[ { "title": "Partitioning processes across clusters by process type to optimize use of cluster specific configurations", "publication_date": "2012/31/12", "number": "09477524", "url": "/2012/12/31/partitioning-processes-across-clusters-by-process-type-to-optimize-use-of-cluster-specific-configurations/", "abstract": "A system and method for virtualization and cloud security are disclosed. According to one embodiment, a system comprises a first multi-core processing cluster and a second multi-core processing cluster in communication with a network interface card and software instructions. When the software instructions are executed by the second multi-core processing cluster they cause the second multi-core processing cluster to receive a request for a service, create a new or invoke an existing virtual machine to service the request, and return a desired result indicative of successful completion of the service to the first multi-core processing cluster.", "owner": "NeoDana, Inc.", "owner_city": "Palo Alto", "owner_country": "US" }, { "title": "Cloth application programmer interface", "publication_date": "2012/30/11", "number": "08930969", "url": "/2012/11/30/cloth-application-programmer-interface/", "abstract": "A method of executing a physics simulation is performed in a system comprising a computational platform, a main application stored in the computational platform, a secondary application stored in the computational platform, and a cloth application programming interface (API) implemented in the computational platform. The method defines a cloth simulation call in the cloth API, and by operation of the main application, invokes a software routine using the cloth simulation call. Additionally, by operation of the secondary application, a state of the physics simulation is updated in response to the software routine.", "owner": "NVIDIA Corporation", "owner_city": "Santa Clara", "owner_country": "US" }, { "title": "Method and system for generating an integration model", "publication_date": "2012/20/11", "number": "09342805", "url": "/2012/11/20/method-and-system-for-generating-an-integration-model/", "abstract": "Exemplary systems and methods are directed to automated performance of a plant process in a control system included in a production management system. The control system including a processor that is configured with integration model code for executing an integration model. The processor is configured to integrate various software systems by establishing a connection to an enterprise resource planning system and exchange information between the plant process and a business process such that production data are received from the processes substantially in real time and an updated status of a production order is received continuously. The integration model includes placeholders associated with variables for at least one of events, devices and plants, placeholders associated with functions to be executed, functionalities which link the variables and call up the functions, mappings of parameters between the software systems to be linked, and requests for loading information from one software system to another.", "owner": "ABB AG", "owner_city": "Mannheim", "owner_country": "DE" }, { "title": "System and method of processing buffers in an OpenCL environment", "publication_date": "2012/10/10", "number": "09348676", "url": "/2012/10/10/system-and-method-of-processing-buffers-in-an-opencl-environment/", "abstract": "A processor has access to processing units for performing data processing and to libraries. Functions in the libraries are implementable to perform parallel processing and graphics processing. The processor may be configured to acquire (e.g., to download from a web server) a download script, possibly with extensions specifying bindings to library functions. Running the script may cause the processor to create, for each processing unit, contexts in which functions may be run, and to run, on the processing units and within a respective context, a portion of the download script. Running the script may also cause the processor to create, for a processing unit, a memory object, transfer data into that memory object, and transfer data back to the processor in such a way that a memory address of the data in the memory object is not returned to the processor.", "owner": "Google Technology Holdings LLC", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Provision of a download script", "publication_date": "2012/10/10", "number": "09448823", "url": "/2012/10/10/provision-of-a-download-script/", "abstract": "Disclosed are machine processors and methods performed thereby. The processor has access to processing units for performing data processing and to libraries. Functions in the libraries are implementable to perform parallel processing and graphics processing. The processor may be configured to acquire (e.g., to download from a web server) a download script, possibly with extensions specifying bindings to library functions. Running the script may cause the processor to create, for each processing unit, contexts in which functions may be run, and to run, on the processing units and within a respective context, a portion of the download script. Running the script may also cause the processor to create, for a processing unit, a memory object, transfer data into that memory object, and transfer data back to the processor in such a way that a memory address of the data in the memory object is not returned to the processor.", "owner": "GOOGLE TECHNOLOGY HOLDINGS LLC", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Machine processor", "publication_date": "2012/10/10", "number": "09069549", "url": "/2012/10/10/machine-processor/", "abstract": "Disclosed are machine processors and methods performed thereby. The processor has access to processing units for performing data processing and to libraries. Functions in the libraries are implementable to perform parallel processing and graphics processing. The processor may be configured to acquire (e.g., to download from a web server) a download script, possibly with extensions specifying bindings to library functions. Running the script may cause the processor to create, for each processing unit, contexts in which functions may be run, and to run, on the processing units and within a respective context, a portion of the download script. Running the script may also cause the processor to create, for a processing unit, a memory object, transfer data into that memory object, and transfer data back to the processor in such a way that a memory address of the data in the memory object is not returned to the processor.", "owner": "GOOGLE TECHNOLOGY HOLDINGS LLC", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Method and system for managing delayed user authentication", "publication_date": "2012/21/08", "number": "08489890", "url": "/2012/08/21/method-and-system-for-managing-delayed-user-authentication/", "abstract": "A system and methods for coordinating the operation of a client security module and a host security module on a mobile electronic device. The modules communicate with each other through a platform abstraction layer using application programming interfaces to coordinate their activities. In particular, on start-up of the device, the host security module obtains user authorization input from a user and passes the input to a client operating system for validation. Once validated, the host security module unlocks the host-side of the device. At the same time, the client operating system sends a notice or request to the client-side virtual machine requesting that the client-side be unlocked. Once the virtual machine is initialized and available it launches the client security module and unlocks the client-side. During the delay while the virtual machine loads, the user is given access only to the host applications.", "owner": "Research In Motion Limited", "owner_city": "Waterloo", "owner_country": "CA" }, { "title": "Automated provisioning and management of cloud services", "publication_date": "2012/30/07", "number": "09477530", "url": "/2012/07/30/automated-provisioning-and-management-of-cloud-services/", "abstract": "A system for managing the provisioning of cloud based services includes a collection module, a configuration module, a licensing module and a set up module. The collection module automatically obtains and stores information from end user machines that relevant to the provisioning of the could-based services. The configuration module uses the obtained information to automatically configure the use of the cloud based services. The licensing module automatically configures the account and licensing information allowing an end-user machine to access the cloud based services. The setup module automatically configures the end user machines to access and use the cloud-based services.", "owner": "CONNECTWISE, INC.", "owner_city": "Tampa", "owner_country": "US" }, { "title": "Method and apparatus for mitigating performance impact of background processing on interactive applications", "publication_date": "2012/17/07", "number": "08769220", "url": "/2012/07/17/method-and-apparatus-for-mitigating-performance-impact-of-background-processing-on-interactive-applications/", "abstract": "A method and apparatus for mitigating the performance impact of background or idle time processing during interactive computing sessions. One embodiment of the present invention is a method for mitigating performance impact of background or idle time processing on interactive applications comprising identifying executable and data pages in physical memory that are associated with an interactive application that is temporarily unused and preventing any of the identified executable and data pages from paging out.", "owner": "Symantec Corporation", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Backup and replication configuration using replication topology", "publication_date": "2012/02/07", "number": "09600376", "url": "/2012/07/02/backup-and-replication-configuration-using-replication-topology2/", "abstract": "Various systems and methods for configuring backup and replication operations. For example, a method involves a backup system receiving storage configuration information regarding a replication topology of a storage system. The backup system uses the storage configuration information to configure a backup operation. The backup operation is configured in accord with specifications included in backup information. Configuring the backup operation includes selecting a source volume and a target volume, using the storage configuration information. Once the backup operation is configured, the backup operation is initiated. Performing the backup operation involves creating a backup image on the selected source volume and replicating the backup image to the selected target volume.", "owner": "Veritas Technologies LLC", "owner_city": "Mountain View", "owner_country": "US" }, { "title": "Client services for web-based applications", "publication_date": "2012/25/06", "number": "09262593", "url": "/2012/06/25/client-services-for-webbased-applications/", "abstract": "A system for acquiring access to a web-based application includes one or more computer-readable storage media and an application (e.g., a web browser) for accessing and retrieving over a network a plurality of resources. The system also includes a program interface embodied on the one or more computer-readable storage media. The program interface is configured to present a common set of application program interfaces (APIs) that can be used by the application to demonstrate that a user of the application is entitled to access a first resource. The system also includes programming logic configured to determine if the user of the application is authorized to access the first resource. If it is determined that authorization has not been established to access the first resource, the application is directed to communicate with a marketplace to obtain authorization to access the first resource.", "owner": "MICROSOFT TECHNOLOGY LICENSING, LLC", "owner_city": "Redmond", "owner_country": "US" }, { "title": "Apparatus and methods for implementation of network software interfaces", "publication_date": "2012/11/06", "number": "09473827", "url": "/2012/06/11/apparatus-and-methods-for-implementation-of-network-software-interfaces/", "abstract": "Apparatus and methods for improved software programming interface functionality in a network. In one exemplary embodiment, the network comprises an HFC cable network with CPE in which network-specific programming interfaces (e.g., APIs) may be downloaded to the CPE, registered, authenticated, stored and executed in a software protocol stack implementing OpenCable Application Platform (OCAP) or Multimedia Home Platform (MHP) standards. The host device software comprises a “manager” module that registers APIs identified by the OCAP Monitor Application, such that all applications launched thereafter on the device can use these communications APIs, provided they have the appropriate permission(s). This relieves individual applications from having to support details regarding network-specific protocols and APIs. In an alternate embodiment, class and data files associated with the API functionality are downloaded along with an application. The downloaded application registers the API using a modified version of the API using a description file (DF). The DF describes the class and data files provided with the application that are part of the registered API.", "owner": "TIME WARNER CABLE ENTERPRISES LLC", "owner_city": "New York", "owner_country": "US" }, { "title": "Method and apparatus for interactive gameplay across multiple computing platforms", "publication_date": "2012/23/05", "number": "09017170", "url": "/2012/05/23/method-and-apparatus-for-interactive-gameplay-across-multiple-computing-platforms/", "abstract": "A method and apparatus is disclosed for enabling interactive gameplay across multiple platforms.", "owner": "King.Com Limited", "owner_city": "St. Julians", "owner_country": "MT" }, { "title": "Detection of vulnerabilities in computer systems", "publication_date": "2012/08/05", "number": "08844043", "url": "/2012/05/08/detection-of-vulnerabilities-in-computer-systems/", "abstract": "Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is provided that includes modifying instructions of the application to include at least one sensor that is configurable to generate an event indicator, wherein the event indicator includes at least some data associated with the event; storing the event indicator with other stored event indicators generated by the at least one sensor during the execution of the application; analyzing the stored event indicators; detecting a presence of at least one vulnerability in the application based on the analysis of the stored event indicators; and reporting the presence of at least one vulnerability.", "owner": "Contrast Security, LLC", "owner_city": "Columbia", "owner_country": "US" }, { "title": "Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update", "publication_date": "2012/20/04", "number": "08635272", "url": "/2012/04/20/method-for-distributing-a-list-of-updated-content-to-a-user-station-from-a-distribution-server-wherein-the-user-station-may-defer-installing-the-updat/", "abstract": "A non-transitory computer-readable storage medium having stored thereon computer-executable instructions that, in response to being executed by a computing device, cause the computing device to perform operations including upon occurrence of a scheduled time, polling an update distribution server to determine that an update for a computer executable software application is available, the computer executable software application configured to operate on the computing device and in response to determining that the update is available, obtaining the update over the Internet from the update distribution server, and selecting whether to install the update at a first time or to defer installing the update until a second time that is later than the first time.", "owner": "Intellectual Ventures I LLC", "owner_city": "Wilmington", "owner_country": "US" }, { "title": "Configuring media player", "publication_date": "2012/15/03", "number": "08438375", "url": "/2012/03/15/configuring-media-player/", "abstract": "A media player is executed on an electronic device by implementing a runtime of a media player in a modular framework on the electronic device. The modular framework is configured to have each of multiple types of media player runtimes implemented therein and to host modules that configure any of the types of media player runtimes for respective device types. The runtime is configured for the electronic device using a module hosted by the modular framework. The module abstracts at least one resource in the electronic device available to the media player. The electronic device is prepared for execution of the media player on the electronic device, and the media player uses the resource during the execution based on configuration according to the module.", "owner": "Adobe Systems Incorporated", "owner_city": "San Jose", "owner_country": "US" }, { "title": "Web-based interaction with a local system", "publication_date": "2012/28/02", "number": "09032303", "url": "/2012/02/28/webbased-interaction-with-a-local-system/", "abstract": "Systems, methods, and computer program products for facilitating web-based interaction with a local system are disclosed. Such systems, methods, and computer program products provide an approach that allows a web client within in a web browser environment to access local hardware and local software—via a web server contained in the local system—in a local computer system. In response to a user input, the web client directs local hardware and local software to perform actions (e.g., writing files and taking pictures). Information related to such actions is returned to the web client via the local web server. The local computer system may be remotely located from the web client and such returned information may be stored and/or executed at a remote site (e.g., cloud database). Security layers may be provided to authenticate the user as well as user permissions for accessing the local computer system.", "owner": "Microsoft Technology Licensing, LLC", "owner_city": "Redmond", "owner_country": "US" } ]