USPTO Page


Duplicate check detection

Images from checks may be compared with each other to detect a twice-deposited or represented check. An image of a check may be parsed into regions or tiles, for example. In an implementation, values for regions or tiles over a predetermined area (e.g., an area from a character in the magnetic ink character recognition (MICR) line at the bottom of the check to the dollar sign symbol) may be compared. In an implementation, a virtual overlay of two check images may be performed and a correlation may be determined.

  • Pub Date: 2012/20/12
  • Number: 08611635
  • Owner: United Services Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


Doorbell backpressure avoidance mechanism on a host channel adapter

A method for processing commands includes receiving, for multiple commands, doorbells for writing to a send queue scheduler buffer on a host channel adapter (HCA). The send queue scheduler buffer is associated with a send queue scheduler. The method further includes detecting a potential deadlock of the send queue scheduler from processing a portion of the doorbells, writing a subset of the doorbells to a doorbell overflow buffer on a host, operatively connected to the HCA, based on detecting the potential deadlock, and discarding the subset by the send queue scheduler without processing the subset of the plurality of doorbells before discarding.

  • Pub Date: 2012/20/12
  • Number: 09069485
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Descending device with direct drive centrifugal brake

The present invention relates to a descending device for repeated braked descent of a load from an elevated structure. The descending device comprises a housing attachable to the elevated structure; a descent shaft rotatably attached to the housing; a centrifugal brake comprising a fixed part connected to the housing and a rotatable part connected to the descent shaft; and a rope configured for attachment of the load at two different load attachment portions being separated by a descent length of the rope. The descent shaft is directly connected to the rotatable part of the centrifugal brake such that one revolution of the descent shaft translates to one revolution of the rotatable part of the centrifugal brake; and the winding angle is at least 360°.

  • Pub Date: 2012/20/12
  • Number: 09474918
  • Owner: Cresto AB
  • Location: Halmstad, SE
  • Details: Visit USPTO

Visit USPTO Page


Cross-platform content management for online community advocacy management platform

For an online community advocacy management platform, techniques (APIs) are described for pulling comments in from the app/plug-in, and cross-pollinating the social online community (e.g., social network website “walls”) and app/plug-in content in an intelligent manner (which content, how often, etc.).

  • Pub Date: 2012/20/12
  • Number: 09015605
  • Details: Visit USPTO

Visit USPTO Page


Cross-network listening agent for network entity monitoring

Various embodiments herein include at least one of systems, methods, and software of a cross-network listening agent for network entity monitoring. In some such embodiments, the cross-network listening agent is an element of software or a hardware device connected to a network and listens for metric data broadcast by other entities of the network. The cross-network listening agent receives the broadcast metric data and transmits the metric data to a network and system management system resident on another network. The network entities are generally any device that reports status with regard to metrics the network entity monitors with regard to its own state. In some embodiments, the network entities report their status in Simple Network Management Protocol (SNMP) messages that are broadcast on the network, but are unable to reach the network and system management system resident on the other network.

  • Pub Date: 2012/20/12
  • Number: 09172596
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Contribution filtering for online community advocacy management platform

For an online community advocacy management platform, the techniques herein intelligently provide mechanisms and user interfaces for filtering (triaging) the view of comments and content based on advocate levels, trend rates, consumer participation, hot topics, recent activity, etc. by gauging the likelihood of user-generated actions to cause future influence based on their algorithmic similarities to historically influential actions, and weighted based on an aggregate, compounding history of individuals throughout time.

  • Pub Date: 2012/20/12
  • Number: 09473584
  • Details: Visit USPTO

Visit USPTO Page


Cloud based contact center platform powered by individual multi-party conference rooms

The present disclosure includes a system and method for handling customer service requests in a virtual computing environment supporting multimedia interactions. In some embodiments, the system includes an automated management tool for receiving a customer service request from a client device, a server for establishing an individualized communication session, and a plurality of available resources capable of being connected to the individualized communication session. In some embodiments, the method includes receiving and establishing a connection between an automated management tool and a client device, receiving a customer service request from the client device, establishing an individualized communication session, and providing resources to the individualized communication session.

  • Pub Date: 2012/20/12
  • Number: 09049309
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Best match processing mode of decision tables

An input combination of at least one condition value to be evaluated against at least one rule of a decision table is received. The at least one rule includes at least one condition and the rule is associated with a result. The at least one rule is evaluated against the input combination to determine conditions fulfilled for the at least one condition value. In one aspect, a rule from the at least one rule that best matches the input combination is determined and a result associated with the rule that best matches the input combination is outputted.

  • Pub Date: 2012/20/12
  • Number: 09031893
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Automated end-to-end testing via multiple test tools

The development of automated tests that span end-to-end business processes, such as may be executed in part by each of multiple Enterprise Resource Planning systems, is a very complex activity. Beside expert know-how of various tools, such end-to-end business process testing requires various test automation tools to cover complex business processes to provide automated tests. Various embodiments herein are built on an approach for building and connecting automated end-to-end tests that combines test scripts from multiple test tools. These embodiments include functionality to assemble test scripts from multiple test tools into a single, composite test script that allows passing of information between the test scripts during performance of an end-to-end automated process test. These and other embodiments are illustrated and described herein.

  • Pub Date: 2012/20/12
  • Number: 09092578
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Application security framework

In accordance with the teaching described herein, systems and methods are provided for providing secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token.

  • Pub Date: 2012/20/12
  • Number: 09098680
  • Owner: AbbVie Inc.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Accelerated object detection filter using a video motion estimation module

Systems, apparatus and methods are described related to accelerated object detection filter using a video estimation module.

  • Pub Date: 2012/20/12
  • Number: 09141855
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


ABAP channels for event signaling

A system, a method and a computer-program product for exchanging communications between user sessions are provided. A first push channel and a first messaging channel on a first application server for connecting a first client to the first application server are established. The first messaging channel communicates with the first push channel, where both channels form a first session corresponding to the first client. A second push channel and a second messaging channel on a second application server for connecting a second client to the second application server are established. The second messaging channel communicates with the second push channel, where both channels form a second session corresponding to the second client. The first and second application servers communicate on a communication network. Messages are exchanged between the first and second messaging channels to form a connection between the first and second clients.

  • Pub Date: 2012/20/12
  • Number: 09467483
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhanced user equipment assistance information in wireless communication systems

Systems and methods are disclosed for communicating enhanced user equipment (UE) assistance information between nodes in wireless communication systems. The UE achieves power savings and latency requirements more effectively by communicating its preferences, constraints and/or requirements to an evolved Node B (eNodeB) in the form of UE assistance information. The UE assistance information may include, for example, an indication of a preferred set of discontinuous reception (DRX) settings, current data traffic conditions, expected data traffic conditions, power or performance preferences, and/or an indication of the UE's mobility between cells.

  • Pub Date: 2012/19/12
  • Number: 09515757
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enabling write-back caching and replication at different abstraction layers

A computer-implemented method for enabling write-back caching and replication at different abstraction layers may include (1) identifying a cache abstraction layer that implements write-back caching to selectively cache at least one write to a backing store, (2) identifying a replication abstraction layer that replicates the backing store to a secondary storage system by replicating writes committed to the backing store to the secondary storage system, (3) receiving a request to create a point-in-time image of the backing store at the secondary storage system at a point at which the writes committed to the backing store are point-in-time consistent, (4) committing the cached write to the backing store to ensure that the writes committed to the backing store are point-in-time consistent, (5) marking the point at which the writes committed to the backing store are point-in-time consistent. Various other methods, systems, and computer-readable media are also disclosed.

  • Pub Date: 2012/19/12
  • Number: 09367457
  • Owner: Veritas Technologies, LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for optimized access messaging in a wireless network

A method is provided for managing wireless network traffic that includes designating a first resource block of a macro base station and a second resource block of a small cell base station for access by a physical random access channel (PRACH). The method further includes designating a first random access subframe associated with the first resource block and a second random access subframe associated with the second resource block for access by a random access channel message. The first random access subframe has a first allocation of random access signatures that are configured to receive a plurality of random access requests. The second random access subframe is time-aligned with the first random access subframe and has a second allocation of random access signatures that are configured to receive a plurality of random access requests.

  • Pub Date: 2012/19/12
  • Number: 09167603
  • Owner: Fujitsu Limited
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


System and method for intelligently selecting a network interface

An method, apparatus and machine readable medium are described for intelligently selecting a network interface. An attempt may be made to connect over a first network interface having the highest priority (e.g., WiFi). At the same time, a fallback timer is started. If the attempt to connect over the first network interface does not succeed within a designated timer threshold, then a parallel attempt is made to connect over a second network interface having a lower priority (e.g., cellular). The first network interface over which a connection is successfully made is then used. These techniques may be employed on a per-connection basis. Thus, a first process may successfully connect over the first network interface while a second process may be unsuccessful over the first network interface but may fall back to the second network interface.

  • Pub Date: 2012/19/12
  • Number: 09439234
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for configuring a field device of a control system

A system and method for configuring a field device of a control system is provided. The system includes a mobile computing device for communicating with a wireless adapter coupled to the field device. The mobile computing device receives an application module via a wireless network communication module. The application module, when executed by a processor, configures the field device via a wireless direct communication module. The mobile computing device includes a user-friendly graphic display to provide and receive information associated with the configuration of the field device.

  • Pub Date: 2012/19/12
  • Number: 09471049
  • Owner: General Equipment and Manufacturing Company, Inc.
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Spectroscopic means and methods for identifying microorganisms in culture

A spectroscopic method for spectroscopic detection and identification of bacteria in culture is disclosed. The method incorporates construction of at least one data set, which may be a spectrum, interference pattern, or scattering pattern, from a cultured sample suspected of containing said bacteria. The data set is corrected for the presence of water in the sample, spectral features are extracted using a principal components analysis, and the features are classified using a learning algorithm. In some embodiments of the invention, for example, to differentiate MRSA from MSSA, a multimodal analysis is performed in which identification of the bacteria is made based on a spectrum of the sample, an interference pattern used to determine cell wall thickness, and a scattering pattern used to determine cell wall roughness. An apparatus for performing the method is also disclosed, one embodiment of which incorporates a multiple sample analyzer.

  • Pub Date: 2012/19/12
  • Number: 09365883
  • Owner: OPTICUL DIAGNOSTICS INC.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Smart small form-factor pluggable transceiver for data networks

In one embodiment, a smart small form-factor pluggable (SSFP) transceiver—compatible with SFP size, power, and interconnection standards—includes an optical transceiver, an electrical connector, a protocol processing engine, and a CPU. The SSFP transceiver is configured for use at a client site having no network interface device (NID). The SSFP transceiver (1) mates to a client's network device at an electrical interface within the network device and (2) connects to a network provider's central office (CO) node via an optical cable at an optical interface. The SSFP transceiver is configured to (1) be powered by the network device, (2) power-up upon mating with the network device, (3) be configured by a remote management agent (RMA) of the network provider for communication with the provider network, (4) respond to/generate Operation, Administration, and Management (OAM) messages from/for the CO node, and (5) provide OAM demarcation functions of a conventional NID.

  • Pub Date: 2012/19/12
  • Number: 08938166
  • Owner: Alcatel Lucent
  • Location: Boulogne Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Single interface for local and remote speech synthesis

Features are disclosed for providing a consistent interface for local and distributed text to speech (TTS) systems. Some portions of the TTS system, such as voices and TTS engine components, may be installed on a client device, and some may be present on a remote system accessible via a network link. Determinations can be made regarding which TTS system components to implement on the client device and which to implement on the remote server. The consistent interface facilitates connecting to or otherwise employing the TTS system through use of the same methods and techniques regardless of the which TTS system configuration is implemented.

  • Pub Date: 2012/19/12
  • Number: 08959021
  • Owner: IVONA Software Sp. z.o.o.
  • Location: Gydnia, PL
  • Details: Visit USPTO

Visit USPTO Page


Provisioning network devices to provide a network service

A device is configured to receive information that identifies a type of network service to be provided to a customer, determine, based on the type of network service, network devices to provide the network service, where the network devices may include a first network device and a second network device. The device is configured to generate, for each of the network devices, corresponding configuration code for configuring the network devices to provide the network service, where first configuration code corresponding to the first network device may be different from second configuration code corresponding to the second network device. The device is configured to transmit, to each network device, the corresponding configuration code to configure the network devices to provide the network service.

  • Pub Date: 2012/19/12
  • Number: 09042269
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Ordering of bookmarks for objects in a social networking system

A social networking system analyzes a user's interactions with objects linked to bookmarks associated with the user to generate a score for each bookmark. The score represents or is based on the probability that the user will access the bookmark or the linked object. For example, the score is a predicted click-through rate for the bookmark. Based on the scores, a subset of the bookmarks is selected for presentation to the user. Additionally, the scores may be used to order the selected subset of the bookmarks. Hence, the bookmarks that the user is most likely to access are presented while the bookmarks the user is less likely to access may be hidden.

  • Pub Date: 2012/19/12
  • Number: 09171287
  • Owner: Facebook, Inc.
  • Location: Menlo Park, unknown
  • Details: Visit USPTO

Visit USPTO Page


Non-blocking caching technique

The described implementations relate to processing of electronic data. One implementation is manifested as a system that can include a cache module and at least one processing device configured to execute the cache module. The cache module can be configured to store data items in slots of a cache structure, receive a request for an individual data item that maps to an individual slot of the cache structure, and, when the individual slot of the cache structure is not available, return without further processing the request. For example, the request can be received from a calling application or thread that can proceed without blocking irrespective of whether the request is fulfilled by the cache module.

  • Pub Date: 2012/19/12
  • Number: 09223780
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multipath communication in a network

Ways of sending data over a network over a single path or over multiple parallel paths on an as-needed basis depending upon network conditions, and/or other factors, are described. For example, if a computing device detects sufficient jitter and/or latency at one or more network interfaces, the data may be sent over two or more communication paths using two or more network interfaces.

  • Pub Date: 2012/19/12
  • Number: 09628373
  • Owner: Comcast Cable Communications, LLC
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for testing navigation routes

Various embodiments may include a method and system for testing data defining one or more navigation routes. A starting location may be input at a computer remote from the starting location. A destination location may also be input. Map data including GPS information based on the starting location input and the destination location input may be received. Route data may also be received. Based on the map data and the route data, data defining one or more navigation instructions may be generated for one or more routes. The one or more navigation instructions may be executed at the computer and compared to the map data. Based on the comparison, an accuracy of the navigation instructions may be determined. The data defining the navigation instructions may be corrected if the data is determined to be inaccurate.

  • Pub Date: 2012/19/12
  • Number: 08706418
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and computer program product for providing composite web application

A method and system for providing composite web application is provided. The method operates at a server computer to receive a client request in the form of an API language request, having a plurality of CLI commands for querying Web services. The process allows generating an Abstract Syntax Tree (AST) from the client request and sequentially executing each node of the AST to query the Web services. All web data received are combined into a composite data structure send back in the form of an API language response to the originator.

  • Pub Date: 2012/19/12
  • Number: 09344524
  • Details: Visit USPTO

Visit USPTO Page


Method and system for emotion tracking, tagging, and rating and communication

A system provides a user an interactive graphic software interface to navigate to an image representative of any particular emotion from within a matrix containing representations of a continuous range of emotional states. The user can then send the selected image to one or more other users or to aggregator servers in order to communicate emotions or to tag or rate various things with emotional significance, so that quantitative statistics on emotional significance can be computed for those things. The system can also be used to track emotional state through a range of time periods or geospatial locations.

  • Pub Date: 2012/19/12
  • Number: 09207755
  • Owner: Iconicast, LLC
  • Location: Wheaton, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for cross-operating systems execution of software applications

A method for cross-operating systems execution of a legacy software application on a user computing device is provided. The method comprises upon launching a native application on the user computing device, executing, on a server, a cloudified application corresponding to the legacy software application, the legacy software application is compliant with a first operating system, wherein the user computing device is compliant with a second operating system, the first operating system and the second operating system are incompatible with each other; rendering outputs responsive of inputs generated by the native application and received at the cloudified application; streaming the rendered outputs to the user computing device to be displayed by the native application; and performing file system operations requested by at least one of the native application and the cloudified application on at least a cloud storage service.

  • Pub Date: 2012/19/12
  • Number: 09342329
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for security mechanism for proximity-based access requests

An approach is provided for providing security mechanism for proximity-based interactions among devices. At least one first device (e.g., a memory tag) may determine a request for interaction between the at least one first device and at least one second device (e.g., a mobile phone), wherein at least the at least one first device is associated with at least one first antenna and at least one second antenna. The at least one first device may determine a first signal received by the at least one first antenna and a second signal received by the at least one second antenna. Further, the at least one first device may determine one or more differences in one or more characteristics of the first signal and the second signal. Furthermore, the at least one first device may process and/or facilitate a processing of the one or more differences to determine whether to allow the interaction.

  • Pub Date: 2012/19/12
  • Number: 09055435
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


FPGA memory paging

To improve the performance of a market data platform, a market data platform includes a hardware offload solution that allows received financial information to bypass the software portion of the platform and be written directly into memory. The hardware offload solution includes a field programmable gate array (FPGA) that takes over responsibility for some tasks that were previously performed in software. These tasks include performing line arbitrage on financial information feed pairs to ensure that an accurate copy of the financial information feed is obtained and stored in memory as quickly as possible. These tasks also include performing memory paging in order to allow financial orders to be stored and accessed in an efficient manner.

  • Pub Date: 2012/19/12
  • Number: 08548900
  • Owner: NYSE Group, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed caching system

Embodiments of a distributed caching system are disclosed that cache data across multiple computing devices on a network. In one embodiment, a first cache system serves as a caching front-end to a distributed cluster of additional cache systems. The first cache system can distribute cache requests to the additional cache systems. The first distributed caching system can also serve as a cache server itself, by storing data on its own internal cache. For example, the first cache system can first attempt to find a requested data item on the internal cache, but, if the lookup results in a cache miss, the first cache system can search the additional cache systems for the data. In some embodiments, the first cache system is configured to identify additional requests for the first data item and duplicate the requested data item in order to respond to the additional requests, which allows for greater responsiveness to requests.

  • Pub Date: 2012/19/12
  • Number: 09621399
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Dialogue-driven user security levels

Natural language controlled devices may be implemented in an environment where the devices are configured to operate with multiple different users. The techniques described herein implement security requirements for a device configured to operate in an environment where the multiple different users may request functionality. The security requirements may be implemented based on the whether the functionality requested is personal and/or secured.

  • Pub Date: 2012/19/12
  • Number: 09147054
  • Owner: Amazon Technolgies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Deferred social network check-in

A system and method is disclosed for sharing previously visited locations in a social network. A mobile computing device (for example, a smartphone) may be configured to receive and transmit a token to a server, the token including event information related to an event at a previously visited location. One or more candidate places of interest are then determined based on the event information, and provided for display to a user of the mobile computing device. The user selects one or more selected places of interest from the candidate places of interest, and the server provides, for display to one or more other users in a social network, a representation of the user and the selected places of interest.

  • Pub Date: 2012/19/12
  • Number: 09508103
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Data center management using virtualized data center inventory

Described are methods, systems, and apparatus, including computer program products for locating a target IT component in a data center. A first identification marker is scanned by a mobile computing device. A location of the first identification marker in the data center based on a virtual representation of the data center is determined by the mobile computing device. An identity of the target IT component is received. A location of the rack containing the target IT component in the data center based on the virtual representation of the data center is determined by the mobile computing device. A map of the data center, wherein the map of the data center includes first indicia of the location of the first identification marker and second indicia of the location of the rack containing the target IT component, is displayed by the mobile computing device.

  • Pub Date: 2012/19/12
  • Number: 09489399
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Completion notification for a storage device

A method for providing notification of completion of a computing task includes providing access to an information handling resource for a first information handling system, registering the first information handling system with a first completion queue, submitting commands from the first information handling system to a first submission queue, providing access to the information handling resource for second first information handling system, registering the second information handling system with the first completion queue, and submitting commands from the second information handling system to a second submission queue. Upon execution of commands in the first submission queue and the second submission queue, an entry in is created a first completion queue. Upon the creation of an entry in the first completion queue, an interrupt is selectively sent to the first information handling resource and to the second information handling resource.

  • Pub Date: 2012/19/12
  • Number: 09122515
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Automated dereferencing of electronic communications for archival

Various methods and systems for automatically obtaining documents that are referenced by an electronic communication, such as an email or instant message, for archival are disclosed. One method involves searching at least a portion (e.g., the header and/or body) of an electronic communication for a reference to a document and, in response to detecting the reference, automatically obtaining an electronic copy of the document. The electronic copy of the document can then be archived.

  • Pub Date: 2012/19/12
  • Number: 08788536
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Authoring a virtualized data center

Described are methods, systems, and apparatus, including computer program products for authoring a virtual representation of a data center. An identity of a first IT component is determined. First position data indicating a position of the first IT component in the data center is received. The associated identity of the first IT component and the first position data is stored as a first part of the virtual representation of the data center. An identity of the second IT component is determined. Relative position data indicating a position of the second IT component relative to the first position data is received. Second position data indicating a position of the second IT component in the data center is determined. The associated identity of the second IT component and the second position data is stored as a second part of the virtual representation of the data center.

  • Pub Date: 2012/19/12
  • Number: 09176648
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Visualization tools for reviewing credibility and stateful hierarchical access to credibility

Some embodiments provide a credibility system including an interface portal for presenting a holistic view of entity credibility. To provide the holistic view, the credibility system aggregates credibility data from multiple data sources. The aggregated credibility data is processed and ordered to present different dimensions of entity credibility, with each dimension graphically presented in the interface portal through an interactive credibility module. In some embodiments, the credibility data associated with each credibility module is processed to produce at least one value that quantifiably represents the credibility data. In some embodiments, the credibility data associated with each credibility module is hierarchically ordered to present the credibility data in a drill-down fashion with each hierarchical layer presenting more detailed credibility data for better understanding the credibility data presented in the preceding layer.

  • Pub Date: 2012/18/12
  • Number: 08453068
  • Owner: Credibility Corp.
  • Location: Malibu, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for redirecting input/output

Techniques for redirecting input/output are disclosed. In one particular embodiment, the techniques may be realized as a method for redirecting input/output comprising the steps of method for redirecting input/output comprising configuring a first virtual machine with a recorder for library interposition, configuring a replica virtual machine with a player for library interposition, receiving a first recorded event from the first virtual machine, and transferring the first recorded event to the replica virtual machine for replay.

  • Pub Date: 2012/18/12
  • Number: 09612852
  • Owner: Veritas Technologies LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning and running a cross-cloud test grid

An automated method for provisioning a grid used to run a load test on a target website includes sending one or more requests in a multi-threaded manner to at least one cloud provider, the one or more requests for an allocation of N load server instances and M result server instances which comprise the grid. Requests received back from the cloud provider are also handled in a multi-threaded manner; any errors occurring during the allocation being corrected automatically. The N load server instances and the M result server instances are then verified to be operational and correctly running software deployed to provide defined test services. Errors identified during the verification are automatically corrected either by attempting to restart a failed instance or allocating a different instance.

  • Pub Date: 2012/18/12
  • Number: 08510600
  • Owner: SOASTA, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Requesting shared variable directory (SVD) information from a plurality of threads in a parallel computer

Methods, parallel computers, and computer program products for requesting shared variable directory (SVD) information from a plurality of threads in a parallel computer are provided. Embodiments include a runtime optimizer detecting that a first thread requires a plurality of updated SVD information associated with shared resource data stored in a plurality of memory partitions. Embodiments also include a runtime optimizer broadcasting, in response to detecting that the first thread requires the updated SVD information, a gather operation message header to the plurality of threads. The gather operation message header indicates an SVD key corresponding to the required updated SVD information and a local address associated with the first thread to receive a plurality of updated SVD information associated with the SVD key. Embodiments also include the runtime optimizer receiving at the local address, the plurality of updated SVD information from the plurality of threads.

  • Pub Date: 2012/18/12
  • Number: 09513910
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Patient selectable joint arthroplasty devices and surgical tools

A patellar 3-D guidance tool includes a template. The template includes at least one contact surface for engaging a surface of the patella. The at least one contact surface substantially conforms with the surface associated with the patellar. At least one guide aperture directs movement of a surgical instrument, wherein the shape and/or position of the guide aperture is based, at least in part, on three or more anatomic reference points associated with the patellar.

  • Pub Date: 2012/18/12
  • Number: 09107680
  • Owner: ConforMIS, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Network assistance for device-to-device discovery

Embodiments of system and method configurations for device discovery and connection establishment in connection with use of device-to-device (D2D) and proximity-based services are generally described herein. In some examples, an evolved packet core (EPC) of a 3GPP Long Term Evolution or 3GPP Long Term Evolution-Advanced (LTE/LTE-A) network is arranged to assist D2D identification and discovery procedures at user equipment (UEs) connected to the LTE/LTE-A network. Various identification and discovery procedures may be implemented in connection with proximity detection and the establishment of communication times for the establishment of the D2D communication link, between the UEs. Accordingly, the EPC of the LTE/LTE-A network may assist the establishment of a device-to-device communication link between UEs on a wireless network employing a distinct wireless protocol (for example, a direct wireless network connection via a wireless local area network (WLAN) or wireless personal area network (WPAN)).

  • Pub Date: 2012/18/12
  • Number: 09036603
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for identifying related documents

A method includes storing two or more documents at a storage system that is associated with a document editing system and receiving usage pattern information regarding each document from the two or more documents. The method also includes determining a likelihood that the two or more documents are related documents based at least in part on the usage pattern information and defining a collection including the two or more documents if the likelihood that the two or more documents are related exceeds a threshold value.

  • Pub Date: 2012/18/12
  • Number: 09384285
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing an electronic account to a customer

An electronic account is provided to a customer to enable the customer to access electronic services, such as e-mail and electronic transactions. The electronic account links an electronic address of the customer to a physical address of the customer. Using the electronic account, electronic services can be provided to the customer at either the electronic or physical address, or both. The services can be both secure and non-secure and can be provided by any service provider, such as an online merchant, a government agency, or a bank.

  • Pub Date: 2012/18/12
  • Number: 09363219
  • Owner: The United States Postal Service
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method for reducing platform boot times by providing lazy input/output abstractions

Methods, systems and computer program products are disclosed for enhanced system boot processing that is faster to launch an operating system, as certain devices such as user input hardware devices may not be initialized unless it is determined that a user-interruption to the boot process is likely. That is, although an interface for the devices is exposed, no initialization occurs unless a call to the interface occurs. Other embodiments are described and claimed.

  • Pub Date: 2012/18/12
  • Number: 09262178
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing checksum of a data stream to optimize deduplication

Techniques for deduplicating a data stream with checksum data embedded therein are described. According to one embodiment, a first data stream is received from a client having a plurality of data regions and a plurality of checksums for verifying integrity of the data regions embedded therein, where the first data stream represents a file or a directory of one or more files of a file system associated with the client. In response the first data stream with the checksums removed is deduplicated into a plurality of deduplicated chunks.

  • Pub Date: 2012/18/12
  • Number: 09063664
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for handling object boundaries of a data stream to optimize deduplication

Techniques for deduplicating a data stream based on boundary markers embedded therein are described. According to one embodiment, a data stream is received from a client having a sequence of a plurality of data objects, where to data stream represents a file or a directory of one or more files of a file system associated with the client. In response, the data stream is deduplicated into a plurality of deduplicated chunks in view of boundaries of the data objects.

  • Pub Date: 2012/18/12
  • Number: 09087086
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for configuring an imaging device for the reception of digital pulse recognition information

In one aspect, the present disclosure related to a method for configuring one or more imaging sensors of an imaging device to capture digital images for digital pulse recognition demodulation. In some embodiments, the method includes initializing one or more imaging sensors of the imaging device, determining a subset of the one or more imaging sensors to configure, setting a configuration for each of the one or more imaging sensors of the subset by defining a region of interest as a metering area for each of the one or more imaging sensors of the subset and automatically adjusting a setting for each of the one or more imaging sensors of the subset, and adjusting input parameters of a demodulation function based on a device profile of the imaging device. In some embodiments, the adjusted setting is locked to prevent further adjustment of the adjusted setting.

  • Pub Date: 2012/18/12
  • Number: 09398190
  • Owner: ABL IP HOLDING LLC
  • Location: Conyers, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware convolution pre-filter to accelerate object detection

Systems, apparatus, articles, and methods are described related to a hardware-based convolution pre-filter to accelerate object detection.

  • Pub Date: 2012/18/12
  • Number: 09342749
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Edge measurement video tool and interface including automatic parameter set alternatives

A user interface for setting parameters for an edge location video tool is provided. In one implementation, the user interface includes a multi-dimensional parameter space representation with edge zones that allows a user to adjust a single parameter combination indicator in a zone in order to adjust multiple edge detection parameters for detecting a corresponding edge. The edge zones indicate the edge features that are detectable when the parameter combination indicator is placed within the edge zones. In another implementation, representations of multiple edge features that are detectable by different possible combinations of the edge detection parameters are automatically provided in one or more windows. When a user selects one of the edge feature representation, the corresponding combination of edge detection parameters is set as the parameters for the edge location video tool.

  • Pub Date: 2012/18/12
  • Number: 09177222
  • Owner: Mitutoyo Corporation
  • Location: Kanagawa-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Determining exposure times using split paxels

A plurality of images of a scene may be captured. Each image of the plurality of images may be captured using a different total exposure time (TET). The images in the plurality of images may be downsampled. A pixel value histogram based on pixel values of the downsampled images may be constructed. The pixel value histogram may be compared to one or more reference pixel value histograms. A payload TET may be determined based on comparing the pixel value histogram to the one or more reference pixel value histograms.

  • Pub Date: 2012/18/12
  • Number: 08866928
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Conditionally updating shared variable directory (SVD) information in a parallel computer

Methods, parallel computers, and computer program products for conditionally updating shared variable directory (SVD) information in a parallel computer are provided. Embodiments include a runtime optimizer receiving a broadcast reduction operation header. The broadcast reduction operation header includes an SVD key and a first SVD address. The first SVD address is associated with the SVD key in a first SVD associated with a first task. Embodiments also include the runtime optimizer retrieving from a remote address cache associated with the second task, a second SVD address indicating a location within a memory partition associated with the first SVD, in response to receiving the broadcast reduction operation header. Embodiments also include the runtime optimizer determining that the first SVD address does not match the second SVD address and updating the remote address cache with the first SVD address.

  • Pub Date: 2012/18/12
  • Number: 09256458
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Broadcasting shared variable directory (SVD) information in a parallel computer

Methods, parallel computers, and computer program products for broadcasting shared variable directory (SVD) information in a parallel computer are provided. Embodiments include a runtime optimizer detecting, by a runtime optimizer of the parallel computer, a change in SVD information within an SVD associated with a first thread. Embodiments also include a runtime optimizer identifying a plurality of threads requiring notification of the change in the SVD information. Embodiments also include the runtime optimizer in response to detecting the change in the SVD information, broadcasting to each thread of the identified plurality of threads, a broadcast message header and update data indicating the change in the SVD information.

  • Pub Date: 2012/18/12
  • Number: 09342378
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automated node fencing integrated within a quorum service of a cluster infrastructure

A quorum service within a cluster infrastructure layer of a cluster environment comprising a plurality of nodes automatically triggers at least one automated fencing operation integrated within the quorum service, to reliably maintain a node usability state of each node of the plurality of nodes indicating an availability of each node to control and access at least one shared resource of the cluster. The quorum service reports the node usability state of each node as a cluster health status to at least one distributed application within an application layer of the cluster environment, to provide a reliable cluster health status of the plurality of nodes to the at least one distributed application for a failover of said at least one shared resource from control by a failed node from among the plurality of nodes to another node from among the plurality of nodes.

  • Pub Date: 2012/18/12
  • Number: 08621263
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for member matching

An apparatus, system, and method for member matching. In one embodiment, the apparatus includes an input adapter, a processor, and an output adapter. The input adapter may receive a first data record from a plurality of data records stored in one or more databases. The processor may generate a first data key from one or more field values in the first data record, compare a second data key associated with a second data record with the first data key associated with the first data record, and identify a match between the first data key and the second data key. In one embodiment, the output adapter may produce an output configured to identify the first data record and the second data record in response to identification of the match.

  • Pub Date: 2012/18/12
  • Number: 09122723
  • Owner: OPTUMINSIGHT, INC.
  • Location: Eden Praire, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for matching users for online sessions

An apparatus, method, and machine-readable medium are described for establishing peer-to-peer (“P2P”) communication channels. In particular, in one embodiment, a matchmaker service performs a series of operations to service match requests received from a group of mobile devices. In one embodiment, the matchmaker service groups the match requests into matchable sets based on the application for which the requests are received and one or more variables associated with the application. Match requests within each match set can then be matched based on variables such as the NAT type, connection type and language associated with each of the mobile devices. Other variables such as geographical location, experience level, and age of the match requests may also be used to render match decisions.

  • Pub Date: 2012/18/12
  • Number: 09118690
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing update conditions for shared variable directory information in a parallel computer

Methods, parallel computers, and computer program products for analyzing update conditions for shared variable directory (SVD) information in a parallel computer are provided. Embodiments include a runtime optimizer receiving a compare-and-swap operation header. The compare-and-swap operation header includes an SVD key, a first SVD address, and an updated first SVD address. The first SVD address is associated with the SVD key in a first SVD associated with a first task. Embodiments also include the runtime optimizer retrieving from a remote address cache associated with the second task, a second SVD address indicating a location within a memory partition associated with the first SVD in response to receiving the compare-and-swap operation header. Embodiments also include the runtime optimizer determining whether the second SVD address matches the first SVD address and transmitting a result indicating whether the second SVD address matches the first SVD address.

  • Pub Date: 2012/18/12
  • Number: 09268623
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Acquiring remote shared variable directory information in a parallel computer

Methods, parallel computers, and computer program products for acquiring remote shared variable directory (SVD) information in a parallel computer are provided. Embodiments include a runtime optimizer determining that a first thread of a first task requires shared resource data stored in a memory partition corresponding to a second thread of a second task. Embodiments also include the runtime optimizer requesting from the second thread, in response to determining that the first thread of the first task requires the shared resource data, SVD information associated with the shared resource data. Embodiments also include the runtime optimizer receiving from the second thread, the SVD information associated with the shared resource data.

  • Pub Date: 2012/18/12
  • Number: 09256538
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual process collaboration

Methods, apparatuses, and systems are presented for automating organization of multiple processes involving maintaining a uniform record of process threads using a server, each process thread comprising a representation of a collaborative process involving a plurality of users, enabling at least one of the plurality of users to carry out a user action while interacting with a different types of application program, and modifying at least one process thread in the uniform record of process threads in response to the user action. Modifying the process thread may comprise generating the process thread as a new process thread. Alternatively or in addition, modifying the process thread may comprise modifying the process thread as an existing process thread. At least one of the process threads may reflect user actions carried out by more than one of the plurality of users.

  • Pub Date: 2012/17/12
  • Number: 08752069
  • Details: Visit USPTO

Visit USPTO Page


User authentication system and method for encryption and decryption

A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication apparatus, and an encryption and decryption computer communicating with the user authentication apparatus. The computer-readable medium may store user identifying information and encryption and decryption data. The encryption and decryption computer may be configured to receive an application programming interface (API) for interfacing with the user authentication apparatus and receive the user identifying information from the computer-readable medium via the API. A user may be authenticated based on the user identifying information and, once the user is authenticated, the encryption and decryption data may be read.

  • Pub Date: 2012/17/12
  • Number: 08762713
  • Owner: MAZ Encryption Technologies LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Treatment of tissue in sphincters, sinuses, and orifices

The invention comprises a method and apparatus for treatment of a body part. More particularly, a method and apparatus for heat treatment of tissue using a catheter inserted into a body part is described along with means for positioning the catheter and means for positioning a set of electrodes relative to a tissue sample for treatment. Still more particularly, radio frequency energy at about 400 to 500 kilohertz is used to provide heat for the tissue treatment.

  • Pub Date: 2012/17/12
  • Number: 08740846
  • Owner: Verathon, Inc.
  • Location: Bothell, US
  • Details: Visit USPTO

Visit USPTO Page


Text analysis system

A text analysis system is described. A natural language input unit () is arranged for enabling a user to input a free text () in a natural language. A natural language processing unit () is arranged for processing at least a portion of the free text () while it is being inputted, to obtain an explicit representation () of semantics represented by the free text. An explicit information input unit () is arranged for enabling the user to input explicit information () relating to the explicit representation () of semantics. The system comprises a visualization unit () for visualizing at least part of the explicit representation () to the user while the user is still inputting the free text (). A user interface () is arranged for providing a user with simultaneous access to both the natural language input unit () and the explicit information input unit ().

  • Pub Date: 2012/17/12
  • Number: 09348813
  • Owner: Koninklijke Philips N.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


System and method for multi-analyte detection

The present invention provides a system and method for the simultaneous detection of multiple analytes in a sample. The detection system includes a housing that holds a reagent carousel rotatably coupled thereto. Further included in the housing is an incubator carousel rotatably coupled thereto. The housing also includes magnetic material that is associated with the incubation carousel for assisting in separation beads from reagent and wash solution. A robot, associated with the housing is configured to manipulate at least either the reagent carousel or the incubator carousel and transfer materials therebetween. Reaction vessels hold samples and reaction vessels handlers move the reaction vessels. Sample analysis is determined by at least one laser based detector.

  • Pub Date: 2012/17/12
  • Number: 08992833
  • Owner: Bio Rad-Laboratories, Inc.
  • Location: Hercules, US
  • Details: Visit USPTO

Visit USPTO Page


Steering column for a motor vehicle

A steering column for a motor vehicle including a steering spindle bearing unit for rotatably supporting a steering spindle of the steering column and a bracket unit for securing the steering column on the motor vehicle. The steering spindle bearing unit is bearing supported by a securement device on at least one bracket part of the bracket unit, wherein the position of the steering spindle bearing unit relative to the bracket unit is secured in position in a closed position of the securement device and, in an open position of the securement device, is displaceable. The securement device includes an operating lever swivellable about a lever swivel axis, by which the operating lever is displaceable between the closed position and the open position. The steering column includes at least one damping element for damping the swivel movement of the operating lever about the lever swivel axis.

  • Pub Date: 2012/17/12
  • Number: 09150240
  • Owner: THYSSENKRUPP PRESTA AKTIENGESELLSCHAFT
  • Location: Eschen, LI
  • Details: Visit USPTO

Visit USPTO Page


Social network system with correlation of business results and relationships

A system that generates a social network and correlates business results within that social network receives, from an enterprise application, a business object, an associated system of record and corresponding enterprise members. The system generates a social object for the social network, where the social object corresponds to the business object. The system assigns social members to the social object and receives any changes to the business object. The system then correlates the change in the business object to each of the enterprise members and social members via the social object.

  • Pub Date: 2012/17/12
  • Number: 09619845
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Set top box architecture supporting mixed secure and unsecure media pathways

A media processing device, such as a set top box, having a plurality of selectable hardware and software components for supporting multiple media pathways providing differing levels of security. In general, each security level corresponds to a particular certification service boundary definition(s) or key/authentication and security management scheme for managing resources such as hardware acceleration blocks and software interfaces. Different sets of components may be adaptively employed to ensure composited compliance with one or more security constraints and to address component unavailability. Security constraints may be applied, for example, on a source or media specific basis, and different versions of a media item may be provided over multiple pathways providing corresponding levels of security. In one embodiment, a service operator or content provider may provide requisite certification or security requirements, or otherwise assist in selection of pathway components.

  • Pub Date: 2012/17/12
  • Number: 09049208
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Robust DTMF detection in an unreliable voice-over-IP (VoIP) environment

A method to discriminate a signal as a DTMF digit is operative in a service provider having a VoIP-based media server. The media server accepts both in-band DTMF and RTP telephone events. A digit detection module receives as input a data stream that may include one or more DTMF digits. The module processes the input data stream and provides, as output, an indication of what digit(s) have been detected and from what source (e.g., in-band audio, an RTP 2833 telephone event, of both). The output is then further processed by a discrimination algorithm to make a final digit determination. If RTP telephone events are detected, the algorithm prefers them and ignores in-band DTMF until the call ends or the media is re-negotiated. The approach detects when duplicate digits of differing types are initially received and only accepts one of them, regardless of spacing or duration.

  • Pub Date: 2012/17/12
  • Number: 09401998
  • Owner: GENESYS TELECOMMUNICATIONS LABORATORIES, INC.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Portable e-wallet and universal card

Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card.

  • Pub Date: 2012/17/12
  • Number: 09177241
  • Owner: GoNow Technologies, LLC
  • Location: Bound Brook, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple hardware paths for backlight control in computer systems

The disclosed embodiments provide a system that drives a display from a computer system. The system includes a first hardware path for controlling a backlight of a display of the computer system. The system also includes a second hardware path for controlling the backlight. Finally, the system includes a backlight controller that enables use of the first and second hardware paths in controlling the backlight from the computer system.

  • Pub Date: 2012/17/12
  • Number: 09262992
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and controlling access to electronic content

Methods, systems and apparatuses for monitoring and controlling access to an electronic content are disclosed. One method includes creating, by an owner server, a group comprising generating a group public key PKand a group secret key SK. The method further includes adding, by the owner server, a member to the group, comprising generating a first share SKfrom the group secret key SKand a public key of a member, and a second share SKfrom the group secret key SKand a public key of a mediator, and providing, by the owner server, the first share SKto a member server of the member and the second shares SKto a mediator server of the mediator.

  • Pub Date: 2012/17/12
  • Number: 08681992
  • Owner: AlephCloud Systems, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Mid-infrared tunable metamaterials

A mid-infrared tunable metamaterial comprises an array of resonators on a semiconductor substrate having a large dependence of dielectric function on carrier concentration and a semiconductor plasma resonance that lies below the operating range, such as indium antimonide. Voltage biasing of the substrate generates a resonance shift in the metamaterial response that is tunable over a broad operating range. The mid-infrared tunable metamaterials have the potential to become the building blocks of chip based active optical devices in mid-infrared ranges, which can be used for many applications, such as thermal imaging, remote sensing, and environmental monitoring.

  • Pub Date: 2012/17/12
  • Number: 09018642
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Method for virtual channel management, method for retrieving digital contents, and network-based multimedia reproduction system with virtual channels

A method for virtual channel management is provided. The method includes the following steps. In response to a command, a control unit of a network-based multimedia reproduction system determines whether the command is associated with virtual channel switching. When the command is associated with virtual channel switching, the control unit checks whether a channel value corresponding to the command exists in an application virtual channel table. When the channel value exists in the application virtual channel table, the control unit determines an application corresponding to the channel number from the application virtual channel table, and executes the application. According to a first operation parameter set corresponding to the application, the control unit sets the executed application to retrieve digital contents through a network unit of the network-based multimedia reproduction system.

  • Pub Date: 2012/17/12
  • Number: 09043842
  • Owner: WISTRON CORPORATION
  • Location: New Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for cross device notifications

A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices.

  • Pub Date: 2012/17/12
  • Number: 09350693
  • Owner: LOOKOUT, INC.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Management of a data network of a computing environment

An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.

  • Pub Date: 2012/17/12
  • Number: 09253017
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Location context, supplemental information, and suggestions for meeting locations

Enhanced input field features and techniques for displaying and resolving location information in meeting items are provided. In response to a user's interaction with a place name displayed in the location field of a user interface for a meeting item, up to date information is retrieved about the location associated with the place name from a web service and displayed. The display can include a map image tile. In addition to enabling the displaying of up to date information, during creation of the meeting item, the location input field of a meeting item can present location suggestions from within the location input field, for example, as a drop-down listing of possible locations. The suggestions for completing a user's input text string to the location input field can be obtained from sources such as a web service, a mailbox, a managed database/directory service, a history cache/database or a combination thereof.

  • Pub Date: 2012/17/12
  • Number: 09578461
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent security control system for virtualized ecosystems

Resources of a virtualized ecosystem are intelligently secured by defining and analyzing object handling security control information for one or more logical resources in the virtualized ecosystem and deriving therefrom object properties for each of the logical resources involved in the execution of a virtual machine in any given context within the virtualized ecosystem.

  • Pub Date: 2012/17/12
  • Number: 08832784
  • Owner: HyTrust, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of untrusted applications and frameworks with a secure operating system environment

A set top box or like device utilizing trusted applications in conjunction with an untrusted software framework. In one implementation, trusted or certified applications are received from a service provider for execution by a software framework of the device. Certification of a trusted application may entail, for example, verifying that the application is executable by the device in a manner consist with the industry standard certification process. The software framework may comprise, for example, an Android framework supported by an underlying. Linux operating system environment and isolated in a Linux resource container. A secure access client/server interface may also be provided to support interactions between the software framework and trusted portions of the device. In further embodiments, both trusted applications and a set top box application utilized by the device to perform traditional set top box operations are implemented in at least one version of an Android or like framework.

  • Pub Date: 2012/17/12
  • Number: 09344762
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed mobile enterprise application platform

Various embodiments of systems and methods for distributed mobile enterprise application platform (MEAP) are described herein. In one aspect, the method includes receiving a request to be executed from a mobile device. Based upon the request, one or more middleware components capable of executing the request are determined from one or more remotely located servers. A middleware component from the one or more middleware components is selected for executing the request. The request is sent to the selected middleware component for execution. Based upon the execution, an output is received from the selected middleware component. In one embodiment, the output is stored in a backend system or sent to a portable device from which the request is received. In another embodiment, the output is sent to another middleware component for further execution.

  • Pub Date: 2012/17/12
  • Number: 09059992
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Cloud spectrum management system

This disclosure is directed to a cloud spectrum management system. In general, an example cloud spectrum management system may match requests from spectrum requestors seeking available radio spectrum with spectrum owners desiring to lease available radio spectrum to determine radio spectrum trade transactions. An example system may include a market communication module to communicate with a market place for trading a spectrum of radio frequencies for use in wireless communication, a core service s module to determine radio spectrum trade transactions based at least on the communications between the market communication module and the market, and a management utilities module configured to manage the radio spectrum trade transactions determined by the core services module.

  • Pub Date: 2012/17/12
  • Number: 09491661
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Cascading failover of blade servers in a data center

Cascading failover of blade servers in a data center that includes transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server, including transferring the workload to the subsequent replacement blade server only if the data processing cost of the transfer of the workload to the subsequent replacement blade is less than the value of a transfer cost threshold.

  • Pub Date: 2012/17/12
  • Number: 09122652
  • Owner: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Browser-based prevention of unsecure online transmission of sensitive information

A device receives, from an online provider device, content of a website and connection information associated with the website, and provides the content of the website for display to a user. The device also receives, from the user, information requested by the website and a request to provide the information to the online provider device, and determines whether the information includes sensitive information. The device further provides the information to the online provider device, based on the request, when the information does not include sensitive information, and determines, when the information includes sensitive information, whether the website is safe or unsafe based on the connection information. The device provides a warning for display to the user, when the information includes sensitive information and when the website is an unsafe website, where the warning indicates that sensitive information is to be transmitted to the unsafe website.

  • Pub Date: 2012/17/12
  • Number: 08887245
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Biological detector and method

A biological detector includes a conduit for receiving a fluid containing one or more magnetic nanoparticle-labeled, biological objects to be detected and one or more permanent magnets or electromagnet for establishing a low magnetic field in which the conduit is disposed. A microcoil is disposed proximate the conduit for energization at a frequency that permits detection by NMR spectroscopy of whether the one or more magnetically-labeled biological objects is/are present in the fluid.

  • Pub Date: 2012/17/12
  • Number: 09194921
  • Owner: ABQMR, Inc.
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Bidding on search results for targeting users in an online system

Advertisements in a social networking system may be targeted to searching users in relation with a real-time search engine operated by a social networking system. Ads are targeted to users based in part on social information included in a structured search query and/or search results on a page. In a typeahead search, a user of the social networking system may receive prefix search results of objects in the search box. The prefix search results are ranked by relevance to the user, and advertisers may bid for particular objects to increase their ranking in the results list. An option may be provided to a viewer of search query results to buy an ad that would be seen by other users who performed the same search query, received a targeted search result, or based on targeting criteria as determined by the viewer bidding on the ad.

  • Pub Date: 2012/17/12
  • Number: 09430782
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic selection of digital service feed

Methods and systems for presentation of content through an interface to provide personalized video feeds to a user. A user's interaction with Internet services automatically generates services preferences indicating a media entity. That media entity is correlated to one or more feed items or feeds. A video feed is harvested from feed items or feeds gathered at various Internet services.

  • Pub Date: 2012/17/12
  • Number: 08706841
  • Owner: Frequency IP Holdings, LLC
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic documentation generator

The subject matter disclosed herein provides methods and apparatus, including computer program products, for generating a list of object descriptions based on an object's relevance for documentation. In one aspect there is provided a method that may include accepting a setting for a filter and a setting for a flag of an object. The filter setting may represent a type of information to be included in a list of object descriptions. The flag setting may represent a category of documentation relevance for the object that may be stored in a repository. The method may include comparing the filter setting with the flag setting of the object, extracting the description of the object from the repository based on the comparing of the flag setting with the filter setting, and generating the list of object descriptions that includes a description of the object. Related systems, apparatus, methods, and/or articles are also described.

  • Pub Date: 2012/17/12
  • Number: 09069646
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Automated selection of images for web pages

In various embodiments, a method, a system, and a computer-readable medium are disclosed for creating a pool of images available for display, such as in one or more web pages. In one embodiment, a method is disclosed that includes generating a pre-determined number N of numbers and encoding an instruction in a markup language document. The instruction includes the N numbers and is executed by one or more processors to select N images for insertion into the markup language document. The N images are selected from all available images using the N numbers, and the N images are placed in the markup language document at one or more respective locations defined in the instruction with the N images to be displayed on one or more web pages. Other embodiments are also disclosed.

  • Pub Date: 2012/17/12
  • Number: 09116868
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Nanostructure diffraction gratings for integrated spectroscopy and sensing

The present disclosure pertains to metal or dielectric nanostructures of the subwavelength scale within the grating lines of optical diffraction gratings. The nanostructures have surface plasmon resonances or non-plasmon optical resonances. A linear photodetector array is used to capture the resonance spectra from one of the diffraction orders. The combined nanostructure super-grating and photodetector array eliminates the use of external optical spectrometers for measuring surface plasmon or optical resonance frequency shift caused by the presence of chemical and biological agents. The nanostructure super-gratings can be used for building integrated surface enhanced Raman scattering (SERS) spectrometers. The nanostructures within the diffraction grating lines enhance Raman scattering signal light while the diffraction grating pattern of the nanostructures diffracts Raman scattering light to different directions of propagation according to their wavelengths. Therefore, the nanostructure super-gratings allows for the use of a photodetector array to capture the surface enhanced Raman scattering spectra.

  • Pub Date: 2012/15/12
  • Number: 08976359
  • Owner: Board of Trustees of the University of Alabama, for and on behalf of the University of Alabama in Huntsville
  • Location: Huntsville, US
  • Details: Visit USPTO

Visit USPTO Page


Managing resource pools for deadlock avoidance

In an illustrative embodiment of a method for managing a resource pool for deadlock avoidance, a computer receives a request from a thread for a connection from the resource pool, and determines whether the thread currently has at least one connection from the resource pool. Responsive to a determination that the thread currently has at least one connection from the resource pool, a new concurrent connection from one of a reserved partition of the resource pool is allocated and the connection is returned to the thread.

  • Pub Date: 2012/15/12
  • Number: 09104502
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Treatment of layer tree as video

In one embodiment, a computing device renders as a first frame of a video a graphical user interface (GUI) of a software application on the computing device based on a multi-layered-tree representation of the GUI. The computing device modifies the multi-layered-tree representation of the GUI in response to an input or output associated with the GUI. The computing device also renders as a second frame of the video of the GUI based on the multi-layered-tree representation of the GUI as modified.

  • Pub Date: 2012/14/12
  • Number: 09274766
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for an analysis cycle to determine interest merchants

The method of processing an analysis cycle to determine interest merchants may include selecting a seed merchant relevant to a topic interest, identifying consumers that have completed a transaction with the seed merchant to generate a list of identified consumers, determining merchants visited by the identified consumers, scoring all the merchants based on network connectivity, activity, and merchant over-index, updating the seed merchant in response to the list of scored merchants relative to a scoring threshold, and scoring the list of identified consumers based on the number of distinct merchants in transaction and over-indexing. Additionally, the method may further comprise producing a list of updated interest merchants and a list of updated identified consumers, where the updated interest merchants and the updated identified consumers are relevant to the topic interest.

  • Pub Date: 2012/14/12
  • Number: 09195988
  • Owner: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Storage service lifecycle policy transition management

Methods and apparatus for storage lifecycle configuration management are disclosed. A storage medium stores program instructions that, when executed on a processor, implement a storage lifecycle manager. The manager receives a lifecycle policy to be applied to storage objects of a container of a storage service. The policy indicates lifecycle transitions to be implemented for the objects. The manager stores (a) a policy modification sequence number (PMSN) indicative of a most recent modification of the policy and (b) a policy application sequence number (PASN) associated with the particular logical container, where the PASN is based on the PMSN. The manager later compares the PMSN and the PASN to determine whether a lifecycle transition is to be performed, and if the transition is to be performed, schedules one or more operations for the transition.

  • Pub Date: 2012/14/12
  • Number: 09355060
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Storage object deletion job management

Methods and apparatus for storage object deletion job management are disclosed. A storage medium stores program instructions that when executed on a processor, identify, during a particular deletion execution iteration, a particular deletion job object stored at a multi-tenant storage service, wherein the particular deletion job object indicates a collection of storage objects that are eligible for deletion from the storage service in accordance with specified deletion criteria. The instructions determine, based on a job validity criterion, whether deletion operations corresponding to the particular deletion job object of the one or more deletion job objects are to be scheduled. If the job object is validated, the instructions initiate a deletion operation for storage objects indicated in the particular deletion job object.

  • Pub Date: 2012/14/12
  • Number: 09052942
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Setting-independent climate regulator control

Climate regulation within an enclosure (e.g., a server cabinet) may involve a climate regulator device that reports a set of available settings (e.g., fan speeds of a fan array) to a computational unit that selects among the available settings. However, such techniques involve bidirectional communication between the climate regulator device and a computational unit that is capable of utilizing the device-specific settings. Presented herein are climate regulation architectures involving a request from the computational unit as a climate target that is independent of the settings of the climate regulator devices (e.g., an selection on an arbitrary scale from 0 to 100). A climate regulator controller may map the device-independent climate target to a selection among the available settings of the particular climate regulator device(s). Further variations may involve conflict resolution among requests from different computational sub-units, and/or failsafe mechanisms such as default climate regulator device settings to alleviate controller failure.

  • Pub Date: 2012/14/12
  • Number: 09541299
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Providing alerts, vouchers, or coupons once a plurality of geo-fences have been breached a number of times

The disclosure is directed to providing a notification based on breaching a plurality of geo-fence perimeters. An embodiment detects a breach related to the plurality of geo-fence perimeters, the breach corresponding to a breach of one of the plurality of geo-fence perimeters, records the breach as one of a plurality of breaches, determines whether the plurality of breaches meet one or more conditions, and if the plurality of breaches meet the condition, issues a notification.

  • Pub Date: 2012/14/12
  • Number: 09589435
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Operation of mobile device as trusted mobile web client or trusted mobile web server

A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session.

  • Pub Date: 2012/14/12
  • Number: 08931052
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, Gyeonggi-do, KR
  • Details: Visit USPTO

Visit USPTO Page


Mobile wellness device

The invention is directed to a system for acquiring electrical footprint of the heart, electrocardiogram (EKG or ECG) and heart rate variability monitoring, incorporated into a mobile device accessory. The ECG signal is conveniently acquired and transmitted to a server via the mobile device, offering accurate heart rate variability biofeedback measurement which is portable and comfortable during normal daily life. The invention provides a reliable tool for applications such as wellness, meditation, relaxation, sports and fitness training, and stress-relief therapy where accurate heart rate variability measurement is desired.

  • Pub Date: 2012/14/12
  • Number: 08855757
  • Details: Visit USPTO

Visit USPTO Page


Lifecycle support for storage objects having multiple durability levels specifying different numbers of versions

Methods and apparatus for lifecycle support for storage objects are disclosed. A storage medium stores program instructions that when executed on a processor implement a storage lifecycle manager of a multi-tenant storage service. The lifecycle manager determines a lifecycle policy to be implemented for a storage object. The policy indicates lifecycle transitions of the object, including a transition from a first service level to a second service level. The first service level and the second service level may each specify a maximum number of versions of the storage object. The lifecycle manager initiates modification operations corresponding to the storage object's data in accordance with the lifecycle policy, and verifies that the modification operations succeeded. The lifecycle manager provides, in response to a query, an indication of a current service level of the storage object.

  • Pub Date: 2012/14/12
  • Number: 09658983
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Language processing resources for automated mobile language translation

Automated language translation often involves language translation resources of significant size (e.g., 50-gigabyte phrase tables) and significant computational power exceeding the capabilities of many mobile devices. Remotely accessible servers capable of near-realtime, automated translation may be inaccessible or prohibitively costly while traveling abroad. Presented herein are adaptations of language translation techniques for offline mobile devices involving reducing the size and raising the efficiency of the language modeling resources. A word index may be provided that stores respective string representations of the words of a language, and maps respective words to a location (e.g., address or offset) of respective word representations within the word index. Language translation resources (e.g., phrase tables) may then specify logical relationships using the word index addresses of the involved words, rather than the string equivalents. This technique significantly condenses the language resources and provides faster, bidirectional access to the word representations of the language.

  • Pub Date: 2012/14/12
  • Number: 09183197
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Inversion-of-control component service models for virtual environments

In the field of computing, many scenarios involve the execution of an application within a virtual environment of a device (e.g., web applications executing within a web browser). Interactions between applications and device components are often enabled through hardware abstractions or component application programming interfaces (API), but such interactions may provide more limited and/or inconsistent access to component capabilities for virtually executing applications than for native applications. Instead, the device may provide hardware interaction as a service to the virtual environment utilizing a callback model, wherein applications within the virtual environment initiate component request specifying a callback, and the device initiates the component requests with the components and invokes associated callbacks upon completion of a component request. This model may enable the applications to interact with the full capability set of the components, and may reduce blocked execution of the application within the virtual application in furtherance of application performance.

  • Pub Date: 2012/14/12
  • Number: 09600351
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent tutoring system

An intelligent tutoring system can be implemented using filters, predictive modeling, and a knowledge warehouse, which allows content to be dynamically selected for individualized presentation to a learner. Such an intelligent tutoring system can be implemented using a variety of techniques, including polynomial vector equations in modeling, extensible markup language storage formats for presentation data, and a knowledge warehouse with information stored in data cubes.

  • Pub Date: 2012/14/12
  • Number: 08684747
  • Owner: Accella Learning, LLC
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of untrusted framework components with a secure operating system environment

A set top box or like device incorporating an untrusted software framework as a client of a secure operating system kernel. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment having a secure kernel. The software framework can be executed using a variety of process isolation techniques depending on performance and isolation requirements. A secure access client/server interface may also be provided to support interactions between the untrusted software framework (and applications utilizing the untrusted software framework) and secure or trusted portions of the device. The secure access interface can be configured to perform operations such as handle validation, heap pointer validation, non-pointer parameter validation, heap isolation, and resource release relating to terminated processes. In further embodiments, a software framework aggregator is used to support a plurality of additional software frameworks for use in the set top box.

  • Pub Date: 2012/14/12
  • Number: 09338522
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Graph query processing using plurality of engines

Graph queries are processed using a plurality of independent query execution engines. A graph query submitted to a graph database which is modeled by an attributed graph is received. The graph query is decomposed into a plurality of query components. For each of the query components, a one of the query execution engines that is available to process the query component is identified, a sub-query representing the query component is generated, the sub-query is sent to the identified query execution engine for processing, and results for the sub-query are received from the identified query execution engine. The results received are then combined to generate a response to the graph query.

  • Pub Date: 2012/14/12
  • Number: 09053210
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and updating online content using standardized tagged data

Methods, and systems, including computer programs encoded on computer-readable media, for managing content associated with a content campaign of a content provider are disclosed herein. In one aspect, the present disclosure is directed to a system of generating and updating online content using standardized tagged data. The system may periodically crawl a document that includes one or more document reference tags. The system may identify at least one document reference tag and corresponding tagged data. The system may receive a request for content to display. The system may select an item of content comprising a content reference tag corresponding to the at least one document reference tag. Responsive to the request for content, the system may replace the content reference tag with the corresponding tagged data to assemble an item of content. The system may transmit the assembled content for display.

  • Pub Date: 2012/14/12
  • Number: 09135345
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with rendezvous services network

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include rendezvous services forming one or more rendezvous service networks.

  • Pub Date: 2012/14/12
  • Number: 09654353
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with reducer services network

A framework includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include reducer services forming one or more reducer service networks.

  • Pub Date: 2012/14/12
  • Number: 09628344
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with hybrid content delivery services

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include hybrid CD services.

  • Pub Date: 2012/14/12
  • Number: 09634904
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with delivery services network

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include delivery services forming one or more delivery service networks.

  • Pub Date: 2012/14/12
  • Number: 09654354
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with content delivery services

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include services supporting content delivery.

  • Pub Date: 2012/14/12
  • Number: 09647899
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with collector services network

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include collector services forming one or more collector service networks.

  • Pub Date: 2012/14/12
  • Number: 09628345
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Framework supporting content delivery with adaptation services

A framework supporting content delivery includes a plurality of devices, each device configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services.

  • Pub Date: 2012/14/12
  • Number: 09654355
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluation of software applications

Software applications receive input data, perform processing of the received data and generate output. In one aspect the output is modification of data structures. The software application is tested with instances of input data that lead to various data modifications in the data structures. In another aspect, patterns are found in the modifications of the data structures, which are evaluated and analyzed for software vulnerabilities.

  • Pub Date: 2012/14/12
  • Number: 09471788
  • Owner: SAP SE
  • Location: WALLDORF, DE
  • Details: Visit USPTO

Visit USPTO Page


Equitable resource allocation for storage object deletion

Methods and apparatus for equitable resource allocation for storage object deletions are disclosed. A storage medium stores program instructions that when executed on a processor implement a deletion task dispatcher of a multi-tenant storage service. The dispatcher identifies one or more deletion job objects that each comprise an indication of a respective set of storage objects that are candidates for scheduled deletion from the storage service. The dispatcher determines a set of resources to be used for deletion operations corresponding to a particular deletion job object, based at least in part on the number of distinct clients whose storage objects are indicated in the job object, and assigned the set of resource to initiate the deletion operations corresponding to the particular job object.

  • Pub Date: 2012/14/12
  • Number: 09417917
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods supporting content delivery with rendezvous services having dynamically configurable log information

A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include rendezvous services with dynamically configurable log information.

  • Pub Date: 2012/14/12
  • Number: 09660875
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods supporting content delivery with reducer services

A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include reducer services.

  • Pub Date: 2012/14/12
  • Number: 09628346
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods supporting content delivery with delivery services

A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include delivery services.

  • Pub Date: 2012/14/12
  • Number: 09647900
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods supporting content delivery with delivery services having dynamically configurable log information

A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include delivery services with dynamically configurable log information.

  • Pub Date: 2012/14/12
  • Number: 09660874
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Devices and methods supporting content delivery with adaptation services

A device supporting content delivery is configured to run at least one content delivery (CD) service of a plurality of CD services. The plurality of CD services include adaptation services.

  • Pub Date: 2012/14/12
  • Number: 09661046
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Deploying a hardware inventory as a cloud-computing stamp

Methods, systems, and computer-readable media for automatically configuring an inventory of hardware to interact seamlessly with a computing fabric of a data center are provided. Initially, a communicative coupling between a user device and computing units of the hardware inventory is established. The communicated coupling allows an engine running on the user device to provision the computing units with software that allows the hardware inventory to function as a fabric-computing cluster (FCC) of the data center. Provisioning involves deploying a computing fabric to the computing units, and deploying core infrastructure services to run on top of the computing fabric. The computing fabric enables the computing units to interact as a unified logical system, while the core infrastructure services represent operating-system-level components that provide underlying support of applications running on the FCC. Upon carrying out the provisioning, the components internal to the computing units of the hardware inventory are validated.

  • Pub Date: 2012/14/12
  • Number: 09367360
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Customizable media auto-reply systems and methods

An auto-reply service provides to callers event-specific audiovisual media messages that were custom recorded on the callee's mobile-telephony device. The auto-reply service selects the media messages at least in part based on an event schedule associated with the callee.

  • Pub Date: 2012/14/12
  • Number: 08666375
  • Owner: RealNetworks, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


CPU-GPU parallelization

Embodiments described herein relate to improving throughput of a CPU and a GPU working in conjunction to render graphics. Time frames for executing CPU and GPU work units are synchronized with a refresh rate of a display. Pending CPU work is performed when a time frame starts (a vsync occurs). When a prior GPU work unit is still executing on the GPU, then a parallel mode is entered. In the parallel mode, some GPU work and some CPU work is performed concurrently. When the parallel mode is exited, for example when there is no CPU work to perform, the parallel mode may be exited.

  • Pub Date: 2012/14/12
  • Number: 09129394
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Content delivery framework

A framework supporting content delivery includes multiple devices, each configured to run at least one content delivery service. The content delivery services include collector services, reducer services, and control services. Event information is provided from the services, and the control services provide control information to control operation or configuration of content delivery services.

  • Pub Date: 2012/14/12
  • Number: 09628342
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Content delivery framework with dynamic service network topologies

A content delivery framework (CDF) includes a plurality of devices, each device configured to run at least one of a plurality of content delivery (CD) services. The plurality of CD services form one or more CD service networks, and each CD service network having a dynamic network topology.

  • Pub Date: 2012/14/12
  • Number: 09628343
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Conditional storage object deletion

Methods and apparatus for conditional deletes of storage objects are disclosed. A storage medium comprises program instructions that when executed, implement a metadata node of a storage service in which a protocol based on sequence numbers is used to resolve update conflicts. The instructions store, as part of a conditional deletion record associated with a key of a particular storage object identified as a deletion candidate, a deletion sequence number derived from a particular modification sequence number of the object. In accordance with the protocol, the instructions determine whether an additional modification sequence number larger than the deletion sequence number has been generated in response to an operation associated with the key. If such an additional sequence number has been generated, the deletion of the storage object is canceled.

  • Pub Date: 2012/14/12
  • Number: 09002805
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Cascading failover of blade servers in a data center

Cascading failover of blade servers in a data center implemented by transferring by a system management server a data processing workload from a failing blade server to an initial replacement blade server, with the data processing workload characterized by data processing resource requirements and the initial replacement blade server having data processing resources that do not match the data processing resource requirements; and transferring by the system management server the data processing workload from the initial replacement blade server to a subsequent replacement blade server, where the subsequent replacement blade server has data processing resources that better match the data processing resource requirements than do the data processing resources of the initial replacement blade server.

  • Pub Date: 2012/14/12
  • Number: 09116860
  • Owner: Lenovo Enterprise Solutions (Singapore) Pte. Ltd.
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Backoff-based scheduling of storage object deletions

Methods and apparatus for backoff-based scheduling of storage object deletions are disclosed. A storage medium stores program instructions that when executed on a processor, obtain an indication of a collection of storage objects of a network-accessible multi-tenant storage service to be deleted in accordance with specified deletion criteria. A deletion of a storage object comprises a metadata deletion operation and one or more other operations. The instructions initiate, corresponding to at least some objects of the collection, respective metadata deletion operations at a metadata node of the storage service. If a metric associated with the metadata node meets a threshold criterion, the instructions delay, by a particular amount of time, an initiation of an operation corresponding to a deletion of another storage object.

  • Pub Date: 2012/14/12
  • Number: 09063946
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for concurrently forming a gastroesophageal valve and tightening the lower esophageal sphincter

An apparatus enables concurrent restoration of a gastroesophageal valve and tightening of the lower esophageal sphincter. The apparatus comprises a longitudinal member having a distal end arranged to be received within a stomach, a tissue shaper at the distal end of the longitudinal member that forms a gastroesophageal valve from stomach tissue, and a tissue gatherer that gathers fundus tissue at or aboral to the gastroesophageal junction to reduce an esophageal opening into the stomach and tighten the lower esophageal sphincter. A fastener deployer then deploys at least one fastener pair to maintain both the restored gastroesophageal valve and the tightened lower esophageal sphincter.

  • Pub Date: 2012/14/12
  • Number: 09161754
  • Owner: EndoGastric Solutions, Inc.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Watermarking screen capture content

Information is displayed on a device by writing data to a buffer in memory, the content of the buffer describing a screen display of the device at a particular point in time. A watermarked version of the buffer content is generated by watermarking the content of the buffer with data, such as data identifying a user of the device and/or a copy of a program (e.g., an operating system) running on the device. The watermarked version of the buffer content is then made available, such as in response to a screen capture request. The data embedded in the watermarked version of the content is undetectable (or nearly undetectable) to the human eye, but can nonetheless be extracted by other computing devices or data extraction systems.

  • Pub Date: 2012/13/12
  • Number: 09123106
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for rendering multiple applications on television screens

A method for rendering application user interfaces includes providing a user interface of a first application for display on a television screen, and, while providing the user interface of the first application for display on the television screen, providing a user interface of a second application for concurrent display with the user interface of the first application, in a predefined user interface region, on the television screen. The method also includes, while providing the user interface of the second application, receiving a request for a user interface of a third application. The method further includes, in response to receiving the request for the user interface of the third application, providing a user interface of the third application, instead of the user interface of the second application, for concurrent display with the user interface of the first application, in the predefined user interface region, on the television screen.

  • Pub Date: 2012/13/12
  • Number: 08839292
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for graphically displaying market related data using fixed size bars

A system and method are provided for displaying market related data, such as traded volume at each price level, or any other trader-selected values, using one or more fixed size bars. In one preferred embodiment, a graphical display interface is provided and includes a plurality of fixed size bars that display traded volume at different price levels. In such an embodiment, the length of each bar may correspond to a predefined maximum value, and each bar may be progressively color-coded using a first graphical format to represent traded volume that is lower than the maximum value. If the traded volume exceeds the maximum value, the overflow value may be represented by progressively color-coding the bar using a second graphical format that may be used in relation to the first graphical format color-coding.

  • Pub Date: 2012/13/12
  • Number: 08538862
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Social-based information recommendation system

Techniques are described herein that are capable of recommending information that is contextually related to code using a social data graph. A machine learning technique is used to determine that the information is contextually related to the code. A social data graph is a graph database that stores information associated with users in a social networking environment. For instance, such information may be retrieved from user profiles, social updates, etc. of the users. A social networking environment is an online service, platform, or domain (e.g., Web site) that facilitates the building of social networks (e.g., social relations) among people who share interests, activities, backgrounds, real-life connections, etc.

  • Pub Date: 2012/13/12
  • Number: 09092211
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Pluggable infrastructure for cloud provider selection

A server computer system receives a request to launch a deployment and determines a set of matches from a pool of cloud providers that meets minimum requirements for the deployment. The server computer identifies a selection criteria comprising priority ranking criteria and probability ranking criteria for the deployment. The server computer then determines one of the cloud providers for the deployment from the set of matches based on the priority ranking criteria and the probability ranking criteria.

  • Pub Date: 2012/13/12
  • Number: 09344521
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Persistent and resilient worker processes

In the field of computing, many scenarios involve the execution of an application within a virtual environment (e.g., web applications executing within a web browser). In order to perform background processing, such applications may invoke worker processes within the virtual environment; however, this configuration couples the life cycle of worker processes to the life cycle of the application and/or virtual environment. Presented herein are techniques for executing worker processes outside of the virtual environment and independently of the life cycle of the application, such that background computation may persist after the application and/or virtual environment are terminated and even after a computing environment restart, and for notifying the application upon the worker process achieving an execution event (e.g., detecting device events even while the application is not executing). Such techniques may heighten the resiliency and persistence of worker processes and expand the capabilities of applications executing within virtual environments.

  • Pub Date: 2012/13/12
  • Number: 09092247
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for use in controlling connections to wireless networks

In one illustrative example, a wireless device receives a communication policy from a private network. The communication policy includes allowable service provider identifiers (e.g. domain names, realms) corresponding to allowable service providers. The wireless device stores these identifiers in its memory. When roaming, the wireless device encounters a wireless network (“hotspot”) and receives via the wireless network one or more reachable service provider identifiers corresponding to one or more reachable service providers. In a work mode of operation, the wireless device allows a connection to the wireless network based on a match between one of the allowable and reachable service provider identifiers, but otherwise disallows the connection. The communication policy may additionally or alternatively include device types for P2P networks, and/or allowable private network identifiers (e.g. ESSIDs), and/or allowable hotspot aggregator service identifiers or names, for use in the work mode.

  • Pub Date: 2012/13/12
  • Number: 09167512
  • Owner: BLACKBERRY LIMITED
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for social media cooperation protocol

Methods and systems for social media cooperation, via allowing inter-social network communications between users of different networks is provided. The inter-social network communications may be facilitated by sending inter-social network communications in a format determined by a protocol that is used by the social networks agreeing to allow inter-social network communications.

  • Pub Date: 2012/13/12
  • Number: 09252976
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Manipulating binary large objects

Embodiments provide automated access policy enforcement, content rule enforcement, and data transformations in a binary large object (blob) storage service. Verified and unverified clients are allowed varying degrees of access to stored blobs. In response to a read request associated with a target blob of a particular blob type, criteria from the read request are used to execute one or more transformation functions defined by the blob type to create transformed data, and the transformed data is provided to the client. In response to a write request including a target blob of a particular blob type, a set of content rules associated with the blob type is executed against the target blob. The target blob is stored based on the content rules being successfully executed.

  • Pub Date: 2012/13/12
  • Number: 09112935
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Inventory system with climate-controlled inventory

A system includes a climate-controlled inventory holder, a mobile drive unit, and a management module. The climate-controlled inventory holder is configured to control a climate of one or more inventory items stored by the inventory holder. The mobile drive unit is operable to transport the climate-controlled inventory holder from a first location to a second location based at least in part upon one or more instructions received from a management module. The management module is operable to receive an order for an inventory item, determine that the inventory holder stores the inventory item, and instruct the mobile drive unit to transport the climate-controlled inventory holder from the first location to the second location.

  • Pub Date: 2012/13/12
  • Number: 09008827
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Gesture pre-processing of video stream to reduce platform power

Techniques are disclosed for processing a video stream to reduce platform power by employing a stepped and distributed pipeline process, wherein CPU-intensive processing is selectively performed. The techniques are particularly well-suited for efficient hand-based navigational gesture processing of a video stream, in accordance with some embodiments. The stepped and distributed nature of the process allows for a reduction in power needed to transfer image data from a given camera to memory prior to image processing. In one example case, for instance, the techniques are implemented in a user's computer system wherein initial threshold detection (image disturbance) and optionally user presence (hand image) processing components are proximate to or within the system's camera, and the camera is located in or proximate to the system's primary display. The computer system may be any mobile or stationary computing system having a display and camera that are internal and/or external to the system.

  • Pub Date: 2012/13/12
  • Number: 08805017
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Fault tolerance for tasks using stages to manage dependencies

A high availability system has an application server communicatively coupled to one or more client machines through a network utilizing stateless communication sessions. The application server manages concurrent execution of tasks on multiple client machines. A task may be dependent on the execution of another task and the dependencies are managed through stages. The application server utilizes a fault tolerance methodology to determine a failure to any one of the components within the system and to perform remedial measures to preserve the integrity of the system.

  • Pub Date: 2012/13/12
  • Number: 09158610
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed analytics method for creating, modifying, and deploying software pneurons to acquire, review, analyze targeted data

A method and system for the integration of disparate data stored within an Information Technology infrastructure of a company is provided. The system and method enables holistic, real time control of data discovery, retrieval and analysis. The system combines data mining, retrieval and analytics at the source of the data, thereby solving traditional problems with disparate and distributed data, systems, business processes and analytics across an organization. The system enables a user to configure and target data, then apply rules, workflows and analytics from one central source. This process is accomplished by distributing functions in the form of software pneurons against the existing infrastructure for maximum processing while preserving a robust and extendable suite of definitions. The system uses the existing application, network and hardware assets and enables connection to the native data, maps only the data fields that need to be mapped to carry out the desired analysis, runs the analysis and then returns the data to a central location to be assembled, analyzed, organized and/or reported.

  • Pub Date: 2012/13/12
  • Number: 09020868
  • Owner: Pneuron Corp.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Determining an image capture payload burst structure

A first plurality of images of a scene may be captured. Each image of the first plurality of images may be captured using a different TET. Based at least on the first plurality of images, a long TET, a short TET, and a TET sequence that includes the long TET and the short TET may be determined. A second plurality of images of the scene may be captured. The images in the second plurality of images may be captured sequentially in an image sequence using a sequence of TETs corresponding to the TET sequence. Based on one or more images in the image sequence, an output image may be constructed.

  • Pub Date: 2012/13/12
  • Number: 09087391
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Determining an image capture payload burst structure based on a metering image capture sweep

A first plurality of images of a scene may be captured. Each image of the first plurality of images may be captured with a different total exposure time (TET). Based at least on the first plurality of images, a TET sequence may be determined for capturing images of the scene. A second plurality of images of the scene may be captured. Images in the second plurality of images may be captured using the TET sequence. Based at least on the second plurality of images, an output image of the scene may be constructed.

  • Pub Date: 2012/13/12
  • Number: 08866927
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Database upgrade management

A system can include an upgrade system manager. The upgrade system manager can be configured to communicate with an upgrade database that employs a given schema. The system can also include a legacy system manager configured to communicate with a legacy database that employs a different schema, wherein the legacy database contains a subset of the data stored at the upgrade database. The legacy database can be configured to provide a forward migration trigger to the upgrade system manager in response to detecting an update to the legacy database. The upgrade system manager can further be configured to determine whether data received from an application configured to produce data for the upgrade database is to be provided to the legacy database.

  • Pub Date: 2012/13/12
  • Number: 09122716
  • Owner: SHORETEL, INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Automated selection of a content provider

Described herein are systems and methods for automatically selecting a content provider for delivery of content for consumption by a user. Various selection data such as cost, historical delivery bitrate, and so forth are gathered and a weighting profile is applied to generate a total weight by content provider. The total weight by content provider may be used to select one content provider from another for delivery of a particular piece of content.

  • Pub Date: 2012/13/12
  • Number: 08959177
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for content directory server presentation

A method and apparatus for content directory server presentation is described. The method includes connecting a device to media content sources, identifying a media content source as a temporary content source, the temporary content source not permanently connected to the home network, scanning, at a periodic rate, the media content source to identify media content, the rate being higher than a rate for a media content source that is not a temporary content source, and updating a catalog of media content available to the media device based on scanning the media content source. The apparatus includes a receiver scanning media content sources to identify available media content, and a controller determining if a media content source is not permanently connected to the home network, the controller increasing a periodic rate of scanning if the at least one media content source is not permanently connected to the home network.

  • Pub Date: 2012/13/12
  • Number: 09516382
  • Owner: THOMSON LICENSING
  • Location: Issy les Moulineaux, FR
  • Details: Visit USPTO

Visit USPTO Page


Aircraft fuel optimization for multi-stop routes

Computer-implemented systems, methods, and computer-readable media for reducing operational costs relating to fuel burn of aircraft include receiving trip data specifying an origin, an intermediate destination, and a final destination from a client device; receiving operational data from one or more computing device; performing optimization logic to determine an optimized route having a minimized fuel cost, the optimized route specifying how much fuel to purchase at each of an origin airport, an intermediate destination airport, and a final destination airport; and transmitting the optimized route to the client device.

  • Pub Date: 2012/13/12
  • Number: 08554460
  • Details: Visit USPTO

Visit USPTO Page


Action broker

Among other things, one or more techniques and/or systems are provided for building an action catalogue, generating an action frame for an action within the action catalogue, and/or executing an action. In an example, an action may be included within the action catalogue based upon descriptive text associated with an application indicating that the application is capable of performing the action (e.g., a movie app may be capable of performing an order movie tickets action). A parameter (e.g., a movie name) and/or an execution endpoint (e.g., a uniform resource identifier used to access movie ticket ordering functionality) may be used to generate an action frame for the action. In this way, user intent to perform an action may be identified from user input (e.g., a spoken command), and the action may be performed (e.g., on behalf of the user with minimal additional user input) by using the action frame.

  • Pub Date: 2012/13/12
  • Number: 09558275
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


User assembly of lightweight user interface for games

Technology is described for user assembly of lightweight user interfaces for games, e.g., massively multiplayer online games. The technology can include a set of pre-selectable action modules; an interface element, a messaging element, and a display element for each pre-selectable action module; and a component configured to enable a user to select a subset from the set of pre-selectable action modules. A first subset of the pre-selectable action modules can provide a different user interface than a second subset of the pre-selectable action modules when at least one pre-selectable action module is in the first subset but not the second subset. Action modules may be capable of communicating using a messaging platform with at least one server computing device and relates to a massively multiplayer online gaming system operating at a server computing device.

  • Pub Date: 2012/12/12
  • Number: 09101840
  • Owner: EMPIRE TECHNOLOGY DEVELOPMENT LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for customer relationship management

According to various embodiments, a social media message posted on a social media system is accessed. One or more similar messages determined to be similar to the social media message may be selected from a database of previously posted messages, based on, for example, an author, product, problem, keyword, etc., identified in the social media message. The similar messages may be displayed in a similar message recommendation list of a user interface. One or more relevant knowledgebase articles determined to be relevant to the social media message may be selected from a knowledgebase repository, based on, for example, a product, problem, keyword, etc., identified in the social media message. The relevant knowledgebase articles may be displayed in a knowledgebase article list of a user interface.

  • Pub Date: 2012/12/12
  • Number: 09230257
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for optimizing the management of thread stack memory

A system, method, and computer program product for optimizing thread stack memory allocation is disclosed. The method includes the steps of receiving source code for a program, translating the source code into an intermediate representation, analyzing the intermediate representation to identify at least two objects that could use a first allocated memory space in a thread stack memory, and modifying the intermediate representation by replacing references to a first object of the at least two objects with a reference to a second object of the at least two objects.

  • Pub Date: 2012/12/12
  • Number: 09411715
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Policy-based checkpointing fault tolerance across remote virtual machines

Embodiments include a checkpointing fault tolerance network architecture enables a first computer system to be remotely located from a second computer system. An intermediary computer system is situated between the first computer system and the second computer system to manage the transmission of checkpoint information from the first computer system to the second computer system in an efficient manner. The intermediary computer system responds to requests from the second computer system for updated data corresponding to memory pages selected by the second computer system, or memory pages identified through application of policy information defined by the second computer system.

  • Pub Date: 2012/12/12
  • Number: 08898509
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-core processor system, cache coherency control method, and computer product

A multi-core processor system includes a processor configured to establish coherency of shared data values stored in a cache memory accessed by a multiple cores; detect a first thread executed by a first core among the cores; identify upon detecting the first thread, a second thread under execution by a second core other than the first core and among the cores; determine whether shared data commonly accessed by the first thread and the second thread is present; and stop establishment of coherency for a first cache memory corresponding to the first core and a second cache memory corresponding to the second core, upon determining that no shared data commonly accessed is present.

  • Pub Date: 2012/12/12
  • Number: 08996820
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to test a subscriber line for a broadband access service

Methods and apparatus to test a subscriber line for a broadband access service are disclosed. An example network interface device (NID) comprises a tone generator to transmit a tone on a subscriber line to characterize the subscriber line while a DSL modem is providing a DSL service via the subscriber line, the tone having a frequency occurring within a range of frequencies in use by the DSL modem to provide the DSL service, and a pair of terminals to couple the DSL modem and the tone generator to the subscriber line.

  • Pub Date: 2012/12/12
  • Number: 08687771
  • Owner: AT&T Intellectutal Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method for setting DNS records

A method includes receiving a request to associate a user-specified domain name with an application function, identifying a registrar system based on the user-specified domain name, and generating a domain record file including domain record information that, when processed by the registrar system, is operable to cause association of the user-specified domain name with the application function. The method also includes identifying a configuration URL based on the user-specified domain name. The configuration URL includes a configuration hostname associated with the registrar system and a configuration pathname that corresponds to a record-setting API that is operable to modify one or more domain name records that are associated with the user-specified domain name. The method also includes transmitting the domain record file to the registrar system using the configuration URL.

  • Pub Date: 2012/12/12
  • Number: 09137094
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for securing a third party communication with a hosting web page

A method and system for securing hosting web pages from malicious third party modules. The method includes uploading a third party module to a hosting web page; validating a proxy API call received from the third party module, wherein the proxy API call includes at least a payload parameter provided by the third party module; generating an engine API call including at least the payload parameter; validating the engine API call; and executing the payload parameter if the engine API call is validated.

  • Pub Date: 2012/12/12
  • Number: 08997178
  • Owner: Sizmek Technologies Ltd.
  • Location: Herzliya, IL
  • Details: Visit USPTO

Visit USPTO Page


Geometrical pattern based application passcode

To authorize an access to an application, a user interface renders a geometrical pattern on receiving a trigger to access the application. The rendered geometrical pattern includes an instance of an arrangement of one or more first nodes and one or more second nodes. The rendered geometrical pattern is associated with an input type to receive a selection of the first nodes and the second nodes. The selection of the first nodes and the second nodes is received as an authorizing key. The authorizing key is matched with an authorizing passcode stored in memory to provide access to the application.

  • Pub Date: 2012/12/12
  • Number: 08925071
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Detecting matched cloud infrastructure connections for secure off-channel secret generation

Technology is described for two parties, by leveraging previously established secure connections with third parties, to obtain a shared secret for generating a secure connection with each other in a way that reduces vulnerability to man-in-the-middle attacks. In some examples, the technology can include generating a session identifier; coordinating use of the session identifier by the two parties; finding an available secure communication channel to a third party; transmitting the session identifier to the third party via the available secure communication channel; receiving, via the available secure communication channel, a third party identifier and a session identifier-specific secret; sharing information about the received third party identifier; determining that the received third party identifier matches a third party identifier received by the second party; and using the session identifier-specific secret received with the matching third party identifier to generate a cryptographic key to secure communication between the two parties.

  • Pub Date: 2012/12/12
  • Number: 09237133
  • Owner: Empire Technology Development LLC.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Contoured facial mask with multiple contact probes for use with tactile tonometer

A system for measuring intraocular pressure (IOP) of an eye, comprising a plurality of force sensors that are adapted to contact a surface of an eye, measuring the forces exerted on the force sensors when in contact with the eye surface, and processing the measured forces to determine the 10P of the eye as a function of the measured forces.

  • Pub Date: 2012/12/12
  • Number: 09155467
  • Owner: THE ARIZONA BOARD OF REGENTS ON BEHALF OF THE UNIVERSITY OF ARIZONA
  • Location: Tucson, US
  • Details: Visit USPTO

Visit USPTO Page


Advanced business query language

A new query language can be embedded in a business application programming language (e.g., the ABAP language). A query language consistent with implementations of the current subject matter can be based on a graph data-model of connected business objects (BO) or other data objects and can be designed as an efficient query language embedded into the business application programming language runtime, thereby allowing expression of business logic in a declarative manner.

  • Pub Date: 2012/12/12
  • Number: 09098546
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Address pinning

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for memory address pinning. One of the methods includes loading a software module into a sandbox environment; receiving, a message from the software module to a recipient, the message includes a memory address; determining whether to pin the memory address; and passing the message to an address pinning unit which replaces at least a portion of the memory address with at least a portion of a specified replacement address, when it is determined to pin the memory address, and passes the modified message to be delivered to the recipient.

  • Pub Date: 2012/12/12
  • Number: 09197446
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for improving performance of remote USB storage

Methods and systems described herein facilitate improving universal serial bus (USB) storage performance in remote computing environments. A virtual USB host is associated with a virtual machine running a guest operating system (OS) and is configured to communicate with a USB storage device that is connected to a remote terminal. The virtual USB host is further configured to transmit one of a data-in request to the USB storage device before the guest OS transmits the data-in request or an acknowledgement of a data-out request to the guest OS before the USB storage device transmits the acknowledgement.

  • Pub Date: 2012/11/12
  • Number: 09081722
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for mobile platform virtualization

A method for a mobile platform containing a mobile terminal having an operating system includes initializing a plurality of user environments (UEs) on the mobile terminal over the operating system, including a current UE running on the mobile terminal. The plurality of UEs are capable of being switched among one another based on one or more of predetermined conditions without changing the operating system. The method also includes collecting sensing data on certain parameters associated with operation of the mobile terminal, and processing the sensing data to indicate at least one of the predetermined conditions. Further, the method includes determining whether the current UE suits the at least one of the predetermined conditions indicated by processing the sensing data and, when the current UE does not suit the condition of the mobile terminal, switching the current UE to a desired UE from the plurality of UEs.

  • Pub Date: 2012/11/12
  • Number: 09063770
  • Owner: TCL RESEARCH AMERICA INC.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Social networking behavior-based identity system

Disclosed are various embodiments for a social networking behavior-based identity system that employs social networking data that a user has elected to share through an opt-in procedure. First social networking data is stored in association with a user identity. An assertion of the user identity is received from a client after the first social networking data is stored. Second social networking data is received in response to receiving the assertion of the user identity. An identity confidence level as to whether the user identity belongs to a user at the client is generated based at least in part on a comparison of the second social networking data with the first social networking data.

  • Pub Date: 2012/11/12
  • Number: 09166961
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Restricting mature content

Methods, devices, and products provide for restricting access to mature content by individuals for whom access to the mature content is designated as inappropriate. A content filter receives a communication, determines that the communication includes an image, and extracts the image. The image is scanned for mature content. A content restrictor component restricts access by various classes of users to the mature content.

  • Pub Date: 2012/11/12
  • Number: 08875257
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Predictive governing of dynamic modification of program execution capacity

Techniques are described for managing program execution capacity or other capacity of computing-related hardware resources used to execute software programs, such as for a group of computing nodes that is in use executing one or more programs for a user. Dynamic modifications to the program execution capacity of the group may include adding or removing computing nodes, such as in response to automated determinations that previously specified triggers are currently satisfied, and may be automatically governed at particular times based on automatically generated predictions of program execution capacity that will be used at those times by the group, such as to verify that requested dynamic execution capacity modifications at a time are within the predicted execution capacity values for that time. In some situations, the techniques are used in conjunction with a fee-based program execution service that executes multiple programs on behalf of multiple users of the service.

  • Pub Date: 2012/11/12
  • Number: 08745218
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Packet routing for embedded applications sharing a single network interface over multiple virtual networks

Techniques are provided for packet routing in a distributed network switch. The distributed network switch includes multiple switch modules operatively connected to one another, and each switch module includes multiple bridge elements and a management controller. In one embodiment, a shared interface routing (SIR) framework is provided that includes an analysis and bifurcation layer and at least one packet interface. A packet is received over a first logical network and via a physical port, the packet being destined for at least a first application executing on the management controller. The analysis and bifurcation layer analyzes the packet and sends the packet to the packet interface, which then routes the packet to the first application.

  • Pub Date: 2012/11/12
  • Number: 09077659
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method, manufacture, and apparatus for instantiating plugin from within browser

A method, apparatus, and manufacture for instantiating a browser plugin is provided. A client web browser of a client is employed to instantiate a browser plugin for the client web browser. Next, the client web browser is employed to obtain a reference to the browser plugin. Then, a command is given to the browser plugin via the reference to the browser plugin. The browser plugin is used by the client web browser rather than the web page.

  • Pub Date: 2012/11/12
  • Number: 09542368
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method, manufacture, and apparatus for content decryption module

A method, apparatus, and manufacture for a content decryption module (CDM) is provided. A user agent loads a web application. The web application gets a license for encrypted media content. The web application instructs a media stack of the user agent to play the encrypted media content. The license is sent from the web application to the media stack. Next, the license is sent from the media stack to the CDM. The media stack and the CDM are distinct binaries from each other. Encrypted data is sent from the media stack to the CDM. The encrypted data includes at least a portion of the encrypted media content. Next, the CDM provides decrypted data by decrypting the encrypted data.

  • Pub Date: 2012/11/12
  • Number: 08891765
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for LED transition from physical to virtual space

An electronic device comprising a touchscreen and a light element may be operable to illuminate the light element in response to an event. In response to an input from a user of the electronic device, the electronic device may display on the touchscreen an animation of a graphical representation of the light element moving onto the touchscreen to a target location on the touchscreen. The graphical representation of the light element may share one or more characteristics with the light element. The characteristic(s) may indicate a contact, application, and/or operating system associated with the event.

  • Pub Date: 2012/11/12
  • Number: 08587550
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Interface and method for inter-thread communication

The interface for inter-thread communication between a plurality of threads including a number of producer threads for producing data objects and a number of consumer threads for consuming the produced data objects includes a specifier and a provider. The specifier is configured to specify a certain relationship between a certain producer thread of the number of producer threads which is adapted to produce a certain data object and a consumer thread of the number of consumer threads which is adapted to consume the produced certain data object. Further, the provider is configured to provide direct cache line injection of a cache line of the produced certain data object to a cache allocated to the certain consumer thread related to the certain producer thread by the specified certain relationship.

  • Pub Date: 2012/11/12
  • Number: 09330005
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying recycled telephone numbers

An automated method begins by receiving a list of numbers that have been de-activated by a carrier. Periodically, and for each number, a request is made to identify a current carrier for the number. If the current carrier matches the carrier that provided the de-activation information, the mobile number is considered to be in a first state, i.e., shut off and returned to a pool of numbers that are available to this same carrier. Upon a determination that the number is in the first state, the provider issues a request to any opt-in database to delete any express consent or other similar data associated with the number. If, however, the number does not match the carrier of deactivation, the number is considered to be in a second state, i.e., likely to have been ported by the same user to a new carrier. This state is logged in an audit trail.

  • Pub Date: 2012/11/12
  • Number: 08891750
  • Owner: Soundbite Communications, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a personalized video mosaic in a cable services network

Methods and systems are provided for generating a personalized video mosaic from multiple of video sources in a cable television services system. A head end receives a subscriber selection of video sources from multiple video sources broadcast in the television services system and generates a personalized video mosaic from those sources. The head end then transmits the personalized video mosaic to the subscriber for simultaneous viewing of the selected video sources on a broadcast channel in the cable television services system. The set-top box executes an application program enabling the subscriber to individually select the video sources which make up the personalized video mosaic and transmits the selections to the head end. The set-top box enables the display of the personalized video mosaic on the broadcast channel in the cable television services network.

  • Pub Date: 2012/11/12
  • Number: 08990855
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Establishing operating system and application-based routing policies in multi-mode user equipment

Techniques for establishing and implementing operating system and application-based routing policies for multi-mode wireless communication devices such as a user equipment (UE) are generally described herein. In some examples, information particular to the profile and platform configuration of the UE is communicated to an Access Network Discovery Function (ANDSF) server. The ANDSF server may provide an inter-system routing policy (ISRP) to handle appropriate network offloading actions for the particular application and device configuration. In some examples, the ISRP may be specific to flow-based or non-seamless based traffic offloading from certain software applications. The techniques described herein may be propagated from the ANDSF server and implemented in a variety of multi-mode UE mobile computing devices in connection with offloading policies established in a 3GPP Long Term Evolution/Long Term Evolution-Advanced (LTE/LTE-A) Evolved Packet Core (EPC) network architecture.

  • Pub Date: 2012/11/12
  • Number: 09526022
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Eliciting event-driven feedback in a social network

Particular embodiments detect events associated with information about activities that a user has engaged in. The activities may be associated with a location or location-agnostic. Based on the received information, the social-networking system sends the user a request for follow-up information after an appropriate time delay. The time delay may vary based on the user activity and the context of the event that triggered the request. After the follow-up information is received, such information is stored in the social-networking system and may be used to determine recommendations, sponsored stories, advertisements, etc. to send to friends of the user. The information may also be used for ranking or filtering recommendations.

  • Pub Date: 2012/11/12
  • Number: 09210228
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Device to-device (D2D) discovery without authenticating through cloud

Embodiments of device-to-device (D2D) discovery, authentication, and connection techniques are generally described herein. In an example, a device-to-device connection establishment technique may be performed directly between peer-to-peer wireless communication devices without obtaining authentication information from a cloud network or an external service. The device-to-device connection establishment technique may include a transmission of a discovery request to available devices, a transmission of a response from available devices including authentication data, and a verification of the authentication data. The authentication data may include previously stored image data associated with a device or human user associated with a device. In further examples, image processing and image recognition techniques may be used to verify a particular device or human user associated with a device.

  • Pub Date: 2012/11/12
  • Number: 08594632
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Determining a lasting value of content items and performers

Disclosed are various embodiments for generating a content item metric or a performer metric. The metric can assess a lasting value of a content item or performer by identifying a distribution of a population of users expressing an interest in the content item or performer according to a demographic attribute, such as age.

  • Pub Date: 2012/11/12
  • Number: 08996526
  • Owner: IMDb.com, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of file modifications performed by malicious codes

File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on the original file. In response to detecting the file modification, a corresponding shadow file is created. The shadow file represents the original file as modified by the file modification. Before allowing the file modification to be performed on the original file, the original file is compared to the shadow file to determine if the file modification is being performed by malicious codes. The file modification may be deemed to be performed by malicious codes when the file modification involves, for example, entry point append, entry point prepend, entry point obfuscation, cavity, overwriting, or mal-tattoo.

  • Pub Date: 2012/11/12
  • Number: 09378369
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Application-specific re-adjustment of computer security settings

System and method for re-adjustment of a security application to various application execution scenarios. Application execution scenarios for each of a set of software applications are created, each representing a specific subset of functionality of a corresponding application. Sets of security application configuration instructions are stored, each corresponding to at least one of the application execution scenarios. A current one or more of the application execution scenarios that is being executed in the computing device is determined and, in response, a set of security application configuration instructions corresponding to each current application execution scenario are carried out, such that the security application is adjusted to perform a specific subset of security functionality that is particularized to the current one or more of the application execution scenarios.

  • Pub Date: 2012/11/12
  • Number: 08925076
  • Owner: Kaspersky Lab ZAO
  • Location: Moscow, RU
  • Details: Visit USPTO

Visit USPTO Page


Testing disk drives shared by multiple processors in a supercomputer complex

An interface node selects a logical block address that corresponds to a contiguous memory location located on a storage device that is accessible by multiple interface nodes. The interface node retrieves a logical block address status indicator from a shared memory area and determines, based upon the logical block status indicator, whether the logical block address is utilized by a different interface node. If the logical block address is not utilized by a different interface node, the interface node tests the corresponding contiguous memory location.

  • Pub Date: 2012/10/12
  • Number: 09021321
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques and apparatus for managing touch interface

An apparatus may comprise a touch-sensitive user interface, a processor circuit; and a personalized touch event filter that includes a touch trainer module for execution on the processor circuit to generate a user touch profile based upon user touch input received at the touch-sensitive user interface, and a revising plug-in component for execution on the processor circuit to generate a revised touch event based upon a raw touch event received at the touch-sensitive user interface and the user touch profile.

  • Pub Date: 2012/10/12
  • Number: 09063612
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System for providing mobile data security

A system transfers applications and datasets (files) from a server to a client device and assigns to each file a lease key that will expire at a specified time. A file cannot be accessed unless its lease key is validated. Upon expiration of a lease key, the client device will connect to the server to determine if the lease key may be renewed. If the lease key may be renewed, a new lease key is created and access to the associated application or dataset is restored. If the lease key may not be renewed, the file may be deleted or rendered inaccessible. If rendered inaccessible, the file may be restored in the future without having to re-transmit it from the server to the client device. The server may also revoke a lease key before it expires.

  • Pub Date: 2012/10/12
  • Number: 08959593
  • Owner: Antenna Vaultus, Inc.
  • Location: Jersey City, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing SRAM write assist

A method and a system are provided for performing write assist. Write assist circuitry is initialized and voltage collapse is initiated to reduce a column supply voltage provided to a storage cell. A bitline of the storage cell is boosted to a boosted voltage level that is below a low supply voltage provided to the storage cell and data encoded by the bitline is written to the storage cell.

  • Pub Date: 2012/10/12
  • Number: 08861290
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamically regulating order entry in an electronic trading environment

A system and method are provided for trading a trading strategy defined for at least one tradeable object in an electronic trading environment. More specifically, one example method includes using a first pay-up tick value to determine a first acceptable price level for an order associated with the trading strategy, automatically modifying the first pay-up tick to a second pay-up tick value in response to detecting a predefined condition, and using the second pay-up tick value to determine a second acceptable price level for the order associated with the trading strategy.

  • Pub Date: 2012/10/12
  • Number: 08751368
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for detecting network activity of interest

A network activity detection system is trained to detect network activities of interest such as threats by malicious computer data. The training involves distilling the characteristics of known network activities of interest (e.g., intrusion by computer viruses, exploits, worms, or the like) into a minimal set of meta-expressions. At run-time, the network activity detection system combines the minimal set of meta-expressions with efficient computer algorithms for evaluating meta-expressions to detect known network activities of interest, as well as their unknown variants, among an unknown set of network activity. The network activity detection system may produce appropriate responses upon the detection of network activities of interest.

  • Pub Date: 2012/10/12
  • Number: 09621578
  • Owner: TrustPipe LLC
  • Location: Healdsburg, US
  • Details: Visit USPTO

Visit USPTO Page


Smart user interface adaptation in on-demand business applications

In one aspect, there is provided a method. The method may include monitoring a process including a plurality of user interfaces, at least one of the user interfaces representing a notification of a task to be completed and at least another user interface representing information associated with an action corresponding to the notification; determining whether at least a portion of the process is a candidate for adaptation; and adapting the process by combining a first portion of the at least one of the user interface representing the notification of the task and a second portion of the at least other user interface representing the information associated with the action. Related systems, methods, and articles of manufacture are also disclosed.

  • Pub Date: 2012/10/12
  • Number: 09652744
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Smart phones that include touch sensitive screen and supporting voice activated commands for managing or replying to E-mails

Smart Phones that support voice activated commands for managing e-mails are disclosed and enabled. This new Smart Phone may include a touch sensitive screen, a graphical user interface, an e-mail application, an Internet browsing application, and applications for playing audio/video content. The Smart Phone includes an operating system and support for installation of new applications. The Smart Phone may further support part of a wireless protocol within IEEE 802.11. In one example, a user of the Smart Phone may reply to an e-mail by using voice commands or by selecting an icon over the touch sensitive screen. The user may scroll down or up an email using the touch sensitive screen interface. In other examples, the user may further issue voice commands to synchronize, stream, transmit, play, print, display, or mirror at least part of digital content from the Smart Phone to one or more output devices over air.

  • Pub Date: 2012/10/12
  • Number: 09383956
  • Owner: Mattel, Inc.
  • Location: El Segundo, US
  • Details: Visit USPTO

Visit USPTO Page


Service-based access for enterprise private network devices to service provider network services

A system is configured to receive, from an enterprise device, a request to access a network domain, and is configured to determine whether the network domain is associated with a wireless service provider service. Based on determining that the network domain is not associated with the wireless service provider service, the system is configured to route the request to a private network associated with the enterprise device. Based on determining that the network domain is associated with the wireless service provider service, the system is configured to route the request to a domain name system server associated with the wireless service provider, receive a domain name system response to the request, the domain name system response identifying a network address, and route the domain name system response to the enterprise device.

  • Pub Date: 2012/10/12
  • Number: 08498626
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


RFID readers causing RFID tags to backscatter more codes

RFID reader systems, readers, components, software and methods cause RFID tags to backscatter a combination made from at least portions of a first code and a second code, without transmitting any commands in the interim. The first and/or second codes may include a tag response to a reader challenge. In a number of embodiments, a separate command does not have to be sent for reading the second code along with the first code, thereby saving time in inventorying the tags. Plus, the combination can enable reading tag codes during tag manufacturing that are not otherwise readily available to read in the field. In some embodiments, the combination may further include one or more error-checking codes.

  • Pub Date: 2012/10/12
  • Number: 08587411
  • Owner: Impinj, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Request and response decoupling via pluggable transports in a service oriented pipeline architecture for a request response message exchange pattern

A computer-implemented system and method for decoupling processing of request and response messages supporting different pluggable respective transports in a service-oriented pipeline architecture for a request-response Message Exchange Pattern (MEP) is disclosed. The method in an example embodiment includes receiving a message having coded therein information identifying a desired pluggable transport mechanism respectively for a request and a response; processing the message through a message processing pipeline; dispatching the processed message to a dispatcher; determining if the desired pluggable transport mechanism is available; activating the desired pluggable transport mechanism, if the desired pluggable transport mechanism is available; and transporting the processed message via the desired pluggable transport mechanism.

  • Pub Date: 2012/10/12
  • Number: 08656038
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Protein-polymer-drug conjugates

A drug conjugate is provided herein. The conjugate comprises a protein based recognition-molecule (PBRM) and a polymeric carrier substituted with one or more -L-D, the protein based recognition-molecule being connected to the polymeric carrier by L. Each occurrence of D is independently a therapeutic agent having a molecular weight ≦5 kDa. Land Lare linkers connecting the therapeutic agent and PBRM to the polymeric carrier respectively. Also disclosed are polymeric scaffolds useful for conjugating with a PBRM to form a polymer-drug-PBRM conjugate described herein, compositions comprising the conjugates, methods of their preparation, and methods of treating various disorders with the conjugates or their compositions.

  • Pub Date: 2012/10/12
  • Number: 08815226
  • Owner: Mersana Therapeutics, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Pro-neurogenic compounds

This invention relates generally to stimulating neurogenesis (e.g., post-natal neurogenesis, e.g., post-natal hippocampal neurogenesis) and protecting from neuron cell death.

  • Pub Date: 2012/10/12
  • Number: 09095571
  • Owner: Board of Regents of The University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Personalized integrated audio services

A processor-implemented method of providing personalized integrated audio comprises maintaining, by a computer, a profile for a user, creating the audio stream to transmit to an audio play device associated with the user and inserting the music from a source into the audio stream, interrupting the insertion of the music into the audio stream, inserting a first audio message into the audio stream, and resuming insertion of the music into the audio stream after the completion of the first audio message. The profile comprises user specified preferences for music and a user-defined schedule of when insertion of audio messages from user selected subscribed information services are permitted into an audio stream, and the first audio message is selected by the computer from the user selected subscribed information services of the profile based on at least one of a time or a place of the audio play device.

  • Pub Date: 2012/10/12
  • Number: 09037664
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Packet routing with analysis assist for embedded applications sharing a single network interface over multiple virtual networks

Techniques are provided for packet routing in a distributed network switch. The distributed network switch includes multiple switch modules operatively connected to one another, and each switch module includes multiple bridge elements and a management controller. In one embodiment, a shared interface routing (SIR) framework is provided that includes an analysis and bifurcation layer, at least one packet interface, and an analysis assist layer. A packet is received over a first logical network and via a physical port, the packet being destined for at least a first application executing on the management controller. The analysis assist layer analyzes the packet to determine a reason code to assign to the packet. The analysis and bifurcation layer then analyzes the packet based at least in part on the reason code.

  • Pub Date: 2012/10/12
  • Number: 09148369
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Obtaining metrics for client-side display of content

Active script can be provided with content to be displayed on a computing device to determine whether advertising, intended to be displayed with the content, is actually displayed by the computing device. The script can examine various aspects of the code used to render the content, to determine whether ad-blocking software is blocking the ad or something is otherwise preventing the advertising from being displayed. Information about the visibility of the advertising can be sent to a location such as a logging service, which can store the data until such time as the data is to be retrieved and processed, such as to determine an extent to which client devices are blocking ads to be displayed with content.

  • Pub Date: 2012/10/12
  • Number: 09275398
  • Owner: A9.com, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Internet-pads that include a digital camera, a touch sensitive screen interface, and support for voice activated commands

New Internet-Pad specifications that include voice activated command functions are disclosed and enabled. The Internet-Pad may include a touch sensitive screen, a digital camera, a wireless communication unit, an operating system, a graphical user interface, an e-mail application, an Internet browsing application, and an application for playing audio or video content. The Internet-Pad operating system supports an application programming interface (API). A user can install additional applications. The Internet-Pad may further include a microphone and a speaker for interacting via voice commands with the user. In some examples, the user may take a picture with the digital camera included in the Internet-Pad and transfer or synchronize the picture to a wireless output device. In other examples, the Internet-Pad may transmit an e-mail upon receiving voice commands, and the Internet-Pad also may stream or mirror digital content over the air to an output device via voice commands.

  • Pub Date: 2012/10/12
  • Number: 09110622
  • Owner: Flexiworld Technologies, Inc.
  • Location: Vancouver, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture device in a networked environment

Described herein are methods and devices that employ wireless network to control the lighting of a target image scene or subject. As described, connected environments enable control of lighting devices within the environment through the use of a network. Some embodiments of the imaging devices described herein may employ the network to control lighting devices for the purpose of illuminating a target scene or subject. Certain embodiments may employ data regarding camera location, subject location, light bulb location, and the parameters of each light bulb in a room to calculate desired lighting parameters for capturing an image of the subject, and may further be able to wirelessly adjust the light bulb parameters to match the calculated parameters.

  • Pub Date: 2012/10/12
  • Number: 09288371
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


High survivability fluid flow sensor having a load cell for detecting loading on the sensor probe

A high survivability fluid flow sensor includes a sensor housing defining an interior space. A sensor probe has a first end disposed within the interior space. The sensor probe also includes a second end opposite the first end outside the interior space. At least one load cell is disposed within the interior space and is operatively engaged with the first end of the sensor probe. The load cell is configured to detect loading on the sensor probe as a result of fluid flow impinging on the sensor probe adjacent to the second end. The sensor is operable to capture fluid flow data history through an over pressure event via the sensor probe, which exerts pressure upon the piezoelectric load cell(s), thereby enabling analysis of the wave fluid dynamics.

  • Pub Date: 2012/10/12
  • Number: 09021893
  • Owner: Exquadrum, Inc.
  • Location: Adelanto, US
  • Details: Visit USPTO

Visit USPTO Page


Flash testing framework

A computer-based automated testing framework tests a multimedia application (such as a Flash application running in a player module) that includes one or more Flash objects by executing test scripts in an external Java-based test module that uses proxy objects in the test module to represent the Flash objects in the player module. Correspondence between the proxy object and Flash objects is maintained by translating the first test script into a command, sending the command from the external test module to the player module, interpreting the command by accessing a lookup table at the player module, and then returning a value to the external test module in response to the command.

  • Pub Date: 2012/10/12
  • Number: 09009674
  • Owner: Versata Development Group, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Downloading data to a mobile device

Methods and apparatus, including computer systems and program products, for downloading data to a mobile device. A method includes receiving, via a user interface, at a computer system independent of the mobile device, information identifying the mobile device to receive the application; receiving, at the computer system, information identifying the application to be installed on the mobile device; wirelessly transmitting, from the computer system to the mobile device, information related to the application; and in response to receiving the information related to the application, the mobile device installing the application on the mobile device independent of user input on the mobile device. The mobile device may be a mobile phone. The method may further include transmitting a download-assistance tool to the mobile device, where the download-assistance tool can receive the information related to the application to be installed and assist the mobile device in installing the application.

  • Pub Date: 2012/10/12
  • Number: 09378004
  • Owner: SITO Mobile R&D IP, LLC
  • Location: Jersey City, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed model compilation

Methods and systems are provided for partitioning and distributing the model processing of a graphical model to provide an executable form of the graphical model. The methods and systems determine tasks of the model processing that can be processed separately and concurrently from other tasks. A distribution scheme for distributing the model processing tasks is determined that considers the characteristics of the model processing tasks in view of the characteristics of available computing resources. Variations of partitioning and distributing the model processing tasks can be determined to provide for distributed processing in an optimized or desired manner. The results of the distributed processing of the model processing tasks are obtained and combined to provide an executable form for the graphical model.

  • Pub Date: 2012/10/12
  • Number: 09195445
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


CTLA4-Ig immunoadhesins

The present application relates to CTLA4-Ig immunoadhesins that target CD80 and CD86, and their use, particularly for therapeutic purposes.

  • Pub Date: 2012/10/12
  • Number: 08629113
  • Owner: Xencor, Inc.
  • Location: Monrovia, US
  • Details: Visit USPTO

Visit USPTO Page


Carcinoma diagnosis and treatment, based on genotype

The present invention provides methods and kits a) for predicting colorectal cancer patient survival, as well as the survival of patients harboring other invasive cancers where cellular proliferation and carcinogenesis is linked, in part, to high levels of ODC activity and increased cellular polyamine contents, and b) for selecting the corresponding treatment options for such patients based on the allelic nucleotide sequence or SNP at position +316 of the ODC1 promoter gene as well as cancer treatment methods, in each case, which include the determination of the ODC1 promoter +316 position genotype, as a means to guide treatment selection.

  • Pub Date: 2012/10/12
  • Number: 09121852
  • Owner: THE REGENTS OF THE UNIVERSITY OF CALIFORNIA, A CALIFORNIA CORPORATION
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Automated tuning of a service configuration using load tests on hosts

Methods and systems for automated tuning of a service configuration are disclosed. An optimal configuration for a test computer is selected by performing one or more load tests using the test computer for each of a plurality of test configurations. The performance of a plurality of additional test computers configured with the optimal configuration is automatically determined by performing additional load tests using the additional test computers. A plurality of production computers are automatically configured with the optimal configuration if the performance of the additional test computers is improved with the optimal configuration.

  • Pub Date: 2012/10/12
  • Number: 09053070
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items

Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items such as, for example, non-controlled prescriptions (Rx), medical devices, and controlled substances in countries such as the United States and Canada, are provided. The systems and methods incorporate a license verification module that is configured to perform license validation for a particular order placed for a controlled and/or non-controlled item. In certain embodiments, the license verification module compares order data to historically sorted data and if one or more discrepancies exist, validation is unsuccessful. The license verification module may further query a third party database for updated license information upon validation failure. The systems and methods further incorporate a suspicious order monitoring module that is configured to perform a plurality of checks on the order to identify the order as an “order of interest” that may be further investigated and deemed to be suspicious.

  • Pub Date: 2012/07/12
  • Number: 08983869
  • Owner: United Parcel Service of America, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Smart phones that include a digital camera, a touch sensitive screen, support for voice activated commands, and support to at least part of a protocol within IEEE 802.11 standards

A Smart Phone specification is disclosed, the Smart Phone supports voice activated commands and may include a touch sensitive screen, a digital camera, a wireless communication unit supporting at least partly a protocol within IEEE802.11 standards, an operating system, a graphical user interface, an e-mail application, an Internet browsing application, and an application for playing audio or video content. The Smart Phone may provide an application programming interface (API) to support applications. The Smart Phone may further include a microphone, a speaker, and voice activated command functions for receiving voice commands from the user. In some examples, the digital camera of the Smart Phone may take a picture and transfer the picture to an output device. In other examples, the Smart Phone may stream or transfer digital content over the air or wirelessly in response to voice activated commands or selections over the touch sensitive screen.

  • Pub Date: 2012/07/12
  • Number: 09092177
  • Owner: Flexiworld Technologies, Inc.
  • Location: Vancouver, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing information associated with power generation devices via a file system on a network

Certain embodiments herein are directed to transferring information between devices on a network using a filing system such as the WebDAV file system. In one embodiment, a sensor device may communicate with a computer server including a WebDAV file system to obtain information for various purposes, such as for software upgrades or resolution of software bugs. The computer server may receive data from a sensor associated with a home, business, or power generation equipment, or other asset. The computer server may further prepare the data for transmission to a filing system, which may include calling one or more WebDAV functions. The data may be used to determine additional data that may be used by the computer device that sent the data, in one embodiment. The data, as well as the additional data, may be stored in a WebDAV file system and/or transmitted to a remote computing device.

  • Pub Date: 2012/07/12
  • Number: 09128889
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Personal assistant context building

Technologies related to personal assistant context building are generally described. In some examples, network service communications, such as network traffic resulting from the use of mobile applications or “apps” on a mobile device, may be captured, parsed, and included in personal assistant context databases for use in configuring automated personal assistant user interaction operations. In some examples, parsing services may be provided to parse forwarded network service communications and generate converted data for inclusion in personal assistant context databases.

  • Pub Date: 2012/07/12
  • Number: 09171092
  • Owner: EMPIRE TECHNOLOGY DEVELOPMENT LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Packing multiple shader programs onto a graphics processor

This disclosure describes techniques for packing multiple shader programs of a common shader program type onto a graphics processing unit (GPU). The techniques may include, for example, causing a plurality of shader programs of a common shader program type to be loaded into an on-chip shader program instruction memory of a graphics processor such that each shader program in the plurality of shader programs resides in the on-chip shader program instruction memory at a common point in time. In addition, various techniques for evicting shader programs from an on-chip shader program instruction memory are described.

  • Pub Date: 2012/07/12
  • Number: 09530245
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Optimized query ordering for file path indexing in a content repository

Techniques for indexing file paths of items in a repository may include, for each type associated with instances that are not associated with file path indexes, starting with folder types prior to item types in a round robin sequence, attempting to associate the instances of the type with file path indexes. The repository may be queried for instances of a current type that are not associated with file path indexes and that are filed in a folder that is associated with a file path index. Responsive to the querying returning one or more instances of the current type, the one or more instances of the current type may be associated with the file path indexes. Responsive to the querying returning one or more instances of the current type, attempting to associate the instances of the same current type with file path indexes may be repeated.

  • Pub Date: 2012/07/12
  • Number: 09323761
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to pre-qualify user communities for communication services

Example methods and apparatus to pre-qualify user communities for communication services are disclosed. An example method comprises configuring a first remote network demarcation associated with a first loop to a loop-back state, interrogating the first loop to determine a first parameter representative of the first loop, configuring a second remote network demarcation associated with a second loop to the loop-back state, interrogating the second loop to determine a second parameter representative of the second loop, and compiling a report based on the first and second parameters, the report containing a value that represents a degree to which a communication service can be provided to a user community associated with the first and second loops.

  • Pub Date: 2012/07/12
  • Number: 09100472
  • Owner: AT&T Intellectual Property I., L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method for routing in a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. A collaboration conferencing routing server may provide configurability in routing a collaboration conference to a conference bridge based on any number of criteria and information about the requester and the communications network on which the conference occurs.

  • Pub Date: 2012/07/12
  • Number: 09178918
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Method for producing acyloxy carboxylic acids and derivatives thereof

The disclosure relates to a process for forming an acyloxy carboxylic acid or a derivative of the acid. A hydroxy acid compound is reacted with a carboxylic acid in a reaction vessel and in the presence of a catalyst, such as in a reactive distillation column containing the catalyst. The reaction product formed in the reaction vessel includes an acyloxy carboxylic acid compound, which can be removed continuously from the vessel in a product stream. Another product stream containing unreacted (excess) carboxylic acid and/or reaction byproducts such as water can be separately removed continuously from the reaction vessel.

  • Pub Date: 2012/07/12
  • Number: 09090556
  • Owner: BOARD OF TRUSTEES OF MICHIGAN STATE UNIVERSITY
  • Location: East Lansing, US
  • Details: Visit USPTO

Visit USPTO Page


Management of professional development plans and user portfolios

An example system for managing professional development plans may include a plan management module for receiving data representing a development plan for one or more users and an achievement module. The achievement module may determine one or more achievements associated with the development plan and may provide the one or more achievements to a user device of a first user. The achievement module may receive an association of an achievement selected from the one or more achievements with the goal-related aspect of the development plan and associate the achievement with the goal-related aspect of the development plan. The system may further include a reporting module for generating, based on associating the achievement with the goal-related aspect, a report describing the progress of the first user on the development plan.

  • Pub Date: 2012/07/12
  • Number: 08751408
  • Owner: School Improvement Network, LLC
  • Location: Midvale, US
  • Details: Visit USPTO

Visit USPTO Page


Load balancing in a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing service may maintain a database of information or preferences associated with the conference requester and attempt to select a conference bridge based on the requester's information. Further, the conferencing routing service may receive performance information from a plurality of conference bridges that are able to conduct the collaboration conference and select a conference bridge in response to the performance information.

  • Pub Date: 2012/07/12
  • Number: 09167011
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


IP-based conferencing in a telecommunications network

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing system may utilize Session Initiation Protocol (SIP) to conduct the routing of the collaboration conferences within the telecommunications network. The SIP-based routing provides for the exchanging of information from one device of the conferencing system to another that is not available in non-IP based conferencing systems. Thus, through the use of IP-based telecommunication devices, the network provides beneficial features for collaboration conferencing.

  • Pub Date: 2012/07/12
  • Number: 09013538
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Drive supporting device, operation detecting device, and controller

A drive supporting device includes a supporting device mounted on a vehicle and capable of executing driving support in the vehicle; a steering angle detecting device configured to detect a steering angle of a steering member of the vehicle; a torque detecting device configured to detect a torque acting on a steering shaft portion that rotates with the steering member; and a controller configured to control the supporting device, wherein the controller changes content of the driving support by the supporting device between a case in which a steering power corresponding to a product of a parameter associated with the steering angle detected by the steering angle detecting device and a parameter associated with the torque detected by the torque detecting device is greater than or equal to a reference value set in advance, and a case in which the steering power is smaller than the reference value.

  • Pub Date: 2012/07/12
  • Number: 09656686
  • Owner: TOYOTA JIDOSHA KABUSHIKI KAISHA
  • Location: Toyota-shi, Aichi-ken, JP
  • Details: Visit USPTO

Visit USPTO Page


Disaster recovery with a central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants. In one embodiment, the conferencing routing server is configured to respond to a failure in a conference bridge to allow for repair to the network and/or account for split conferences that may occur due to the bridge failure. In one embodiment, the CCRS may account for moving a conference bridge into an offline state by removing the conference bridge from consideration for hosting a collaboration conference.

  • Pub Date: 2012/07/12
  • Number: 09178919
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Central conferencing routing server

Aspects of the present disclosure involve systems, methods, computer program products, and the like, for collaboration conferencing with multiple participants over a communications network, and more specifically for a conferencing routing service for managing and routing collaboration participants.

  • Pub Date: 2012/07/12
  • Number: 09167010
  • Owner: LEVEL 3 COMMUNICATIONS, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Web page load time prediction and simulation

Embodiments of automated cloud service performance prediction are disclosed. The automated cloud service performance prediction includes extracting one or more dependency relationships for each web object in the webpage. The prediction further includes determining an original performance metric value and original timing information associated with a page loading of a webpage. The prediction also includes simulating a page loading of the webpage based on the adjusted timing information and the dependency relationships to estimate a new performance metric value associated with the simulated page loading of the webpage. The prediction additionally includes comparing the original performance metric value to the new performance metric value to determine whether the adjusted timing information increased or decreased the new performance metric value relative to the original performance metric value.

  • Pub Date: 2012/06/12
  • Number: 09456019
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Session certificates

A client device requests permission from a network access device to access a network associated with the network access device. The client device sends credentials of a user associated with the client device for authenticating with the network access device. The client device receives from the network access device permission to access the network along with a session certificate and an associated key. The session certificate and the key are associated with the credentials of the user. The client device establishes a network session using the network based on receiving the permission. During the network session, the client device establishes a secure communications channel with a website. The client device authenticates the user to the website by sending the session certificate to the website over the secure communications channel. The client device then receives permission from the website to access contents of the website.

  • Pub Date: 2012/06/12
  • Number: 09166969
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for semantic extraction and video remix creation

A method, apparatus and computer program product are provided for extracting semantic information from user-generated media content to create a video remix which is semantically enriched. An exemplary method comprises extracting media content data and sensor data from a plurality of media content, wherein the sensor data comprises a plurality of data modalities. The method may also include classifying the extracted media content data and the sensor data. The method may further include detecting predefined objects or events utilizing the sensor data to create remix video.

  • Pub Date: 2012/06/12
  • Number: 09436875
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Location services in email and calendaring web services

An application programming interface (API) method for providing location related search capability to clients of an email and calendaring service is disclosed. In response to a request message from a client, a find place method defined in an API provided by an API service is invoked. The find place method parses the request message for parameters such as a query string or source-related identifier indicating a place name or address of a location to be searched, the culture/format for the search and results, a maximum number of results to be provided, the source of the location to search, and geo-coordinates of the place and/or the user. The parameters are used to query specified source(s). The results of the search are filtered and formatted to provide location information to the client.

  • Pub Date: 2012/06/12
  • Number: 09355385
  • Owner: Microsoft Technology Licensing
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and using temporal data partition revisions

Concepts and technologies are disclosed herein for generating and using temporal data partition revisions. In some embodiments, a server computer can execute a data management application. The server computer can obtain a data partition associated with a data stream. The data partition can include a data point and a timestamp. The server computer can analyze the timestamp to determine if the data partition corresponds to an update of a base data record. If the server computer determines that the data corresponds to an update, the server computer can compute a revision comprising a delta and a timestamp and store the revision.

  • Pub Date: 2012/06/12
  • Number: 09600526
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Database scale-out

A method for scaling out database information may include creating second database instantiation. The method may include configuring one or more partitions of a first database for transfer to the second database and configuring the second database for receiving the one or more first database partitions. The method may also include transferring the one or more first database partitions to the second database.

  • Pub Date: 2012/06/12
  • Number: 09189503
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling a network interface using virtual switch proxying

Methods and systems for permitting a controller within a virtualization environment to control access to devices virtualized within hardware are described herein. For example, a NIC may be able to request rules that define how network traffic is managed at the NIC's virtual switch. In some arrangements, the NIC may transmit a query for the matching rule to a proxy, which may determine whether it has a rule matching the request. If the proxy does not have a matching rule, the proxy may query a controller for the matching rule, which may transmit the rule to the proxy. The proxy may update its store of rules and transmit the matching rule to the NIC. Upon receipt of the matching rule, the NIC may update the rules stored in its virtual switch and may process the packet in accordance with the matching rule.

  • Pub Date: 2012/06/12
  • Number: 09083651
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Automated firmware settings verification

Systems and methods are described for managing computing resources. In one embodiment, data representative of an abstracted firmware framework is maintained. The data may comprise computing firmware settings and determined based on standardized associations between vendor-specific firmware settings and abstracted firmware settings that are independent of the vendor-specific firmware settings. In response to receiving a request for a computing firmware setting, the requested computing firmware setting is translated to one or more vendor-specific firmware settings based on the data. A computing resource capable of implementing the one or more vendor-specific firmware settings is identified.

  • Pub Date: 2012/06/12
  • Number: 09471784
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Automated firmware settings management

Systems and methods are described for managing computing resources. In one embodiment, groupings of computer resources having common firmware settings are maintained based on an abstraction firmware framework representing associations between vendor-specific firmware settings and abstracted firmware settings that provide a degree of independence from specific vendor-specific firmware settings. In response to a request for a computer resource with a specified abstracted firmware configuration, it is determined which of the groupings can support the specified abstracted firmware configuration based on at least one criterion for managing the computer resources in accordance with the abstraction firmware framework.

  • Pub Date: 2012/06/12
  • Number: 09471536
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Automated firmware settings framework

Systems and methods are described for managing computing resources. In one embodiment, mappings between a plurality of parameters of an abstracted firmware framework to corresponding firmware settings of computing components are maintained. The mappings are determined based on predetermined associations between vendor-specific firmware settings and abstracted firmware settings that implement a standardized interface that is independent of the vendor-specific firmware settings. In response to receiving one of the plurality of parameters, the received parameter is translated to corresponding vendor-specific firmware settings based on the mappings.

  • Pub Date: 2012/06/12
  • Number: 09372731
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for tracking subject with still or video camera

An apparatus, method, and system for controlling camera aiming and operation through a convenient and intuitive interface using correlative touch and feel, which allows a camera operator to primarily pay attention to a game or event, while simultaneously controlling a still or video camera in three control dimensions, with a high degree of accuracy or quality.

  • Pub Date: 2012/06/12
  • Number: 09363441
  • Owner: Musco Corporation
  • Location: Oskaloosa, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive queue-management

In one embodiment, a method includes storing in a QoS-enabled communication system a data structure that has a multi-level hierarchy including a physical level, a logical level, and a class level; receiving a first request for M number of services provided by the QoS-enabled communication system; in response to the first request, modifying an allocation of the logical-level nodes by mapping M class-level nodes to a first one of the logical-level nodes according to a first mapping mode of the data structure; receiving a second request for P services provided by the QoS-enabled communication system, with P being greater than M; and, in response to the second request, modifying an allocation of the logical-level nodes by mapping P class-level nodes to a second one of the logical-level nodes according to a second mapping mode of the data structure.

  • Pub Date: 2012/06/12
  • Number: 08923120
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Telehealth wireless communication hub device and service platform system

A display circuit includes a first pulse width modulated (PWM) signal line coupled to a first switch, a second PWM signal line coupled to a second switch and the signal line, a transistor coupled to the second signal line between the first signal line and the second switch, a third switch coupled to a third PWM signal line, a fourth switch coupled to a fourth PWM signal line, a fifth switch coupled to a fifth PWM signal line, a light emitting diode (LED) including a red element coupled between the first and third switches, a green element coupled between the first and fourth switches, and a blue element coupled between the first and fifth switches, and an LED including a red element coupled between the second and third switches, a green element coupled between the second and fourth switches, and a blue element coupled between the second and fifth switches.

  • Pub Date: 2012/05/12
  • Number: 09035568
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for character string auto-suggestion based on degree of difficulty

In one embodiment, a method includes receiving one or more characters of a character string as a user enters the character string into a graphical user interface (GUI) of a computing device. The method also includes determining a degree of difficulty of the user entering the character string into the GUI of the computing device. The method further includes, if the degree of difficulty is at least approximately equal to or exceeds a pre-determined threshold, providing for display to the user an auto-suggestion for completing the character string for the user.

  • Pub Date: 2012/05/12
  • Number: 09026429
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing simplified programming constructs for user activities in a telecommunications application

In accordance with embodiments of the invention, the converged application framework of a converged application server is extended by providing a set of easily usable artifacts which enable easy creation of programs effecting user activities without detailed knowledge of the underlying SIP level protocol and events. In particular embodiments the present invention provides new communication beans implementing particular user activities including, for example, subscribing to the status of a user mailbox.

  • Pub Date: 2012/05/12
  • Number: 09426238
  • Owner: ORACLE INTERNATIONAL CORPORATION
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for processing streaming media of an event captured by nearby mobile phones

Systems, processes and computer-readable media that incorporate the subject disclosure may include, for example, the establishment of wireless communications with a wireless communications device positioned for monitoring an event. A media stream including event media is received from the wireless communications device. The event media is generated by the wireless communications device obtained from the observation position. The media stream is forwarded to a media production processor. Upon selection, the media production processor uses the media stream to prepare media program coverage of the event. Other embodiments are disclosed.

  • Pub Date: 2012/05/12
  • Number: 09497424
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing analysis on information, such as social media

A system for analyzing text-based information is presented. Each datum of information includes an author, a description and a timestamp. A fetcher fetches the raw information according to keywords. A parser parses the raw information to refine the results. A lexicon management module extracts lemmas from the raw information, and creates an edited lexicon containing the raw data and the lemmas for each datum. A data manager correlates lemmas in the edited lexicon and identifies clusters of lemmas that are correlated between each other. The results can be visually displayed to a user, and clusters of lemma that are less correlated than the other clusters can be visually identified. In one aspect, the user is able to excise the less correlated clusters, in order to further refine the results of the keyword search.

  • Pub Date: 2012/05/12
  • Number: 09275015
  • Owner: Nexalogy Environics, Inc.
  • Location: Montreal, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for a service metering framework in a network environment

A method is provided in one example embodiment and includes causing generation of a metered record associated with a metering event of an application executed within a cloud-based computing system, the metered record including a metering attribute and a corresponding value, the corresponding value being determined substantially simultaneous to a runtime execution of the application, and facilitating searching for the metered record based on the metering attribute and the corresponding value of the metering attribute. In specific embodiments, the metered record is communicated using a REpresentational State Transfer (REST) Application Programming Interface (API). In an example embodiment, the notification of the metering event can be received by any one of a REST API, a Java Messaging Service listener, an Extensible Messaging and Presence Protocol (XMPP) listener, or a metering plugin.

  • Pub Date: 2012/05/12
  • Number: 08983987
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Selection of allocation policy and format for virtual machine disk images

A system and method are disclosed for selecting an allocation policy and format for storing a disk image of a virtual machine (VM). In accordance with one embodiment, a computer system that hosts a virtual machine (VM) selects an allocation policy and format for storing the disk image on a particular storage device (e.g., a magnetic hard disk, a Universal Serial Bus [USB] solid state drive, a Redundant Array of Independent Disks [RAID] system, a network attached storage [NAS] array, etc.), where the selection is based on one or more capabilities of the storage device, and on a parameter that indicates a tradeoff between performance and storage consumption.

  • Pub Date: 2012/05/12
  • Number: 09092161
  • Owner: Red Hat Israel, Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Radio interface layer design for smartphones

A method and system communicates a request between a user application and a modem within a wireless communication device. A radio interface layer (RIL) architecture includes an application framework which receives a hardware specific request as a first application programming interface (API) call from the user application. In response to receiving the request, the application framework sends a corresponding, second API call to a vendor radio interface layer (Vendor RIL) which provides an interface configured for communicating with a specific type of transceiver or modem. In one embodiment, the second API call is transmitted via a Java Native interface (JNI). The JNI provides access to software programs associated with the transceiver, which programs are written in a language that is different from Java. The Vendor RIL communicates with the modem using a modem protocol software corresponding to the specific type of modem to perform commands associated with the request.

  • Pub Date: 2012/05/12
  • Number: 08995966
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Optical imaging systems having input beam shape control and path length control

Scanning optical beam imaging systems for imaging a surface with convex curvature are provided. The systems include a sphero-telecentric objective, wherein a scanning radius of curvature of the sphero-telecentric objective is greater than an apical radius of curvature of the surface and less than or equal to four times an apical radius of curvature of the surface.

  • Pub Date: 2012/05/12
  • Number: 08864309
  • Owner: Bioptigen, Inc.
  • Location: Morrisville, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for creating an advertising database

Systems and methods for applications of orthogonal corpus indexing (OCI), such as selecting ad words for purchase and improving visibility of web pages in search engines, are described. In one aspect, the systems and methods described herein employ OCI for creating an advertising database. The described systems and methods process an information database using orthogonal corpus indexing and a seed topic to derive keywords. The described systems and methods query a search engine with a first keyword of the keywords, and process the provided results page to determine content relating to a classification such as an advertiser, an advertisement, an ad word, and an advertising link page. The described systems and methods insert the determined content with respective classification in the advertising database.

  • Pub Date: 2012/05/12
  • Number: 08812559
  • Owner: SEMMX, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to protect and audit communication line status

Methods and apparatus to protect and audit communication line status are disclosed. An example method includes receiving a set of available communication lines from a media gateway, associating a plurality of destination numbers with respective ones of the available communication lines, and dialing the plurality of destination numbers from the media gateway to identify the communication line status information.

  • Pub Date: 2012/05/12
  • Number: 08705520
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus and system for web service management

A method and an apparatus for realizing web service. An apparatus having a binary web service interface to communicate with nodes operationally connected to the apparatus using a binary web service, the nodes having one or more resources, the binary web service interface being configured to receive information from a node whenever a resource of a node changes or whenever a pre-configured event regarding a resource occurs. The apparatus also has an interface for communicating with web applications making use of the resources and ap component for receiving subscriptions regarding the information received from the nodes and providing the subscribed information.

  • Pub Date: 2012/05/12
  • Number: 09614877
  • Owner: ARM FINLAND OY
  • Location: Oulu, FI
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing a shopping cart with feedback information generated by user social network connections

A system, computer-readable storage medium storing at least one program, and computer-implemented method for automatically providing item feedback information during the checkout process is provided. Feedback information related to one or more items added to an electronic shopping cart of a user is obtained. A message including the feedback information is provided automatically to the user during the checkout process.

  • Pub Date: 2012/05/12
  • Number: 09652796
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing context aware logging

A method, apparatus and computer program product are therefore provided to enable context aware logging. In this regard, the method, apparatus, and computer program product may record events that occur in one or more applications, where the events are due to user input. These events may be associated with time values and data describing application contexts, such that the events may be used to generate an input log that also records application semantics and statuses. A variety of operations may be performed using this input log, including recreation of an application state by playing back the log, the ability to suspend or resume a user session, the ability to perform undo or pause operations, the ability to analyze user inputs to train or audit users, testing of users, troubleshooting of errors, and enabling multi-user collaboration.

  • Pub Date: 2012/05/12
  • Number: 08869174
  • Owner: McKesson Financial Holdings
  • Location: Hamilton, BM
  • Details: Visit USPTO

Visit USPTO Page


Medical organogel processes and compositions

Serial-solvent biomaterials are described. Embodiments include materials made in an organic solvent that are stripped of the solvent and used in a patient, where they imbibe water and form a hydrogel. These materials are useful for, among other things, delivering therapeutic agents, tissue augmentation, and radiological marking.

  • Pub Date: 2012/05/12
  • Number: 09205150
  • Owner: Incept, LLC
  • Location: Lexington, US
  • Details: Visit USPTO

Visit USPTO Page


Mechanism for comparison of disparate data in data structures

A device receives a first result that includes first data, and a second result that includes second data, and determines whether a comparator supports the first data and the second data. When the comparator supports the first data and the second data, the device utilizes the comparator to select comparison logic for the first data of the first result and for the second data of the second result, compares the first result and the second result, using the selected comparison logic, to determine whether the first result is equivalent to the second result, and outputs or stores the determination of whether the first result is equivalent to the second result.

  • Pub Date: 2012/05/12
  • Number: 09223595
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Integrating diagnostic information with boolean constraints

A device receives code generated via a technical computing environment (TCE), where the code includes one or more values to be tested. The device receives Boolean constraints and diagnostic information, and generates a test based on the Boolean constraints and the diagnostic information. The device performs the test on the one or more values of the code to generate a result, and outputs or stores the result.

  • Pub Date: 2012/05/12
  • Number: 09064053
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for system communication for handling data

Techniques for making internal data from a source application available through an application programming interface (“API”). Embodiments may analyze a source application to determine a storage location and a first storage format of internal data, wherein the source application does not provide an API through which the internal data is accessible. Embodiments may then extract the internal data from the storage location, and convert the extracted data from the first storage format to a common storage format. Embodiments may then provide an API to make the converted data available.

  • Pub Date: 2012/05/12
  • Number: 09189299
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating service degradation risk for a service provided by data processing resources

In one aspect, a service requirements specification specifies data processing resources required to provide a service, and a configuration specification specifies a configuration of data processing resources for providing the service. The service requirements specification and configuration specification are analyzed using resource reliability data for the specified resources to determine a composite risk of degradation of the service. In another aspect, reliability of one or more software modules is projected according to a current state in a development life cycle of the software modules and any of various additional indicators. Preferably, a data processing support provider separate from the service-providing enterprise maintains historical field support data concerning significant field defect events with respect to various resources, and uses this data for projecting reliability of the resources.

  • Pub Date: 2012/05/12
  • Number: 09152485
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Deferred evaluation and presentation of a custom diagnostic analysis

A device receives code generated via a technical computing environment (TCE), performs a test on the code to generate a test result, and generates test information based on the performance of the test on the code. The device outputs or stores the test result, and receives, based on the test result, a request for a diagnostic analysis of the code. The device performs, based on the request, the test information, and at least one diagnostic, a diagnostic analysis of the code to generate a diagnostic result, and outputs or stores the diagnostic result.

  • Pub Date: 2012/05/12
  • Number: 09117029
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Contained command invocation framework

An object-oriented middleware framework for use in a network having a plurality of hosts including a first host having an associated first memory and first processor; and a second host having an associated second memory and second processor. The object-oriented middleware framework includes an Originator Command Container instantiating a Command by executing computer programming code stored in the first memory using the first processor. The framework also includes an Invocator Command Container, remote from the Originator Command Container and its associated first host where the instantiated Command is invoked, locally by executing computer programming code stored in the second memory using the second processor.

  • Pub Date: 2012/05/12
  • Number: 08533748
  • Owner: Composite Ideas, LLC
  • Location: Centerville, US
  • Details: Visit USPTO

Visit USPTO Page


Communications device and related method that detects radio frequency (RF) interferer on a communications channel

A communications device includes a demodulator configured to demodulate a received communications signal into complex time domain samples. A processor is coupled to the demodulator and configured to determine the variance over time domain magnitude samples, perform a complex Fast Fourier Transform (cFFT) on the complex time domain samples as magnitude and phase to obtain frequency domain samples and determine the variance over the frequency domain samples. A comparator compares a variance ratio of the time domain magnitude samples and the frequency domain samples with a threshold to determine if a RF interferer is present, indicative that the communications channel is busy.

  • Pub Date: 2012/05/12
  • Number: 08948324
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Buy now option from map view

Product search results may be presented to a user via a map view, with merchants selling a selected product displayed on a map. A buy now button may be displayed for a merchant within the map view, allowing the user to execute a purchase transaction directly from the map view.

  • Pub Date: 2012/05/12
  • Number: 09519926
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Application migration between clouds

Embodiments described herein are directed to reinitiating an application on a target computing cloud and to evaluating potential target cloud computing systems. In one scenario, a computing system receives an indication that identifies a target cloud for application migration. The target cloud computing system includes a specified set of hardware and/or environment specifications, associated configuration settings and an assigned rating that indicates how well the application will perform on the target cloud computing system. The computing system determines that the application is to be reconfigured for compatibility with the target cloud computing system and reconfigures some or all of the application to comply with the hardware and/or environment specifications and configuration settings of the target cloud computing system. The computing system also identifies and transfers specified portions of the application to the target cloud, and indicates that the application is to be re-instantiated using the transferred application portions.

  • Pub Date: 2012/05/12
  • Number: 09444896
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for improved mobility in a wireless heterogeneous network

Generally, this disclosure provides apparatus and methods for improved User Equipment (UE) mobility in wireless heterogeneous networks. The UE device may include a location determination module configured to determine location information associated with the UE relative to one or more of a cells, wherein the of cells form part of a wireless heterogeneous network; a processing circuit configured to generate an assistance message, the assistance message including the location information associated with the UE; and a transmitter circuit configured to transmit a Radio Resource Control (RRC) message to an evolved Node B (eNB) associated with one of the cells, the RRC message including the assistance message.

  • Pub Date: 2012/05/12
  • Number: 09055474
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Using separate processes to handle short-lived and long-lived jobs to reduce failure of processes

A method, system and computer program product for reducing the failure of processes. After a job is received, a determination is made as whether the received job is a “short-lived job” or a “long-lived job.” A short-lived job refers to a job who accomplishes a given task in less than a threshold period of time. A long-lived job refers to a job who accomplishes a given task in greater than a threshold period of time. For an identified long-lived job, the long-lived job is executed on a single process apart from other processes; whereas, the short-lived job is executed on at least one process separate from the processes executing long-lived jobs. As a result of executing the long-lived jobs on separate processes from the short-lived jobs, the likelihood of having a process fail is lessened since the duration of time that the process is running will be lessened.

  • Pub Date: 2012/04/12
  • Number: 09043644
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Transforming modeling environment code/model into a non-modeling environment format

A device receives code in a modeling environment format, receives a model in the modeling environment format, and receives relationships information associated with one or more relationships between the code and the model. The device combines the code, the model, and the relationships information to generate an output file in a non-modeling environment format, and outputs or stores the output file.

  • Pub Date: 2012/04/12
  • Number: 09098291
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Tag-based deployment to overlapping host sets

Methods and systems for deploying software packages are provided. In an example, a deployment service allows users to deploy software packages to target sets of computing devices where the target sets may overlap. The deployment service prevents software packages from being deployed to target sets that would conflict with a software package deployed to at least some of the target set as a result of the target set overlapping with another set.

  • Pub Date: 2012/04/12
  • Number: 09110756
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for sketching and imaging

A method, a system, and a computer program product for generating a three-dimensional representation of a scene within a three-dimensional space are disclosed. A plurality of two-dimensional planes to be positioned within the three-dimensional space are generated. The plurality of two dimensional planes include two-dimensional content that is capable of being modified. The generated two-dimensional planes are positioned within the three-dimensional space. The positioning of the planes is capable of being modified.

  • Pub Date: 2012/04/12
  • Number: 09153062
  • Owner: Yale University
  • Location: New Haven, US
  • Details: Visit USPTO

Visit USPTO Page


System, devices, and methods for optically clearing tissue

Embodiments of the present disclosure provides systems, devices, and methods for non-invasively modifying, maintaining, or controlling local tissue optical properties. Methods and devices of the disclosure may be used for optically clearing tissue, for example, for diagnostic and/or therapeutic purposes. A method of optically clearing a tissue may comprise contacting the tissue with an optical clearing device having a base, an array of pins fixed to one side of the base, a brim fixed to the base, an inlet port in the base, an exit port in the base, and a handpiece interface tab fixed to the side of the base opposite the array of pins, applying a mechanical force to the tissue, and illuminating said tissue with at least one wavelength of light through the optical clearing device. A method may further comprise controlling the temperature of the tissue illuminated.

  • Pub Date: 2012/04/12
  • Number: 09168388
  • Owner: The Board of Regents, the University of Texas System
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for distributing meeting recordings in a network environment

A method is provided and includes discovering active participants and passive participants from a meeting recording, generating an active notification that includes an option to manipulate the meeting recording, and a passive notification without the option to manipulate the meeting recording, and sending the active notification and the passive notification to the active participants and the passive participants, respectively. The method can also include discovering followers from the meeting recording, generating a followers notification without the option to manipulate the meeting recording, and which includes access to a portion of meeting recording, and sending the followers notification to the followers. Discovering the active participants and the passive participants includes running speaker segmentation and recognition algorithms on the meeting recording, discovering attendees including speakers and non-speakers, and categorizing the speakers as the active participants, and the non-speakers as the passive participants.

  • Pub Date: 2012/04/12
  • Number: 08902274
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for call blocking and SMS blocking

Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded.

  • Pub Date: 2012/04/12
  • Number: 08913994
  • Owner: Lookout, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Smart electric vehicle (EV) charging and grid integration apparatus and methods

An expert system manages a power grid wherein charging stations are connected to the power grid, with electric vehicles connected to the charging stations, whereby the expert system selectively backfills power from connected electric vehicles to the power grid through a grid tie inverter (if present) within the charging stations. In more traditional usage, the expert system allows for electric vehicle charging, coupled with user preferences as to charge time, charge cost, and charging station capabilities, without exceeding the power grid capacity at any point. A robust yet accurate state of charge (SOC) calculation method is also presented, whereby initially an open circuit voltage (OCV) based on sampled battery voltages and currents is calculated, and then the SOC is obtained based on a mapping between a previously measured reference OCV (ROCV) and SOC. The OCV-SOC calculation method accommodates likely any battery type with any current profile.

  • Pub Date: 2012/04/12
  • Number: 09026347
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable and secure high-level storage access for cloud computing platforms

An untrusted component exposing a high level storage object interface within an untrusted client virtual machine accepts application level storage object operations. Responsive to a storage object operation, the untrusted component passes a message through the underlying hypervisor to an associated trusted component. The trusted component processes the message by authenticating the client virtual machine and locating an internal mapping between the client virtual machine and an associated customer-specific set of backend storage resources to which the requested storage object operation is to be applied. The trusted component uses a trust relationship with the backend storage system to securely communicate the storage object operation to the backend storage system, and passes the operation results through the hypervisor back to the untrusted component in the source client virtual machine from which the storage object request originated.

  • Pub Date: 2012/04/12
  • Number: 08997096
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Quality of service application controller and user equipment application profiler

Various topologies of a quality of service application controller and related techniques to optimize the communications performance an application executing on a device participating in a communications environment are disclosed. The communications environment may include a cellular network, an unlicensed spectrum network, or a combination of the two. The quality of service application controller observes one or more key performance indicators of the communications network, and retrieves a policy from a policy store specific to the application. The quality of service application controller then modifies the execution of the application and/or the configurable aspects of the communications environment to optimize the communications performance of the application. For example, the application's data throughput may be increased, the power draw of the application may be minimized, data requested by the application may be minimized, or the apparent response time of the application's response to a web service may be minimized.

  • Pub Date: 2012/04/12
  • Number: 09100854
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Product synthesis from multiple sources

Methods and systems for automatically synthesizing product information from multiple data sources into an on-line catalog are disclosed, and in particular, for automatically synthesizing the product information based on attribute-value pairs. Information for a product may be obtained, via entity extraction, feed ingestion, and other mechanisms, from a plurality of structured and unstructured data sources having different taxonomies and schemas. Product information may additionally or alternatively be obtained or derived based on popularity data. The product information may be cleansed, segmented and normalized. The product information may be clustered so closest products, attribute names and attribute values are associated. A representative value for an attribute name may be determined, and the on-line catalog may be updated so that entries are comprehensive, meaningful and useful to a catalog user. Updates from at least 500 million different data sources may be scheduled to occur as frequently as several times daily.

  • Pub Date: 2012/04/12
  • Number: 09384233
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Privacy control for wireless devices

According to various embodiments, a computer-implemented method is disclosed that includes receiving, at a wireless adaptor of a device, a wireless data packet from an access point (AP), wherein the wireless data packet includes a Basic Service Set Identifier (BSSID) of the AP; changing the BSSID of the received data packet by a processor or hardware to produce a modified wireless data packet; and transmitting the modified wireless data packet to an application on the device.

  • Pub Date: 2012/04/12
  • Number: 09143931
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Platform and game agnostic social graph

Social graphs may be determined for individual users belonging to affiliations in virtual spaces accessible via electronic social networks. Affiliations within one or more virtual spaces may be managed. A given affiliation within a given virtual space may comprise a discrete group of users with a relationship having a functional significance within the given virtual space. Relationships within one or more electronic social network may be managed. A given relationship within a given electronic social network may represent a reciprocal relation between two or more users in the given electronic social network. Social graphs associated with individual users may be determined based on the affiliations within the one or more virtual spaces and the relationships within the one or more electronic social networks.

  • Pub Date: 2012/04/12
  • Number: 09578094
  • Owner: Kabam, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of using halogenated peptides as internal standards for liquid chromatography-mass spectrometry

Methods of using halogenated peptides as internal standards for liquid chromatography-mass spectrometry, and novel halogenated peptides useful for the same, are disclosed. In particular, methods of using halogenated peptides as internal standards in proteomic analyzes, as well as methods of using halogenated peptides to conduct quality control assessments of and/or to calibrate liquid chromatography-mass spectrometry systems are disclosed.

  • Pub Date: 2012/04/12
  • Number: 08884214
  • Owner: Institute for Systems Biology
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for enabling features provided by a first presentation layer protocol in a session implemented according to a second presentation layer protocol

A method for enabling a feature provided by a first presentation layer protocol, within a session established according to a second presentation layer protocol includes intercepting, by a hooking component executing on a first machine, a request, by an operating system executing on the first machine, for an indication whether the first machine established a session with a second machine according to a first presentation layer protocol. The method includes determining that the first machine established a session according to a second presentation layer protocol. The method includes identifying a type of a function within the operating system that generated the request for the indication. The method includes indicating that the first machine established the session according to the first presentation layer protocol, responsive to the identification of the type. The method includes enabling functionality provided for use in sessions established according to the first presentation layer protocol.

  • Pub Date: 2012/04/12
  • Number: 09537958
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method for creating 3-D models by stitching multiple partial 3-D models

A method of creating a 3-D model by capturing partial 3-D models each comprising a sequence of 2-D images, analyzing each of the partial 3-D models to identify image features in the sequence of 2-D images of each of the partial 3-D models, identifying pairs of overlapping image features between the 2-D mages of each of the partial 3-D models by identifying image features in each 2-D image in the sequence of 2-D images of each of the partial 3-D models that overlaps image features in 2-D images of the sequence of 2-D images of the other partial 3-D models and selecting a 2-d image from each of the partial 3-D models, computing an initial transformation between 3-D coordinates of individual pairs of identified image features between the selected 2-D image from each of the partial 3-D models; and generating a final 3-D model based on the initial transformation.

  • Pub Date: 2012/04/12
  • Number: 09129435
  • Owner: FUJI XEROX CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and systems for sub-allocating computational resources

The disclosed embodiments relate to systems and methods for method and systems for sub-allocating computational resources. A first computing device receives information associated with a first set of computational resources from a cloud infrastructure. The first set of computational resources has been allocated to the first computing device by the cloud infrastructure. A first set of parameters associated with a workflow received by the first computing device is determined. The first set of parameters is indicative of a need of the first set of computational resources by the first computing device. One or more computational resources from the first set of computational resources are sub-allocated based on the determined first set of parameters.

  • Pub Date: 2012/04/12
  • Number: 09507642
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Metal nanoparticle compositions for reflective features

A composition for the fabrication of reflective features using a direct-write tool is disclosed. The composition comprises metal nanoparticles having an average particle size less than 300 nm and which carry thereon a polymer for substantially preventing agglomeration of the nanoparticles, wherein the nanoparticles exhibit a metal-polymer weight ratio of 100:1 to 10:1. The composition further includes a vehicle for forming a dispersion with the metal nanoparticles. A number of electronic devices comprising a reflective layer formed from the composition are also disclosed. One example case provides an electronic device having a reflective electrode. The reflective electrode comprises a percolation network of the metal nanoparticles embedded in a matrix of the polymer and having an average particle size of less than 300 nm, wherein the reflective electrode is reflective in the visible light range and does not diffract incident light.

  • Pub Date: 2012/04/12
  • Number: 08668848
  • Owner: Cabot Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Image capture and identification system and process

A digital image of the object is captured and the object is recognized from plurality of objects in a database. An information address corresponding to the object is then used to access information and initiate communication pertinent to the object.

  • Pub Date: 2012/04/12
  • Number: 08718410
  • Owner: Nant Holdings IP, LLC
  • Location: Culver City, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying function calls and object method calls

A device receives program code, generated via a technical computing environment (TCE) and including code that requires further processing to execute, and identifies one or more function calls or one or more object method calls in the program code. The device creates a control flow graph, for the program code, based on the one or more function calls or the one or more object method calls. The device transforms the control flow graph into a data flow graph. The data flow graph includes a representation for each of the one or more function calls or the one or more object method calls. The device generates hardware code based on the data flow graph, the hardware code including code that does not require further processing to execute.

  • Pub Date: 2012/04/12
  • Number: 09032380
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and using temporal metadata partitions

Concepts and technologies are disclosed herein for generating and using temporal metadata partitions. Metadata can be stored in temporal metadata partitions based upon a time range included in the metadata. Furthermore, metadata can be stored in multiple temporal metadata partitions to which the metadata is relevant. As such, metadata can be stored in manner that allows event data to be understood in the context of temporally accurate and/or relevant metadata. Functionality for executing queries of event data and providing results in view of metadata, as well as the merging of multiple temporal metadata partitions also are disclosed.

  • Pub Date: 2012/04/12
  • Number: 08943107
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic entities for a model of a graphical modeling environment

A device receives a dynamic system model for a graphical modeling environment, and associates an entity with the dynamic system model, the entity including an entity model. The device defines at least one of a parameter, a configuration, or a solver setting for the entity model, and performs a simulation of the dynamic system model. The device generates a system event during the simulation of the dynamic system model, and modifies at least one of the parameter, the configuration, or the solver setting for the entity model based on the system event.

  • Pub Date: 2012/04/12
  • Number: 09152393
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Digital makeup

A system for processing an image of a human face, the system including a data processing and analyzing utility including a high-pass filtering module outputting a high-pass signal indicative of edges or contours of the face in the input image data; at least one band-pass filtering module outputting a bandpass signal indicative of low-contrast slowly-varying qualitative features of the face; a low-pass filtering module outputting a low-pass signal in which low-contrast regions are smoothed and high-contrast regions are preserved; a feature computation module calculating a localized feature of the image for a plurality of pixels of the image; a strength computation module determining a localized operand using the localized feature to determine a strength of filters to be used in the high-pass, band-pass, and low-pass filtering modules at the pixels, and transmitting the localized operand to the filtering modules; at least one transformation module altering a portion of the high-pass, the bandpass, or the low-pass signals; and an addition module adding the various signals together, thus yielding an output signal indicative of a characteristic of an altered image.

  • Pub Date: 2012/04/12
  • Number: 09495582
  • Owner: DIGITAL MAKEUP LTD.
  • Location: Tel Aviv, IL
  • Details: Visit USPTO

Visit USPTO Page


Credit card point of service payment authorization system

The risk of fraud in point of sale credit card transactions is reduced by providing independently-routed verification by communication between the authorized user of the credit card and the issuer of the credit card through a trusted intermediary.

  • Pub Date: 2012/04/12
  • Number: 09043224
  • Owner: Securus, LLC
  • Location: Annapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Auto-commit memory synchronization

Apparatuses, systems, methods and computer program products are disclosed for auto-commit memory management. A method includes receiving a memory request from a client, such as a barrier request or a checkpoint request. The memory request is associated with a volatile memory buffer of a non-volatile recording device. The memory buffer may be configured to preserve data in the non-volatile recording device in response to a trigger. A method includes issuing a serializing instruction that flushes data from a processor complex to the memory buffer. A method includes determining completion of the serializing instruction flushing the data to the memory buffer.

  • Pub Date: 2012/04/12
  • Number: 09047178
  • Owner: SanDisk Technologies, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for controlling a remote medical device guidance system in three-dimensions using gestures

A system for enabling a user to remotely control a robotic medical device system includes a motion capture apparatus to capture motion of a user in a sensing volume and generate indicative output data. The system includes a control unit configured to execute gesture recognition logic that recognizes a user gesture based on analysis of the indicative output data. The control unit executes interpreter logic that is configured to translate the recognized user gesture into a corresponding robotic medical device control command configured to control an aspect of the operation of the robotic medical device system.

  • Pub Date: 2012/03/12
  • Number: 09439736
  • Owner: St. Jude Medical, Atrial Fibrillation Division, Inc.
  • Location: St. Paul, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for analyzing user experience of a software application across disparate devices

A system for providing a consistent user experience of an application across disparate mobile devices comprises a computing device including a display analysis application, and one or more mobile devices including a display analysis application is provided. In one example, a mobile device comprises a memory storing a version of an operating system, a display analysis patch, and a patched application. A consistency module of the mobile device is configured to access the application with the display analysis patch, obtain one or more display parameters of the mobile device via the application with the display analysis patch, and transmit the obtained one or more display parameters to a computing device.

  • Pub Date: 2012/03/12
  • Number: 09578133
  • Owner: APKUDO, LLC
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Soft error resilient circuit design method and logic cells

A method is disclosed for creating a logic integrated circuit cell from an original logic integrated circuit gate. The method includes combining the original logic integrated circuit cell with a second circuit which takes as input a complement of inputs of the original logic integrated circuit cell and provides as output complements of the output of the original logic integrated circuit cell. The method further includes connecting the combined logic integrated circuit cells, where the outputs of the combined integrated circuit cells provide the inputs for other combined circuit cells such that, when the output of the original logic integrated circuit from a first combined logic integrated circuit cell is connected as input to a second combined logic integrated circuit cell, then the output of the second circuit in the first combined logic integrated circuit cell is always also connected to the second combined logic integrated circuit cell serving as the inverse of the input signals that come from the original logic integrated circuit cell.

  • Pub Date: 2012/03/12
  • Number: 09083341
  • Details: Visit USPTO

Visit USPTO Page


Sharing television and video programming through social networking

In particular embodiments, one or more computer systems of a social-networking system provide social content for display in a mobile application running on a mobile device of a user of the social-networking system. The mobile application is configured to display the social content and an interface for selecting media content to view on a display device. The social content is from a social graph of the social-networking system. The social graph includes nodes and edges connecting the nodes. The nodes include user nodes that are each associated with a particular user of the social-networking system. The one or more computer systems of the social-networking system receive an indication from the mobile application that an option to view particular media content has been selected and provide one or more instructions to display the selected particular media content on the display device.

  • Pub Date: 2012/03/12
  • Number: 09549227
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Representational state transfer communications via remote function calls

A business application backend system, such as an Advanced Business Application Programming backend can receive and respond to representational state transfer (RESTful) service requests via both HTTP and Remote Function Call (RFC) protocols. In particular, the backend system extracts the RESTful service requests and fulfills the extracted requests using a protocol-independent resource controller. Related apparatus, systems, techniques and articles are also described.

  • Pub Date: 2012/03/12
  • Number: 09491266
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Remote dynamic configuration of telemetry reporting through regular expressions

A system for dynamic configuration of telemetry data may comprise a client to place a library call to a configuration server, the library call including identifying information associated with the client. The system may further comprise a processor to receive, from the configuration server, one or more regular expressions for configuration of the telemetry data collected at the client, based on the identifying information, collect, at the client, the telemetry data based on predetermined criteria, match the one or more regular expressions to the telemetry data, based on the match, selectively provide the telemetry data based on the one or more regular expressions to produce filtered telemetry data, and periodically report the filtered telemetry to the server, the filtered telemetry data including or excluding the telemetry data matching the one or more regular expressions.

  • Pub Date: 2012/03/12
  • Number: 09105178
  • Owner: Sony Computer Entertainment Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Recommendation and purchase options for recommemded products based on associations between a user and consumed digital content

Features are disclosed for providing notifications or recommendations to users based on user profile information and digital content the user is watching. In some implementations, a user can be watching a television program on a network enabled television. The systems and methods may determine characteristics of the television program and obtain user profile information. The systems and methods then may analyze the determined characteristics and user profile information to determine an association between the user and an item of interest in the television program. The systems and methods then may generate and provide a notification relating to the association to the user. Optionally, the systems and methods may also provide one or more recommendations to the user based at least in part on the determined association.

  • Pub Date: 2012/03/12
  • Number: 09420319
  • Owner: AUDIBLE, INC.
  • Location: Newark, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive remote disease monitoring and management system

A system that requests clinical data from a patient and then provides the clinical data wirelessly to be reviewed or analyzed with a certified medical algorithm and/or decision tree. The certified algorithm and/or decision tree can provide a summary of the data, indication of severity, “smart” decision or intervention protocol to a nurse, doctor, and the like. In addition, the system with the certified algorithm and/or decision tree can provide the summary of the data, indication of severity, “smart” decision or intervention protocol to the nurse, doctor, and the like within a short time frame, e.g. within 5 minutes from the data being provided by the patient. The certified decision and/or protocol can be agreed to or changed by an individual, e.g. a doctor, which can then be forwarded or sent back to the patient. If the patient doesn't respond to the certified decision within a short time frame, e.g. within 3 minutes from the data being provided to the patient, then a series of triggers can take place, e.g., a text message to a caregiver and the like.

  • Pub Date: 2012/03/12
  • Number: 09076315
  • Owner: DocView Solutions LLC
  • Location: Cherry Hill, US
  • Details: Visit USPTO

Visit USPTO Page


Ingress traffic classification and prioritization with dynamic load balancing

According to one embodiment, a method comprises an operation of determining whether an ingress control message is locally terminated control traffic on a digital device prior to the ingress control message being forwarded to a hardware processor of the digital device for processing. A priority is assigned to the ingress control message based on information within the ingress control message, if the ingress control message is determined to be locally terminated control logic.

  • Pub Date: 2012/03/12
  • Number: 09160671
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed, transactional key-value store

In one embodiment, a system for implementing a distributed, transactional key-value store is provided. The system includes a set of nodes, where each node is communicatively coupled with one or more storage devices storing a set of data log files, and where each data log file including key-value pairs for a key namespace. Each node is configured to execute, using a transaction log file specific to the node, transactions for modifying or retrieving key-value pairs in the set of data log files, where the transaction log file includes state information for the transactions. The transactions are executed in a manner that ensures the atomicity and durability of each transaction.

  • Pub Date: 2012/03/12
  • Number: 09037556
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Composition and method for affecting male and female hormone levels

A composition and method for enhancing fertility of a male or female human by affecting levels of cortisol, dehydroepiandrosterone sulfate, testosterone, progesterone, and estradiol in the human. The composition comprises effective amounts of spermine and spermidine, administered at least once daily for a period of at least thirty days.

  • Pub Date: 2012/03/12
  • Number: 09333184
  • Owner: NOKOMIS RESEARCH, INC.
  • Location: Carefree, US
  • Details: Visit USPTO

Visit USPTO Page


Component analysis of software applications on computing devices

Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks.

  • Pub Date: 2012/03/12
  • Number: 09407443
  • Owner: Lookout, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Cloud-based data backup and sync with secure local storage of access keys

Methods and systems are provided for secure online data access. In one embodiment, three levels of security are provided where user master passwords are not required at a server. A user device may register with a storage service and receive a user device key that is stored on the device and at the service. The user device key may be used to authenticate the user device with the storage service. As data in the storage service is encrypted with a master password, the data may be protected from disclosure. As a user master key or derivative thereof is not used in authentication, the data may be protected from a disclosure or breach of the authentication credentials. Encryption and decryption may thus be performed on the user device with a user master key that may not be disclosed externally from the user device.

  • Pub Date: 2012/03/12
  • Number: 09330245
  • Owner: Dashlane SAS
  • Location: Puteaux, FR
  • Details: Visit USPTO

Visit USPTO Page


Binding multiple addresses to a socket in a network system

A TCP/IP socket extension may bind a single socket to more than one IP address. The socket API extension may allow a user to bind a socket to a list of IP addresses instead of a single IP address. Additional socket APIs may allow applications to bind an existing socket to one or more additional IP addresses. Bind-specific support may enhance a user's capability to specify one or more IPv4 addresses and/or IPv6 addresses or other addresses to bind to a generic server information handling system (IHS). The method may convert a generic server IHS into a bind-specific server IHS that accepts new connections over both the IPv4 and IPv6 network transports and/or other network transports without requiring changes to the server IHS. A modified TCP/IP stack may provide support for multiple sockets. The method may map multiple address/port/protocol tuples to the same socket.

  • Pub Date: 2012/03/12
  • Number: 09137270
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient data transmission between computing devices

The subject disclosure is directed towards technology by which data transmission sizes are reduced when uploading files over a network. By processing hash values corresponding to a plurality of data blocks of a file to potentially be uploaded to a server, the server identifies any already known data block or blocks of the file. The server performs a server-local copy operation that writes the known data block into a server-local copy of the file. If applicable, the server returns hash values corresponding to unknown data blocks to a client, by which the client responds by uploading copies of the unknown data blocks. Accordingly, the client and the server maintain the server-local copy of the file by transferring only unknown data blocks.

  • Pub Date: 2012/02/12
  • Number: 09398053
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Wave dynamic differential logic

Wave Dynamic Differential Logic (WDDL) is provided, wherein a differential logic stage is pre-charged or pre-discharged by a previous logic stage, such as, for example, a previous SDDL stage, a WDDL stage, etc. In one embodiment, a Divided Wave Dynamic Differential Logic (DWDDL) is provided wherein a WDDL circuit is conveniently implemented as dual logic trees.

  • Pub Date: 2012/30/11
  • Number: 08947123
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


User productivity on demand services

The present disclosure involves systems, software, and computer implemented methods for providing user productivity on-demand services. One process includes operations for determining a hosted service for use with an application at a client based on user context data associated with the application. A request for the hosted service and a reference to stored data required for the hosted service is received. The hosted service is executed, and the results are transmitted to the client.

  • Pub Date: 2012/30/11
  • Number: 08655948
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System-wide query optimization

A locally optimized plan for executing a command using a sequence of steps can be determined for a single computing node. However, the locally optimized sequence of steps may not be optimized for a combined system comprising multiple computing nodes, any one of which may be tasked with executing the command. A plan that is optimized for the combined system may be determined by comparing the predicted cost of locally optimized plans for computing nodes in the combined system.

  • Pub Date: 2012/30/11
  • Number: 09229983
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for intelligent call transcription

Intelligent call transcript systems and methods are disclosed. An intelligent call transcript system can create a transcript of a telephonic communication and supplement the transcript with additional information automatically or upon request. Additional information may be added when key words are detected, such as adding acronym expansion when an acronym is detected or adding identifying information to an important task when mention of the task is detected. Portions of the transcript may also be sent as messages, text-based or audio, upon detection of key words or at the instruction of a user or device.

  • Pub Date: 2012/30/11
  • Number: 08611507
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for validating download or configuration assignment for an EGM or EGM collection

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify different game devices and other related activities. The slot management system includes a validator that validates assignments to modify game devices.

  • Pub Date: 2012/30/11
  • Number: 08667457
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for testing and deploying rules

Embodiments of the present invention are directed to a method for assessing impact of a rule change in a contact center. The method includes configuring one or more parameters of the rule; receiving a command to assess the rule; retrieving a log of past interactions between end users and the contact center, wherein the log of past interactions reflects interactions prior to deployment of the rule; processing one or more of the past interactions based on the rule; simulating an outcome of the one or more past interactions; and deploying the rule or not to a rules engine based on the simulating.

  • Pub Date: 2012/30/11
  • Number: 08767947
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Smart calendar for scheduling and controlling collaboration devices

A system and method for implementing a service oriented architecture that supports complex event processing and business activity monitoring. An enterprise service bus (ESB) generates a first list of one or more devices, receives a selection from a user associated with a first device of a second device in the first list, generates a second list that includes functions associated with the selection from the first user, receives a request from the first device to perform one of the functions in the second list, translates a first communication protocol of the request received from the first device into a second communication protocol used by the second device to create a translated request, translates a first message format of the request into a second message format and transmits the translated request to the second device.

  • Pub Date: 2012/30/11
  • Number: 09444774
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Sharing television and video programming through social networking

In particular embodiments, one or more computer systems of a social-networking system determine identities of one or more users in proximity to a display device and query a social graph of the social-networking system for social content associated with the determined identities. The social graph includes nodes and edges connecting the nodes. The nodes include user nodes that are each associated with a particular user of the social-networking system. The one or more computer systems of the social-networking system identify, using the social content, recommended media content for the one or more users in proximity to the display device and provide a playlist for display on the display device. The playlist includes the recommended media content for the one or more users in proximity to the display device.

  • Pub Date: 2012/30/11
  • Number: 09660950
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Resource management in a wireless communications network

Detection of an unbalanced network load and redistribution of network traffic to balance the network load is provided herein. Load balancing across different radios in the same sector of a cell site can be facilitated through detection of the unbalance network load and changes to one or more parameters can be made to rebalance the network load. After radios within a sector are more evenly balanced, network load balancing across sectors can be facilitated. The balancing can be performed to improve system performance, reduce a dropped call rate, as well as to achieve other benefits that can provide an improved user experience as compared to systems that do not attempt to balance the network load.

  • Pub Date: 2012/30/11
  • Number: 09288716
  • Owner: AT&T MOBILITY II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Propagation and adoption of extensions across applications in networked solutions

The present disclosure describes methods, systems, and computer program products for adoption of an extension of a service across networked applications. One process includes receiving, by a target platform operating a target networked application, a data package associated with the extension, the data package comprising data specifying the service to be extended and information associated with a technology of a source platform at which the data package was created, extracting a portion of the data from the data package, and implementing the extracted portion of the data in the service of the target application.

  • Pub Date: 2012/30/11
  • Number: 09077717
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Preserving restful web service structure in a client consuming the restful web service

A computer system identifies a uniform resource identifier (URI) that corresponds to a resource of a RESTful web service. The URI contains elements. The computer system identifies a relationship between the elements of the URI and creates programming code for a method of a software development kit (SDK) client. The method reflects the relationships between the elements of the URI to facilitate communication with the resource of the RESTful web service.

  • Pub Date: 2012/30/11
  • Number: 09465587
  • Owner: Red Hat Israel, Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Power saving in computing devices

Power saving in computing devices is provided. A first computing device communicates with a second computing device using a first set of tones. A low power event is detected by the first computing device. In response to the detected low power event, a request to communicate using a second set of tones is sent to the second computing device by the first computing device. The second set of tones has fewer tones than the first set of tones, and may be a subset of the first set of tones.

  • Pub Date: 2012/30/11
  • Number: 09285861
  • Owner: ARRIS Enterprises, Inc.
  • Location: Suwanee, US
  • Details: Visit USPTO

Visit USPTO Page


Polling of I/O devices on host initiated communication transports

A disclosed data processing system includes a processor and an operating system kernel that includes communication drivers to support sideband interrupt deferring of polling associated with I/O requests. The communication drivers may implement a driver stack that includes a sideband miniport driver to detect an application program read request for device data from an input/output (I/O) device. The I/O device may be a sensor or another type of human interface device. The sideband miniport driver may pend the read request and maintain an interrupt pipe of a communication transport between the host system and the I/O device in a disabled state. With the interrupt pipe disabled, the host system drivers are unable to poll the I/O device. The sideband miniport driver may pend the read request and keep the interrupt pipe disabled until a sideband interrupt is communicated to the sideband miniport driver.

  • Pub Date: 2012/30/11
  • Number: 09021143
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Policy-based switching between graphics-processing units

The disclosed embodiments provide a system that configures a computer system to switch between graphics-processing units (GPUs). In one embodiment, the system drives a display using a first graphics-processing unit (GPU) in the computer system. Next, the system detects one or more events associated with one or more dependencies on a second GPU in the computer system. Finally, in response to the event, the system prepares to switch from the first GPU to the second GPU as a signal source for driving the display.

  • Pub Date: 2012/30/11
  • Number: 08564599
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Overload detection and handling in a data breakout appliance at the edge of a mobile data network

Mobile network services are performed in an appliance in a mobile data network in a way that is transparent to most of the existing equipment in the mobile data network. The mobile data network includes a radio access network and a core network. The appliance in the radio access network breaks out data coming from a basestation, and performs one or more mobile network services at the edge of the mobile data network based on the broken out data. The appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliance without revealing details regarding the hardware and software used to implement the appliance. The appliance includes overload detection and handling within the appliance. This appliance architecture allows performing new mobile network services at the edge of a mobile data network within the infrastructure of an existing mobile data network.

  • Pub Date: 2012/30/11
  • Number: 08913491
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Navigating visual data associated with a point of interest

Systems and methods for navigating an imagery graph are provided. In some aspects, a first image is provided for display, where the first image corresponds to a first image node within an imagery graph, where the imagery graph comprises image nodes corresponding to images from a plurality of different imagery types, and where each image node in the imagery graph is associated with geospatial data. An indication of a selection of a predetermined region within the first image is received, where the predetermined region is associated with a position in the first image that corresponds to geospatial data associated a second image node within the imagery graph. A second image corresponding to the second image node is provided for display in response to the indication of the selection of the predetermined region.

  • Pub Date: 2012/30/11
  • Number: 08928666
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for multi-purpose metering

Methods and apparatus for multi-purpose metering are disclosed. An example method includes acquiring a rate of data transfer to/from the monitored location and comparing the acquired rate of data transfer to a threshold. The example method also includes setting at least one media monitoring device in a first bandwidth mode when the acquired rate of data transfer exceeds the threshold, and setting the at least one media monitoring device in a second bandwidth mode when the acquired rate of data transfer is below the threshold.

  • Pub Date: 2012/30/11
  • Number: 08752081
  • Owner: The Nielsen Company (US), LLC.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, apparatus, and articles of manufacture to trigger preemptive maintenance in vectored digital subscriber line (DSL) systems

Example methods, apparatus, and articles of manufacture to trigger preemptive maintenance of vectored digital subscriber line (DSL) systems are disclosed. An example method includes generating a trouble ticket for a first subscriber loop based on a result of a diagnostic test, the diagnostic test being performed on the first subscriber loop when a value representing crosstalk coupling between the first subscriber loop and a second subscriber loop exceeds a threshold. The first subscriber loop and the second subscriber loop belong to a vectored group of subscriber loops contained in a same cable binder. The example method includes submitting the trouble ticket.

  • Pub Date: 2012/30/11
  • Number: 09054783
  • Owner: AT&T INTELLECTUAL PROPERTY I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for a distributed radio communications network

The present disclosure is directed to methods and systems for providing a distributed radio communications network. Each of a first gateway and a second gateway may separately receive modulated signals comprising at least a portion of data from a first node of a plurality of geographically-dispersed nodes. The modulated signals may be wirelessly transmitted as radio frequency (RF) signals from the first node, the data gathered or generated by the first node at a first location. A server may receive the modulated signals from the first gateway and the second gateway. As configured by software-defined radio (SDR) software, the server may perform processing of the separately received modulated signals to recover the data. The processing may include demodulation of the modulated signals.

  • Pub Date: 2012/30/11
  • Number: 09065699
  • Owner: COGNOSOS, INC.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to distribute network IP traffic

Example methods disclosed herein include, in response to receiving, at a server, a first control packet from a first router, selecting a first auxiliary router to forward the first control packet, and updating a forwarding table in the first router to associate a destination address of the first control packet with a first control path from the first router to the first auxiliary router, the forwarding table initially causing the first control packet to be routed from the physical router to the server, the first control path being determined by routing the first control packet from the first router to the first auxiliary router through the server, the updating of the forwarding table to cause subsequent data packets associated with the first control packet to be forwarded from the first router to the first auxiliary router via the first control path without being routed through the server.

  • Pub Date: 2012/30/11
  • Number: 08687638
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method to produce particulate filter

A method is provided for producing a particulate filter to pass through select permeate particles in a fluid medium from inflow to outflow regions while restraining reticulate particles. The method includes providing an aluminum oxide substrate; disposing a sol-gel membrane onto the substrate to form a tiered filtration unit; drying the filtration unit; and calcinating the filtration unit.

  • Pub Date: 2012/30/11
  • Number: 08652572
  • Owner: The United States of America as Represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus and system for dynamic images

Methods, apparatus and systems are employed to generate a dynamic image, for example, an animated image in which a selected region of the image includes action. In some embodiments, the dynamic image is generated from a stream of images which are stabilized.

  • Pub Date: 2012/30/11
  • Number: 08957915
  • Owner: Cinemagram Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for selecting a communication network

A method, apparatus, and computer usable program product for selecting a network for telecommunication are provided. A type of network supporting a called identifier is identified. Several types of networks are accessible to a calling communication device. A database is queried with a query including the called identifier to identify the types of networks that are accessible to a called communication device. A network corresponding to the called communication device is selected at the calling communication device. A communication session is established between the calling and called communication devices using the selected network.

  • Pub Date: 2012/30/11
  • Number: 09001820
  • Owner: CenturyLink Intellectual Property LLC
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Media content caching

A playback device includes tangible storage configured to receive transfer of media content from a remote communications device to the playback device while the remote communications device is operating in a high power mode. Interface logic is coupled to the tangible storage and configured to signal the remote communications device during the transfer to prepare the remote communications device to enter a low power mode after the transfer is complete. The remote communications device includes a content manager configured to transfer of media content from the remote communications device to a playback device while the remote communications device is operating in a high power mode. Power logic is coupled to the content manager and configured to prepare the remote communications device to enter a low power mode after the transfer is complete, responsive to receipt of a signal from the playback device during the transfer is complete.

  • Pub Date: 2012/30/11
  • Number: 08781294
  • Owner: Seagate Technology LLC
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Matrix based dynamic programming

Embodiments relate to dynamic programming. An aspect includes representing a dynamic programming problem as a matrix of cells, each cell representing an intermediate score to be calculated. Another aspect includes providing a mapping assigning cells of the matrix to elements of a result container data structure, and storing cells of the matrix to elements of the result container data structure in accordance with the mapping. Another aspect includes calculating intermediate scores of all cells of the matrix, whereby intermediate scores of some of the cells of the matrix are stored to a respectively assigned element of the result container data structure in accordance with the mapping. Another aspect includes during the calculation of the intermediate scores, dynamically updating the assignment of cells and elements in the mapping and assembling a final result of the dynamic programming problem from the intermediate scores stored in the result container data structure.

  • Pub Date: 2012/30/11
  • Number: 09110855
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Mandelic acid condensation polymers

Disclosed herein are compounds and compositions useful for reducing the risk of infection. In particular, disclosed herein are mandelic acid condensation polymers, compositions comprising such compounds, processes for producing such compounds, and methods of using such compounds.

  • Pub Date: 2012/30/11
  • Number: 09527793
  • Owner: RUSH UNIVERSITY MEDICAL CENTER
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Managing gateway access

A storage system provides a content manager configured to initiate transfer of media content from a first device to a second device. Responsive to a transfer request from the second device and during the transfer, gateway logic coupled to the content manager disables a gateway executing on the first device, responsive to the transfer request from the second device. Power logic coupled to the content manager enters a low power mode in the first device, responsive to completion of the transfer of the media content from the first device to the second device.

  • Pub Date: 2012/30/11
  • Number: 09229520
  • Owner: Seagate Technology LLC
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Management of multimedia content

Disclosed are method and apparatus for managing multimedia content. The uniform resource locators of multimedia content accessed via the Internet are saved in collections stored in the database of a multimedia access system, which is shared by multiple users via individual user accounts. Collections may be copied from one user account to another user account, e-mailed, and posted on a website. Collections in the database may be searched by keywords associated with the collections.

  • Pub Date: 2012/30/11
  • Number: 08874521
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Login initiated scanning of computing devices

Embodiments of the invention relate to systems, methods, and computer program products for login initiated remote scanning of computer devices. The present invention detects login to the network via access management systems. The login data provides information that identifies the device so that the device can be checked against a scan database to determine if and when a previous scan occurred. Based on the findings in the scan database determinations are made as to whether to perform a scan. Additionally, the level of scanning can be determined based on previous scan dates and previous scan results, which may dictate customized scanning. In addition, the priority of the impending scan may be dictated by previous scan dates and results. Further embodiments provide for assessing risk, such as risk scoring or the like, concurrently or in near-real-time with the completion of the scan so that alerts may be communicated.

  • Pub Date: 2012/30/11
  • Number: 08695099
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Interference management in wireless communication networks

A scheme to reduce the problem of radio interference between wireless devices such as MTC devices in a multi-RAT scenario. Wireless devices are configured (S) for interference reporting in accordance with their capabilities. Information is collected, not only on interference measurements reported by the wireless devices, but also on device signatures (S) and transmission patterns (S) for the purpose of attributing interference, suffered by a reporting device, to one or more offending devices (S). One or more mitigation techniques is then applied to the offending device and/or the reporting device (S-S). The scheme provides an additional stability mechanism for existing interference mitigation and co-existence schemes by using device management and avoiding potential conflicts across diverse systems. Under the assumption that geographically co-located devices are all using a common service platform, the centralized algorithm permits more efficient solutions than existing interference mitigation solutions.

  • Pub Date: 2012/30/11
  • Number: 09020546
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Integration of client side applications into a fantasy open platform environment

Techniques to integrate client side applications into a fantasy open platform environment include a server processor component operating within the fantasy open platform environment and operative to provide application programming interface (API) data of the client side application code to the fantasy open platform environment. The client side application may be independent from the fantasy open platform environment. Hooks may be created to allow embedding of the client side application code on the fantasy open platform environment web pages wherein the client side application code identifies on which of the fantasy open platform environment web pages the client side application code runs. A client side application executing on a client browser may be allowed to access resources of the fantasy open platform environment over a network connection.

  • Pub Date: 2012/30/11
  • Number: 09495226
  • Owner: CBS Interactive Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Institutional provided data share platform

Embodiments of the invention are directed to a system, method, or computer program product for an institution provided data share platform. The institution provided data share platform allows customers and commercial partners to access data the institution may have. Specific platform data access may be limited and/or monitored by the institution to ensure customer safety and privacy compliance. Allowing access to the institution data provides a customer the means to create customized applications utilizing the data in combination with data provided by the customer. In return for access to the platform, the institution may recover assessments based on the application the customer creates.

  • Pub Date: 2012/30/11
  • Number: 08548930
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Index-based querying of archived data sets

Methods and systems for index-based querying of archived data sets are disclosed. A plurality of indices are generated, each comprising a plurality of pointers to storage locations of a plurality of updates to a document. A query request is received after generating the plurality of indices. The query request comprises an identifier of the document and a specified time range. A subset of the indices that comprise the identifier of the document within the specified time range are determined. From the subset of the indices are retrieved a subset of the pointers to the storage locations for one or more of the updates to the document within the specified time range. The one or more updates to the document within the specified time range are retrieved using the subset of the plurality of pointers.

  • Pub Date: 2012/30/11
  • Number: 09230011
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Incremental speech recognition for dialog systems

A system and method for integrating incremental speech recognition in dialog systems. An example system configured to practice the method receives incremental speech recognition results of user speech as part of a dialog with a user, and copies a dialog manager operating on the user speech to generate temporary instances of the dialog manager. Then the system evaluates actions the temporary instances of the dialog manager would take based on the incremental speech recognition results, and identifies an action that would advance the dialog and a corresponding temporary instance of the dialog manager. The system can then execute the action in the dialog and optionally replace the dialog manager with the corresponding temporary instance of the dialog manager. The action can include making a turn-taking decision in the dialog, such as whether, what, and when to speak or whether to be silent.

  • Pub Date: 2012/30/11
  • Number: 09015048
  • Owner: Oregon Health and Science University
  • Location: Portland, US
  • Details: Visit USPTO

Visit USPTO Page


Implementing menu pages in a social networking system

A social networking system can generate or utilize a social menu in a social network page. The social menu can be generated based on a crowd-sourced user interaction, an external database of business offerings, an administrator interface of the social network page, or any combination thereof. A user interaction of one user account with a menu item of a social menu can be presented to another user account. A user account can select the menu item by querying the social networking system for creating a reference link to the menu item.

  • Pub Date: 2012/30/11
  • Number: 09495714
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a restful web service software development kit client

A computer system receives user input indicating uniform resource identifiers (URIs) for a RESTful web service. The computer system identifies a programming language for a RESTful web service software development kit (SDK) client and creates methods for the URIs using programming code format of the identified programming language. The computer system creates the RESTful web service SDK client using the methods.

  • Pub Date: 2012/30/11
  • Number: 09003361
  • Owner: Red Hat Israel, Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components

Subject innovations enable a client device to dynamically download Digital Rights Management components, and/or other plug-ins, to extend a browser functionality, where the downloading places the downloaded component(s) within a super sandbox that, inter alia, disables selected operating system calls by the downloaded component, performs one or more heuristic analysis on code execution of the component to detect possible malicious code, and restricts output through the super sandbox to those responses that are in response to a request to the component, rather than output that the component might have initiated ‘on its own.’ In some embodiments, a webpage is configured to include instructions to automatically download and install the component, thereby minimizing user actions to directly request and/or install the component.

  • Pub Date: 2012/30/11
  • Number: 09223988
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Emulated message signaled interrupts in multiprocessor systems

A processor with coherency-leveraged support for low latency message signaled interrupt handling includes multiple execution cores and their associated cache memories. A first cache memory associated a first of the execution cores includes a plurality of cache lines. The first cache memory has a cache controller including hardware logic, microcode, or both to identify a first cache line as an interrupt reserved cache line and map the first cache line to a selected memory address associated with an I/O device. The selected system address may be a portion of configuration data in persistent storage accessible to the processor. The controller may set a coherency state of the first cache line to shared and, in response to detecting an I/O transaction including I/O data from the I/O device and containing a reference to the selected memory address, emulate a first message signaled interrupt identifying the selected memory address.

  • Pub Date: 2012/30/11
  • Number: 09311243
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Displays for three-dimensional printers

A variety of techniques are disclosed for incorporating displays into three-dimensional printers.

  • Pub Date: 2012/30/11
  • Number: 09473760
  • Owner: MakerBot Industries, LLC
  • Location: Brooklyn, US
  • Details: Visit USPTO

Visit USPTO Page


Customized predictors for user actions in an online system

Online systems generate predictors for predicting actions of users of the online system. The online system receives requests to generate predictor models for predicting whether a user is likely to take an action of a particular action type. The request specifies the type of action and criteria for identifying a successful instance of the action type and a failure instance of the action type. The online system collects data including successful and failure instances of the action type. The online system generates one or more predictors of different types using the generated data. The online system evaluates and compares the performance of the different predictors generated and selects a predictor based on the performance. The online system returns a handle to access the generated predictor to the requester of the predictor.

  • Pub Date: 2012/30/11
  • Number: 09317812
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Custom electronic program guides

Custom electronic program guides are disclosed. An example method includes collecting identifying information associated with media using at least one of a microphone or camera of a consumer electronics device, determining a characteristic of the consumer electronics device, the characteristic being at least one of a length of time during which the identifying information was collected, a percentage of the identifying information corresponding to a same program, or a geographic location at which the identifying information was collected, and determining, based on the characteristic, whether the collected identifying information is to be used in generating a custom electronic program guide for a user associated with the consumer electronics device.

  • Pub Date: 2012/30/11
  • Number: 09215489
  • Owner: The Nielson Company (US), LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Completion processing for data communications instructions

Completion processing of data communications instructions in a distributed computing environment, including receiving, in an active messaging interface (‘AMI’) data communications instructions, at least one instruction specifying a callback function; injecting into an injection FIFO buffer of a data communication adapter, an injection descriptor, each slot in the injection FIFO buffer having a corresponding slot in a pending callback list; listing in the pending callback list any callback function specified by an instruction, incrementing a pending callback counter for each listed callback function; transferring payload data as per each injection descriptor, incrementing a transfer counter upon completion of each transfer; determining from counter values whether the pending callback list presently includes callback functions whose data transfers have been completed; calling by the AMI any such callback functions from the pending callback list, decrementing the pending callback counter for each callback function called.

  • Pub Date: 2012/30/11
  • Number: 08745123
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Cloth application programmer interface

A method of executing a physics simulation is performed in a system comprising a computational platform, a main application stored in the computational platform, a secondary application stored in the computational platform, and a cloth application programming interface (API) implemented in the computational platform. The method defines a cloth simulation call in the cloth API, and by operation of the main application, invokes a software routine using the cloth simulation call. Additionally, by operation of the secondary application, a state of the physics simulation is updated in response to the software routine.

  • Pub Date: 2012/30/11
  • Number: 08930969
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Aggregated appliance in a mobile data network

A mobile data network includes a breakout appliance at the edge of the mobile data network and an appliance in the core network that includes multiple enclosures. Each appliance has defined interfaces and defined commands on each interface that allow performing all needed functions on the appliances without revealing details regarding the hardware and software used to implement the appliances. An aggregate appliance in the mobile data network defines high-level commands, which each have a corresponding set of steps that are performed when the high-level command is executed. Each step causes one or more of the defined commands to be executed on the breakout appliance and/or the appliance in the core network and/or one a related software entity. This aggregated appliance allows configuring and controlling the breakout appliance and the appliance in the core network in a way that is transparent to most existing components in the mobile data network.

  • Pub Date: 2012/30/11
  • Number: 09226170
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Abstracting restful web service HTTP between a client and a server

A computer system identifies metadata components that are associated with uniform resource identifiers (URIs) in service description language metadata for a RESTful (Representational State Transfer) web service The computer system identifies a programming language for a template pertaining to a method of a software development kit (SDK) client. The computer system creates the template. The template includes programming code placeholders for the metadata components based on the identified programming language.

  • Pub Date: 2012/30/11
  • Number: 09231819
  • Owner: Red Hat Israel, Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Visualizing reach of posted content in a social networking system

Effects of content communications propagated to users of a social networking system may be tracked and measured by the social networking system. Identifiers of content presented to users within a time period before the users interact with the content are recorded. As users interact with the content, additional data describing the interactions with the content and the users interacting with the content are stored. Various metrics may be determined from the data describing interactions with the content. For example including virality metrics and reach metrics, may be determined and presented to the user that posted the content.

  • Pub Date: 2012/29/11
  • Number: 09430439
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Use of snapshots to reduce risk in migration to a standard virtualized environment

During a process of migrating a source system into a standardized virtual environment, virtual machine instances of the source system executing in a hypervisor are snapshotted as virtual machine images in an operational repository of the hypervisor. The virtual machine images in the operational repository are short-term snapshots. From time to time during the migration process, long-term snapshots of the source system are created by checking given ones of the virtual machine images from the hypervisor operational repository into an image library as image objects.

  • Pub Date: 2012/29/11
  • Number: 09092837
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for delivering content to a mobile device based on geo-location

Described herein are a system and method for delivering content to a mobile computing device, where the content is selected for presentation to a member of a social network service based on the current geo-location of the member (device) and one or more associations and/or relationships between entities represented in a social graph of the social network service. A particular embodiment includes providing, by use of a data processor, a user interface to notify a member of a social network service of his or her proximity to another entity that is represented in the social graph of the social network service. In some embodiments, in response to determining that a member is in geographical proximity of a company that has a presence in the social graph of the social network service, a job recommendation/matching engine may cause information to be presented relating to a job listing posted to a job listing service by an authorized representative of the company.

  • Pub Date: 2012/29/11
  • Number: 09009249
  • Owner: LinkedIn Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for identification of implanted medical devices and/or detection of retained surgical foreign objects from medical images

A computer-based system and method(s) are described which detects and identifies implanted medical devices (“IMDs”) and/or retained surgical foreign objects (“RSFOs”) from diagnostic medical images. In some embodiments, the system provides further identification—information on the particular IMD and/or RSFO that has been recognized. For example, the system could be configured to provide information feedback regarding the IMD, such as detailed manual information, safety alerts, recalls, assess its' structural integrity, and/or suggested courses of action in a specific clinical setting/troubleshooting. Embodiments are contemplated in which the system is configured to report possible 3D locations of RSFOs in the surgical field/images.

  • Pub Date: 2012/29/11
  • Number: 09317920
  • Owner: Rush University Medical Center
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for distributing assets to multi-tiered network nodes

Provided are methods and systems for distributing an asset to a multi-tiered network node. A pending notice is received from a distribution server. If the notice indicates that at least one asset is pending, i.e., awaiting deployment, an asset descriptor manifest is received from the distribution server. The asset descriptor manifest, which is stored in a memory on a node, identifies at least one asset to be deployed to the node and includes an offset associated with the asset identifier. A fragment, associated with the asset, is received and stored in the memory. The offset associated with the asset is marked with the end of the fragment and a second fragment, beginning at the offset, is received. Additional fragments are received, and the offset updated, until the entire asset is deployed to the node. Alternately, the entire asset or multiple assets are received in the first fragment.

  • Pub Date: 2012/29/11
  • Number: 08666933
  • Owner: OP40 Holdings, Inc.
  • Location: Somers, US
  • Details: Visit USPTO

Visit USPTO Page


Social dialogue listening, analytics, and engagement system and method

Embodiments of social media listening, analytics, and engagement systems and method are described herein where a system user may listen to and analyze social media content based on one or more key terms. The system may expand the key terms and listen to additional social media content based on the expanded terms. The system may also enable a user to engage social media participants related to the social media content via multiple campaigns. Other embodiments may be described and claimed.

  • Pub Date: 2012/29/11
  • Number: 09276892
  • Owner: LIQUID GIRDS
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing television and video programming through social networking

In particular embodiments, a social TV dongle receives a first video stream from a content source using a first interface and receives social content from a social-networking system using a second interface. The social TV dongle generates a modified video stream using at least the first video stream and the social content and sends the modified video stream to a display device using a third interface.

  • Pub Date: 2012/29/11
  • Number: 09578390
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Proactive maintenance of devices based on usage data

A system and method for monitoring device usage are described. The system includes an enterprise service bus configured to receive a request to transmit media to a device and route the media to a device and network appliance as a service (NAaaS) server-side application configured to log device usage entries for a second device, determine usage information based on the device usage entries, perform a comparison between a life expectancy associated with the second device and the usage information and responsive to the comparison being within a threshold value, generating a notification.

  • Pub Date: 2012/29/11
  • Number: 09076117
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Portable mechanical switch for selective deactivation of radio frequency identification circuits

Systems and methods for providing security for authentication devices—such as electronically readable cards or ID badges with embedded RFID chips or NFC capability—may include an envelope or pocket-like case for carrying an electronically readable card, having an electrically conductive, non-opaque sleeve that can be moved to cover or expose the electronically readable card and that prevents information on the card from being electronically read when covered yet still allows the card to be seen when covered. In one or more embodiments, the sleeve may be a wire mesh that is flexible enough to be compressed to expose the card yet stiff (or rigid) enough to be extended to cover the card and that is transparent enough to allow reading visual information on the surface of the card when covering the card. Protection can be switched off by a mechanical switch that leaves the protection normally on.

  • Pub Date: 2012/29/11
  • Number: 09135548
  • Owner: PAYPAL, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Photonic devices on planar and curved substrates and methods for fabrication thereof

A versatile and rapid sol-gel technique for the fabrication of high quality one-dimensional photonic bandgap materials. For example, silica/titania multi-layer materials may be fabricated by a sol-gel chemistry route combined with dip-coating onto planar or curved substrate. A shock-cooling step immediately following the thin film heat-treatment process is introduced. This step was found important in the prevention of film crack formation—especially in silica/titania alternating stack materials with a high number of layers. The versatility of this sol-gel method is demonstrated by the fabrication of various Bragg stack-type materials with fine-tuned optical properties by tailoring the number and sequence of alternating layers, the film thickness and the effective refractive index of the deposited thin films. Measured optical properties show good agreement with theoretical simulations confirming the high quality of these sol-gel fabricated optical materials.

  • Pub Date: 2012/29/11
  • Number: 09403186
  • Owner: University of Utah Research Foundation
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Periodic channel state information reporting for coordinated multipoint (coMP) systems

Technology for periodic channel state information (CSI) reporting in a coordinated multipoint (CoMP) scenario is disclosed. One method can include a user equipment (UE) generating a plurality of CSI reports for transmission in a subframe for a plurality of CSI processes. Each CSI report can correspond to a CSI process with a CSIProcessIndex. The UE can drop CSI reports corresponding to CSI processes except a CSI process with a lowest CSIProcessIndex. The UE can transmit at least one CSI report for the CSI process to an evolved Node B (eNB).

  • Pub Date: 2012/29/11
  • Number: 09544801
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Network appliance architecture for unified communication services

A system and method for implementing a service oriented architecture that supports complex event processing and business activity monitoring. An enterprise service bus (ESB) generates a first list of one or more devices, receives a selection from a user associated with a first device of a second device in the first list, generates a second list that includes functions associated with the selection from the first user, receives a request from the first device to perform one of the functions in the second list, translates a first communication protocol of the request received from the first device into a second communication protocol used by the second device to create a translated request, translates a first message format of the request into a second message format and transmits the translated request to the second device.

  • Pub Date: 2012/29/11
  • Number: 09363214
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Mobile device navigation state application programming interface

A method includes providing a service to expose navigation events data generated by a maps navigation application on a Linux-based mobile computing device platform to a third party application. The method further includes making provisions for verification on the mobile computing device platform that the third party application is authorized to access the navigation events data, and for establishing an interprocess service connection to the third party application upon verification of authorization.

  • Pub Date: 2012/29/11
  • Number: 08886460
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for processing commands by a device interfacing with a computing system

Method and system for processing a command received from a processor executable computing entity from among a plurality of computing entities of a computing system that interfaces with a device is provided. The method includes receiving the command by a command processing module executed by a processor of the computing system; generating a command object for the command by the command processing module, where the command object format does not change regardless of a computing entity type or a command type; placing the command object in a command queue maintained by the command processing module; sending the command to a device in a same context as a context of the computing entity, when the command object is a first command object in the command queue with the command that is ready to be sent to the device; and sending the command to the device in a different context as the context of the computing entity, when the command object is not the first command object in the command queue with the command that is ready to be sent to the device.

  • Pub Date: 2012/29/11
  • Number: 09047151
  • Owner: QLOGIC, Corporation
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


Method for multiple projector display using a GPU frame buffer

A primary image is transformed into secondary images for projection, via first and second frame buffers and view projection matrixes. To do so, a first image is loaded into the first frame buffer. A calibration data set, including the view projection matrixes, is loaded into an application. The matrixes are operable to divide and transform a primary image into secondary images that can be projected in an overlapping manner onto a projection screen, providing a corrected reconstruction of the primary image. The first image is rendered from the first frame buffer into the second images, by using the application to apply the calibration data set. The second images are loaded into a second frame buffer, which can be coupled to the video projectors.

  • Pub Date: 2012/29/11
  • Number: 09035969
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and computer device to control software file downloads

A computer device includes a download unit which downloads one or more files into a storage device. A file logging unit records a resource locator identifying a source network location of the file, when the file is downloaded, and associates the resource locator with a first fingerprint of the file. A system policy unit stores the resource locator associated with a process control policy relevant to the file. A process control unit is arranged to obtain a second fingerprint of the file upon launching a process in a runtime execution environment, retrieve the resource locator from the file logging unit by matching the second fingerprint with the first fingerprint, retrieve the process control policy from the system policy unit according to the retrieved resource locator, and selectively apply process execution privileges which determine execution of the process in the runtime execution environment according to the retrieved process control policy.

  • Pub Date: 2012/29/11
  • Number: 09069950
  • Owner: Avecto Limited
  • Location: Cheadle Cheshire, GB
  • Details: Visit USPTO

Visit USPTO Page


Managing application log levels in cloud environment

Applications and their application components run on a cloud platform and an underlying cloud runtime infrastructure. The cloud platform provides a service that exposes an interface to remotely change log levels of logger objects defined in application components. The application logs are generated and stored for the application components on the cloud runtime infrastructure of the cloud platform. Log levels affect the content stored in the application logs. The exposed interface is instantiated to process remote requests for managing application logs and log levels for a specified application component. The application component is deployed on the cloud platform. The requested change in the log levels is performed based on the implementation of the interface. The change in the log levels is performed in the configuration data on the cloud runtime infrastructure provided by the cloud platform.

  • Pub Date: 2012/29/11
  • Number: 09569328
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Management infrastructure analysis for cloud migration

In a source computing system having a source management infrastructure, at least one source infrastructure management component is discovered. A description of a target cloud infrastructure having a target management infrastructure is obtained. The description includes at least one mandatory target infrastructure management component. The at least one source infrastructure management component is analyzed to determine whether at least one conflict exists with the at least one mandatory target infrastructure management component.

  • Pub Date: 2012/29/11
  • Number: 09282166
  • Owner: INTERNATIONAL BUSINESS MACHINES CORPORATION
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive table to present multi-level relationships between data items

In one embodiment, a first selection of a data item in an interactive table is received. Further, one or more data items related to the first selected data item in the interactive table are identified. The interactive table is modified to render the data items identified as related to the first selected data item. Furthermore, a second selection of a data item within the data items identified as related to the first selected data item is received and one or more data items related to the second selected data item within the data items identified as related to the first selected data item are identified. Further, the previously modified interactive table is again modified to render the data items identified as related to the second selected data item.

  • Pub Date: 2012/29/11
  • Number: 09183231
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Graphics memory load mask for graphics processing

Systems and methods are described including creating a mask that indicates which pixel groups do not need to be loaded from Graphics Memory (GMEM). The mask indicates a pixel group does not need to be loaded from GMEM. The systems and methods may further include rendering a tile on a screen. This may include loading the GMEM based on the indication from the mask and skipping a load from the GMEM based on the indication from the mask.

  • Pub Date: 2012/29/11
  • Number: 09280956
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Generation of an interface with computer-executable options and visual elements based on collected social network data

A network device is configured to receive purchase information and receive, from a social networking server, information regarding a friend of the user. The network device is further configured to receive additional purchase information associated with the friend. The network device is further configured to generate, based on a result of comparing the purchase information and the additional purchase information, a recommendation, and send the recommendation to a user device associated with the user.

  • Pub Date: 2012/29/11
  • Number: 09373140
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Creating a column family in a database

A mechanism for providing messages for Java message service (JMS). A method includes receiving, by a Java message service (JMS) server executed by a processing device, key-value data pair. The key-value data pair is sent by a client. The method also includes extracting, by the processing device, destination information of a JMS message from the value data of the key-value data pair. The destination information is either a JMS queue or a JMS topic. The method further includes storing, by the processing device, the key-value data pair in a column family of not only structured query language (NoSQL) database when one of the JMS queue or the JMS topic associated with the received key-value data pair exists in the column family of the NoSQL database. The column family includes a plurality of stored key-value data pairs.

  • Pub Date: 2012/29/11
  • Number: 09141681
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic population of a network accessible content collection

A system, computer-readable storage medium storing at least one program, and computer-implemented method for automatically posting content to a network accessible content collection are described. User activity over a communication network from a client device is tracked and a triggering event is detected. In response to detecting the triggering event, a content item is automatically posted to a network accessible collection of content items viewable by additional users.

  • Pub Date: 2012/29/11
  • Number: 09438684
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Automated testing of gesture-based applications

A technology for facilitating testing of a web application is provided. In some embodiments, a data file including recorded data of one or more recorded gesture-events is received. A test case is loaded with the recorded data. The one or more recorded gesture events are replayed in the test case and the web application is executed to generate test results.

  • Pub Date: 2012/29/11
  • Number: 09342237
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Adaptive UL-DL configurations in a TDD heterogeneous network

Technology for traffic offloading to generate a low interference flexible subframe (FlexSF) of an adaptive uplink-downlink (UL-DL) time-division duplexing (TDD) subframe configuration in a heterogeneous network (HetNet) is disclosed. One method can include an evolved Node B (eNB) monitoring a traffic loading metric for a specified traffic loading condition. The eNB can offload traffic scheduled for a packet of a macro user equipment (UE) from a macro cell to a FlexSF of a UL-DL subframe configuration of a small cell when the specified traffic loading condition exists. The eNB can be a macro eNB of the macro cell or a small eNB of the small cell.

  • Pub Date: 2012/29/11
  • Number: 09185620
  • Owner: INTEL CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Visual securement of sensitive data

Various embodiments of systems and methods for visual securement of sensitive data are described herein. In one aspect, the method includes receiving a request for displaying a report. It is determined whether the requested report comprises sensitive data. When the report comprises the sensitive data, a display rule related to the sensitive data is identified. Based upon the identified display rule, the sensitive data within the report is displayed.

  • Pub Date: 2012/28/11
  • Number: 08935807
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Test circuit having scan warm-up

A test circuit for a functional circuit includes a scan chain coupled to the functional circuit, and a controller coupled to the scan chain, for controlling the scan chain to scan a test pattern into the scan chain, and subsequently and repetitively for a multiple number of times launch the test pattern to the functional circuit, capture test data into the scan chain, and restore the test pattern in the scan chain for subsequent launch.

  • Pub Date: 2012/28/11
  • Number: 09046574
  • Owner: ADVANCED MICRO DEVICES, INC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to classify moving airplanes in airports

A sequence of video images is generated of a pavement area of an airport which contains one or more objects. A processor accesses a background model of the pavement area and determines in a current image a single cluster of foreground pixels that is not part of the background model and assigns a first value to each foreground pixel in the cluster to create a foreground mask. The background model is updated by learning new conditions. A convex hull is generated from the foreground mask. A ratio is determined from pixels captured by the complex hull and pixels in the foreground mask. A ratio higher than a threshold value indicates an object not being an airplane and an alert is displayed on a computer display. Images may be thermal images. A surveillance system based on the calculated ratio is disclosed.

  • Pub Date: 2012/28/11
  • Number: 09412025
  • Owner: SIEMENS SCHWEIZ AG
  • Location: Zürich, CH
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a platform for the trade of financial instruments

The present invention is a system and method for providing a trading platform for the trade of F.I.s. According to some embodiments of the present invention, there may be provided a server or server cluster including at least one Interfacing Server adapted to interface with a user, possibly via a distributed data network such as the interne. The IS1 may be adapted to present to a user a trading platform, to receive from a user trade instructions, via the platform, and execute them. The trading platform may include innovative trade options including mid-trade options (e.g. trade insurance), batch trade options, series trade options, parlay trade options and “close now”/“extend” options.

  • Pub Date: 2012/28/11
  • Number: 08676696
  • Details: Visit USPTO

Visit USPTO Page


System and method for conducting electromagnetic resonant cavity inspection of gun barrels

A system and associated method for quickly and automatically determining if the safety and performance of a gun tube have been compromised by firing damage or by an excessive number of fatigue cycles. An electromagnetic resonant cavity inspection provides a means of rapidly evaluating the health of the gun tube by monitoring the resonant frequencies that evolve from microwave signals introduced into the cavity or bore of the gun tube. This approach exploits the high sensitivity of the electromagnetic cavity resonance phenomena. Defects and degradation in the structure's cavity produce quantifiable changes in the quality factor, frequency shifts, and mode splitting.

  • Pub Date: 2012/28/11
  • Number: 09310321
  • Owner: The United States of America as Represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Pharmaceutical/life science technology evaluation and scoring

A method for evaluating and/or scoring pharmaceutical/life science technology is provided. The method includes importing data of a publication; transforming the data into a structured schema; ingesting the structured schema to determine a context of the data and draw associations between the data and a plurality of profiles; and generating a score based on the associations between the raw data and the profiles. The method may also include generating meta-data based on the determined context of the data and/or one or more quantitative metrics having a temporal component based on the ingested data. Related apparatus, systems, techniques and articles are also described.

  • Pub Date: 2012/28/11
  • Number: 08725552
  • Owner: DR/Decision Resources, LLC
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Managing social network accessibility based on age

When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online service obtains parental authorization from an additional user having a parental relationship to the user. The child user may identify the user having the parental relationship and the online service verifies the validity of the identified user's account, the age of the identified user, and/or a connection between the identified user and the child user having a parental relationship type. The online service may make these verifications based in part social and transactional information associated with the identified user's account. Upon successful verification, the online service allows the identified user to authorize account creation for the child user, and/or manage the account and actions of the child user.

  • Pub Date: 2012/28/11
  • Number: 08966590
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive rendering of building information model data

A system, apparatus and method for interactively rendering building information modeling data.

  • Pub Date: 2012/28/11
  • Number: 09019269
  • Details: Visit USPTO

Visit USPTO Page


High efficiency distributed device-to-device (D2D) channel access

Techniques for facilitating device-to-device (D2D) communications using a high efficiency distributed channel access scheme are generally described herein. In some examples, a communication zone allocated for wireless D2D communications is divided into resource contention and scheduled transmission portions. The resource contention segment may be used to transmit a request message from a transmitting device to a receiving device (a request-to-send message), and transmit a response to the request message from the receiving device to the transmitting device (a clear-to-send message). The response can indicate a time for the data transmission to occur during the scheduled transmission segment. During the scheduled transmission segment, the scheduled data transmission and other D2D data transmissions among the various devices will be performed. In further examples, contention access techniques may be used during the resource contention segment to manage access to the resource channel.

  • Pub Date: 2012/28/11
  • Number: 09191828
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Fast switching hybrid video decoder

Techniques are presented herein for switching between a software decoder and a hardware decoder in a hybrid decoder. A video bit stream is received. The video bit stream is analyzed to determine whether or not the video bit stream can be decoded by the hardware decoder. When the video bit stream can be decoded by the hardware decoder, the video bit stream is routed to the hardware decoder and also stored in a first buffer. The video bit stream is decoded by the hardware decoder and when a reference frame is decoded, the reference frame is stored in a second buffer. When the video bit stream cannot be decoded by the hardware decoder, the video bit stream is routed to the software decoder for decoding. When an instantaneous decoder refresh (IDR) frame is decoded by the software decoder, the IDR frame is stored in the first buffer.

  • Pub Date: 2012/28/11
  • Number: 09179144
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Displaying estimated social interest in time-based media

Social media content items are mapped to relevant time-based media events. These mappings may be used as the basis for multiple applications, such as ranking of search results for time-based media, automatic recommendations for time-based media, prediction of audience interest for media purchasing/planning, and estimating social interest in the time-based media. Social interest in time-based media (e.g., video and audio streams and recordings) segments is estimated through a process of data ingestion and integration. The estimation process determines social interest in specific events represented as segments in time-based media, such as particular plays in a sporting event, scenes in a television show, or advertisements in an advertising block. The resulting estimates of social interest also can be graphically displayed.

  • Pub Date: 2012/28/11
  • Number: 09218101
  • Owner: Bluefin Labs, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Determining object relevance in a social networking system

An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.

  • Pub Date: 2012/28/11
  • Number: 09325751
  • Owner: FACEBOOK, INC.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Determining influence in a social networking system

An influence metric describing the influence of a social networking system object on social networking system users is determined based on affinities between the users and the object. For example, affinities between the associated users and the object are combined to determine the influence metric. Content may be selected for presentation to users based in part on influence metrics of the content. Additionally, influence metrics of objects associated with a user may be combined to determine the relevance of objects associated with the user, which may also be used to select content for presentation to the user.

  • Pub Date: 2012/28/11
  • Number: 09224174
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Using a local authorization extension to provide access authorization for a module to access a computing system

Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a computing system. A memory stores information on a first validity range comprising position coordinates for a module seeking to access the computing system and a second validity range comprising position coordinates for a location authorization extension for a computing system. A determination is made of a first position signal from a first receiver of the module and of a second position signal from a second receiver of the location authorization module. Determinations are made as to whether the first position signal is within the first validity range and whether the second position signal is within the second validity range. The module is granted access to the computing system in response to determining that the first position signal is within the first validity range and the second position signal is within the second validity range.

  • Pub Date: 2012/27/11
  • Number: 08990899
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for migrating mailbox data from systems with limited or restricted remote access

Examples described include software hosting systems able to provide software as a service to client systems through a firewall and/or to client systems which do not have web service capability. Examples include mailbox migration systems for migrating mailboxes from a source messaging system (e.g. a Lotus Notes system) to a destination messaging system. Software hosting systems described herein may maintain an action buffer including a next action to be performed by the source messaging system, and wait for data (e.g. messaging system content) to be returned and stored in a data buffer. Communication between the software hosting system and the source messaging system may occur over a communication channel which may be operated through a firewall using HTTP.

  • Pub Date: 2012/27/11
  • Number: 09654436
  • Owner: BITTITAN INC.
  • Location: Kirkland, US
  • Details: Visit USPTO

Visit USPTO Page


Push service without persistent TCP connection in a mobile network

Methods, systems, and articles of manufacture for non-TCP push service in a mobile network comprise receiving, at a push server, registration information for a mobile device from a push client via a first internal interface without persistent TCP connection. The registration information includes a private IP address for the mobile device and a mobile device session identifier associated with an instance of an application client on the mobile device. A push trigger associated with an event of an application server is received at the push server via a second interface exposed outside of a service provider firewall. The push trigger includes a push trigger session identifier. When the push trigger session identifier matches the mobile device session identifier, the push trigger is determined to be associated with the instance of the application client on the mobile device and is transmitted to the push client without persistent TCP connection.

  • Pub Date: 2012/27/11
  • Number: 09148765
  • Owner: Alcatel Lucent
  • Location: Boulogne-Billiancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


History inclusive connection management

Different types of connections can be established between a device and an endpoint (e.g., an address associated with a service) based at least in part upon the recent connection history for that endpoint. A connection manager can monitor the connections, and properties of those connections, from a number of different applications of a device to one or more endpoints. If the information from the system as a whole indicates that properties for the connection should be modified, an appropriate can be established for that endpoint, which can be used by any or all of those applications. The connection can meet or exceed any policies for the request, as well as other requests that can utilize the connection. Various other factors can be used in determining which types of connections to provide, as may include existing connections, system load, user type, and other such information.

  • Pub Date: 2012/27/11
  • Number: 09531764
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Game control device, program, recording medium, game control method, game control system

A game control device includes an accepter configured to accept an access request including user-spec