API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Systems and methods for generating a selective distribution of media content feeds

Aspects relate to systems and methods for generating a selective distribution of media content feeds. A content server can identify a set of mobile video cameras or other sources for delivery to a mobile device, based on a state of motion or orientation of the mobile device. Media content can be collected from video-equipped cellular devices capable of reporting their position, bearing, speed, and other sensor data. In one aspect, the position, bearing, and speed of the mobile device along with similar data for the media sources can be taken into account to generate a media envelope, or included set of media devices, to make available to the user. In one aspect, the selected content can be based on the compass orientation of a sensor in the mobile device. In one implementation, user preferences along with other access criteria can be used to further select content feeds.

  • Pub Date: 2009/31/12
  • Number: 08755738
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Shared buffer techniques for heterogeneous hybrid graphics

The graphics processing technique includes detecting a transition from rendering graphics on a first graphics processing unit to a second graphics processing, by a hybrid driver. The hybrid driver, in response to detecting the transition, configures the first graphics processing unit to create a frame buffer. Thereafter, an image rendered on the second graphics processing unit may be copied to the frame buffer of the first graphics processing unit. The rendered image in the frame buffer may then be scanned out on the display.

  • Pub Date: 2009/31/12
  • Number: 09111325
  • Owner: NVIDIA CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable architecture

Exemplary embodiments may employ techniques for dynamically dispatching requests to resources operating in a distributed computing environment, such as a computing cloud, according to one or more policies. Embodiments may further dynamically adjust resources in the computing environment using predictive models that use current loads as an input. Embodiments may still further maintain a state for a processing environment independent of the type or configuration of a device used to access the environment on behalf of a user.

  • Pub Date: 2009/31/12
  • Number: 08380880
  • Owner: The Mathworks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Peer-to-peer telephony recording

System and method for recording communication sessions in a peer-to-peer communication networks. End-devices of the peer to peer communication network may register with a selected super-node that may fork media to a recording system for recording. Communication sessions arriving at a call center may be transferred between the external end-device and the target agent end-device via a recorder and the communication session media may be recorded. Alternatively, a conference call may be established between an external end-device, a target agent end-device of a call center and a recorder over a peer-to-peer communication network. After the conference call is established, the recorder may receive media transferred between the external end-device and the target agent end-device and record that media.

  • Pub Date: 2009/31/12
  • Number: 08380872
  • Owner: Nice Systems Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Nutraceuticals containing nitro fatty acids

Activated fatty acids, nutraceutical compositions including activated fatty acids, methods for using activated fatty acids to treat a variety of diseases, and methods for preparing activated fatty acids are provided herein.

  • Pub Date: 2009/31/12
  • Number: 08933255
  • Owner: Nitromega Corp.
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for analyzing an analysis fluid

A meter and test wand system is capable of cooperatively processing an analysis fluid and communicating results to a user. The system includes a meter case including a case front, a case front, a case front, a case bottom, a first case side member, and a second case side member. The first and second case side members connect the case front to case front. The first case side member has a longitudinal dimension between said case front and said case bottom and a latitudinal dimension between said case front and said case front. The first case side member includes a first case ridge; A test wand is capable of receiving an analysis fluid, and includes a cartridge including a cartridge ridge. The cartridge ridge is sized and shaped to matingly engage with said first case ridge to connect said test wand to said meter case.

  • Pub Date: 2009/31/12
  • Number: 07931864
  • Details: Visit USPTO

Visit USPTO Page


Method and system for storing and presenting program messages

An approach is provided for a messaging interface between applications and a user. A plurality of messages associated respectively with a plurality of programs is stored in a common message database according to timing information corresponding to the messages. A subset of the messages is retrieved based on the timing information. The subset of messages is filtered based on message type. The filtered messages are output to a non-visual communication program for presentation of the filtered messages.

  • Pub Date: 2009/31/12
  • Number: 08738712
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing multiple forms of communications in one session

An approach is provided for performing multiple and hybrid forms of communication in the same communication session. A communication manager receives a to establish a communication session using a first form of communication, wherein the communication session supports multiple and simultaneous forms of communication. Next, the communication manager selects a second form of communication to conduct the communication session. Then, the communication manager transcodes the second form of communication to the first form of communication. The different forms can be converted to facilitate and enrich the communication capability, according to an embodiment of the invention.

  • Pub Date: 2009/31/12
  • Number: 09106672
  • Owner: NOKIA TECHNOLOGIES OY
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for identifying a device handle in a computer system

The present invention provides a method and apparatus for identifying a desired device handle in a computer system such as a personal computer running Linux™. The desired device handle is capable of facilitating or providing for interaction with a desired peripheral device, such as a USB™ device. The invention comprises providing a database containing information associating device handles with peripheral devices. A first portion of the database is scanned for information associated with the desired peripheral device. This information is used in determining a second portion of the database, which is scanned for information indicative of the desired device handle. The desired device handle is then identified.

  • Pub Date: 2009/31/12
  • Number: 08230121
  • Owner: Sierra Wireless, Inc.
  • Location: Richmond, CA
  • Details: Visit USPTO

Visit USPTO Page


High performance execution environment

The subject matter of this specification can be implemented in, among other things, a computer-implemented method for accessing a native application programming interface (API) of a computing device including receiving on the computing device one or more control objects from a first application written in a device-independent programming language. The control objects define a context for accessing the native API and the control objects include at least one control script. The method further includes compiling the control script on the computing device into a second application that is native to the operating system of the computing device. The method further includes executing the second application on the computing device. The executed second application accesses the native API of the computing device to generate an output through a hardware interface of the computing device based on the context.

  • Pub Date: 2009/31/12
  • Number: 08561038
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Delivering secured media using a portable memory device

In some embodiments an interface of a portable memory device is used to store content information in a hidden memory region of the portable memory device. The interface is also used to store information in a visible memory region of the portable memory device. The information stored in the visible memory region allows the content information stored in the hidden memory region to be accessed. Other embodiments are described and claimed.

  • Pub Date: 2009/31/12
  • Number: 09021202
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Authentication system and terminal authentication apparatus

After checking a receiving message appearing on an output device, a network administrator inputs an authentication result to a setting terminal using an input device, such as a keyboard. Upon receiving the authentication result from the network administrator, the setting terminal registers, if the received authentication result is permission to access a network device, a MAC address of a traveling employee's terminal that is the sender of the authentication request in the network device as an access permitted terminal. After the registering in the network device is completed, the setting terminal sends the authentication result indicative of permission to access the network device to the employee's terminal, i.e., the sender of the authentication request.

  • Pub Date: 2009/31/12
  • Number: 08312513
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Application of enhanced television services using back-end core software

A method and system to permit TV viewers to interact with program content broadcast over a subscriber network, such as cable, satellite, internet, or cellular telephone. The details of the ability for the viewer to interact is embedded as data in the program signal. The subscription provider broadcasts a visual indicator as a small icon during programming that informs the viewer that interaction is permitted. The viewer then uses a remote control to purchase products, vote on events, respond to polls, download files, request information, and request callback actions. The TV viewer uses the remote control to send information to a set-top box front-end application, and to iteratively create transactions that are batched and then sent to a back-end core application and database which then handles fulfillment.

  • Pub Date: 2009/31/12
  • Number: 08683501
  • Owner: icueTV, Inc.
  • Location: Cherry Hill, US
  • Details: Visit USPTO

Visit USPTO Page


System for creation and distribution of software applications usable on multiple mobile device platforms

The present invention provides a mobile application ecosystem comprising a mobile application development kit and store, both of which are implemented as web-based services such that creation, testing, and distribution of mobile applications, as well as discovery, investigation, and delivery of same, can all be performed using a standard web browser. The mobile application development kit offers common capabilities across all target mobile device brand and brand groups, allowing the same application construct to work unmodified on all, while building the application in a manner that is native to each, thereby avoiding any requirement to embed a separate common runtime or virtual machine on every mobile device.

  • Pub Date: 2009/30/12
  • Number: 08719776
  • Owner: Foneclay, Inc.
  • Location: Rancho Santa Fe, US
  • Details: Visit USPTO

Visit USPTO Page


System and unified setting interface for configuring network manageable devices

A unified setting interface that enables a management application to configure network manageable devices, regardless of their type or manufacturer. Configuration of a network manageable device requires that certain information be provided to the network manageable device. For different types of devices from different manufacturers, this information and its format can vary. A management application using the unified setting interface does not require the individual interfaces for configuring network manageable devices from different manufacturers.

  • Pub Date: 2009/30/12
  • Number: 08849973
  • Owner: GTEKO, Ltd.
  • Location: Ra' Anana, IL
  • Details: Visit USPTO

Visit USPTO Page


Storing a variable number of instances of data objects

Described are systems and methods for storing a variable number of instances of data objects (e.g., 1, 2, 3, or up to N−1 instances, where N is the number of instances of the data object included in primary data) in secondary storage across a data storage network. In some examples, a system for storing a variable number of instances of data objects includes, one or more computing devices storing a set of data objects and multiple storage devices distinct from the one or more computing devices. Each of the multiple storage devices is configured to store at least a single instance of a data object. The system also includes a database configured to store information associated with the data objects. This information includes substantially unique identifiers for the data objects and, for each of the data objects, a number of instances of the data object stored on the multiple storage devices.

  • Pub Date: 2009/30/12
  • Number: 08401996
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing automatic controlled value expansion of information

An approach is provided for automatic controlled value expansion of information. A value expansion controller detects a request at a device to perform an information operation on a set of data elements of an information space, wherein the request identifies the set by a name and the information operation applies to each data element within the set. The value expansion controller intercepts the request based on the detection and determines the location of the data elements within a communication network based on the name. The value expansion controller retrieves the data elements from the location and populates an expansion table with the retrieved data elements, wherein the expansion table is correlated to the set. The value expansion controller performs the information operation on each data element in the expansion table and causes transmission of one or more results of the information operation to the device.

  • Pub Date: 2009/30/12
  • Number: 08271433
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Enabling the use of process flow applications within an information management system (IMS)

An IMS process flow toolset can be used to create an IMS process flow application. The IMS process flow application can include an IMS process flow control program. The IMS process flow control program can embody process flow elements such as business logic and events as well as communication with external non-IMS applications. Both the IMS process flow application and IMS process flow control program can be run within the IMS.

  • Pub Date: 2009/30/12
  • Number: 08375353
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Elastic wave device and electronic component

To provide an elastic wave device that is small sized and in which a frequency fluctuation due to a change with time hardly occurs, and an electronic component using the above elastic wave device. A trapping energy mode portion provided in an elastic wave waveguide made of an elastic body material excites a second elastic wave being an elastic wave in an energy trapping mode by a specific frequency component included in a first elastic wave being an elastic wave in a first or higher-order propagation mode propagated from a first propagation mode portion , and a cutoff portion provided in a peripheral region of the trapping energy mode portion has a cutoff frequency being a frequency higher than that of the second elastic wave. A second propagation mode portion mode-converts the second elastic wave leaked through the cutoff portion to a third elastic wave being the elastic wave in the propagation mode to propagate the third elastic wave.

  • Pub Date: 2009/30/12
  • Number: 08237329
  • Owner: Nihon Dempa Kogyo Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Display data management techniques

Embodiments provide techniques for generation and outputting of display data. For instance, embodiments provide features involving frame data storage within display devices. Also, embodiments provide features involving the isolation of different user contexts to different frame buffers. Further, embodiments provide efficient techniques for saving frame data upon the transitioning between power states. Moreover, embodiments provide techniques for flexibly and dynamically allocating multiple display content to a physical display.

  • Pub Date: 2009/30/12
  • Number: 08760459
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Customizing function behavior based on cache and scheduling parameters of a memory argument

Disclosed are a method, a system and a computer program product of operating a data processing system that can include or be coupled to multiple processor cores. In one or more embodiments, each of multiple memory objects can be populated with work items and can be associated with attributes that can include information which can be used to describe data of each memory object and/or which can be used to process data of each memory object. The attributes can be used to indicate one or more of a cache policy, a cache size, and a cache line size, among others. In one or more embodiments, the attributes can be used as a history of how each memory object is used. The attributes can be used to indicate cache history statistics (e.g., a hit rate, a miss rate, etc.).

  • Pub Date: 2009/30/12
  • Number: 08949529
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Compression for co-processing techniques on heterogeneous graphics processing units

The graphics co-processing technique includes rendering a frame of red, green, blue (RGB) data on a graphics processing unit on an unattached adapter. The frame of RGB data are converted on the graphics processing unit on the unattached adapter to luminance-color difference (YUV) data. The YUV data is copied from frame buffers of the graphics processing unit on the unattached adapter to buffers in system memory. The YUV data is copied from the buffers in the system memory to texture buffers of a graphics processing unit on a primary adapter. A frame of RGB data is recovered from the YUV data in the texture buffer of the graphics processing unit on the primary adapter. The recovered frame of RGB data may then be presented by the graphics processing unit on the primary adapter on the primary display.

  • Pub Date: 2009/30/12
  • Number: 08773443
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Automated content and bookmark distribution

A method of submitting content on behalf of a client to multiple service providers includes the steps of receiving a request from a client to submit content to a plurality of service providers and retrieving client login information necessary to submit the content to the plurality of service providers, logging on to the service providers using the client login information. The method also includes the steps of identifying service providers that include a human verification request before submitting the content, developing a queue of the human verfication request, and dispatching the human verification requests to one or more processing consoles used by operators who do not have knowledge of the underlying content submission request. The method further includes the steps of submitting responses to the human verification request through a processing console and submitting the content to each of the plurality of service providers through a client device. The responses are routed through the client device to the service providers to submit the responses and the content submitted to a service provider is formatted in accordance with such sevice provider. The server performs the steps of proccssing, retrieving, logging on, and submitting automatically after the request is received without additional input from the client.

  • Pub Date: 2009/30/12
  • Number: 08161102
  • Owner: Onlywire, LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Anode materials for lithium-ion batteries

An anode material for lithium-ion batteries is provided that comprises an elongated core structure capable of forming an alloy with lithium; and a plurality of nanostructures placed on a surface of the core structure, with each nanostructure being capable of forming an alloy with lithium and spaced at a predetermined distance from adjacent nanostructures.

  • Pub Date: 2009/30/12
  • Number: 08920970
  • Owner: University of Louisville Research Foundation
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods implementing non-shared page tables for sharing memory resources managed by a main operating system with accelerator devices

Systems and methods are provided that utilize non-shared page tables to allow an accelerator device to share physical memory of a computer system that is managed by and operates under control of an operating system. The computer system can include a multi-core central processor unit. The accelerator device can be, for example, an isolated core processor device of the multi-core central processor unit that is sequestered for use independently of the operating system, or an external device that is communicatively coupled to the computer system.

  • Pub Date: 2009/29/12
  • Number: 08719543
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Outgoing communications inventory

Systems and methods for generating and accessing a communications inventory are provided. To generate the inventory in one embodiment, a plurality of outgoing communications is received. The outgoing communications may have been auto-generated or generated as part of a batch process. Next, a determination is made that a first outgoing communication of the plurality of outgoing communications is unique relative to other outgoing communications to avoid storing duplicate messages. Lastly, a user may access a display of the first outgoing communication.

  • Pub Date: 2009/29/12
  • Number: 09001673
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for filtering video data using a programmable graphics processor

Video filtering using a programmable graphics processor is described. The programmable graphics processor may be programmed to complete a plurality of video filtering operations in a single pass through a fragment-processing pipeline within the programmable graphics processor. Video filtering functions such as deinterlacing, chroma up-sampling, scaling, and deblocking may be performed by the fragment-processing pipeline. The fragment-processing pipeline may be programmed to perform motion adaptive deinterlacing, wherein a spatially variant filter determines, on a pixel basis, whether a “bob”, a “blend”, or a “weave” operation should be used to process an interlaced image.

  • Pub Date: 2009/29/12
  • Number: 08520009
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for dynamically grouping items in applications

Techniques for dynamically grouping items include determining context associated with each group comprising one or more items; and determining current context at a device. In response to determining that prompted prompt is presented for input to indicate an item, a suggested group is determined based on the current context at the device and relevance of a context associated with the suggested group. The suggested group is presented. In some embodiments, prompted prompt is presented to name a suggested group; and, in response, data indicating the suggested group is stored as a permanent group associated with the name. In some embodiments, relevance is determined for each item of a group. A group avatar is generated based on M images associated with the items that have the most relevance.

  • Pub Date: 2009/29/12
  • Number: 09335893
  • Owner: HERE GLOBAL B.V.
  • Location: Veldhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Hypervisor isolation of processor cores to enable computing accelerator cores

Techniques for utilizing processor cores include sequestering processor cores for use independently from an operating system. In at least one embodiment of the invention, a method includes executing an operating system on a first subset of cores including one or more cores of a plurality of cores of a computer system. The operating system executes as a guest under control of a virtual machine monitor. The method includes executing work for an application on a second subset of cores including one or more cores of the plurality of cores. The first and second subsets of cores are mutually exclusive and the second subset of cores is not visible to the operating system. In at least one embodiment, the method includes sequestering the second subset of cores from the operating system.

  • Pub Date: 2009/29/12
  • Number: 09058183
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


High-performance, scalable, adaptive and multi-dimensional event repository

A High-Performance, Scalable, Adaptive and Multi-dimensional Event Repository is described and utilized in a method for publishing an event in a database. The present method includes transparently intercepting a request to a database to publish an event. A messaging system operable with the database intercepts the request. The present method further includes examining an event repository for a template of the event. The event repository is operable with the database and the messaging system. The present method additionally includes retrieving the event template from the event repository. The present method also includes marshalling the event template to create the event. The present method also includes publishing the event in an event queue.

  • Pub Date: 2009/29/12
  • Number: 08631024
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic hosted shopping cart

Systems and methods are provided for a Dynamic Hosted Shopping Cart. According to one embodiment, a method comprises configuring a Dynamic Hosted Shopping Cart (DHSC) at a remote server based on communications with a buyer device and at least one seller's server that hosts one or more seller websites. The method also comprises embedding in or floating a widget above the one or more seller websites in connection with the DHSC. The method further comprises dynamically updating contents of the DHSC implemented by the widget according to communicated transaction information. In addition, the method comprises offering checkout across all enabled pages of the one or more seller websites.

  • Pub Date: 2009/29/12
  • Number: 08170921
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Clustered file system for mix of trusted and untrusted nodes

A cluster of computer system nodes share direct read/write access to storage devices via a storage area network using a cluster filesystem. At least one trusted metadata server assigns a mandatory access control label as an extended attribute of each filesystem object regardless of whether required by a client node accessing the filesystem object. The mandatory access control label indicates the sensitivity and integrity of the filesystem object and is used by the trusted metadata server(s) to control access to the filesystem object by all client nodes.

  • Pub Date: 2009/29/12
  • Number: 08151347
  • Owner: Silicon Graphics International
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices to manage routing communications between connected computer networks

Techniques are described for providing managed virtual computer networks whose configured logical network topology may have one or more virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of a virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. The networking functionality provided for a managed computer network may include supporting a connection between that managed computer network and one or more other managed computer networks, such as via a provided virtual peering router to which each of the managed computer networks may connect, with the functionality of the virtual peering router being emulated by modules of the configurable network service without physically providing the virtual peering router, including to manage routing communications between the inter-connected managed computer networks in accordance with client-specified configuration information.

  • Pub Date: 2009/28/12
  • Number: 07953865
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices to connect managed computer networks

Techniques are described for providing managed virtual computer networks whose configured logical network topology may have one or more virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of a virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. The networking functionality provided for a managed computer network may include supporting a connection between that managed computer network and other managed computer networks, such as via a provided virtual peering router to which each of the managed computer networks may connect, with the functionality of the virtual peering router being emulated by modules of the configurable network service without physically providing the virtual peering router, including to manage data communications between computing nodes of the inter-connected managed computer networks in accordance with client-specified configuration information.

  • Pub Date: 2009/28/12
  • Number: 07991859
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices and routing information to initiate external actions

Techniques are described for providing managed virtual computer networks that have a configured logical network topology with virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the virtual networking devices if they were physically present. In some situations, the networking functionality provided for a managed computer network of a client includes receiving routing communications directed to the virtual networking devices, and using included routing information to identify and initiate external actions whose effects are not related to how network communications between computing nodes of the managed computer network are configured to be routed or otherwise forwarded through the managed computer network, such as external actions that affect devices that are not part of the managed computer network, or other types of external actions.

  • Pub Date: 2009/28/12
  • Number: 08224971
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Treatment of tissue in sphincters, sinuses, and orifices

The invention comprises a method and apparatus for treatment of a body part. More particularly, a method and apparatus for heat treatment of tissue using a catheter inserted into a body part is described along with means for positioning the catheter and means for positioning a set of electrodes relative to a tissue sample for treatment. Still more particularly, radio frequency energy at about 400 to 500 kilohertz is used to provide heat for the tissue treatment.

  • Pub Date: 2009/28/12
  • Number: 08353908
  • Owner: Novasys Medical, Inc.
  • Location: Newark, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for verification of repeatable virtualized computing

A physical computer system includes a processor and a memory configured to store instructions executable by the processor to implement a virtualization module, which in turn implements virtual machine(s) as a service on behalf of clients. Each virtual machine executes an operating system that is distinct from any underlying operating system executed by the physical computer system. The virtualization module instructs that the virtual machine(s) perform a computation that has been identified as a repeatable computation, to generate an original terminal state of the repeatable computation. In response to a request to repeat the repeatable computation, the virtualization module instructs that the virtual machine(s) perform the repeatable computation to generate a new terminal state of the repeatable computation, and, dependent upon a comparison of the original and new terminal states, to determine whether the repeatable computation has been successfully repeated according to a success criterion.

  • Pub Date: 2009/28/12
  • Number: 08347288
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Service adaptation definition language

A back-end service adaptation system provides access to normalized data in a data repository for a consumer runtime environment sending a query request for denormalized data. The back-end service adaptation system can include a data access service layer, a parser layer, and a back-end service adaptation runtime layer. The consumer runtime can use a service adaptation definition language (SADL), and the parser and data access service can be configured to convert and translate the SADL request for the back-end service adaptation runtime layer.

  • Pub Date: 2009/28/12
  • Number: 08387030
  • Owner: SAP AG
  • Location: Waldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Progress-driven progress information in a service-oriented architecture

A system may include reception of the first instruction, execution of the business process in a first software work process, reception, during execution of the business process, of an indication of a business object process associated with the business process, determination of progress information associated with the business process based on the indication of the business object process, and storage of the progress information within a memory. Aspects may further include reception, at a second work process, of a request from the client application for progress information, retrieval of the progress information from the shared memory and provision of the progress information to the client application.

  • Pub Date: 2009/28/12
  • Number: 08739166
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Progress information in a service-oriented architecture

A system may include reception of an instruction to execute a business process from a client application, execution of the business process in a first software work process, and storage, during execution of the business process, of progress information associated with the business process within a memory. A system may further include reception, at a second software work process, of a request from the client application for progress information, retrieval, in the second software work process, of the progress information from the shared memory, reception, at the second software work process, of the progress information from the memory, and provision of the progress information to the client application from the second software work process.

  • Pub Date: 2009/28/12
  • Number: 09536222
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Progress information in a service-oriented architecture

A system may include reception of an instruction to execute a business process from a client application, execution of the business process in a first software work process, and storage, during execution of the business process, of progress information associated with the business process within a memory. A system may further include reception, at a second software work process, of a request from the client application for progress information, retrieval, in the second software work process, of the progress information from the shared memory, reception, at the second software work process, of the progress information from the memory, and provision of the progress information to the client application from the second software work process.

  • Pub Date: 2009/28/12
  • Number: 09536222
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Preventing biofilm formation on implantable medical devices

Biodegradable polymer-coated surgical meshes formed into pouches are described for use with cardiac rhythm management devices (CRMs) and other implantable medical devices. Such meshes are formed into a receptacle, e.g., a pouch or other covering, capable of encasing, surrounding and/or holding the cardiac rhythm management device or other implantable medical device and preventing or retarding the formation of a biofilm.

  • Pub Date: 2009/28/12
  • Number: 08315700
  • Owner: TYRX, Inc.
  • Location: Monmouth Junction, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-language support for service adaptation

A plurality of domain-specific service adaptation languages can be supported by a back-end service adaptation system to provide runtime access to a runtime instance of a data object comprising data stored in a repository. By defining a language-specific data access service and parser for each domain-specific service adaptation language, a single, service adaptation language-independent compiler and interpreter can prepare and execute a runtime load that includes an execution plan for retrieving and converting data from the repository for delivery in a data object according to a query request from a consumer runtime environment. A consumer using the consumer runtime environment can define the service adaptation language to be used and provide a parser and source code to enable access to business object data using the back-end service adaptation system.

  • Pub Date: 2009/28/12
  • Number: 08726229
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses to optimize updates in a file system based on birth time

Methods and apparatuses that maintain birth time for a file system to optimize file update operations are described. The file system can include a plurality of snapshots or clones of data stored in one or more extents of blocks allocated in a storage device. Each extent may be associated with a time stamp according to the birth time. A request may be received from an executable using the file system to update data in a particular extent associated with a particular time stamp. In response, the current birth time in the file system and the particular time stamp may be compared to determine if the particular extent is not shared by more than one of the snapshots. If the particular time stamp is equal to the current birth time, the particular extent may be updated directly without performing an expensive operation to check whether a reference count of the particular extent is equal to one.

  • Pub Date: 2009/28/12
  • Number: 08849876
  • Details: Visit USPTO

Visit USPTO Page


Method, computer program product and apparatus for providing an interactive network simulator

An apparatus for providing an interactive network simulator may include processing circuitry configured to at least perform receiving an indication of messages or responses exchanged between a testing platform simulating one or more external systems and a system under test, storing data corresponding to the indications received, and providing for a visual display of information related to the indications received to a user interacting with the testing platform. A corresponding method and computer program product are also provided.

  • Pub Date: 2009/28/12
  • Number: 08660833
  • Owner: McKesson Financial Holdings
  • Location: Hamilton, BE
  • Details: Visit USPTO

Visit USPTO Page


MetAP-2 inhibitor polymersomes for therapeutic administration

The present invention provides methods to treating inflammation related disease and disorders such as an autoimmune disease and autoimmune related uveitis by administering compositions and formulations comprising MetAP-2 inhibitors as disclosed herein. The composition comprises a formulation of a fumagillol derivative that retains anti-inflammation activity and is associated with a block copolymer comprising a hydrophilic polymer moiety and a hydrophobic polymer moiety.

  • Pub Date: 2009/28/12
  • Number: 08790634
  • Owner: Children's Medical Center Corporation
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Comparison of virtual computing states by performing identified repeatable computations in a changing virtual computing environment

A physical computer system includes a processor and a memory configured to store instructions executable by the processor to implement a virtualization module, which in turn implements virtual machine(s) that execute an operating system distinct from any underlying operating system executed by the physical computer system. In response to a client request to initially perform a repeatable computation, the virtualization module instructs that the virtual machine(s) archive an original initial state of the repeatable computation, initially perform the repeatable computation, and archive an original terminal state of the repeatable computation. In response to a client request to repeat the repeatable computation, the virtualization module instructs that the virtual machine(s) be initialized according to configuration information indicated by the archived original initial state of the repeatable computation, and that the one or more virtual machines perform the repeatable computation to generate a new terminal state of the repeatable computation.

  • Pub Date: 2009/28/12
  • Number: 08572613
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Block-level single instancing

Described in detail herein are systems and methods for single instancing blocks of data in a data storage system. For example, the data storage system may include multiple computing devices (e.g., client computing devices) that store primary data. The data storage system may also include a secondary storage computing device, a single instance database, and one or more storage devices that store copies of the primary data (e.g., secondary copies, tertiary copies, etc.). The secondary storage computing device receives blocks of data from the computing devices and accesses the single instance database to determine whether the blocks of data are unique (meaning that no instances of the blocks of data are stored on the storage devices). If a block of data is unique, the single instance database stores it on a storage device. If not, the secondary storage computing device can avoid storing the block of data on the storage devices.

  • Pub Date: 2009/28/12
  • Number: 08578120
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


High-strength and high-electrical conductivity copper alloy rolled sheet and method of manufacturing the same

In a high-strength and high-electrical conductivity copper alloy rolled sheet, 0.14 to 0.34 mass % of Co, 0.046 to 0.098 mass % of P, 0.005 to 1.4 mass % of Sn are contained, [Co] mass % representing a Co content and [P] mass % representing a P content satisfy the relationship of 3.0≦([Co]−0.007)/([P]−0.009)≦5.9, a total cold rolling ratio is equal to or greater than 70%, a recrystallization ratio is equal to or less than 45% a an average grain size of recrystallized grains is in the range of 0.7 to 7 μm, an average grain diameter of precipitates is in the range of 2.0 to 11 nm, and an average grain size of fine crystals is in the range of 0.3 to 4 μm. By the precipitates of Co and P, the solid solution of Sn, and fine crystals, the strength, conductivity and ductility of the copper alloy rolled sheet are improved.

  • Pub Date: 2009/25/12
  • Number: 09455058
  • Owner: MITSUBISHI SHINDOH CO., LTD.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Transporting object packets in a nested system landscape

Described are methods and systems related to transporting one or more object packets present in a nested hierarchy of one or more system landscapes. The object packets available for transporting from source systems to target systems present in the nested hierarchy of the system landscapes is identified. A transport request is generate for a collection of object packets of each source system in the nested hierarchy of the system landscapes. The transport requests are aggregated to render a nested transport collection. The nested transport collection is transported within the nested hierarchy of the system landscapes. The nested transport collection is deployed to assign the transport requests present in the nested transport collection to the target systems present in the nested hierarchy of the system landscapes.

  • Pub Date: 2009/24/12
  • Number: 08566814
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Reducing energy consumption in a cloud computing environment

Functionality can be implemented within a cloud manager to leverage energy consumption data of cloud processing and their associated facility resources when selecting computing nodes to complete the job. The cloud manager can determine possible computing nodes to complete the job based on the job attributes. The cloud manager can determine aggregate energy data of the cloud resources from an energy usage database. The cloud manager can analyze the energy usage data to determine a configuration of the computing nodes to perform the job that reduces total energy consumption. For example, a configuration of servers can be based on a number of servers and processor utilization at the servers to perform the job. The cloud manager can assign the job to the servers and set the processor utilization at the servers in accordance with the resource configuration determined to minimize energy consumption.

  • Pub Date: 2009/24/12
  • Number: 08341441
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Carbon-based sorbent for gas storage, and method for preparation thereof

The method enables control over carbon pore structure to provide sorbents that are particularly advantageous for the adsorption of specific gases. It involves preparation of a sorbent precursor material, carbonization of the precursor material, and, usually, activation of the carbonized material. The resultant material is subjected to heat treatment and/or to surface conditioning by a reducing gas at elevated temperatures.

  • Pub Date: 2009/24/12
  • Number: 08231712
  • Owner: Advanced Fuel Research, Inc.
  • Location: East Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive resource management using survival minimum resources for low priority consumers

Allocation of resources across multiple consumers allows efficient utilization of shared resources. Observed usages of resources by consumers over time intervals are used to determine a total throughput of resources by the consumers. The total throughput of resources is used to determine allocation of resources for a subsequent time interval. The consumers are associated with priorities used to determine their allocations. Minimum and maximum resource guarantees may be associated with consumers. The resource allocation aims to allocate resources based on the priorities of the consumers while aiming to avoid starvation by any consumer. The resource allocation allows efficient usage of network resources in a database storage system storing multiple virtual databases.

  • Pub Date: 2009/24/12
  • Number: 09106591
  • Owner: Delphix Corporation
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Web-enabled conferencing and meeting implementations with a subscription-based model

Meeting and conferencing systems and methods are implemented in a variety of manners. Consistent with an embodiment of the present disclosure, a meeting system is implemented that includes a computer server arrangement with at least one processor. The computer server arrangement is configured to provide a web-based meeting-group subscription option to potential meeting participants. A meeting scheduling data is received over a web-accessible virtual meeting interface. The meeting scheduling data includes group identification information and meeting time information. In response to the group identification information, participant identification information is retrieved for participants that subscribe to a meeting group identified by the group identification information. In response to the meeting time information and the participant identifying information, audio connections are established for participants of the meeting. Merged audio from the established audio connections is provided to the participants over the established audio connections.

  • Pub Date: 2009/23/12
  • Number: 08914734
  • Owner: 8x8, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Time debugging

A design time debugging tool provides debugging information available from the compiler during design time, as if a user were debugging code that provided the debugging information, by exposing information available from the compiler without initiation of a debugging session and without executing the program being debugged.

  • Pub Date: 2009/23/12
  • Number: 08621435
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Telephony and data network services at a telephone

A packetised data network includes IP telephones (ITs) and a network intelligence (NI). All of the keys of each IT are “soft” keys (i.e., they have no fixed function). The NI associates a configuration data structure with the IT which correlates the keys with functions, and, based on this, may control the display of the IT to indicate the current function of certain of the soft keys. Some of the functions are requests for data services at the telephone (e.g., video or programmed audio over the internet). When a user requests such a service with a key press, the NI sets up the service between the data source and the telephone. This may require associating a new configuration data structure with the keys of the IT. The IT user may activate multiple data services through the NI.

  • Pub Date: 2009/23/12
  • Number: 08964727
  • Owner: Rockstar Consortium US LP
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for server surge protection in a multi-core system

The present application is directed towards systems and methods for providing connection surge protection to one or more servers by an intermediary multi-core system. A packet processing engine of a multi-core device deployed as an intermediary between a plurality of clients and one or more servers determines an estimated number of total pending requests received by all packet processing engines based on a value of a local counter of received requests, the total number of pending requests received by all other packet processing engines at a last predetermined interval, and a rate of change of the total number of pending requests received by all other packet processing engines multiplied by the time since the last predetermined interval. The packet processing engine applies a surge protection policy to received pending requests responsive to the determined estimated number of total pending requests.

  • Pub Date: 2009/23/12
  • Number: 08463887
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for queue level SSL card mapping to multi-core packet engine

The present invention is directed towards systems and methods for distributed operation of a plurality of cryptographic cards in a multi-core system. In various embodiments, a plurality of cryptographic cards providing encryption/decryption resources are assigned to a plurality of packet processing engines in operation on a multi-core processing system. One or more cryptographic cards can be configured with a plurality of hardware or software queues. The plurality of queues can be assigned to plural packet processing engines so that the plural packet processing engines share cryptographic services of a cryptographic card having multiple queues. In some embodiments, all cryptographic cards are configured with multiple queues which are assigned to the plurality of packet processing engines configured for encryption operation.

  • Pub Date: 2009/23/12
  • Number: 08675674
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for processing application firewall session information on owner core in multiple core system

The present invention is directed towards systems and methods for sharing session data among cores in a multi-core system. A first application firewall module executes on a core of a multi-core intermediary device which establishes a user session. The first application firewall module stores application firewall session data to memory accessible by the first core. A second application firewall module executes on a second core of the multi-core intermediary device. The second application firewall module receives a request from the user via the established user session. The request includes a session identifier identifying that the user session was established by the first core. The second application firewall module determines to perform one or more security checks on the request and communicates a portion of the request the first core. The second application firewall module receives and processes the security check results and instructions from the first core.

  • Pub Date: 2009/23/12
  • Number: 08438626
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for prevention of JSON attacks

Described herein is a method and system for prevention of personal computing attacks, such as JavaScript Objection Notation (JSON) attacks. An intermediary device is deployed between a plurality of clients and servers. A firewall executes on the intermediary device. A client sends a request to the server and the server sends a response to the request. The intermediary device intercepts the response and identifies that the response may contain possibly harmful content. The application firewall parses the content of the response and determines whether it contains any harmful content. If it does, the application firewall blocks the response from being sent to its destination. Additionally, the method and system can provide other security checks, such as content hijacking protection and data validation.

  • Pub Date: 2009/23/12
  • Number: 09094435
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for policy based transparent client IP insertion

The present disclosure presents systems and methods for maintaining an original source IP address of a request by an intermediary network device despite the source IP address being modified by a cache server during an unfulfilled cache request. An intermediary receives a request from a client to access a destination server via a first transport layer connection. The client request identifies the client's IP address as a source IP address. The intermediary transmits to a cache server, via a second transport layer connection, the client request as a second request modified to include the client IP address of the first request in a header. The intermediary device receives, via a third connection, the second request as a third request from the cache server. The intermediary device obtains the client IP address from the header of the third request and transmits to the server identified in the first request the third request as a fourth request identifying the client IP address as the source IP address.

  • Pub Date: 2009/23/12
  • Number: 08200752
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for policy based integration to horizontally deployed WAN optimization appliances

The present disclosure presents systems and methods for policy based redirection of network traffic, by an intermediary device, to a horizontally deployed WAN device. An intermediary receives a request from a client to access a server. The request was previously modified by a first WAN device to include information in a first option field of a transport layer. The intermediary may determine, responsive to a redirection policy, to send the request to a second WAN optimization device deployed horizontally from the intermediary, instead of the server. The intermediary transmits the request to the second WAN optimization device, while maintaining the information from the first option field. The intermediary device receives the request including the information in the first option field identifying the first WAN optimization device to the second WAN optimization device. The intermediary receives a modified request from the second WAN device, the modified request determined by the intermediary to be sent to the destination server.

  • Pub Date: 2009/23/12
  • Number: 08965955
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for object rate limiting in multi-core system

The present invention is directed towards systems and methods for managing a rate of request for an object transmitted between a server and one or more clients via a multi-core intermediary device. A first core of the intermediary device can receive a request for an object and assume ownership of the object. The first core can store the object in shared memory along with a rate-related counter for the object and generate a hash to the object and counter. Other cores can obtain the hash from the first core and access the object and counter in shared memory. Policy engines and throttlers in operation on each core can control the rate of access to the stored object.

  • Pub Date: 2009/23/12
  • Number: 08452835
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for mixed mode handling of IPv6 and IPv4 traffic by a virtual server

The present invention is directed towards systems and methods for mixed-mode load balancing by a virtual server in a network supporting a plurality of internet protocols. In various embodiments, a mixed-mode virtual server receives service requests based on two or more internet layer protocols. The mixed-mode virtual server is configured to detect an IP address type of the client issuing the service request, and identify the internet protocol of the service request based on the detected IP address type. The mixed-mode virtual server can then forward the request to a server supporting the identified internet protocol. In this manner, the mixed-mode virtual server can bind load balance servers supporting a plurality of internet protocols.

  • Pub Date: 2009/23/12
  • Number: 09054943
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing static proximity in multi-core GSLB appliance

The present invention is directed towards systems and methods for providing static proximity load balancing via a multi-core intermediary device. An intermediary device providing global server load balancing identifies a size of a location database comprising static proximity information. The intermediary device stores the location database to an external storage of the intermediary device responsive to determining the size of the location database is greater than a predetermined threshold. A first packet processing engine on the device receives a domain name service request for a first location, determines that proximity information for the first location is not stored in a first memory cache, transmits a request to a second packet processing engine for proximity information of the first location, and transmits a request to the external storage for proximity information of the first location responsive to the second packet processing engine not having the proximity information.

  • Pub Date: 2009/23/12
  • Number: 08635367
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing preferred client connectivity to servers via multi-core system

The present application is directed towards systems and methods for providing a cookie by an intermediary device comprising a plurality of packet processing engines executing on a corresponding plurality of cores, the cookie identifying a session of a user that was redirected responsive to a service exceeding a response time limit. The cookie may be generated with identifiers based off a name of a virtual server managing a service of a server, and a name of a policy associated with the virtual server. Each packet processing engine of the plurality of packet processing engines may interpret cookies generated by other packet processing engines due to the name of the virtual server and name of the policy, and may provide preferred client connectivity based on cookies included in requests for access to a service.

  • Pub Date: 2009/23/12
  • Number: 08392562
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing dynamic proximity in multi-core GSLB appliance

The present invention is directed towards systems and methods for providing dynamic proximity load balancing via a multi-core intermediary device. An intermediary device providing global server load balancing (GSLB) identifies a local domain name service (LDNS) entries database and assigns each LDNS entry in the LDNS entries database to one of the plurality of packet processing engine base on a source internet protocol (IP) address of each LDNS entry. The first packet processing engine on the appliance receives a LDNS request for an IP address, determines that the LDNS entry for the IP address is assigned to a second packet processing engine of the plurality of packet processing engines, transmits a request to the second packet processing engine for the LDNS entry for the IP address, and determines a response to the LDNS request based on the LDNS entry for the IP address received from the second packet processing engine.

  • Pub Date: 2009/23/12
  • Number: 08230054
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for maintaining transparent end to end cache redirection

The present disclosure presents systems and methods for maintaining original source and destination IP addresses of a request while performing intermediary cache redirection. An intermediary receives a request from a client destined to a server identifying a client IP address as a source IP address and a server IP address as a destination IP address. The intermediary transmits the request to a cache server, the request maintaining original IP addresses and identifying a MAC address of the cache server as the destination MAC address. The intermediary receives the request from the cache server responsive to a cache miss, the received request maintaining the original source and destination IP addresses. The intermediary identifying that the third request is coming from the cache server via one or more data link layer properties of the third transport layer connection. The intermediary transmits to the server the request identifying the client IP address as the source IP address and the server IP address as the destination IP address.

  • Pub Date: 2009/23/12
  • Number: 08769156
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for listening policies for virtual servers of appliance

The present invention is directed towards a method for using a listening policy for a virtual server on an intermediary device. An intermediary device establishes for a first virtual server a first listening policy with an expression for evaluating packets received by the intermediary device to determine whether the packet may access the first virtual server. The intermediary device listens for packets at a first internet protocol (IP) address and a first port specified for the first virtual server. Then, the intermediary device evaluates the expression of the first listening policy to a first packet received at the first IP address and first port and determines whether to provide the first packet to the first virtual server based on a result of the evaluation.

  • Pub Date: 2009/23/12
  • Number: 08654659
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for GSLB spillover

The present invention is directed towards systems and methods for global server load balancing spillover. An intermediary device providing global server load balancing (GSLB) identifies a spillover threshold for a first GSLB virtual server of the intermediary device. The first GSLB virtual server resolving DNS requests to a remote site of a plurality of remote sites. The intermediary device monitors spillover related statistics of each of a plurality of services at the plurality of remote sites, establishes a first spillover aggregate statistic for the plurality of services, determines that the first spillover aggregate statistic exceeds the spillover threshold for the first GSLB virtual server, and receives a DNS request and directing the DNS request to a second GSLB virtual server of the intermediary device responsive to the determination.

  • Pub Date: 2009/23/12
  • Number: 08255528
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for GSLB MEP connection management across multiple core appliances

The present disclosure presents systems and methods for obtaining metric information by a multi-core GSLB intermediary device and providing global server load balancing services using the obtained information. A first core of a multi-core GSLB appliance establishes a transport layer connection to a remote load balancer at a site of a plurality of sites. The first core transmits a message to each of the other cores of the multi-core GSLB appliance that that the first core is a master core for receiving metric information from the load balancer. The first core receives metric information of the remote site from the load balancer. The first core propagates the metric information to each of the other cores of the GSLB appliance. A GSLB virtual server on a slave core receives a DNS request. The GSLB virtual server determines a DNS resolution for the DNS request based on the metric information.

  • Pub Date: 2009/23/12
  • Number: 08412832
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in multi-core system

The present application is directed towards systems and methods for generating and maintaining cookie consistency for security protection across a plurality of cores in a multi-core system. A packet processing engine executing on one core designated as a primary packet processing engine generates and maintains a global random seed. The global random seed may be used as an initial seed for creation of cookie signatures by each of a plurality of packet processing engines executing on a plurality of cores of the multi-core system using a deterministic pseudo-random number generation function such that each core creates an identical set of cookie signatures.

  • Pub Date: 2009/23/12
  • Number: 08380994
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for flash crowd control and batching OCSP requests via online certificate status protocol

The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers receives a first client certificate during a first SSL handshake with a first client and a second client certificate during a second SSL handshake with a second client. The intermediary may identify that the statuses of the client certificates are not in a cache of the intermediary. An OCSP responder of the intermediary may transmit a single request to an OCSP server to determine the statuses. The intermediary may determine, from a single response received from the OCSP server, whether to establish SSL connections with the clients based on the statuses. The intermediary may store the statuses to the cache for determining whether to establish a SSL connection in response to receiving a client certificate from the first client.

  • Pub Date: 2009/23/12
  • Number: 08627063
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for evaluating and prioritizing responses from multiple OCSP responders

The present invention is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP) request. An intermediary device between a plurality of clients and one or more servers identifies a plurality of OCSP responders for determining a status of a client certificate responsive to receiving the client certificate from a client during a Secure Socket Layer (SSL) handshake. Each of the plurality of OCSP responders may transmit a request for the status of the client certificate to a uniform resource locator corresponding to each OCSP responder. The intermediary device may determine a single status for the client certificate from a plurality of statuses of the client certificate received via responses from each uniform resource locator.

  • Pub Date: 2009/23/12
  • Number: 08621204
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for efficient Xpath processing

The present invention is directed towards systems and methods for efficient Xpath matching of a document comprising Extensible Markup Language (XML) or JavaScript Object Notation (JSON). A Xpath engine identifies an Xpath expression for processing values in the document, which is represented by a stack of nodes. The device may traverse the stack from top to bottom to match each step of the Xpath expression to a type and name of one or more nodes in the stack. The device may store a flag in each node that matches a step of the Xpath expression. Responsive to encountering a leaf node, the device may trace bottom to top from the leaf node to one or more flagged nodes in the stack and compare each flagged node against a corresponding step of the path expression. Responsive to the tracing of the flagged nodes, the device determines if the path expression is matched.

  • Pub Date: 2009/23/12
  • Number: 09298846
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for determining a good RSS key

The present application is directed towards systems and methods for ensuring equal distribution of packet flows among a plurality of cores in a multi-core system by identifying a rank of a matrix created from a hash key. If the rank of the matrix is equal to or greater than a divisor of a modulo operation applied to the results of the hash function, then the hash key may be used to ensure equal distribution of packet flows.

  • Pub Date: 2009/23/12
  • Number: 08082359
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for triaging of information feeds

A system and method for triaging of information feeds is provided. A plurality of information feeds are received. At least one topic is identified from each information feed. At least one topic is presented to a user in topic facet including a plurality of identified topics. A selection of one of the plurality of topics is received from the user. The user interface is updated to display only the feeds that contain the selected topic.

  • Pub Date: 2009/23/12
  • Number: 08874577
  • Owner: Palo Alto Research Center Incorporated
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for aggregating user data and targeting content

Systems and methods for aggregating user data and targeting content to users are described. User data is collected through quizzes and users are associated with a particular fictional or nonfictional character profile based on the user-submitted information. The user data associated with each character profile is aggregated to identify and recommend content for the user, such as television shows, news feed, web pages, promotions, advertisements, and the like. The invention can be used in connection with fan sites or other topic-specific sites that are associated with the character of the character profile.

  • Pub Date: 2009/23/12
  • Number: 08448204
  • Owner: CBS Interactive Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Supercavitating projectile tracking system and method

A system for three-dimensional tracking of high speed undersea projectiles may utilize a distributed field of randomly positioned passive acoustic sensors. The system measures variables related to the pressure field generated by a supercavitating projectile in flight wherein the amplitude of the pressure generated at a point in space is related to the projectile dimensions, velocity, and trajectory. The system iteratively processes data from the sensors to measure launch velocity, flight direction (trajectory), ballistic coefficient (drag), and/or maximum range.

  • Pub Date: 2009/23/12
  • Number: 08300501
  • Owner: The United States of America as represented by the Scretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Sporting event image capture, processing and publication

Systems, methods and software are disclosed for capturing and/or importing and processing media items such as digital images or video () associated with a sporting event such as a marathon or bicycle race (FIG. ). The media items are processed, including bib number or facial recognition if necessary (), to associate them with an individual participant. Other input sources may include spectator uploads (), external web sites and media sharing () or social networking () services. The system () aggregates, organizes and generates content, and distributes it () via various output channels, which may include event web sites (), personal feeds (), and other output channels (, FIG. ). Preferably, selected content is associated with at least one individual participant in the event, and that content is automatically distributed to channels that are associated with that individual participant.

  • Pub Date: 2009/23/12
  • Number: 07876352
  • Owner: Strands, Inc.
  • Location: Corvallis, US
  • Details: Visit USPTO

Visit USPTO Page


Split ring resonator antenna adapted for use in wirelessly controlled medical device

An infusion pump assembly is disclosed. The infusion pump assembly includes a reservoir for receiving an infusible fluid, a pump assembly for pumping a quantity of infusible fluid from the reservoir to an exit, a first valve assembly configured to selectively isolate the pump assembly from the reservoir, a second valve assembly configured to selectively isolate the exit from the pumping assembly, and a split ring resonator antenna having a resonant frequency comprising a plurality of planar metallic layers.

  • Pub Date: 2009/23/12
  • Number: 08900188
  • Owner: DEKA Products Limited Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Registry for trading partners using documents for commerce in trading partner networks

A market making node in a network routes machine readable documents to connect businesses with customers, suppliers and trading partners. The self defining electronic documents, such as XML based documents, can be easily understood amongst the partners. Definitions of these electronic business documents, called business interface definitions, are posted on the Internet, or otherwise communicated to members of the network. The business interface definitions tell potential trading partners the services the company offers and the documents to use when communicating with such services. Thus, a typical business interface definition allows a customer to place an order by submitting a purchase order or a supplier checks availability by downloading an inventory status report. Also, the registration at a market maker node of a specification of the input and output documents, coupled with interpretation information in a common business library, enables participants in a trading partner network to execute the transaction in a way which closely parallels the way in which paper based businesses operate.

  • Pub Date: 2009/23/12
  • Number: 08375116
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Providing secure access to a set of credentials within a data security mechanism of a data storage system

A technique provides secure access to a set of credentials within a data storage system. The technique involves obtaining a unique identifier (e.g., a hostname which is unique to the system) and a set of stable values (e.g., machine-generated codes which are random to users of the system); and, in response to a storage request from a client application, storing a set of credentials of the client application within a data security mechanism of the data storage system. The set of credentials is in encrypted form when stored within the data security mechanism of the data storage system. The technique further involves configuring the data security mechanism of the data storage system to provide the set of credentials in non-encrypted form in response to new fingerprints matching a system fingerprint which is formed at least in part from the unique identifier and the set of stable values.

  • Pub Date: 2009/23/12
  • Number: 08555342
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing phishing attacks based on reputation of user locations

User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.

  • Pub Date: 2009/23/12
  • Number: 09576119
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Preventing phishing attacks based on reputation of user locations

User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.

  • Pub Date: 2009/23/12
  • Number: 09576119
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Peripheral ultrasound device providing pivotal adjustment of an imaging mechanism about two axes

A device for acquiring ultrasound-generated data from a patient including a securing system and a probe configured for connection to the securing system, the probe including a base having an interfacing surface, an imaging mechanism adjustable relative to the base and configured to send and receive ultrasound signals along an imaging direction, and an adjustment mechanism configured to adjust the imaging mechanism relative to the base thereby adjusting the imaging direction.

  • Pub Date: 2009/23/12
  • Number: 08876720
  • Owner: Guardsman Scientific, Inc.
  • Location: Park City, US
  • Details: Visit USPTO

Visit USPTO Page


Modular and expandable irrigation controller

Described herein are several embodiments relating to modular irrigation controllers. In many implementations, the irrigation controllers are modular in that various functional components of the irrigation controller are implemented in removable modules that when inserted into position within the controller, expand the capabilities of the controller. Also described are various different types of expansion modules that may be coupled to the modular controller, having as variety of functions and features, as well as related methods of use and configuration of these modules in the controller. In some embodiments, a serial communication bus is provided between a control unit of a modular irrigation controller and an expansion module.

  • Pub Date: 2009/23/12
  • Number: 09348338
  • Owner: Rain Bird Corporation
  • Location: Azusa, US
  • Details: Visit USPTO

Visit USPTO Page


Microkernel gateway server

A gateway server includes a first subsystem including a media level, a communication level and a control level; a microkernel; an IPC controller configured to manage communication between the server resources allocated to the first subsystem a second subsystem including a second media level, a second communication level and a second control level such that the microkernel and the IPC controller also manage communication between the server resources allocated to the second subsystem; and a memory with shared reading and writing, established under the control of the microkernel and the IPC controller, between the control level of the first subsystem and the control level of the second subsystem.

  • Pub Date: 2009/23/12
  • Number: 09282079
  • Owner: EADS SECURE NETWORKS
  • Location: Elancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and computer program product for synchronization of similar data objects with event information

A computer-implemented method for receiving information at a first device is provided. The method includes storing a first data object on the first device in a first device-specific representation, receiving a batch of information in response to the first device transitioning from an off-line state to an online state, processing the modification event to recover the modification, updating the first data object based on the recovered modification, and transmitting an acknowledgement indicating that the modification event was successfully processed by the first device. The batch of information includes a modification event. The content of the batch was determined based at least on a state of data stored on the first device. The modification event was generated based on at least a modification made to a second data object stored at a second device in a second device-specific representation.

  • Pub Date: 2009/23/12
  • Number: 08180839
  • Owner: iAnywhere Solutions, Inc.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for incorporating objects into cigarette filters

Cigarette filter rods having individual objects positioned at predetermined intervals therein are prepared by transferring the individual objects from a rotating horizontal pan to a rotating vertical wheel and then depositing the object into a web of filter tow. Each object is positioned within the moving web of tow. The web filter material and the objects positioned within the web are introduced into a rod-forming unit wherein the rod is formed. The rate of feed of the filter tow, the rate of rotation of the horizontal pan and the vertical wheel are controlled relative to one another such that objects are positioned at predetermined intervals along the rod. Cigarette filter elements having well controlled amounts of flavorant contained therein can be made from the rods.

  • Pub Date: 2009/23/12
  • Number: 07833146
  • Owner: R.J. Reynolds Tobacco Company
  • Location: Winston-Salem, US
  • Details: Visit USPTO

Visit USPTO Page


Locking of communication device

A communication system for implementing locking of a device () is described. The device () can be locked to a network service provider for a validity period. After expiry of the validity period, the device () can be automatically unlocked. In locked mode of operation, an integrated circuit (IC) card tool-kit () that is used for housing the IC card, is disabled in the device (). During the validity period, the device () transmits an equipment identity number to the network service provider while initiating a request for communication. The network service provider dynamically allocates a subscriber identity number to facilitate communication process. After expiry of the validity period, the device () is unlocked automatically and the IC tool-kit () of the device () is enabled.

  • Pub Date: 2009/23/12
  • Number: 08774864
  • Owner: ST-Ericsson SA
  • Location: Geneva, CH
  • Details: Visit USPTO

Visit USPTO Page


Interface for sharing posts about a live online event among users of a social networking system

An external system (e.g., a website) is associated with an event and includes an interface that allows users to interact with streams of content associated with a social networking system. The interface allows a user to provide posts about the event via the interface, where the posts are displayed in the interface and also in a social networking interface on social networking system in connection with the user and other users associated with that user. The user can view, via the interface on the external system, posts from all users that are provided via the interface (e.g., everyone watching the event), thereby increasing the likelihood that the posts are relevant to the event. The user can also view, via the interface, posts from users associated with the user via the social networking system (e.g., friends of the user), regardless of where those are posted.

  • Pub Date: 2009/23/12
  • Number: 08997006
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Authenticating user sessions based on reputation of user locations

User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.

  • Pub Date: 2009/23/12
  • Number: 08869243
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for PCO based UWB impulse radio with localized synchronization detection and retention

The present invention provides a communications system, node and method of operation for forming a wireless network from independently operating nodes that have the ability to self-synchronize with each other, independently determine master and slave modes of operation to cooperate as a network, and independently vary those functions to adjust to changes in the network.

  • Pub Date: 2009/22/12
  • Number: 08238402
  • Owner: Cornell University
  • Location: Ithaca, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for electronically circulating a currency

Virtual currency notes may be derived from one or more currency notes deposited at a currency reserve and/or from an asset held by a depository institution. A transaction provider may provide for ownership and/or transfer of the notes by various entities. Ownership of virtual currency notes may be transferred between entities while the depository institution maintains the asset associated therewith. A virtual currency note may be transferred to a transfer account, which may cause an amount equivalent to the virtual currency note to be deposited therein. After the transfer to a transfer account, the transferred virtual currency note may be removed from electronic circulation and/or transferred to another entity.

  • Pub Date: 2009/22/12
  • Number: 08630951
  • Owner: Capitalwill LLC
  • Location: Alpine, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing advertising server optimization for online computer users

A system and method for providing advertising server optimization for online computer users is disclosed. A particular embodiment includes obtaining an advertisement; defining a set of features of the advertisement; generating a predicted click through rate (CTR) corresponding to the advertisement based in part on the set of features; ranking the advertisement based on the generated click through rate; and serving the advertisement based on the ranking.

  • Pub Date: 2009/22/12
  • Number: 09547865
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing advertising server optimization for online computer users

A system and method for providing advertising server optimization for online computer users is disclosed. A particular embodiment includes obtaining an advertisement; defining a set of features of the advertisement; generating a predicted click through rate (CTR) corresponding to the advertisement based in part on the set of features; ranking the advertisement based on the generated click through rate; and serving the advertisement based on the ranking.

  • Pub Date: 2009/22/12
  • Number: 09547865
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for driving hardware device and processing data

A system for driving a hardware device and processing data and a method thereof are provided. The system includes a storage unit, a processor, and the hardware device. The storage unit stores a multimedia application interface, a virtual window driving model (WDM) interface, and a multimedia application. The processor is electrically connected with the storage unit and used for executing a multimedia application. The hardware device receives or outputs first format data. When the multimedia application and the hardware device are active, the multimedia application interface and the virtual WDM interface are taken as communication interfaces between the multimedia application and the hardware device, and the virtual WDM interface converts the first format data to second format data and transmits the second format data to the multimedia application via the multimedia application interface, and the second format data is processed by the multimedia application.

  • Pub Date: 2009/22/12
  • Number: 08181189
  • Owner: Asustek Computer Inc.
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


System and method for directing clients to optimal servers in computer networks

A communication protocol includes one or more messages passed between Web routers over a reliable transmission protocol used for inter-Web router communication. These messages include information that allows the Web routers to dynamically update mappings of client addresses or address ranges to information object repository addresses based on client-to-server distance and server load. The mappings are preferably optimal mappings of the client addresses or address ranges to the information object repository addresses and the messages report updated distances from these information object repository addresses to the client addresses or address ranges. For example, the messages may report, for each updated distance, an associated client address or address range and/or an associated anchor address of a Web router co-located with an information object repository that is the subject of the message.

  • Pub Date: 2009/22/12
  • Number: 08433787
  • Owner: Adara Networks, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Sporting event image capture, processing and publication

Systems, methods and software are disclosed for capturing and/or importing and processing media items such as digital images or video () associated with a sporting event such as a marathon or bicycle race (FIG. ). The media items are processed, including bib number or facial recognition if necessary (), to associate them with an individual participant. Other input sources may include spectator uploads (), external web sites and media sharing () or soda! networking () services. The system () aggregates, organizes and generates content, and distributes it () via various output channels, which may include event web sites (), personal feeds (), and other output channels (, FIG. ). Preferably, selected content is associated with at least one individual participant in the event, and that content is automatically distributed to channels that are associated with that individual participant.

  • Pub Date: 2009/22/12
  • Number: 08442922
  • Owner: Strands, Inc.
  • Location: Corvallis, US
  • Details: Visit USPTO

Visit USPTO Page


Restore of full system backup and incremental backups using multiple simultaneous device streams

A technique for restoring file systems by applying full and incremental backups together while streaming them from multiple devices provides a faster system restore from a full backup where incremental backups must also be applied. A first storage device streams the full backup while at least one second storage device streams at least one incremental backup. As files are detected in the incremental backup, they are written instead of the corresponding file in the full backup. Incremental backups can be pre-merged to reduce their number to one less than a number of storage devices available to stream the backups, so that the full backup can be streamed along with the pre-merged incremental backup(s) to restore the file system.

  • Pub Date: 2009/22/12
  • Number: 08341122
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Preserving a dedicated temporary allocation virtualization function in a power management environment

A mechanism is provided for temporarily allocating dedicated processors to a shared processor pool. A virtual machine monitor determines whether a temporary allocation associated with an identified dedicated processor is long-term or short-term. Responsive to the temporary allocation being long-term, the virtual machine monitor determines whether an operating frequency of the identified dedicated processor is within a predetermined threshold of an operating frequency of one or more operating systems utilizing the shared processor pool. Responsive to the operating frequency of the identified dedicated processor failing to be within the predetermined threshold, the virtual machine monitor either increases or decreases the frequency of the identified dedicated processor to be within the predetermined threshold of the operating frequency of the one or more operating systems utilizing the shared processor pool and temporarily allocates the identified dedicated processor to the shared processor pool.

  • Pub Date: 2009/22/12
  • Number: 08595721
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-threaded system for data management

A multi-threaded system for data management and other computationally intensive applications. The invention takes advantage of multi-core processors to attain high performance. Multi-core processors provide high performance by executing programs in parallel. The amount of performance gained is strongly dependent on the software implementation. To take advantage of the multi-core architecture, applications should be multi-threaded. The invention provides a uniform, configurable, and a consistent multi-threaded software structure that increases performance by distribution of tasks and workload between threads and allocating threads to different processing units, so as to run programs in parallel. The uniform structure of the threads, the ease of configuring the software, and its modularity simplify execution of complex projects and expedite application development.

  • Pub Date: 2009/22/12
  • Number: 08336056
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for managing and utilizing connections between an application server and an enterprise information system based on a daytona architecture

Methods for managing, and utilizing connections between an application server and an enterprise information system (EIS) based on a Daytona architecture are provided. The methods may include operating a resource adapter conforming to the JCA standard, and interfacing with and being managed by the application server. The resource adapter may be configured to provide a connection to the EIS and to submit a query request to and receive query results from the EIS, including receiving the query request from a client; instructing the EIS to open a query, compile the query, execute the query, and return the results of the execution of the query; receiving the results of the execution of the query from the EIS; instructing the EIS to terminate the connection; and returning the results of the execution of the query to the client. Related systems and computer program products are also provided.

  • Pub Date: 2009/22/12
  • Number: 08621085
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses to allocate file storage via tree representations of a bitmap

Methods and apparatuses that search tree representations of a bitmap for available blocks to allocate in storage devices are described. An allocation request for a file may be received to initiate the search. In one embodiment, the bitmap may include an array of bits corresponding to blocks in the storage devices. Each bit may indicate whether one of the blocks is available. The tree representations may include at least one red-black tree having nodes corresponding to one or more consecutive bits in the bitmap indicating an extent of available blocks. One of the tree representations may be selected according to a file associated with an allocation request to identify an extent of available block matching the allocation request. The tree representations may be synchronized as the bitmap is updated with changes of block allocations in the storage devices.

  • Pub Date: 2009/22/12
  • Number: 08504792
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for secure cross-site scripting

An approach is provided for providing secure cross-site scripting. A web services platform causes, at least in part, reception of an initiation request from at least a first inline frame of at least one web page. The initiation request specifies a developer identifier associated with a domain of the at least one web page. The web services platform determines a callback resource identifier based on the developer identifier. The web services platform then determines to cause, at least in part, transmission of the callback resource identifier to the at least the first inline frame for use in creation of at least a second inline frame associated with the at least the first inline frame.

  • Pub Date: 2009/22/12
  • Number: 08789204
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Infrastructure for rapid service deployment

A controller is used to provide a sharable, programmable and composable infrastructure. The controller includes a user manager to take input of user application programming interface calls that correspond to actions accepted from users. A physical manager fulfills requests from the user manager by manipulating distributed physical resources and logical devices in a network controlled by the controller. A configuration effector implements configuration changes to the physical resources and logical devices. A device monitor determines a status of the physical resources and logical devices, propagates the status to the physical manager for detecting a failure of the physical resources and logical devices in real-time, and mitigates the failure.

  • Pub Date: 2009/22/12
  • Number: 08566653
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Field level concurrency and transaction control for out-of-process object caching

A method includes executing a multi-threaded, object-oriented application (OOA) on a device; receiving, by multiple threads of the OOA, an object from an out-of-process cache memory; mutating one or more fields of the object, wherein the one or more fields correspond to one or more attributes of the object; and applying an update of the one or more fields that have been mutated to the out-of-process cache memory, wherein the applying the update updates the one or more fields mutated at a field level and not at an object level.

  • Pub Date: 2009/22/12
  • Number: 08364903
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Deliver application services through business object views

Systems and methods for providing application services through business object views. In one aspect, a definition of at least one business object (BO) is included in a metadata of an application platform. The definition includes descriptions of entities of the BO, and an identification of a service provider of the BO. The service provider instantiates the business object in response to an application service request. In a further aspect, a definition of a business object view (BOV) is included in the metadata of the application platform. The definition includes description of entities of the BOV, and an identification of the BO. The BO is a data source of the BOV. In one other aspect, a transformation describes a mapping of BOV entities to data source BO entities. A service corresponding to a core service of a BOV entity is called at the BO service provider based on the mapping.

  • Pub Date: 2009/22/12
  • Number: 08234308
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Compiling for programmable culling unit

During compilation, the interval bounds for a programmable culling unit are calculated if possible. For each variable, interval bounds are calculated during the compilation, and the bounds together with other metadata are used to generate an optimized culling program. If not possible, then an assumption may be made and the assumption used to compile the code. If the assumption proves to be invalid, a new assumption could be made and the code may be recompiled in some embodiments.

  • Pub Date: 2009/22/12
  • Number: 09038034
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Collaborative firewall for a distributed virtual environment

A virtual environment firewall receives a message having a request from a virtual environment entity intended for a virtual environment controller. The virtual environment firewall determines whether the request complies with one or more governance rules of the virtual environment controller. If the request does not comply with the one or more governance rules, the virtual environment firewall processes the message to prevent the request from being processed by the virtual environment controller.

  • Pub Date: 2009/22/12
  • Number: 08424075
  • Owner: Qurio Holdings, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Capturing OLAP analysis thread as refreshable business intelligence data

Described herein are methods and systems for capturing OLAP analysis thread and transferring the data into a data visualization tool. According to one aspect, OLAP analysis step queries and the corresponding results are recorded and transferred to a data visualization tool. In another aspect, the data in the data visualization tool may be refreshed without affecting the data format.

  • Pub Date: 2009/22/12
  • Number: 08892501
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Assays utilizing nicotinic acetylcholine receptor subunits

The present invention is in the field of identification and characterization of novel insecticidal target sites and, in particular, relates to host cells, assays and antibodies thereto.

  • Pub Date: 2009/22/12
  • Number: 09005981
  • Owner: Dow AgroSciences LLC
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Visual voicemail messages and unique directory number assigned to each for accessing corresponding audio voicemail message

An improved visual voicemail system is provided. When a call is made to a wireless telephone device and a voicemail message is deposited for the called party, the voicemail message is transcribed to generate a text version of the deposited voicemail message. The transcribed voicemail message is sent to the called mobile telephone device to allow the user to read the text version of the voicemail message. Embedded with transcribed text voicemail message is a link that maps to a unique telephone number that is assigned to the original audio voicemail message from the text voicemail message was transcribed. If the called party selects the link, the called party's mobile telephone device or other receiving computing device places a call to the storage location of the original audio version of the voicemail message to listen to the audio version of the voicemail message.

  • Pub Date: 2009/21/12
  • Number: 08244221
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


User productivity on-demand services

The present disclosure involves systems, software, and computer implemented methods for providing user productivity on-demand services. One process includes operations for determining a hosted service for use with an application at a client based on user context data associated with the application. A request for the hosted service and a reference to stored data required for the hosted service is received. The hosted service is executed, and the results are transmitted to the client.

  • Pub Date: 2009/21/12
  • Number: 08346895
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Updating a firmware package

Updating a firmware package including receiving an update package for the firmware package, the firmware package including currently installed components supporting one of a plurality of software layers, the update package including update components that correspond to the currently installed components; retrieving information describing a state of the currently installed components; comparing the information describing the state of the currently installed components to information describing a state of the corresponding update components; constructing a revised update package that includes only update components having a state more recent than the state of the corresponding currently installed components; and updating the currently installed components with corresponding update components of the revised update package.

  • Pub Date: 2009/21/12
  • Number: 09639347
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Updating a firmware package

Updating a firmware package including receiving an update package for the firmware package, the firmware package including currently installed components supporting one of a plurality of software layers, the update package including update components that correspond to the currently installed components; retrieving information describing a state of the currently installed components; comparing the information describing the state of the currently installed components to information describing a state of the corresponding update components; constructing a revised update package that includes only update components having a state more recent than the state of the corresponding currently installed components; and updating the currently installed components with corresponding update components of the revised update package.

  • Pub Date: 2009/21/12
  • Number: 09639347
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of making content-based demographics predictions for website cross-reference to related applications

Systems and methods for making demographic predictions for websites and web-pages. Embodiments include a system and a method of making demographic predictions for websites. The system and method select one or more websites with known demographic attributes for use as training websites, obtain demographic attributes data of the training websites, determine first features of web-pages of the training websites and develop a prediction model using the determined first features and the obtained demographic attributes data. The prediction model predicts one or more values for a target demographic attribute. The system and method determine second features of web-pages of a target website and apply the prediction model to the determined second features of the target website to predict one or more values for the target demographic attribute of the target website.

  • Pub Date: 2009/21/12
  • Number: 08412648
  • Owner: nXnTech., LLC
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Substance communicating device with mechanically energized connector

A substance communicating device for use in conjunction with an appliance or a system including an appliance and a consumable holder. The appliance has a first substance service connector component and a first service switch component. The substance communicating device has a second substance service connector component operably engageable with the first substance connector component to permit the communication of a substance between the first and second substance service connector components. The substance communicating device further has a second service switch component operably associated with the second substance service connector component, the second service switch component being configured to engage the first service switch component when the first and second substance service connector components are engaged to selectively permit the communication of the substance between the substance communicating device and the appliance.

  • Pub Date: 2009/21/12
  • Number: 08342480
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Substance communicating device with mechanically energized connector system

Systems and components for providing or receiving a service through a service connector system. A first substance communicating device has a first service connector component and a first switch component. A second substance communicating device has a second service connector component operably actuatable by the first service connector component to permit the communication of a service between the first and second service connector components. One of the substance communicating devices further has a second switch component operably associated with the second service connector component, the second switch component being configured to be actuatable by the first switch component when the first service connector component is adjacent the second service connector component to selectively draw the first and second service connector components into engagement to permit the communication of the service between the substance communicating devices.

  • Pub Date: 2009/21/12
  • Number: 08382065
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Substance communicating device with activatable connector and cycle structure

A substance communicating device for use in conjunction with an appliance or a system including an appliance and a substance communicating device. The substance communicating device has a service connector component operably engageable with a service connector component of the appliance to permit the communication of a substance between the appliance and the substance communicating device. Information related to the substance can be communicated to the appliance and used to affect the physical cycle of operation of the appliance.

  • Pub Date: 2009/21/12
  • Number: 08700809
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Rule-based processing in different layers

In an embodiment, a method is provided for processing rules within a layer of an application. In this method, a rule defining a condition and a functionality associated with the condition is received at runtime of the layer. This functionality is provided by the layer. Using a microprocessor, a fulfillment of the condition is identified and the functionality is executed based on this identification.

  • Pub Date: 2009/21/12
  • Number: 08635178
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Propagating business object extension fields from source to target

A system and method for creating extension fields for business objects are described. In various embodiments, a system includes modules to display business processes and business objects thereof in graphical user interface screens. In various embodiments, the system propagates created extension fields to other business objects via metadata derived from selections in the graphical user interface. In various embodiments, a method for propagating extension fields from one business object to another business object via a data flow between the two business objects is presented. In various embodiments, the method receives instructions from a graphical user interface for the propagation of an extension field and sends instructions to a backend module to propagate the extension field from the source business object to the other business object.

  • Pub Date: 2009/21/12
  • Number: 08863005
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Power management in a device

Implementations of power management in a device are described. The device includes a power driver configured to manage power supply to one or more components in system-on-chip (SOC) hardware. The device further includes power subsystems configured as drivers for controlling the components of the SOC hardware and a user interface configured to receive a selected power mode as an input and identify profiles of one or more applications being executed in the device. Based on the selected power mode, the power driver directs the power subsystems to change a mode of operation of at least one component determined from the profiles of the one or more applications being executed.

  • Pub Date: 2009/21/12
  • Number: 09189049
  • Owner: STMICROELECTRONICS INTERNATIONAL N.V.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Pluggable login architecture and dynamic resource recognition

Methods and systems are disclosed that generally involve handling logins for a user accessing a plurality of computer resources. In one embodiment, once a user enters login information for a first computer resource, the login information can be stored and/or re-used to access a plurality of other computer resources without the user having to re-enter the login information for each resource. The methods and systems can involve a software framework in communication with various plugins, each plugin including one or more login candidates representing a type of a computer resource. The plugins and/or login candidates can allow the framework to pluggably and dynamically recognize and log into various types of computer resources.

  • Pub Date: 2009/21/12
  • Number: 08458780
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-phase file system restore with selective on-demand data availability

A selective restore technique for restoring file systems within computer systems provides on-demand access during the restore process, while preventing users from slowing the restore process by generating random accesses to files that have not yet been restored, early in the restore process. The restored files are grouped into multiple groups of files, which correspond to multiple phases of the restore process. On-demand requests may be locked out for some or all users during the first one or more phases of the restore, while they are permitted for the subsequent phases, ensuring that critical files needed by all users will be available before the backup process is interrupted by on-demand accesses. The groups are generally organized by elapsed time since last access or modification, and may be organized at restore time or during periodic back-up operations so that the files may be similarly organized in the backup media.

  • Pub Date: 2009/21/12
  • Number: 08204863
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method of forming sheet member, exhaust gas treatment apparatus including the sheet member, and muffling apparatus including the sheet member

A method of forming a sheet member includes feeding first raw slurry into a forming device, dehydrating the first raw slurry to form a first forming body, feeding second raw slurry including inorganic fibers having a minimum diameter substantially equal to or less than 3 micrometers on the dehydrated first slurry, dehydrating the second raw slurry to form a second forming body on the first forming body, feeding third raw slurry into the forming device, dehydrating the third raw slurry to form a third forming body on the first and the second forming bodies, and compressing and dehydrating a forming body having a three-layer structure where the third forming body is formed on the first and the second forming bodies to form a sheet member having a three-layer structure. The first and third raw slurries include inorganic fibers having a minimum diameter substantially greater than 3 micrometers.

  • Pub Date: 2009/21/12
  • Number: 08308837
  • Owner: Ibiden Co., Ltd.
  • Location: Ogaki-Shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and system for lane graph visualization

A system and method for lane graph visualization are described. In various embodiments, a system includes modules to receive and display nodes in topological order. In various embodiments, the system determines a structure for nodes and sorts the data nodes. In various embodiments, a user interface is provided for displaying the lane graph visualization. In various embodiments, the user interface offers interactivity features responsive to user interface events. In various embodiments, a method for lane graph visualization is presented. The method includes receiving nodes in topological order and displaying the nodes in a lane graph visualization. In various embodiments, the method provides interactivity features for the lane graph visualization.

  • Pub Date: 2009/21/12
  • Number: 08502823
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for authenticating a non-native user of a mobile device

An approach for permitting an unregistered user of a mobile device to utilize a communication service. It is detected that a user of a mobile device is not registered with a service provider to utilize the mobile device. Authentication information supplied by the user of the mobile device is collected. A request, including the authentication information, is generated for using a communication service of the service provider. In response to the request, an acknowledgement message is selectively received granting permission for the user to utilize the communication service if the authentication information is valid.

  • Pub Date: 2009/21/12
  • Number: 08855600
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Managing connections in a data storage system

Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more computing devices for purposes of performing storage operations on the data of one of the computing devices. The data storage system includes at least two computing devices. A first computing device includes an unauthorized connection data structure and a connection manager component. The connection manager component receives a connection request from a second computing device. If the second computing device is not identified on the unauthorized connection data structure, the connection manager component can request that an authentication manager authenticate the second computing device and/or determine whether the second computing device is properly authorized. If so, the connection manager component can allow the second computing device to connect to the first computing device.

  • Pub Date: 2009/21/12
  • Number: 08434131
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Iterative scheduling and campaign management

An iterative scheduling and campaign management process uses a WFM system and a CLM system. These systems may be independent or consolidated. In a first step of the process, the WFM system provides the CLM system coarse agent availability data. The coarse agent availability data is used by the CLM system to generate a first list order for a given outbound contact list, which contact list is then provided back to the WFM system. In a second step of the process, the WFM uses the first list order to facilitate a multi-skilled agent scheduling routine. The resulting set of multi-skilled agent schedules (or staffing level data derived from those schedules) is then provided by the WFM system to the CLM system. The CLM system then uses the multi-skilled agent schedules (or staffing level data) to create a second list order for the given outbound contact list. This list may be considered an optimized list given the agent schedule data provided by the WFM system. The outbound campaign is then initiated. Thereafter, and periodically during the outbound campaign, the WFM system provides the CLM system intraday (or intra-campaign) updates to the multi-skilled agent schedules and, in response, the CLM creates at least one re-optimized list order for the contact list based on the intraday data update received from the WFM system. The process can then be repeated iteratively throughout the campaign.

  • Pub Date: 2009/21/12
  • Number: 08630404
  • Owner: IEX Corporation
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Game of chance and system and method for playing games of chance

A game of chance is provided in which a wagering game of skill and chance is played electronically automatically according to a predetermined set of rules. Such games of chance may include card games, such as poker and blackjack, or other games, such as dominoes, craps or backgammon. Such games may be reduced to games of chance, removing the element of player skill, and allowing such games to be played outside legal gaming jurisdictions.

  • Pub Date: 2009/21/12
  • Number: 08221209
  • Owner: Scientific Games Holdings Limited
  • Location: Ballymahon, Co. Longford, IE
  • Details: Visit USPTO

Visit USPTO Page


Electron microscope with an emitter operating in medium vacuum

An electron microscope is described. This electron microscope includes an electron emitter that has an evaporation or sublimation rate that is significantly less than that of tungsten at the reduced pressures around the electron emitter during operation of the electron microscope. As a consequence, the electron microscope may be able to operate at reduced pressures that are much larger than those in existing electron microscopes. For example, at least during the operation the reduced pressure in the electron microscope may be greater than or equal to a medium vacuum. This capability may allow the electron microscope to use a roughing pump to provide the reduced pressure, thereby reducing the cost and complexity of the electron microscope, and improving its reliability. In addition, the size of the electron microscope may be reduced, which may enable a hand-held or portable version of the electron microscope.

  • Pub Date: 2009/21/12
  • Number: 08729470
  • Owner: DLA Instruments
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Elastic wave device and electronic component

To provide an elastic wave device that is small sized and in which a frequency fluctuation due to a change with time hardly occurs, and an electronic component using the above elastic wave device. A trapping energy mode portion provided in an elastic wave waveguide made of an elastic body material excites a second elastic wave being an elastic wave in an energy trapping mode by a specific frequency component included in a first elastic wave being an elastic wave in a zero-order propagation mode propagated from a first propagation mode portion , and a cutoff portion provided in a peripheral region of the trapping energy mode portion has a cutoff frequency being a frequency higher than that of the second elastic wave. A second propagation mode portion mode-converts the second elastic wave leaked through the cutoff portion to a third elastic wave being the elastic wave in the zero-order propagation mode to propagate the third elastic wave.

  • Pub Date: 2009/21/12
  • Number: 08242664
  • Owner: Nihon Dempa Kogyo Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Dynamic messaging routing and audio-to-text linking for visual voicemail

An improved visual voicemail system is provided. When a call is made to a wireless telephone device and a voicemail message is deposited for the called party, the voicemail message is transcribed to generate a text version of the deposited voicemail message. The transcribed voicemail message is sent to the called mobile telephone device to allow the user to read the text version of the voicemail message. Embedded with transcribed text voicemail message is a link that maps to a unique telephone number that is assigned to the original audio voicemail message from the text voicemail message was transcribed. If the called party selects the link, the called party's mobile telephone device or other receiving computing device places a call to the storage location of the original audio version of the voicemail message to listen to the audio version of the voicemail message.

  • Pub Date: 2009/21/12
  • Number: 08204486
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Document indexing based on categorization and prioritization

Disclosed are methods and systems for improving indexing throughput. The methods and systems involve receiving one or more documents for indexing, categorizing the one or more documents based on a document type, a document size and a processing priority, assigning buckets to the categorized one or more documents according to the document type, the document size and the processing priority and scheduling the buckets for processing based on a document type priority, a bucket type and number of threads available to process the buckets.

  • Pub Date: 2009/21/12
  • Number: 08983958
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Determination of graph connectivity metrics using bit-vectors

Determination of a connectivity-metrics for graphs representative of networks of interest. A graph that represents a network of interest is accessed. The graph includes nodes representing points in the network of interest, and edges corresponding to the nodes. Bit-vectors are generated corresponding to the nodes and/or edges, wherein individual bits in the bit-vectors respectively provide a logical indication of connectedness. The connectivity-metric is then determined by applying a logical bit operation to the plurality of bit-vectors. Examples of connectivity metrics include a connected components, shortest paths, betweenness, clustering, and tree-based determinations.

  • Pub Date: 2009/21/12
  • Number: 08145588
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Corrected nuclear magnetic resonance imaging using magnetization transfer

Techniques for corrected nuclear magnetic resonance (NMR) data include applying a presaturation radio frequency (RF) magnetic field different from a fat molecule resonance for a particular time to a target tissue; and applying a first measurement RF magnetic field within a first time after the particular time. Correction nuclear magnetic resonance (NMR) data from the target tissue is determined based on first NMR data received in response to applying the first measurement RF magnetic field. In some embodiments, a second measurement RF magnetic field is also applied in a second time different from both the particular time and the first time. Corrected NMR data is determined by subtracting the correction NMR data from second NMR data received in response to applying the second measurement RF magnetic field. Among other applications, these techniques allow distinguishing either fat or proteins in edemas, or both, from proteins in other tissues.

  • Pub Date: 2009/21/12
  • Number: 08405392
  • Owner: Sloan Kettering Institute for Cancer Research
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Coordinated viewing experience among remotely located users

A method of viewing a content item is provided. The method includes receiving an encrypted content item and a network address of a key management system from a primary client device over a communications network. A session key is obtained over the communications network and the primary client device is notified that the session key has been obtained. An encrypted version of a content key is received over the communication network to decrypt the content item and content rights that determine access to the content item. The content rights restrict the content item from being rendered unless it is rendered in coordination with the rendering of the content item by the primary client device. The encrypted version of a content key is decrypted with the session key. The content item is rendered in accordance with the content rights by decrypting the content item with the content key.

  • Pub Date: 2009/21/12
  • Number: 08515063
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Browser security standards via access control

A computing system is operable to contain a security module within an operating system. This security module may then act to monitor access requests by a web browser and apply mandatory access control security policies to such requests. It will be appreciated that the security module can apply mandatory access control security policies to such web browser access attempts.

  • Pub Date: 2009/21/12
  • Number: 08458765
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon, KR
  • Details: Visit USPTO

Visit USPTO Page


Adding services to application platform via extension

Systems and methods for adding services to an application platform via an extension platform coupled to the application platform. The application platform runs in a first operation system process and provides a number of resources. The extension platform is implemented in a second operation system process and communicates with the application platforms via standard inter-process communication protocols. The extension platform provides an environment to dynamically model and host application services. A resource abstraction layer provides the extension platform with access to the resources provided at the application platform. The resources are utilized by the extension platform to design and to execute the application services. The application services hosted in the extension platform are centrally managed and administered from the application platform via exposed interfaces.

  • Pub Date: 2009/21/12
  • Number: 08904343
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for creating virtual universal plug-and-play systems

Methods and devices enable a device located on a source network to appear as a virtual device on a target network. Agent applications running on computers on the source and target networks communicate over a peer-to-peer network enabled by a super-peer networking server on the Internet. To share a device, the target network agent requests the source network agent to provide access to a device in the source network. The source network agent sends the device name, properties, and service template information to the target network agent. The target network agent uses the received information to announce itself as the device to the target network. Devices on the target network may request device services from the target network agent. Such requests are repackaged by the target network agent and sent to the source network agent. The source network agent redirects the service request to the actual device and redirects received responses to the target network agent. The target network agent receives the processes forwards service response to the requesting device. Thereafter, the requesting device on the first network can directly access services from the device on the second network as if the two devices were on the same network. Using such methods, devices on a local network may access services available on an Internet server as if the server was on the local network.

  • Pub Date: 2009/20/12
  • Number: 08516071
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a task management library to execute map-reduce applications in a map-reduce framework

An improved system and method for a task management library to execute map-reduce applications is provided. A map-reduce application may be operably coupled to a task manager library and a map-reduce library on a client device. The task manager library may include a wrapper application programming interface that provides application programming interfaces invoked by a wrapper to parse data input values of the map-reduce application. The task manager library may also include a configurator that extracts data and parameters of the map-reduce application from a configuration file to configure the map-reduce application for execution, a scheduler that determines an execution plan based on input and output data dependencies of mappers and reducers, a launcher that iteratively launches the mappers and reducers according to the execution plan, and a task executor that requests the map-reduce library to invoke execution of mappers on mapper servers and reducers on reducer servers.

  • Pub Date: 2009/20/12
  • Number: 09619291
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for a task management library to execute map-reduce applications in a map-reduce framework

An improved system and method for a task management library to execute map-reduce applications is provided. A map-reduce application may be operably coupled to a task manager library and a map-reduce library on a client device. The task manager library may include a wrapper application programming interface that provides application programming interfaces invoked by a wrapper to parse data input values of the map-reduce application. The task manager library may also include a configurator that extracts data and parameters of the map-reduce application from a configuration file to configure the map-reduce application for execution, a scheduler that determines an execution plan based on input and output data dependencies of mappers and reducers, a launcher that iteratively launches the mappers and reducers according to the execution plan, and a task executor that requests the map-reduce library to invoke execution of mappers on mapper servers and reducers on reducer servers.

  • Pub Date: 2009/20/12
  • Number: 09619291
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Visual generation of mobile applications based on data models

Systems, methods and computer program products for mobile device application design are described herein. The method accesses a data model corresponding to a selected mobile platform. The data model is used by a device application designer to generate, model, and debug a mobile application. The data model is used to take into consideration characteristics of the selected platform and a selected mobile device as the application is designed. The application is structured and generated for a selected platform that is independent of the data model, but is cognizant of the selected platform. A simulator models the application user interface (UI) as it will appear on the selected platform. The method performs platform-specific validation and allows for correction of various aspects of a generated application including platform-specific features. The tool generates a graphical image that can guide a developer to either generated code or help files corresponding to framework libraries.

  • Pub Date: 2009/18/12
  • Number: 09336023
  • Owner: SYBASE, INC.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques to provide enhanced message management services

Techniques to provide enhanced message management services are described. An apparatus may comprise a mobile computing device having a radio module operative to establish a wireless communication channel with a wireless resource, and a message manager communicatively coupled to the radio module. The message manager may be operative to receive a message size parameter for a message, determine a first time parameter representing a length of time needed to communicate the message based on an available bandwidth parameter, determine a second time parameter representing a length of time available to communicate the message based on an available power parameter, and send a transmit control directive to the radio module indicating whether to communicate the message over the wireless communication channel based on the first and second time parameters. Other embodiments are described and claimed.

  • Pub Date: 2009/18/12
  • Number: 08270990
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


System with user directed enrichment

A system for enriching document content using enrichment themes includes a directed search service and an import-export service. The directed search service allows users to author documents while querying information providers using the directed searches that are inserted as part of the authored documents. The import-export service enables meta-document exchanges between systems that provide document enrichment by binding imported meta-documents to identical or similar information providers.

  • Pub Date: 2009/18/12
  • Number: 07941446
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for autonomous vehicle control

A system for localizing an autonomous vehicle to a target area can include a position indicator adapted for association with the vehicle in a three dimensional configuration, a detection device configured to detect the position indicator, a computation device configured to compute a position of the vehicle based on the detected position indicator and the relationship of the configuration to the vehicle orientation, a transmitter configured to receive information from the computation device and produce a signal carrying the information, a receiver configured to receive the signal from the transmitter and filter the information therefrom, and a control system configured for association with and control of one or more directional control components of the vehicle, the control being based on the information received from the receiver relating to localizing the vehicle to the target area. A method of for localizing a vehicle to a target area is also disclosed.

  • Pub Date: 2009/18/12
  • Number: 08301326
  • Owner: ReconRobotics, Inc.
  • Location: Edina, US
  • Details: Visit USPTO

Visit USPTO Page


Session monitoring of virtual desktops in a virtual machine farm

Disclosed are techniques for determining the status of virtual machine sessions on a computing device for a user by reading from a memory location written to by a program executing within a virtual machine. The memory location is preferably a registry key that contains the status of a remote user session operating on a guest operating system operational on the virtual machine, the virtual machine executing in a virtual environment comprising a plurality of virtual machines operating on a computing device.

  • Pub Date: 2009/18/12
  • Number: 08949408
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Rolling cache configuration for a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2009/18/12
  • Number: 08271830
  • Owner: Commvault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Resource allocation in a virtualized environment

In a virtualized environment, provisioned virtual machines may be migrated between different servers as needed and, accordingly, may be clustered according to particular configurations and requirements. The system described herein provides techniques for controlling the provisioning of users' virtual machines among clusters based on determined requirements obtained from users' service level agreements (SLAs) and in accordance with an optimized allocation of resources to service the processes corresponding to the virtual machines. The provisioning of virtual machines according to the system described herein may be dynamically controlled and allow for over-provisioning of virtual machines to a cluster beyond that which would normally be supported at the cluster absent the provisioning control techniques provided by the system described herein. The over-provisioning may be controllable according to specific requirements identified in each user's SLA.

  • Pub Date: 2009/18/12
  • Number: 08307362
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Remote application presentation over a public network connection

Web access over a public network for applications that operate on virtual desktops on a plurality of servers is facilitated. Through the web access the user is provided with the information necessary to establish a connection with an application by way of the virtual desktop. Applications that the user is authorized to access are determined and those applications that the user is not authorized to access are filtered out. The applications associated access control list is used for determining the user's access to discover an application.

  • Pub Date: 2009/18/12
  • Number: 08370510
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


On-device multiplexing of streaming media content

Techniques are disclosed for multiplexing a dynamic bit-rate video stream with an audio stream received by a client device in a manner that allows the resulting multiplexed stream to be played back without disruption, despite dynamic changes in the bit rate of the video stream that may occur. A content server may stream both a video stream and an audio stream to a client device for playback. The client device may multiplex the video and audio streams prior to them being presented to a playback engine for decoding and playback to a user.

  • Pub Date: 2009/18/12
  • Number: 09009337
  • Owner: Netflix, Inc.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for identifying, assessing and clearing conflicts of interest

Methods and systems for identifying, assessing and clearing conflicts of interest are described herein. Consistent with some embodiments, a conflicts management system receives a conflict search request, and processes the request utilizing a risk matrix that encompass and represents the risk tolerance or risk profile of a law firm. The risk matrix maps certain request types to different search queries and rules that are to be evaluated for a given request type. Based on the execution of the queries and the rules for the request, a score is assigned to a party, such that the score represents the level of risk that would be undertaken if the party was engaged as a client.

  • Pub Date: 2009/18/12
  • Number: 08161060
  • Owner: The Frayman Group, Inc.
  • Location: Brooklyn, US
  • Details: Visit USPTO

Visit USPTO Page


Method of operating a hearing instrument based on an estimation of present cognitive load of a user and a hearing aid system

A method of operating a hearing instrument for processing an input sound and to provide an output stimulus according to a user's particular needs, and related system, computer readable medium and data processing system. An object is to provide an improved customization of a hearing instrument. The method includes the steps a) providing an estimate of the present cognitive load of the user; b) providing processing of an input signal originating from the input sound according to a user's particular needs; and c) adapting the processing in dependence of the estimate the present cognitive load of the user. The estimate of the present cognitive load of a user is produced by in-situ direct measures of cognitive load (e.g. based on EEG-measurements, body temperature, etc.) or by an on-line cognitive model in the hearing aid system whose parameters have been preferably adjusted to fit to the individual user.

  • Pub Date: 2009/18/12
  • Number: 09313585
  • Owner: OTICON A/S
  • Location: Smørum, DK
  • Details: Visit USPTO

Visit USPTO Page


Method for controlling power transitions in transmitter systems

A method for controlling a transmitter power control system in communication networks that include a modulation scheme having a non-constant amplitude envelope. The method includes generating a transmission signal and transitioning the transmission signal from a first specified power level to a second specified power level and having a transition period therebetween, and generating a constant amplitude envelope modulation of the transmission signal during the transition period. The method may further include generating a non-constant amplitude envelope modulation of the transmission signal at the first specified power level, switching to the constant amplitude envelope modulation of the transmission signal during the transition period and generating the non-constant amplitude envelope modulation of the transmission signal at the second specified power level. A mobile communication device may be used to perform the method.

  • Pub Date: 2009/18/12
  • Number: 09503991
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Metadata plug-in application programming interface

Computer-based methods and systems for editing a time-based media program involve receiving an instruction to associate metadata with a selected portion of the program, determining a type of the metadata, wherein the type of the metadata is one of a predetermined set of metadata types, identifying a software component available to the editing system that is configured to process metadata of the determined type, and associating the metadata with the selected portion of the program by executing the identified software component to process the metadata. Metadata is represented using a scheme that is shared among the various computational components that manipulate the metadata; the scheme may also be shared with a host media processing system, as well as with other systems that are used in a time-based media editing and production workflow.

  • Pub Date: 2009/18/12
  • Number: 08589871
  • Owner: Avid Technology, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Media playback system and method for monitoring usage of media contents

There is provided a media playback system for monitoring usage of a plurality of media contents. The system includes a memory configured to store an analytic log file corresponding to each of the plurality of media contents. The system also includes a processor. The processor is configured to identify the analytic log file corresponding to one of the plurality of media contents. The processor is further configured to collect data relating to a plurality of events. At least one of the plurality of events relates to the usage of one of the plurality of media contents. The processor is further configured to store at least one of the plurality of events in the analytic log file. In addition, the processor is configured to send the analytic log file to a remote network server if the network connection has been detected.

  • Pub Date: 2009/18/12
  • Number: 09077858
  • Owner: Disney Enterprises, Inc.
  • Location: Burbank, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid tree/mesh overlay for data delivery

Hybrid tree/mesh overlays for data delivery involve using a tree overlay network and a mesh overlay network to delivery a data stream via a push mechanism and a pull mechanism, respectively. In an example embodiment, a network node enters a mesh overlay network and attaches to a tree overlay network. In operation, the network node receives data blocks of a data stream over the tree overlay network via a push mechanism. The network node ascertains if a data block is not received over the tree overlay network. If a data block is missing, the network node retrieves the missing data block over the mesh overlay network via a pull mechanism. In another example embodiment, the tree overlay network includes a subset of nodes forming a tree-based backbone. Network nodes that are identified as being stable may join the backbone and provide the data stream to other nodes.

  • Pub Date: 2009/18/12
  • Number: 08504734
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a where-used objects list for updating data

Methods and systems are described that involve creating a where-used objects list that contains a set of provider's objects to be adjusted or tested in a customized program after an upgrade of a program, import of projects, patches, and so on. A set of contracts is created that corresponds to the set of provider's objects used in the customer system. Each contract contains information about the provider's object it is created for and assigned to. This information is used by a lifecycle tool to detect if a provider's object has been changed by comparing the contract information of the provider's object with a new imported version of the same provider's object. The provider's object is modified according to the detected change and the assigned contract is recreated to represent the latest data.

  • Pub Date: 2009/18/12
  • Number: 09658845
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Generating a where-used objects list for updating data

Methods and systems are described that involve creating a where-used objects list that contains a set of provider's objects to be adjusted or tested in a customized program after an upgrade of a program, import of projects, patches, and so on. A set of contracts is created that corresponds to the set of provider's objects used in the customer system. Each contract contains information about the provider's object it is created for and assigned to. This information is used by a lifecycle tool to detect if a provider's object has been changed by comparing the contract information of the provider's object with a new imported version of the same provider's object. The provider's object is modified according to the detected change and the assigned contract is recreated to represent the latest data.

  • Pub Date: 2009/18/12
  • Number: 09658845
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Bit rate stream switching

Embodiments for changing bit rates in streaming media are provided. As portions of a streaming media file are downloaded for playback, the size of the portion is compared with an expected size determined prior to initiating playback of streaming AV data. The portion of the media file may be padded such that the size of the portion matches the size specified prior to initiating playback of streaming AV data.

  • Pub Date: 2009/18/12
  • Number: 09060187
  • Owner: NETFLIX, INC.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Application specific memory consumption and analysis

Methods and systems are described that involve determining the memory consumption of a specific application. The memory analysis identifies the dynamic memory objects controlled by a particular application and the memory objects controlled by the framework running that application. A structured view of the memory objects of the framework with respect to the individual framework architecture is presented in combination with the application specific memory object graph. A resulting display, in the form of a dominator tree, allows detecting dependencies of the application to the framework and shows which part of the framework is responsible for keeping alive which part of the application. Moreover, the resulting structure shows memory consumption of a single element of the application including bound memory and object memory. Further, a user can identify the references and the dependencies among the memory objects.

  • Pub Date: 2009/18/12
  • Number: 08843526
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing power savings on mobile devices

Various embodiments for providing enhanced power savings in mobile computing devices are described. In one or more embodiments, a mobile computing device may include a motion sensor to detect when the device is in motion. The mobile computing device may include a radio processor that may select from among several signal search procedures based on whether the device is in motion, and whether a signal is detectable and adequate. Other embodiments are described and claimed.

  • Pub Date: 2009/18/12
  • Number: 08190153
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer program products for collecting and reporting sensor data in a communication network

A system for collecting and reporting sensor data in a communication network includes a microprocessor coupled to a memory and an electronic storage device. The microprocessor receives sensor data from sensors, and stores the sensor data for each sensor in the electronic storage device. The microprocessor also receives, via the communication network, a data reporting instruction defining a data reporting technique corresponding to the sensor data associated with one or more of the sensors. The data reporting instruction is stored in the electronic storage device, and the microprocessor transmits, to a trust mediator over the communication network, at least a portion of the sensor data based on the data reporting instruction. The trust mediator maintains an acceptable level of security for data throughout the communication network by adjusting security safeguards based on the sensor data.

  • Pub Date: 2009/17/12
  • Number: 08621636
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for linking vehicles to telematics-enabled portable devices

Systems and methods are disclosed herein for transmitting telematics data from a vehicle. The systems include a smartphone holder that provides a communications link between a smartphone and a vehicle computer, through the smartphone dataport and the vehicle onboard diagnostics (OBD) port. The smartphone holder is configured to keep the smartphone in a stable, known position and orientation with respect to the vehicle, such that data from an accelerometer in the smartphone can be calibrated. The smartphone accelerometer data and telematics data from vehicle telematics sensors is then transmitted via the smartphone or stored locally.

  • Pub Date: 2009/17/12
  • Number: 08635091
  • Owner: Hartford Fire Insurance Company
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Predicting hardware usage in a computing system

Disclosed are various embodiments of modeling hardware usage in a computing system. Usage factors affecting hardware usage of the computing system are identified. Usage factor data over a time period that corresponds to the usage factors is extracted. A regression analysis is performed on the historical usage factor data that determines a hardware usage function characterizing a relationship between the usage factors and historical hardware usage data.

  • Pub Date: 2009/17/12
  • Number: 08417811
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing data transfer time on graphics processor units

Disclosed are methods and systems for optimizing data transfer time in a graphics processor unit. The methods and systems involve receiving a user request to perform online analytical processing computation, the user request comprising axes dimensions and filter dimensions associated with a visualization for an online analytical computation cube, identifying one or more slices of the online analytical processing cube based on the user request, transferring the one or more identified slices to a second memory, performing the online analytical processing computation for the one or more identified slices at the graphics processor unit and retrieving a result of the online analytical processing computation from the second memory.

  • Pub Date: 2009/17/12
  • Number: 08965866
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for transferring an electronic payment

A method and system for transferring an electronic payment between a purchaser and a merchant that includes assigning a role of a merchant account to a first account and a role of a purchaser account to a second account within a payment system, adding an item from a product catalog stored in the payment system to a purchase list, obtaining a user ID token of a purchaser from a merchant terminal, communicating identity confirmation information associated with the user ID token to the merchant terminal, and transferring funds for the purchase price total from the purchaser account to the merchant account.

  • Pub Date: 2009/17/12
  • Number: 08396808
  • Owner: Think Computer Corporation
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Malicious software prevention using shared information

A method and apparatus for managing executable files. Responsive to detecting a request to run an executable file on a computer, a processor unit determines whether the executable file was downloaded to the computer within a period of time associated with a recent download. Responsive to a determination that the executable file was downloaded to the computer within the period of time, the processor unit determines whether feedback for the executable file from a number of users of the executable file is present in a repository. The feedback identified for the executable file in the repository is presented using a presentation system. User input as to whether the executable file should be run is prompted for by the processor unit after presenting the feedback.

  • Pub Date: 2009/17/12
  • Number: 08347382
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Location-independent raid group virtual block management

A computer storage system is described. A range of volume block numbers (VBNs) is assigned to a volume. A range of storage device block numbers (DBNs) is assigned to each of a plurality of storage devices. A first mapping parameters are created to map a first range of VBN numbers to a first selected range of DBNs using a first portion of a new storage device. A second mapping parameters are created to map a second range of VBN numbers to a second range of DBNs on a second portion of the new storage device.

  • Pub Date: 2009/17/12
  • Number: 08041924
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Isolated security monitoring system

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for security monitoring. In one aspect, a device includes an integrated processing unit, including a user system and an auditor system. The user system includes a first processor and a first computer storage medium. The auditor system includes a second processor that is isolated from the first processor and a second computer storage medium that is isolated from the first computer storage medium. The second computer storage medium stores instructions that cause the second processor to load auditing data in isolation from the user system, monitor processes on the user system, determine from the auditing data that one of the processes is an unauthorized process, and perform one or more security processes on the unauthorized process.

  • Pub Date: 2009/17/12
  • Number: 08499351
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Cooperated interrupt moderation for a virtualization environment

Generally, this disclosure describes systems (and methods) for moderating interrupts in a virtualization environment. An overflow interrupt interval is defined. The overflow interrupt interval is used for triggering activation of an inactive guest so that the guest may respond to a critical event. The guest, including a network application, may be active for a first time interval and inactive for a second time interval. A latency interrupt interval may be defined. The latency interrupt interval is configured for interrupt moderation when the network application associated with a packet flow is active, i.e., when the guest including the network application is active on a processor. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.

  • Pub Date: 2009/17/12
  • Number: 09176770
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Automated service interface optimization

Disclosed are various embodiments for automated service interface optimization. A plurality of usage metrics for at least one service client corresponding to a set of data items within a data object are determined in at least one computing device. The data object is obtainable by at least one service client from a service provider. The service provider is configured to provide an optimized data object to the at least one service client. The optimized data object includes a proper subset of the set of data items. The proper subset is determined based at least in part on the usage metrics.

  • Pub Date: 2009/17/12
  • Number: 08505034
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing authorized device access

Methods, apparatus, and systems are described for providing an accessor device an access credential to interact with a device resource on an accessee device. An authorization entity having a trust relationship with the accessee device, or a linked subordinate authorization entity, generates the access credential. The access credential includes a modification detection indicator, at least one access privilege, and an accessor public key. The at least one access privilege corresponds to at least one device resource on the accessee device. The authorization entity forwards the access credential to the accessor device, which presents the access credential to the accessee device for authentication. Once authenticated, the accessee device grants access to one or more device resources, and controls requests to insure they are within the scope of the at least one access privilege.

  • Pub Date: 2009/17/12
  • Number: 08505078
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Agile help, defect tracking, and support framework for composite applications

This disclosure describes, generally, methods and systems for implementing agile and dynamic help, defect tracking, and support frameworks for composite applications. The method includes implementing, on a computer system including a storage database, a composite application including a plurality of application components and establishing, in the computer system's storage database, a storage container for each of the plurality of application components. The storage containers are configured to store support information for each of the component applications. The method further includes storing, in the storage database, support data for each of the plurality of component applications, removing at least one of the plurality of component applications from the composite application, and maintaining, in the storage database, the support data for the remaining component applications of the composite application.

  • Pub Date: 2009/17/12
  • Number: 08407724
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for discovering database connectivity leaks

Techniques for discovering database connectivity leaks are presented. Each connection made by an application to a database is monitored. When the application is shut down, if information regarding a particular connection remains in memory, then that connection is reported as a potential database connectivity leak.

  • Pub Date: 2009/16/12
  • Number: 08949421
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for debugging code during runtime

A technique for debugging code during runtime includes providing, from an outside process, a trigger to a daemon. In this case, the trigger is associated with a registered callback function. The trigger is then provided, from the daemon, to one or more designated tasks of a job. The registered callback function (that is associated with the trigger) is then executed by the one or more designated tasks. Execution results of the executed registered callback function are then returned (from the one or more designated tasks) to the daemon.

  • Pub Date: 2009/16/12
  • Number: 08607199
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for facilitating call request aggregation over a network

A method is disclosed for facilitating electronic commerce over a network includes identifying input dependencies for a call request based on information passed with the call request, identifying state dependencies for the call request based on information passed with the call request, parallelizing calls from the call request based on at least one of the identified input dependencies and the identified state dependencies, developing a service execution map by grouping calls in an execution order including parallelized calls, and processing the service execution map by executing grouped calls in the execution order including parallelized calls.

  • Pub Date: 2009/16/12
  • Number: 08683498
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Secure communication port redirector

A method and system that allows a host system application to securely communicate with a legacy device is provided. A redirector software module receives data that is destined for a host system serial COM port. Data is secured and re-directed to a legacy device via a network port instead of the serial COM port. Conversely, data destined for the host system is provided to a device server via a server COM port by the legacy serial device. The data can be encrypted and sent to the host system via the network. The redirector software module decrypts the encrypted data and presents it to the consumer application as if the data had arrived via the local COM port.

  • Pub Date: 2009/16/12
  • Number: 08412854
  • Owner: Lantronix, Inc.
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for producing metallic iron nuggets

Method and system for producing metallic nuggets includes providing reducible mixture (e.g., reducible micro-agglomerates; reducing material and reducible iron bearing material; reducible mixture including additives such as a fluxing agent; compacts, etc.) on at least a portion of a hearth material layer. In one embodiment, a plurality of channel openings extend at least partially through a layer of the reducible mixture to define a plurality of nugget forming reducible material regions. Such channel openings may be at least partially filled with nugget separation fill material (e.g., carbonaceous material). Thermally treating the layer of reducible mixture results in formation of one or more metallic iron nuggets. In other embodiments, various compositions of the reducible mixture and the formation of the reducible mixture provide one or more beneficial characteristics.

  • Pub Date: 2009/16/12
  • Number: 08158054
  • Owner: Nu-Iron Technology, LLC
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


IT discovery of virtualized environments by scanning VM files and images

Information-technology discovery techniques are performed directly on virtual machine files. A discovery system sends directives to a remote host and receives data extracted from the virtual machine files as a result of the remote host responding to the directive. The discovery system extracts discovery information from the received data and sends the discovery information to a discovery repository. The discovery information may include static and dynamic virtualized hardware as well as executing software applications and services within a virtual machine and across multiple virtual machines.

  • Pub Date: 2009/16/12
  • Number: 08849947
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated user interface

A system and method for a content player to determine and retrieve a graphical asset associated with a player feature supported by the content. The content player downloads the graphical assets, integrates the graphical assets in the player's graphical user interface, and displays the graphical assets as part of the player's user interface. The user can now select one of the graphical assets to enable the player feature associated with the graphical asset.

  • Pub Date: 2009/16/12
  • Number: 08892988
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and binding notes to business objects

A system and method for creating notes for business object instances are described. In various embodiments, a system includes modules to receive note data and bind notes to business object instances. In various embodiments, the system saves notes to a database via a dedicated database connection in a dedicated transaction. In various embodiments, a user interface is provided for creating and modifying notes on business content. In various embodiments, a method for creating notes in a user interface and attaching the notes to one or more positions in a user interface screen displaying business content in an enterprise information system is presented.

  • Pub Date: 2009/16/12
  • Number: 08768887
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Coordination of error reporting among multiple managed runtimes in the same process

Systems and methods are described for coordinating error reporting among a plurality of managed runtimes that are concurrently executing in the same process. In accordance with various embodiments, an error reporting manager that executes concurrently in the same process as the managed runtimes coordinates error reporting among the managed runtimes in a manner that does not require the managed runtimes to be aware of each other or to communicate directly with each other.

  • Pub Date: 2009/16/12
  • Number: 08429454
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Composite service control system using explicit and implicit conflict resolution scheme

The triggering condition and execution information of the existing application is reported. When either of the intersections exists, a defining of a conflict resolution policy or a changed application triggering condition for the new application is requested; otherwise the triggering condition and the execution information of the new application is stored in an information database.

  • Pub Date: 2009/16/12
  • Number: 08266638
  • Owner: Electronics and Telecommunications Research Institute
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


Techniques for persistence of connections

Described are techniques for preserving connections. First code is executed on a server. The server communicates with a client over one or more connections and the first code uses one or more control structures describing a state of the one or more connections. An operation is performed on the server. First processing is performed in response to the operation. The first processing includes loading second code for execution on the server. The second code replaces the first code and uses the one or more control structures previously used by the first code.

  • Pub Date: 2009/15/12
  • Number: 08335820
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for specifying batch execution ordering of requests in a storage system cluster

A method for operating a computer data storage system is described. A plurality of requests are received from a client, each request of the plurality of requests having assigned a unique sequence number, each request being an input/output request to a data storage device. The plurality of requests is divided into a plurality of subsets of requests. A unique batch number is assigned to each subset of requests so that each subset of requests is assigned a unique batch number. A first subset of requests having a first batch number is executed in arbitrary order with respect to the sequence number of each request. A second subset of requests is executed in response to a second batch number after execution of all of the first subset of requests has completed.

  • Pub Date: 2009/15/12
  • Number: 08762416
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing message notification

A method for providing message notification in a wireless network includes receiving from a subscriber a message that is to be sent over the wireless network, receiving from the subscriber a requested notification type and a requested notification destination, processing the requested notification type and the requested notification destination, and sending the requested notification type to the requested notification destination.

  • Pub Date: 2009/15/12
  • Number: 08190131
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Setting cookies in conjunction with phased delivery of structured documents

In one embodiment, a method includes receiving a first request from a client for a target structured document and generating the target structured document and one or more parameters for one or more state objects associated with the client. In a particular embodiment, the method includes, in a first response phase, transmitting a first portion of the target structured document to the client. In a particular embodiment, the method further includes, in a second response phase, transmitting a second portion of the target structured document that includes a code segment. The method may additionally include receiving a second request from the client sent from the client as a result of the client executing the code segment, and transmitting a response to the second request that comprises the one or more parameters for the one or more state objects.

  • Pub Date: 2009/15/12
  • Number: 08230046
  • Owner: Facebook, Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Persistent content in nonvolatile memory

Applications may request persistent storage in nonvolatile memory. The persistent storage is maintained across power events and application instantiations. Persistent storage may be maintained by systems with or without memory management units.

  • Pub Date: 2009/15/12
  • Number: 09128762
  • Owner: Micron Technology, Inc.
  • Location: Boise, US
  • Details: Visit USPTO

Visit USPTO Page


Pathname translation in a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2009/15/12
  • Number: 07962455
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Online fraud prevention using genetic algorithm solution

Online fraud prevention including receiving a rules set to detect fraud, mapping the rules set to a data set, mapping success data to members of the rules set, filtering the members of the rules set, and ordering members of the data set by giving priority to those members of the data set with a greater probability for being fraudulent based upon the success data of each member of the rule set in detecting fraud. Further, a receiver coupled to an application server to receive a rules set to detect fraud, and a server coupled to the application server, to map the rules set to a data set, and to map the success data to each members of the rules set. The server is used to order the various members of the data set by giving priority to those members of the data set with a greatest probability for being fraudulent.

  • Pub Date: 2009/15/12
  • Number: 07840520
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Modular and expandable irrigation controller

Described herein are several embodiments relating to modular irrigation controllers. In many implementations, the irrigation controllers are modular in that various functional components of the irrigation controller are implemented in removable modules that when inserted into position within the controller, expand the capabilities of the controller. Also described are various different types of expansion modules that may be coupled to the modular controller, having as variety of functions and features, as well as related methods of use and configuration of these modules in the controller. In some embodiments, authentication procedures are provided for one or both of a modular irrigation controller and an expansion module to determine if they are authorized to operate together.

  • Pub Date: 2009/15/12
  • Number: 08265797
  • Owner: Rain Bird Corporation
  • Location: Azusa, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for configuring mailing equipment

A computer receives two input documents, including a carrier product description file and a document that describes attributes of a type of mailing equipment. The computer extracts information from the documents and generates a provisioning document based at least in part on the extracted information. The provisioning document is suitable for controlling a piece of mailing equipment which belongs to the particular type of mailing equipment, in such a manner that the piece of mailing equipment generates mail pieces in compliance with the carrier product description file. The provisioning document includes a script for controlling operation of the piece of mailing equipment and data to be read by the piece of mailing equipment.

  • Pub Date: 2009/15/12
  • Number: 08244647
  • Owner: Pitney Bowes Inc.
  • Location: Stamford, US
  • Details: Visit USPTO

Visit USPTO Page


Kiosk-based automatic update of online social networking sites

Systems and methods identify a current location of a user based on a known location of an electronic device including kiosk, beacon, or location-aware camera when the user interacts with the electronic device. The systems and methods automatically create a user status data file based on the known location. The user status data file contains data identifying that the user is currently at the known location and other data captured about the event or venue at that location. The systems and methods automatically upload the user status data file to a personal storage account which can then be used to post to a social networking web site associated with the user as an activity post associated with the user.

  • Pub Date: 2009/15/12
  • Number: 08275767
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced cluster failover management

An embodiment of the present invention is directed to a method and system for making intelligent failover decisions within a server cluster. The method includes receiving temperature information and location information using RFID technology and detecting an error condition. The method further includes responsive to the error condition, selecting a failover target based on said temperature information and location information and transferring operations from a portion of a storage cluster to the failover target based on the selecting.

  • Pub Date: 2009/15/12
  • Number: 08484510
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic bartering system with facilitating tools

A method for responding to order flow is disclosed. The method comprises establishing for a market maker a rule for automatically generating a contra order in response to an order. The rule comprises at least one condition comprising at least one characteristic describing the order. The at least one condition allowing matching based on a security in the order is in a security list specified by the market maker. The method further comprises receiving from a trader the order; matching on the computer the order to the at least one condition of the rule; automatically generating the contra order in response to the order, if the rule is satisfied; and providing the contra order for acceptance.

  • Pub Date: 2009/15/12
  • Number: 08793178
  • Owner: BarterSecurities, Inc.
  • Location: W. Conshohocken, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic receive queue balancing with high and low thresholds

A method according to one embodiment includes the operations of assigning a network application to at least one first core processing unit, from among a plurality of core processing unit. The method of this embodiment also includes the operations of assigning a first receive queue to said first core processing unit, wherein the first receive queue is configured to receive packet flow associated with the network application; defining a high threshold for the first receive queue; and monitoring the packet flow in the first receive queue and comparing a packet flow level in the first receive queue to the high threshold; wherein if the packet flow level exceeds the threshold based on the comparing, generating a queue status message indicating that the packet flow level in the first queue has exceeded the queue high threshold.

  • Pub Date: 2009/15/12
  • Number: 08346999
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed platform for network analysis

The present disclosure describes an apparatus and methods for performing data analysis, in particular network analysis. Specifically it provides a framework and user interface whereby raw data may be imported into a data model with entities, attributes, and relationships between the entities and multiple data analysis algorithms may be pipelined into a larger data analysis model and applied to the data model. Offline and online data visualization and data exploration techniques, may be applied to the results of the data analysis enabling real-time and near real-time interactive online analysis. Extensibility models and market transaction models are also provided.

  • Pub Date: 2009/15/12
  • Number: 08352495
  • Owner: ChalkLabs, LLC
  • Location: Bloomington, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic determination of read-ahead amount

Read-ahead of data blocks in a storage system is performed based on a policy. The policy is stochastically selected from a plurality of policies in respect to probabilities. The probabilities are calculated based on past performances, also referred to as rewards. Policies which induce better performance may be given precedence over other policies. However, the other policies may be also utilized to reevaluate them. A balance between exploration of different policies and exploitation of previously discovered good policies may be achieved.

  • Pub Date: 2009/15/12
  • Number: 08307164
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for user agent code patch management

A system and method for executing a user agent in an electronic device. Upon each startup of the user agent, the electronic device loads binary code of a base version of the user agent into memory, and determines whether a binary patch has previously been downloaded. If the patch has been downloaded, it is applied to the base version and the updated base version is executed. The binary patch may be downloaded from a server, which compiles the binary patch on the basis of stored source code of the base version and stored source code of one or more enhancements selected by the electronic device.

  • Pub Date: 2009/14/12
  • Number: 08701104
  • Owner: Opera Software ASA
  • Location: Oslo, false
  • Details: Visit USPTO

Visit USPTO Page


Screening portal, system and method of using same

A portal, system and method for screening an object for a target substance is provided. The portal includes an inflatable bladder expandable to form a test space for receiving the object and a plurality of nozzles positioned about the inflatable bladder. The nozzles are in fluid communication with a fluid source for directing air over the object whereby samples are removed from the object for examination. A collector is operatively connected to the inflatable bladder for collecting the samples removed from the object. A detector is operatively connected to the collector for examining the removed samples for the presence of the target substance. At least one preconcentrator may be operatively connected to the collector for concentrating the samples collected thereby.

  • Pub Date: 2009/14/12
  • Number: 08429987
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating disease with random copolymers

The invention relates to novel methods and kits for treating or preventing disease through the administration of random copolymers comprising amino acids tyrosine (Y), phenylalanine (F), alanine (A), and lysine (K). The invention also relates to the treatment of autoimmune diseases, such as multiple sclerosis, and to the administration of random copolymers in treatment regimen comprising formulations that are administered at intervals greater than 24 hours, or to sustained release formulations which administer the copolymer over a period greater than 24 hours. The invention further relates to methods for conducting a pharmaceutical business comprising manufacturing, licensing, or distributing kits containing or relating to the formulations or dosing regimens of random copolymer described herein.

  • Pub Date: 2009/14/12
  • Number: 08475779
  • Owner: Ares Trading SA
  • Location: Vaud, CH
  • Details: Visit USPTO

Visit USPTO Page


Methods, apparatus and articles of manufacture to control network element management traffic

Example methods, apparatus and articles of manufacture to control network element management traffic are disclosed. A disclosed example apparatus to process an element management system (EMS) query message includes a receiver to receive the EMS query message from a managed network element, the EMS query message being redirected from an EMS server, a responder to select a pre-determined response to the EMS query message and discard EMS information contained in the EMS query message, wherein the pre-determined response is to delay the managed network element from resending the EMS query message to the EMS server for a time period, and a transmitter to send the pre-determined response to the managed network element.

  • Pub Date: 2009/14/12
  • Number: 08131811
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method for providing extended content and system using the same and computer-readable recording medium

A content service system including a content metadata analyzer module, a widget information acquisition module, a widget administration module, and a widget engine module is provided. The content metadata analyzer module receives a first metadata corresponding to a multimedia content, and generates a widget request or a service metadata according to the first metadata. The widget information acquisition module acquires a widget information of a first widget according to the widget request or the service metadata. The widget administration module installs and executes the first widget according to the widget information, wherein the first widget plays an extended content corresponding to the multimedia content. A content service method and a computer-readable recording medium corresponding to the content service method are also provided.

  • Pub Date: 2009/14/12
  • Number: 08726160
  • Owner: Institute for Information Industry
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Indole compounds useful as serotonin selective agents

Novel indole compounds are disclosed. Also disclosed are methods for using the compounds to treat human and animal disease, pharmaceutical compositions of the compounds, and kits including the compounds.

  • Pub Date: 2009/14/12
  • Number: 08071786
  • Owner: Galenea Corp.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Correlated media for distributed sources

A method and a system of associating correlating metadata with data assets, such as video and audio files, so that the files are rendered as a combination presentation are described herein. The system includes a client a media capture device that provides on board storage, network connectivity, preprocessing, preview buffering, file management, and an eventing system. The method includes capturing the media, associating the media with other media via an identifier, and supports associating correlating metadata prior to time of media capture and during media capture on the capture device itself, and after media capture either on a local machine or on an on-line group. When the combination presentation is presented, additional associated advertising and annotations may be provided upon rendering.

  • Pub Date: 2009/14/12
  • Number: 08311983
  • Owner: WHP Workflow Solutions, LLC
  • Location: North Charleston, US
  • Details: Visit USPTO

Visit USPTO Page


User-selected tags for annotating geographic domains containing points-of-interest

A location-based service is provided that allows a user of a mobile device to tag and track the places he or she visits and share these places with social networking members. To implement this service a system receives location information from the user's location-aware mobile device over a wireless network. The location information identifies various locations or other points-of-interest that the user has visited. Based on this information the system determines a geographical domain that encompasses at least some of the locations the user has visited. Once a geographic domain has been determined it is presented to the user via the mobile device. The user is prompted to tag the geographical domain with an annotation that describes the geographic domain. The system stores the geographical domain and the annotation associated therewith so that it can be searched and accessed or retrieved by the user or members of the user's social network.

  • Pub Date: 2009/11/12
  • Number: 09218360
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Tools enabling preferred domain positioning on a registration website

The present inventions may be implemented by tools enabling preferred domain positioning on a registration website. An example may comprise a computer-readable media storing instructions that, when executed by a server computer, cause the server to receive a bid from a registry seeking such preferred placement for a domain (that may be administered by the registry), generate a quality score for the domain, and determine the preferred placement based upon the bid and the quality score.

  • Pub Date: 2009/11/12
  • Number: 07890602
  • Owner: The Go Daddy Group, Inc.
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of storing backup image catalog

A system and method for managing backup and restore operations associated with a backup system. Metadata associated with files/directories of one or more file systems associated with one or more resources may be received. A virtual catalog image associated with the metadata may be created in a virtual file system image format. Once the virtual catalog image is created, virtualization vendor specific technology may be utilized to mount the image on the backup system and search and browse operations may be performed. The virtual catalog image may contain the file/directory hierarchy without containing actual file data.

  • Pub Date: 2009/11/12
  • Number: 09489266
  • Owner: GOOGLE INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Secure programming of vehicle modules

A method for programming a vehicle module via a secure programming system. The method carried out by the system involves generating a credentials media containing one or more secure credentials. Then, a credentials programmer programs one or more vehicle modules using the credentials media. During each stage of the vehicle module programming, the programming status is securely updated in the credential media. In case of a programming failure, the credentials media is used in a secondary credentials programmer to program the vehicle modules.

  • Pub Date: 2009/11/12
  • Number: 08844047
  • Owner: General Motors LLC
  • Location: Detroit, US
  • Details: Visit USPTO

Visit USPTO Page


Reusable and extensible framework for multimedia application development

Systems and methods of developing and/or implementing multimedia applications. The system provides an extensible framework including an application layer, a framework utility layer, and a core engine layer. The framework utility layer includes an application programming interface, a video codec sub-framework (XCF), a video packetization sub-framework (XPF), and a video/text overlay sub-framework (XOF). The core engine layer includes one or more core codec engines and one or more core rendering engines. The XCF, XPF, and XOF sub-frameworks are effectively decoupled from the multimedia applications executing on the application layer, and the core codec and rendering engines of the core engine layer, allowing the XCF, XPF, and XOF sub-frameworks and core codec/rendering engines to be independently extensible. The system also fosters enhanced reuse of existing multimedia applications across a plurality of multimedia systems.

  • Pub Date: 2009/11/12
  • Number: 08885708
  • Owner: Dialogic Corporation
  • Location: Montreal, CA
  • Details: Visit USPTO

Visit USPTO Page


Remote passive sensing of a vibration signature using modulated light

An optical detector senses the intensity of scattered light reflected by a surface coupled to a vibration source. If the vibration source is operating, the coupled surface vibrates at the same frequency. Incident light reflected by the surface is modulated by the vibration at a hypertemporal frequency. The detector produces a direct electrical current as a temporal function of the detected modulated light intensity. A transimpedance amplifier converts the current into a voltage. A voltage amplifier amplifies the voltage. An analog-to-digital converter converts the amplified voltage into digital signal. A digital signal processor converts the digital signal into a function of power spectral density and frequency using Fourier transform and principle component analyses. The vibration signature of the vibration source, if present, is discerned from a graphical display of the foregoing function.

  • Pub Date: 2009/11/12
  • Number: 08284405
  • Owner: The United States of America as Represented by The Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Providing recommendations using information determined for domains of interest

Techniques are described for determining and using information related to domains of interest, such as by automatically analyzing documents and other information related to a domain in order to automatically determine relationships between particular terms within the domain. Such automatically determined information may then be used to assist users in obtaining information from the domain that is of interest (e.g., documents with contents that are relevant to user-specified terms and/or to other terms that are determined to be sufficiently related to the user-specified terms). For example, recommendations may be automatically generated for a user by using information about specified preferences or other interests of the user with respect to one or more terms and identifying other particular terms that are sufficiently probable to be of interest to that user, such as based on a generated probabilistic representation of relationships between particular terms for the domain.

  • Pub Date: 2009/11/12
  • Number: 08429106
  • Owner: Atigeo LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Network based malware detection and reporting

An apparatus, system and method are described for use in detecting the presence of malware on subscribers computers. The apparatus, system and method are network based and may be deployed within an Internet Service Provider (ISP) network. The system may include a plurality of network sensors for receiving and analyzing network traffic to determine the presence of malware. An aggregating apparatus receives alerts of the presence of malware and translates a network identifier of the alert to a subscriber identifier. The aggregating apparatus aggregates alert information and forwards it to a reporting infrastructure that can generate notifications in order to notify a subscriber that malware has been detected on a computer associated with the subscriber.

  • Pub Date: 2009/11/12
  • Number: 08578491
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Methods for determining preferred domain positioning on a registration website

Methods of the present inventions allow for determining preferred domain positioning on a registration website. An exemplary method may comprise the steps of receiving a bid from a registry seeking such preferred placement for a domain that may be administered by the registry, generating a quality score for the domain, and determining the preferred placement based upon the bid and the quality score.

  • Pub Date: 2009/11/12
  • Number: 08370217
  • Owner: Go Daddy Operating Company, LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for identifying and characterising the impact of network incidents on the telecommunication services offered to users

The present Invention relates to a method and to a system for identifying and characterizing the impact of network incidents on the telecommunication services offered to users. According to the invention, the system for identifying and characterizing an incident in a service offered to a user of a telecommunications network comprises an unavailability selection module (), a consolidation module (), an aggregation module (), a stabilization module () and a notification module ().

  • Pub Date: 2009/11/12
  • Number: 08249583
  • Owner: TELEFONICA, S.A.
  • Location: Madrid, ES
  • Details: Visit USPTO

Visit USPTO Page


High fidelity data compression for acoustic arrays

Techniques include determining coefficients of a complex auto regression (AR) model to fit a complex average spectrum at a base frequency resolution of a set of one or more measured acoustic beams during a time block. Residuals derived by filtering actual data through an inverse of the AR model are determined at frequencies below a first threshold frequency. A quantized spectrum of the residuals is determined at the base frequency resolution. Magnitude, phase, and frequency bin at the base frequency resolution are determined for each peak of a set of one or more narrowband peaks above a second threshold frequency for the set of one or more measured acoustic beams. A message is sent, which indicates without loss the coefficients of the AR model, the quantized spectrum of the residuals, and the frequency bin, magnitude and phase for each peak of the set of one or more narrowband peaks.

  • Pub Date: 2009/11/12
  • Number: 08254210
  • Owner: The Johns Hopkins University
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical transport protocol stack for data transfer between enterprise servers

A Small Computer System Interface (SCSI) transport for fabric backplane enterprise servers provides for local and remote communication of storage system information between storage sub-system elements of an ES system and other elements of an ES system via a storage interface. The transport includes encapsulation of information for communication via a reliable transport implemented in part across a cellifying switch fabric. The transport may optionally include communication via Ethernet frames over any of a local network or the Internet. Remote Direct Memory Access (RDMA) and Direct Data Placement (DDP) protocols are used to communicate the information (commands, responses, and data) between SCSI initiator and target end-points. A Fiber Channel Module (FCM) may be operated as a SCSI target providing a storage interface to any of a Processor Memory Module (PMM), a System Control Module (SCM), and an OffLoad Module (OLM) operated as a SCSI initiator.

  • Pub Date: 2009/11/12
  • Number: 08848727
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Game of chance and system and method for playing games of chance

A game of chance is provided in which a predetermined fixed number of winning cell content drawn from a predetermined set of cell content. The drawn content is matched to the content on game cards and if the matched game card content covers a predetermined winning pattern then the game card is a winner. In one example, numerous winners may occur per game session because the game continues until the predetermined fixed number of winning cell content is drawn and not until a win occurs.

  • Pub Date: 2009/11/12
  • Number: 08070585
  • Owner: Scientific Games Holdings Limited
  • Location: Longford, IE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for facilitating electronic commerce over a network

In accordance with embodiments of the present disclosure, systems and methods for facilitating electronic commerce over a network include communicating with a plurality of users via a plurality of user devices over the network, receiving a login request from a first user via a first user device over the network, accessing an account related to the user based on information passed with the login request, receiving a snaplist file related to a multiple image listing provided by the first user via the first user device, processing the snaplist file by extracting the multiple image listing from the snaplist file, and displaying the multiple image listing to one or more other users via one or more other user devices.

  • Pub Date: 2009/10/12
  • Number: 09495697
  • Owner: EBAY INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time frame streaming from remote graphics processing unit

A client computing device transmits commands and/or data to a software application executing on a server computing device. The server computing device includes one or more graphics processing units (GPUs) that render frames of graphic data associated with the software application. For each frame, the one or more GPUs copy the frame to memory. A server engine also executing on the server computing device divides the frame into subframes, compresses each subframe, and transmits compressed subframes to the client computing device. The client computing device decompresses and reassembles the frame for display to an end-user of the client computing device.

  • Pub Date: 2009/10/12
  • Number: 08984167
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time compression with GPU/CPU

Example embodiments of the present disclosure provide techniques for efficiently processing and transmitting graphics data when sub-regions of the screen represented by the graphics data are updated at different relative update rates. In an embodiment, when the screen is divided into tiles and a plurality of the tiles have been determined as being changed, some of the sublevels resulting from the image transform may not be encoded and transmitted. The decoding process may use zeroes for any data not received. The rendering subsystem may render the image with the partial data, and the remaining data may be received in subsequent transmissions.

  • Pub Date: 2009/10/12
  • Number: 09075560
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Push pull adaptive capture

In various embodiments, a screen image may be divided into rectangles, and a capture component may track changed rectangles and capture the screen upon receiving an indication. For small screen updates, the capture rate may be set to ˜30 captures per second to provide a lower latency. As the screen update size increases, the capture rate may be decreased to match an allocated bandwidth. The capture rate may be increased when available bandwidth increases and decreased as bandwidth decreases. For example, the capture rate may be decreased when downstream back pressure meets predefined criteria. The capture rate change may be effected gradually to avoid jerks and jumps. Varying the capture rate by also enable audio/video synchronization with varying bandwidth variations. Some embodiments may be extended to multiple monitor solutions.

  • Pub Date: 2009/10/12
  • Number: 09146884
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Nested roadmap navigation in a graphical user interface

Systems and methods for nested roadmap information navigation in a graphical user interface (GUI) where a sequence of items is generated and stored in a memory of a computer system. The sequence of items includes at least one compound item. A number of user interface (UI) elements are displayed in a GUI screen, wherein each UI element represents an item of the sequence of items, and wherein the UI elements are ordered according to the sequence of items. The displayed UI elements include a UI element representing a compound item of the sequence of items. The compound item could be selected as a currently active item. The UI element representing the selected compound item can gradually expand to display one or more new UI elements representing component items subordinate to the compound item. The first of the component items is automatically selected as a currently active item.

  • Pub Date: 2009/10/12
  • Number: 08578271
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Managing command compliance in internetworking devices

In an embodiment, an internetworking device is configured with compliance proxy logic that is configured for sending, to a compliance server, a request to determine whether the command conforms to one or more compliance policies, wherein the request includes the command; receiving a compliance response from the compliance server; in response to determining whether the compliance response indicates success, executing the command only when the compliance response indicates that the command conforms to the one or more compliance policies. Thus the device can determine actively whether a proposed user command or configuration change will violate established standards or policies, before the command or change is applied to the device.

  • Pub Date: 2009/10/12
  • Number: 08856292
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Long-term storage of potable water in metallic vessels

A method for controlling microbial growth in potable water stored in a vessel having a metallic surface includes heating the metallic surface to a temperature between about 480° C. (900° F.) and about 870° C. (1600° F.), exposing the metallic surface to oxygen during heating to oxidize potential reduction sites on the metallic surface and charging potable water containing silver ions to the vessel. A vessel having a metallic surface is prepared for long-term storage of potable water containing silver ions by heating the metallic surface to a temperature between about 480° C. (900° F.) and about 870° C. (1600° F.) and exposing the metallic surface to oxygen during heating to oxidize electropositive metals on the metallic surface or by treating the metallic surface with an aqueous solution containing on oxidizing agent to oxidize potential reduction sites on the metallic surface.

  • Pub Date: 2009/10/12
  • Number: 08685257
  • Owner: Hamilton Sundstrand Space Systems International, Inc.
  • Location: Windsor Locks, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent roadmap navigation in a graphical user interface

Systems and methods for intelligent information navigation in a graphical user interface (GUI) where a sequence of items is generated and stored in a memory of a computer system. A number of graphical elements are displayed on a screen of a GUI, wherein each graphical element corresponds to an item of the sequence of items, and wherein the graphical elements are ordered according to the sequence. When requested, the graphical elements scroll in a chosen direction to gradually include a new graphical element into the screen at the direction of scrolling. Respectively, the scrolling could gradually exclude from the screen a graphical element at opposite direction. An item of the sequence of items could be selected as a currently active item. The displayed graphical elements are automatically scrolled to move the graphical element corresponding to the currently active item at a focal position within the screen.

  • Pub Date: 2009/10/12
  • Number: 08775952
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Information exchange using generic data streams

Systems and methods for information exchange using generic data streams, wherein a data stream is sent from one computer system to another, and the receiving computer system is not aware of the structure of the information in the data stream. A header of the data stream includes a description of a data object. A body of the data stream includes information for instances of a data object stored on a computer system. The object is compliant with the description provided in the header of the data stream. The information in the body of the stream is extracted based on the description provided in the header of the data stream. A user interface (UI) is dynamically created based on the description of data object to display portions of the received information, and further to allow a user to change the information.

  • Pub Date: 2009/10/12
  • Number: 08806345
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Data-related task support in wireless communication systems

Apparatuses may stay synchronized with a network via a beacon signal that is transmitted at a set interval. Various communication-related activities may be planned around an instance when a beacon signal is expected, or a target beacon transmission time (TBTT). While some networked apparatuses are active during every TBTT, other apparatuses may operate using a diluted beacon period that is an integer multiple of the network beacon signal interval. Diluted beacon intervals may initiate periods of time during which apparatuses may become “aware” of other apparatuses. Awareness may comprise information related to communication configuration, apparatus status, and services offered by the various apparatuses in the network. Awareness information obtained during an awake window may also comprise information on data-related tasks that are pending in one or more apparatuses which may allow for the control of further data conveyance activities.

  • Pub Date: 2009/10/12
  • Number: 08774021
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Control system for robotic vehicles

A method and apparatus may be present for controlling robotic vehicles. A processor system may identify hardware for a robotic vehicle to form an identification. The processor system may run an interface layer for the hardware for the robotic vehicle using the identification. The interface layer may be configured to receive information from the hardware in which the information may be received using a number of protocols for the hardware. The processor system may send the information received from the hardware to a control layer in which a number of applications running in the control layer may be configured to indirectly control operation of the robotic vehicle. The information may be received in the control layer using a protocol used by the number of applications.

  • Pub Date: 2009/10/12
  • Number: 08521328
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Vaccine for the prevention of breast cancer recurrence

Provided are methods to induce and maintain a protective cytotoxic T-lymphocyte response to a peptide of the HER/neu oncogene, GP2, with the effect of inducing and maintaining protective or therapeutic immunity against breast cancer in a patient in clinical remission, including patients having low to intermediate levels of HER2/neu expression. The methods comprise administering to the patient an effective amount of a vaccine composition comprising a pharmaceutically acceptable carrier, an adjuvant such as GM-CSF, and the GP2 peptide. The methods may further comprise administering a periodic booster vaccine dose as needed due to declining GP2-specific T cell immunity. Also provided are vaccine compositions for use in the methods.

  • Pub Date: 2009/09/12
  • Number: 09114099
  • Owner: The Henry M. Jackson Foundation for the Advancement of Miltary Medicine, Inc.
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Using consumer purchase behavior for television targeting

In various embodiments, strategies, tools and techniques are provided for processing and analyzing data in an advertising measurement system accessible through a software-as-a-service model or a client-downloaded computer program. The system may be configured to receive and process household media exposure data, product purchase data, advertising data, program data, and demographic data, wherein the data may be obtained from various sources, including from a program delivery source (e.g., a television set-top box) located in a household of a consumer. The data may be matched and cross-correlated for calculating return on advertising investment measurements and other metrics. The data may be used to optimize media placement generally or to address advertising content to specific households. Methods for storing and accessing data in the advertising measurement system by distributing the data across multiple shards are also provided. In addition, methods for protecting privacy of communicated data are disclosed.

  • Pub Date: 2009/09/12
  • Number: 08060398
  • Owner: TRA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing discrete data replication

Systems and methods for performing intelligent replication of production data on a source storage device. In certain examples, a full backup of the production data is first performed and stored on a destination system. A journal module on the storage device (e.g., a shared storage device), or on at least one source system, tracks files on the storage device that change during a particular period of time. Following this period, a snapshot is taken of the production data. Upon mounting the snapshot, the replication system uses the journal information to identify modified files, conduct a block-level comparison of only the modified files with corresponding files on the destination system, and identify the particular data blocks that changed. The replication system then replicates only the changed blocks to the destination system. Certain systems further store information indicating a source system time of a known good state of the production data.

  • Pub Date: 2009/09/12
  • Number: 09495382
  • Owner: Commvault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for domain name resolution interception caching

The present solution provides a variety of techniques for accelerating and optimizing network traffic, such as HTTP based network traffic. The solution described herein provides techniques in the areas of proxy caching, protocol acceleration, domain name resolution acceleration as well as compression improvements. In some cases, the present solution provides various prefetching and/or prefreshening techniques to improve intermediary or proxy caching, such as HTTP proxy caching. In other cases, the present solution provides techniques for accelerating a protocol by improving the efficiency of obtaining and servicing data from an originating server to server to clients. In another cases, the present solution accelerates domain name resolution more quickly. As every HTTP access starts with a URL that includes a hostname that must be resolved via domain name resolution into an IP address, the present solution helps accelerate HTTP access. In some cases, the present solution improves compression techniques by prefetching non-cacheable and cacheable content to use for compressing network traffic, such as HTTP. The acceleration and optimization techniques described herein may be deployed on the client as a client agent or as part of a browser, as well as on any type and form of intermediary device, such as an appliance, proxying device or any type of interception caching and/or proxying device.

  • Pub Date: 2009/09/12
  • Number: 08364785
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for analyzing test coverage at an organizational level

Disclosed are methods and systems for calculating test coverage of a software organizational schema. The method and systems involve retrieving the software organizational schema associated with an application, receiving an assigned weight factor to the one or more software organizational schema components associated with the application, determining a number of processed code lines and a total number of the code lines associated with the one or more software organizational schema components, calculating a test coverage for the one or more software organizational schema components based on the weight factor, the number of processed code lines and the total number of code lines of the software organizational schema component.

  • Pub Date: 2009/09/12
  • Number: 08495575
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System for providing real time locating and gas exposure monitoring

A system is described for providing real time locating and gas exposure monitoring. The system may include a memory, interface, and processor. The memory may store an alarm data item including an amount of gas exposure and a location identifier. The processor may receive the alarm data item from a sensor device of a first user. The processor may identify a relative location of the first user based on the location identifier. The processor may determine a second user located within a proximity of the first user. The processor may communicate to the second user the relative location of the first user and the gas exposure of the first user. The processor may receive, from the second user, an indication of whether an emergency responder should be contacted. The processor may initiate communication with an emergency responder if the indication indicates an emergency responder should be contacted.

  • Pub Date: 2009/09/12
  • Number: 08330605
  • Owner: Accenture Global Services Limited
  • Location: , IE
  • Details: Visit USPTO

Visit USPTO Page


Remote validation of network device configuration using a device management protocol for remote packet injection

In general, this disclosure describes techniques for testing and verifying the functionality of networks and network devices without requiring the deployment of specialized testing components. For example, as described herein, a device management protocol (e.g., SNMP or NETCONF) typically used for remote configuration of devices has been extended to allow traffic patterns to be seamlessly injected into the existing network devices that form the enterprise network. For instance, a network management device sends configuration data to a managed network device in accordance with a device management protocol and calls, using a test packet parameter, a device configuration function exposed by a managed device. When the device configuration function is called, the managed device processes the test packet to produce a result in accordance with the configuration data as if the test packet had been received from the network, and the managed device returns a test packet processing result.

  • Pub Date: 2009/09/12
  • Number: 08248958
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing data storage among a plurality of data storage repositories

Machines and methods for optimizing data storage among a plurality of data storage repositories are provided. The method comprises processing a data request submitted for storing data on one or more data storage mediums; determining whether duplicate copies of the data are to be maintained on more than one storage medium so that established quality of service requirements are met; and managing duplicate copies of the data on said one or more data storage mediums to meet the established quality of service requirements while servicing the data request.

  • Pub Date: 2009/09/12
  • Number: 09191437
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing enhanced content associated with a media content instance available for purchase

An exemplary method includes presenting, by a media content delivery system, an advertisement for a media content instance that is accessible only at or after a scheduled release time, receiving, by the media content delivery system, a request input by a user to purchase access to the media content instance, and providing, by the media content delivery system in response to the received request, enhanced content associated with the media content instance for experiencing by the user before the scheduled release time. Corresponding methods and systems are also disclosed.

  • Pub Date: 2009/09/12
  • Number: 08327404
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for aggregating and translating real-time user information to update social network profiles

A method, computer readable medium and apparatus for automatically updating social network profiles are disclosed. For example, the method receives one or more inputs from a subscriber, processes the one or more inputs in accordance with a policy defined by the subscriber to produce an update about the subscriber and publishes the update about the subscriber on one or more social network profiles associated with the subscriber.

  • Pub Date: 2009/09/12
  • Number: 08782022
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Flexible cable having rectangular waveguide formed therein and methods of manufacturing same

A flexible cable for carrying RF signals and method of manufacturing same. The cable includes an elongate base substrate including a dielectric layer with an upper metal layer deposited on one side and a lower metal layer deposited on its other side. It further includes two parallel spaced-apart series of vias formed along the length of the base substrate, each via electrically interconnecting the upper metal layer and the lower metal layer, whereby a rectangular cross-sectional waveguide is provided between the upper metal layer, the lower metal layer and the two series of vias.

  • Pub Date: 2009/09/12
  • Number: 08279611
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Automated application-based storage provisioning

Described are techniques for automatically provisioning storage for an application. A request to provision object-based storage for the application in a data storage system is received The request identifies the application and is received from a user interface interacting with the data storage system at a specified one of a plurality of user levels, each of said plurality of user levels being associated with a different level of abstraction with respect to first processing performed in implementing the request. The first processing is performed to provision object-based storage for the request. The first processing is determined in accordance with the application and includes a level of automation varying in accordance with the specified user level at which the user interface interacts with the data storage system. The automation includes selecting one or more default options in accordance with best practices of the application.

  • Pub Date: 2009/09/12
  • Number: 08438342
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for member matching

An apparatus, system, and method for member matching. In one embodiment, the apparatus includes an input adapter, a processor, and an output adapter. The input adapter may receive a first data record from a plurality of data records stored in one or more databases. The processor may generate a first data key from one or more field values in the first data record, compare a second data key associated with a second data record with the first data key associated with the first data record, and identify a match between the first data key and the second data key. In one embodiment, the output adapter may produce an output configured to identify the first data record and the second data record in response to identification of the match.

  • Pub Date: 2009/09/12
  • Number: 08359337
  • Owner: Ingenix, Inc.
  • Location: Eden Prairie, US
  • Details: Visit USPTO

Visit USPTO Page


A-Buffer compression for different compression formats

One embodiment of the present invention sets forth a technique for efficiently creating and accessing an A-Buffer that supports multi-sample compression techniques. The A-Buffer is organized in stacks of uniformly-sized tiles, wherein the tile size is selected to facilitate compression techniques. Each stack represents the samples included in a group of pixels. Each tile within a stack represents the set of sample data at a specific per-sample rendering order index that are associated with the group of pixels represented by the stack. Advantageously, each tile includes tile compression bits that enable the tile to maintain data using existing compression formats. As the A-Buffer is created, a corresponding stack compression buffer is also created. For each stack, the stack compression buffer includes a bit that indicates whether all of the tiles in the stack are similarly compressed and, consequently, whether the GPU may operate on the stack at an efficient per pixel granularity.

  • Pub Date: 2009/09/12
  • Number: 08654135
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Weighting surface fit points based on focus peak uncertainty

A machine vision inspection system acquires a plurality of images of a workpiece region of interest at various focus heights, and determines a Z-height (e.g., the best focus height) for the region of interest based on a focus peak determining data set for the region of interest. The focus peak determining data set is derived from the plurality of images. The machine vision inspection system also determines Z-height quality meta-data based on data derived from the plurality of images (e.g., based on the focus peak determining data set), and associates the Z-height quality meta-data with the corresponding Z-heights. The Z-height quality meta-data are usable to establish weighting factors that are used in association with the corresponding best focus Z-heights in subsequent operations that fit a workpiece surface representation to a plurality of the best focus Z-heights.

  • Pub Date: 2009/08/12
  • Number: 08581162
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Software fault isolation using byte-granularity memory protection

Software fault isolation methods using byte-granularity memory protection are described. In an embodiment, untrusted drivers or other extensions to a software system are run in a separate domain from the host portion of the software system, but share the same address space as the host portion. Calls between domains are mediated using an interposition library and access control data is maintained for substantially each byte of relevant virtual address space. Instrumentation added to the untrusted extension at compile-time, before load-time, or at runtime and added by the interposition library enforces the isolation between domains, for example by adding access right checks before any writes or indirect calls and by redirecting function calls to call wrappers in the interposition library. The instrumentation also updates the access control data to grant and revoke access rights on a fine granularity according to the semantics of the operation being invoked.

  • Pub Date: 2009/08/12
  • Number: 08352797
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Server monitoring framework

A software framework configured to execute in a computer system and adapted to monitor statistics associated with one or more servers coupled to the computer system is disclosed. A data structure is configured to store statistics associated with the one or more servers coupled to the computer system. A server-monitoring thread is configured to update at least some of the statistics stored in the data structure, the server-monitoring thread to execute on a processor of the computer system. An application programming interface (API) responsive to a plurality of software modules executes in the computer system, the API is configured to process requests from the plurality of software modules for (i) adding or removing servers in the data structure or (ii) accessing statistics from the data structure. The computer system may be a network cache.

  • Pub Date: 2009/08/12
  • Number: 08028056
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Optimization of a computing environment in which data management operations are performed

Described are embodiments of an invention for optimizing a computing environment that performs data management operations such as encryption, deduplication and compression. The computing environment includes data components and a management system. The data components operate on data during the lifecycle of the data. The management system identifies all the data components in a data path, how the data components are interconnected, the data management operations performed at each data component, and how many data management operations of each type are performed at each data component. Further, the management system builds a data structure to represent the flow of data through the data path and analyzes the data structure in view of policy. After the analysis, the management system provides recommendations to optimize the computing environment through the reconfiguration of the data management operation configuration and reconfigures the data management operation configuration to optimize the computing environment.

  • Pub Date: 2009/08/12
  • Number: 08554743
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Object location service for network-based content repository

A distributed object store in a network storage system uses location-independent global object identifiers (IDs) for stored data objects. The global object ID enables a data object to be seamlessly moved from one location to another without affecting clients of the storage system, i.e., “transparent migration”. The global object ID can be part of a multilevel object handle, which also can include a location ID indicating the specific location at which the data object is stored, and a policy ID identifying a set of data management policies associated with the data object. The policy ID may be associated with the data object by a client of the storage system, for example when the client creates the object, thus allowing “inline” policy management. An object location subsystem (OLS) can be used to locate an object when a client request does not contain a valid location ID for the object.

  • Pub Date: 2009/08/12
  • Number: 08832154
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


External processor for a distributed network access system

An external processor for a network access system having a programmable access device includes a service controller that provides at least one service for network traffic, a message processor that processes network messages for service processing by the service controller, and a programmable access device controller that programs the programmable access device in response to service controller processing. It is advantageous for the external processor to include primary and secondary service controllers for a particular service so that, if the primary service controller fails, the secondary service controller can provide the particular service for message received from the programmable access device. In preferred embodiments, the service controller further includes a reporting processor that provides an interface through which reporting messages received from the programmable access device can be communicated to the service controller and a signaling controller that transmits signals to configure network hardware to establish requested network connections. The external processor preferably further supports a service policy interface through which the service controller can request policy decisions from a possibly remote policy server.

  • Pub Date: 2009/08/12
  • Number: 08131853
  • Owner: Verizon Business Global LLC
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed object store for network-based content repository

A distributed object store in a network storage system uses location-independent global object identifiers (IDs) for stored data objects. The global object ID enables a data object to be seamlessly moved from one location to another without affecting clients of the storage system, i.e., “transparent migration”. The global object ID can be part of a multilevel object handle, which also can include a location ID indicating the specific location at which the data object is stored, and a policy ID identifying a set of data management policies associated with the data object. The policy ID may be associated with the data object by a client of the storage system, for example when the client creates the object, thus allowing “inline” policy management. An object location subsystem (OLS) can be used to locate an object when a client request does not contain a valid location ID for the object.

  • Pub Date: 2009/08/12
  • Number: 09507799
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Display configuration for multimode electronic calipers having a ratiometric measurement mode

A multimode electronic measuring instrument is provided that includes a ratiometric mode of operation. During the ratiometric mode, a desired dimension is established as a stored reference dimension X. After the reference dimension is stored in memory, subsequent ratiometric measurement readouts will equal a current measurement distance Xdivided by the reference dimension X. A persistent number of decimal places used to the right of the decimal point as seen on a display is determined based on a current reference dimension X, an increment used for the least significant digit, and an internal measurement resolution of the multimode electronic measuring instrument.

  • Pub Date: 2009/08/12
  • Number: 08745108
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Content repository implemented in a network storage server system

A network storage server system includes a distributed object store, a presentation layer, a metadata subsystem, and a content management subsystem. The object store has no namespace and provides location-independent addressing of data objects. The presentation layer provides multiple interfaces for accessing data stored in the object store, including a NAS interface and a Web Service interface, and provides at least one namespace for accessing data via the NAS interface or the Web Service interface. The Web Service interface allows access to stored data via the namespace or without using the namespace (“raw object” access). The metadata subsystem stores user-specified and/or system-generated metadata relating to data objects and allows data objects to be identified and retrieved by searching on the metadata. The content management subsystem autonomously manages lifecycles of data objects according to user-specified policies, based on metadata associated with the data objects and tracked by the metadata subsystem.

  • Pub Date: 2009/08/12
  • Number: 08180813
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Biaryl carboxamides

  • Pub Date: 2009/08/12
  • Number: 08367679
  • Owner: Merck Sharp & Dohme Corp.
  • Location: Rahway, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for processing data streams

A distributed architecture and method for maintaining the integrity of data streams within a multi-pipelined processing environment. The architecture comprising a communications network for carrying a plurality of data streams and a master processor adapted to process one or more messages in at least one of the data streams, the message processing including the creation of one or more data packets within the stream, each packet encapsulating at least a transaction summary of the data that has been processed. The architecture further comprising at least one slave processor per master processor adapted to emulate the transactional state of the master processor by regenerating the data stream as a result of processing the one or more data packets, whereupon in response to an error event on the master processor, the slave processor acts to avoid interrupting the data stream by generating one or more successive data packet(s). Hence, the architecture and method serve as a high availability, robust fault tolerant system, mitigating against the loss of data within data streams.

  • Pub Date: 2009/08/12
  • Number: 08930754
  • Owner: BAE Systems PLC
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Aliphatically substituted pyrazolopyridines, and the use thereof

The present application relates to novel aliphatically substituted pyrazolopyridines, to processes for their preparation, to their use, alone or in combination, for the treatment and/or prevention of diseases and to their use for preparing medicaments for the treatment and/or prevention of diseases, in particular for the treatment and/or prevention of cardiovascular disorders.

  • Pub Date: 2009/08/12
  • Number: 08334291
  • Owner: Bayer Intellectual Property GmbH
  • Location: Monheim, DE
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices to manage routing cost information

Techniques are described for providing managed virtual computer networks that have a configured logical network topology with virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the virtual networking devices if they were physically present. In some situations, the networking functionality provided for a managed computer network of a client includes receiving routing communications directed to the virtual networking devices and using included routing cost information to update the configuration of the managed computer network, and/or includes determining actual cost information corresponding to use of an underlying substrate network and providing routing cost information to the client that reflects the determined actual cost information, so as to enable the client to modify the configuration of the managed computer network accordingly.

  • Pub Date: 2009/07/12
  • Number: 08995301
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices to manage external connections

Techniques are described for providing managed virtual computer networks that may have a configured logical network topology with one or more virtual networking devices, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. In some situations, the emulating of networking device functionality includes receiving routing communications directed to the networking devices and using included routing information to update the configured network topology for the managed computer network. In addition, the techniques may further include supporting interactions with devices that are external to the virtual computer network, including remote physical networking devices that are part of a remote computer network configured to interoperate with the virtual computer network, and/or specialized network devices that are accessible via a substrate network on which the virtual computer network is overlaid.

  • Pub Date: 2009/07/12
  • Number: 07937438
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using virtual networking devices and routing information to associate network addresses with computing nodes

Techniques are described for providing managed virtual computer networks that have a configured logical network topology with virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of the virtual computer network by emulating functionality that would be provided by the virtual networking devices if they were physically present. In some situations, the networking functionality provided for a managed computer network of a client includes receiving routing communications directed to the virtual networking devices and using included routing information to update the configuration of the managed computer network, such as to allow at least some computing nodes of a managed computer network to dynamically signal particular types of uses of one or more indicated target network addresses and/or to dynamically signal use of particular external public network addresses based on such routing information.

  • Pub Date: 2009/07/12
  • Number: 09036504
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Using consumer purchase behavior for television targeting

In various embodiments, strategies, tools and techniques are provided for processing and analyzing data in an advertising measurement system accessible through a software-as-a-service model or a client-downloaded computer program. The system may be configured to receive and process household media exposure data, product purchase data, advertising data, program data, and demographic data, wherein the data may be obtained from various sources, including from a program delivery source (e.g., a television set-top box) located in a household of a consumer. The data may be matched and cross-correlated for calculating return on advertising investment measurements and other metrics. The data may be used to optimize media placement generally or to address advertising content to specific households. Methods for storing and accessing data in the advertising measurement system by distributing the data across multiple shards are also provided. In addition, methods for protecting privacy of communicated data are disclosed.

  • Pub Date: 2009/07/12
  • Number: 08000993
  • Owner: TRA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Text message paging and ordering system

A text message paging and ordering system utilizes a dedicated or shared short code to enable an establishment, such as a restaurant, to send pages to mobile communication devices, such as a mobile phone. Transmitted text messages sent from the establishment are associated with a short code, which allows the mobile communication device in receipt of the text message to send reply messages back to the establishment associated with the short code. As such, this provides a wireless carrier approved medium that reliably and readily enables an establishment to have two-way text communication with a customer or client to facilitate paging functions as well as ordering functions.

  • Pub Date: 2009/07/12
  • Number: 08718684
  • Owner: iSpeedbuy, LLC
  • Location: Glenelg, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for real time theft detection

A method for tracking one or more portable devices in real time to detect theft of the one or more portable devices is provided. The method enables, firstly, interrogating a Radio Frequency Identification (RFID) tag via a RFID reader during successive sweep intervals. The sweep interval represents active state of the RFID reader. Secondly, the method enables receiving one or more pairing information from the RFID tag. Further, the method enables comparing the one or more pairing information with corresponding one or more pairing information stored in the RFID reader. Finally, the method enables generating an alert signal via the wearable-band or the one or more portable devices when the one or more pairing information does not match with the corresponding one or more pairing information stored in the RFID reader.

  • Pub Date: 2009/07/12
  • Number: 08427319
  • Owner: Infosys Technologies Limited
  • Location: , IN
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing multiple content feeds

A system and method for enabling networked computer users to manage multiple content feeds is disclosed. A particular embodiment includes collecting digital content from a plurality of content feeds; receiving a subscriber-provided affinity indicator from a subscriber; filtering the digital content based on the subscriber-provided affinity indicator to produce filtered content; identifying portions of the filtered content not previously delivered to the subscriber; and notifying the subscriber of the filtered content not previously delivered using one of a plurality of subscriber-configured delivery mechanisms.

  • Pub Date: 2009/07/12
  • Number: 09317612
  • Owner: D&B BUSINESS INFORMATION SOLUTIONS
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for efficient and accurate comparison of software items

Apparatus, processes, and related technologies for comparison between a target item of software code and a reference set of software code. The target item is preprocessed to be compared against a reference item from the reference set to identify a selected set of lines of software code from the target item to be used for the comparison. Each line of the selected set of lines from the target software item is individually compared with lines of software code from the reference set to produce a measure of similarity between the target software item and at least one reference item of software code from the reference set. Various techniques for maintaining and updating a numerical representation of similarity of the target item with each reference item, the numerical representation being stored in a corresponding element of a data structure.

  • Pub Date: 2009/07/12
  • Number: 08499167
  • Owner: Kaspersky Lab ZAO
  • Location: Moscow, RU
  • Details: Visit USPTO

Visit USPTO Page


System and method for discovering subscriber content affinity and making corresponding recommendations

A system and method to discover subscriber content affinity and make corresponding recommendations is disclosed. A particular embodiment includes collecting digital content from a plurality of content feeds; receiving a subscriber-provided affinity indicator from a subscriber; filtering the digital content based on the subscriber-provided affinity indicator to produce filtered content; tracking interactions with the filtered content by the subscriber; and automatically determining implicit subscriber affinity based on subscriber interactions with the filtered content.

  • Pub Date: 2009/07/12
  • Number: 09507856
  • Owner: D&B BUSINESS INFORMATION SOLUTIONS
  • Location: , IE
  • Details: Visit USPTO

Visit USPTO Page


Screen scraping interface

An interface can serve as a client-mainframe interface, enabling clients to develop applications without a need to understand mainframe processes and screen flows. Extended Tool Command Language (Tcl) can define services that can include a series of interactions with a mainframe system and service definitions can be added or updated on the interface during operation of the interface without disrupting processing. The service definitions can enable the interface to receive XML requests from a client, parse the XML requests, execute the service scripts to interact with the mainframe systems, generate the result in a XML format and send the XML file back to the client. Fundamental Mainframe Interactions (FMI) commands can interact with the mainframe systems and enable the specification of the XML structure of the request and response. The interface can provide efficient connection pooling management and connection life cycle control to improve the performance of the mainframe system interactions.

  • Pub Date: 2009/07/12
  • Number: 08291047
  • Owner: Verizon Data Services LLC
  • Location: Temple Terrace, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable reusable scanning of application networks/systems

A device schedules a scan of a group of devices associated with an application network/system, and receives, at a scheduled time, scan information from the group of devices, where the scan information is provided in different formats. The device also converts the scan information, in the different formats, into a single normalized format, and processes the normalized scan information to produce enriched, normalized scan information.

  • Pub Date: 2009/07/12
  • Number: 09077609
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Polymorphs of suberoylanilide hydroxamic acid

The present invention provides methods of selectively inducing terminal differentiation, cell growth arrest and/or apoptosis of neoplastic cells, and/or inhibiting histone deacetylase (HDAC) by administration of pharmaceutical compositions comprising potent HDAC inhibitors. The oral bioavailability of the active compounds in the pharmaceutical compositions of the present invention is surprisingly high. Moreover, the pharmaceutical compositions unexpectedly give rise to high, therapeutically effective blood levels of the active compounds over an extended period of time. The present invention further provides a safe, daily dosing regimen of these pharmaceutical compositions, which is easy to follow, and which results in a therapeutically effective amount of the HDAC inhibitors in vivo. The present invention also provides a novel Form I polymorph of SAHA, characterized by a unique X-ray diffraction pattern and Differential Scanning Calorimetry profile, as well a unique crystalline structure.

  • Pub Date: 2009/07/12
  • Number: 08101663
  • Owner: Merck HDAC Research, LLC
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Modulators of the prostacyclin (PGI2) receptor useful for the treatment of disorders related thereto

  • Pub Date: 2009/07/12
  • Number: 08940891
  • Owner: Arena Pharmaceuticals, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and program for an improved enterprise spatial system

Disclosed is a method, system, and program for providing access to spatial data. A request for data is received. Enterprise and third party data are integrated. The integrated data is processed. Spatially referenced results are generated using the processed data. The spatially referenced results are returned in response to the request.

  • Pub Date: 2009/07/12
  • Number: 08918730
  • Owner: The Paradigm Alliance, Inc.
  • Location: Maize, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for single pass volume scanning for multiple destination mirroring

A method for operating a computer data storage system is disclosed. The system operates an active file system on a first volume of a plurality of volumes of storage devices connected to one or more servers, each volume being a plurality of storage devices. Snapshots of the active file system are stored on one or more destination volumes. A mirroring operation is initiated on a selected server of the one or more servers. A scanner executes on the selected server, the scanner identifying a latest snapshot on each of the one or more destination volumes, the scanner. Data blocks which are newer than a latest snapshot stored at each destination volume are sent to each destination volume.

  • Pub Date: 2009/07/12
  • Number: 07949843
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Managing power consumption in a data center

Systems and methods are provided for managing resources. In one implementation, a method is provided in which a management server determines whether a condition related to one or more resources has occurred. The management server further determines at least one program instance to terminate. The at least one program instance executes on one of a plurality of servers. The management server further terminates the determined at least one program instance, which was used by an excess program execution capacity user.

  • Pub Date: 2009/07/12
  • Number: 08224993
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed file system consistency mechanism extension for enabling internet video broadcasting

The consistency callback mechanisms employed by local file systems such as NTFS and distributed file systems such as DDS, NFS and CIFS are extended to provide a shared memory foundation for efficiently broadcasting real-time high definition video from a source object to large numbers of viewers via the Internet. Distributed applications such as video viewing client applications establish connections to a common distributed file system object, and then each application registers with the underlying distributed file system to receive notifications whenever the video source modifies the source object. The data required to update images maintained by viewing clients is included in notification messages. The distributed file system employs a network of proxy cache nodes. Proxy cache nodes receive notification messages (complete with image update data) and update their cached images of the source object and then retransmit the notification messages towards the viewing clients using IP multicast techniques. In this manner, the distributed file system's consistency mechanism efficiently employs network resources to enable the real-time distribution of video content streams.

  • Pub Date: 2009/07/12
  • Number: 08504597
  • Details: Visit USPTO

Visit USPTO Page


Content delivery for client server protocols with user affinities using connection end-point proxies

In a network supporting transactions between clients and servers over a network path having operating characteristics to overcome, data is transported to overcome the operating characteristics using user affinities and dynamic user location information to selectively preload data, or representations, signatures, segments, etc. of data, in order to overcome the one or more operating characteristic. Examples of operating characteristics to overcome include bandwidth limitations, errors and latency. The dynamic location information can be stored in data structures accessible by agents of a data server and the data structures are populated based on user activities with respect to proxies associated with user locations, or the dynamic location information can be obtained implicitly as proxies maintain connections after termination by clients and the use of those maintained connections for preloading of data for the users associated with those clients. The data being preloaded can be protocol-specific data or protocol-independent data.

  • Pub Date: 2009/07/12
  • Number: 08635346
  • Owner: Riverbed Technology, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Translation of programming code

Embodiments of the invention may provide methods and/or systems for converting a source application to a platform-independent application. Source programming language code of the source application may be translated to target programming language code of the platform-independent application. The source programming language code may comprise Connected Limited Device Configuration (CLDC) code, and the platform-independent programming language may be independent of one or more device platforms. Further, one or more source resources associated with the source application may be converted to one or more target resources.

  • Pub Date: 2009/04/12
  • Number: 08762963
  • Owner: Beck Fund B.V. L.L.C.
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Tracing values of method parameters

Implementations of the present disclosure provide methods including receiving one or more specifications at a virtual machine that is executed using one or more processors, each specification indicating one or more methods and one or more parameters to be traced, the one or more parameters corresponding to the one or more methods, executing an application, the application calling a method of the one or more methods using the virtual machine, determining a subset of the one or more received specifications, the subset corresponding to specifications that are applicable to the method, generating an entry event corresponding to the method based on the subset, the entry event comprising event data including values of the one or more parameters, and reporting the entry event.

  • Pub Date: 2009/04/12
  • Number: 09129056
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Securing communications between different network zones

In an embodiment, a method is provided for communicating a protocol request at a network zone. In this method, the protocol request is received from a computing device and this protocol request is encapsulated in a different protocol. The protocol request is then transmitted to a different network zone by way of the different protocol. A message is then accessed from the different network zone by way of the different protocol, and this message includes a protocol response to the protocol request. The protocol response is extracted from the message and transmitted to the computing device.

  • Pub Date: 2009/04/12
  • Number: 08701180
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Remote procedure call (RPC) bind service with physical interface query and selection

A service module that provides for discovery of one or more network interfaces connecting a prospective remote procedure call (RPC) client, facilitates the provision of RPC programs in a network including multi-horned systems. When a request for a network address to an RPC application providing an RPC program is received from the RPC client, the RPC bind daemon discovers from the module, using the client response address, over which interface(s) the client is accessible. The daemon then selects an address of a network path to the RPC application that the prospective client can access and returns the corresponding network address. The service module monitors the network stack for RPC get address requests and builds tables of client address entries with corresponding network interface identifiers. The entries are retired according to an aging policy. When multiple network paths to the RPC application are available, the service can be selected using a heuristic such as preferred interface, non-firewalled interface, least number of return path links or other criteria.

  • Pub Date: 2009/04/12
  • Number: 08266639
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Realtime kernel

A realtime kernel supports realtime communications between communicants operating on respective network nodes. The realtime kernel handles the complex tasks of connecting to communicants, virtual areas, and other network resources, switching those connections in response to user inputs, and mixing realtime data streams. The realtime kernel enables developers to focus on developing high-level communications functionality instead of low-level plumbing code. The realtime kernel imposes relatively low computational resource requirements so that realtime communications performance can be achieved using a wide range of computing devices and network connections that currently are available.

  • Pub Date: 2009/04/12
  • Number: 08578000
  • Owner: Social Communications Company
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Profiling data snapshots for software profilers

Implementations of the present disclosure provide methods including executing a profiling session to profile one or more applications running on a virtual machine executed on a server, collecting profiling data over a first time interval during the profiling session, receiving user input generated at a client device, the client device being in communication with the server, in response to the user input, generating a snapshot corresponding to a subset of the profiling data, the snapshot being identified based on a second time interval that is within the first time interval, and transmitting the profiling data to generate a snapshot view for display on a client device, the snapshot view corresponding to the subset of the profiling data.

  • Pub Date: 2009/04/12
  • Number: 08850403
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Pervasive realtime framework

A pervasive realtime framework supports the execution of realtime software applications with high-level functions that significantly reduce the effort and time needed to develop realtime software applications in a new operating environment paradigm in which realtime connections between network nodes are pervasive. The pervasive realtime framework handles the complex tasks of connecting to communicants, virtual areas, and other network resources, as well as switching those connections in response to user inputs and thereby enables software application developers to focus on developing high-level realtime software application functionality.

  • Pub Date: 2009/04/12
  • Number: 08868656
  • Owner: Social Communications Company
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating epilepsy with transforming growth factor beta inhibitors

The present invention provides methods of treating epilepsy and other neurological disorders. The methods generally involve administering to an individual in need thereof an effective amount of an agent that blocks a transforming growth factor-beta pathway.

  • Pub Date: 2009/04/12
  • Number: 09468649
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


High throughput, reliable replication of transformed data in information systems

Provided are techniques for, in response to a source object being changed by a local transaction, generating log records, wherein each of the log records includes a sequence identifier, a source system entity modification timestamp, a target key, a target partition identifier, and values of source properties, wherein the source properties are identified using a target key indicator. The log records to process are selected based on a phase value of each log record, wherein the phase value is one of submitted, in-flight, and source system entity state change complete. One or more disjoint partitions are assigned to each of multiple processing instances. Under control of each of the multiple processing instances, it is determined whether to transmit a log record in the one or more disjoint partitions assigned to said processing instance and, in response to determining that the log record is to be transmitted, the log record is transmitted.

  • Pub Date: 2009/04/12
  • Number: 08244686
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic data storage repartitioning

Embodiments of the present invention enable dynamic repartitioning of data storage in response to one or more triggers. In embodiments, a trigger may be a user-initiated action, a system-generated action, and/or an inference based on storage usage parameters. Applications of the present invention are its use in embodiments of a storage management system comprising a file system manager and a volume manager, where the placement of data into a partition (data storage region) may be specified by matching one or more disk region placement data attributes assigned to data with corresponding disk region attributes. In embodiments, dynamic repartitioning comprises adjustment of the location of the boundary between adjacent disk partitions and, if necessary, rebalancing of the data stored within the partitions by identifying mismatched data and relocating it to the partition with which it is associated.

  • Pub Date: 2009/04/12
  • Number: 08156304
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Concurrently presented data subfeeds

When presenting a news feed (e.g., statuses of contacts in a social media network), it may be inefficient to display the data items in a single column according to a single filter, such as a designated group of contacts. Rather, from the data feed, a set of at least two data subfeeds may be generated based on different filters, and the at least two data subfeeds may be currently presented to the user (e.g., as two or more vertically aligned columns, each presenting a different set of data items based on a different filter.) The user may prefer the concurrent presentation due to the contextual separation of the data items according to different filters, and may more easily administrate the filters and groupings; e.g., dragging data items from one column to another column may alter the filters to achieve a more preferred sorting of data items in future presentations.

  • Pub Date: 2009/04/12
  • Number: 08335763
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Component statistics for application profiling

Implementations of the present disclosure provide methods including executing an application using one or more processors, generating a plurality of method call stacks, each method call stack comprising a plurality of methods invoked by the application, providing a component call stack based on a method call stack of the plurality of method call stacks, the component call stack comprising a plurality of components, each component being defined by one or more methods of the plurality of methods, and generating component statistics based on the component call stack and profiling data collected during the executing.

  • Pub Date: 2009/04/12
  • Number: 08584098
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Combination therapy for treating cancer and diagnostic assays for use therein

The present disclosure relates to a combination of therapeutic agents for use in treating a patient a subject suffering from cancer. In addition, the present disclosure also relates to diagnostic assays useful in classification of patients for treatment with one or more therapeutic agents.

  • Pub Date: 2009/04/12
  • Number: 08624027
  • Owner: AbbVie Inc.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Bcl-2-selective apoptosis-inducing agents for the treatment of cancer and immune diseases

Disclosed are compounds which inhibit the activity of anti-apoptotic Bcl-2 or Bcl-xL proteins, compositions containing the compounds and methods of treating diseases during which are expressed anti-apoptotic Bcl-2 protein.

  • Pub Date: 2009/04/12
  • Number: 08563735
  • Owner: Abbvie Inc.
  • Location: North Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for monitoring and optimizing delivery of content in a network

Methods and apparatus for delivering content to a user so as to optimize and enhance the “experience” of the content. In one embodiment, an optimization and monitoring entity (OME) is used which determines, evaluates, and provides notification and/or recommendation of alternative content delivery platforms which are available to a user. The OME receives requests for content forwarded from a content server containing information identifying requesting devices and/or subscriber accounts. The OME examines the capabilities of the registered devices, and identifies/recommends alternative devices based on e.g., video/audio quality, picture size, bandwidth availability, and/or any other additional capabilities of the client devices. A notification is then sent to the client devices indicating which of the user's devices may receive the content alternatively, or in addition to, the requesting device. The notifications may be interactive, allowing the user to select one or more of the devices for delivery.

  • Pub Date: 2009/04/12
  • Number: 09519728
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for supporting information interoperability between medical instruments

The present invention relates, in general, to Electronic Medical Record (EMR) systems, and, more particularly, to a system and method for supporting information interoperability between medical instruments which is capable of automatically combining medical test information measured by a plurality of medical instruments for performing data communication in compliance with various data interface protocols with the medical information of an EMR system.

  • Pub Date: 2009/03/12
  • Number: 08380834
  • Owner: Bit Computer Co., Ltd.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing virtual web access

A client-based computer system adapted to communicate with a remote server through a network and to provide access to content or services provided by the server. The system includes a storage device and a cache. The cache is adapted to communicate with the server over the network, to intercept a request from the client to the server, and to store responses from the server on the storage device. The cache is further adapted to automatically determine when to send the request to the server over the network. The cache is still further adapted to provide a response, including from the responses stored on the storage device based upon the request, to appear as through the server provided the response. The system may also include a crawler. The crawler is adapted to operate in conjunction with the cache to cause requests to be sent to the server over the network.

  • Pub Date: 2009/03/12
  • Number: 08516080
  • Owner: Mobophiles, Inc.
  • Location: Santa Monica, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for analyzing nonstandard facility operations within a data center

A computer implemented method and a data center management appliance for simulating nonstandard operation of an element of a data center is provided. The method includes acts of determining a one data center resource affected by a data center element, selecting a simulator from a plurality of simulators based on the data center resource and the data center element and generating a impact analysis of the nonstandard operation of the data center element using the simulator. The data center management appliance includes a network interface, a memory and a controller coupled to the network interface and the memory. The controller is configured to determine a data center resource affected by a data center element, select a simulator from a plurality of simulators based on the data center resource and the data center element and generate a impact analysis of nonstandard operation of the data center element using the first simulator.

  • Pub Date: 2009/03/12
  • Number: 08433547
  • Owner: Schneider Electric IT Corporation
  • Location: West Kingston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for analyzing and reporting extensible data from multiple sources in multiple formats

A system and method for analyzing and reporting data from multiple sources is provided. The system is a foundation for an analytical platform that covers not only traditional relational data, but also a new generation of extensible data formats designed for the web, such as those based on XML (FIXML, FpML, ebXML, XBRL, ACORD, etc.), as well as HTML, E-mail, Excel, PDF, and others. In a preferred embodiment, the eXtensible on-line analytical processing (XOLAP), is a scalable client/server platform that allows the multi-dimensional analysis of modern data types, as well as traditional relational data, by bringing them all into an internal common XML-based model, without the time and expense of creating a data warehouse.

  • Pub Date: 2009/03/12
  • Number: 08346811
  • Owner: Skytide, Inc.
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable monolithic single frequency fiber amplifier

A method to increase the output power of monolithic narrow-linewidth Yb-doped fiber amplifiers by suppressing simulated Brillouin scattering. The fiber amplifier employs a co-propagating geometry and is seeded with broad- (source ) and narrow- (source ) linewidth signals that are sufficiently different in wavelengths to allow for efficient gain competition and favorable temperature profile at the output end of fiber. The broadband seed signal possesses the higher emission and absorption cross sections. If source is also given sufficiently greater input power than source , it will be amplified to its maximum value as the seed signals reach the middle portion of the gain fiber. Beyond that portion, the signal having the lower emission and absorption cross sections (signal ) will continue to experience gain by power transfer from both signal and the pump light, attaining a power output well beyond what the maximum output would have been had the amplifier been illuminated with a single frequency beam. Furthermore, if the two signals are carefully selected such that appreciable quantum defect heating occurs during the power transfer, a steep thermal gradient develops leading to even further increase in output power.

  • Pub Date: 2009/03/12
  • Number: 08462426
  • Owner: The United States of America as Represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of diagnosing and treating motor neuron diseases

Use of an agent which upregulates an activity or amount of miRNA-9 or miRNA-9* is disclosed for the preparation of a medicament for the treatment of a motor neuron disease (MND).

  • Pub Date: 2009/03/12
  • Number: 08734759
  • Owner: Yeda Research and Development Co. Ltd.
  • Location: Rehovot, IL
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for treating

The disclosure provides an antigenic composition useful for immunization against , or . The disclosure provides a method for producing a vaccine for preventing infection and screening agents useful for preventing infection.

  • Pub Date: 2009/03/12
  • Number: 09340769
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Method for reorganizing tasks for optimization of resources

A method of reorganizing a plurality of task for optimization of resources and execution time in an environment is described. In one embodiment, the method includes mapping of each task to obtain qualitative and quantitative assessment of each functional elements and variables within the time frame for execution of each tasks, representation of data obtained from the mapping in terms of a matrix of dimensions N×N, wherein N represents total number of tasks and reorganizing the tasks in accordance with the represented data in the matrix for the execution, wherein reorganizing the tasks provides for both static and dynamic methodologies. It is advantageous that the present invention determines optimal number of resources required to achieve a practical overall task completion time and can be adaptable to non computer applications.

  • Pub Date: 2009/03/12
  • Number: 08732714
  • Owner: Kpit Technologies Limited
  • Location: Pune, IN
  • Details: Visit USPTO

Visit USPTO Page


Method and system for transparently directing graphics processing to a graphical processing unit (GPU) of a multi-GPU system

A method for transparently directing data in a multi-GPU system. A driver application receives a first plurality of graphics commands from a first graphics application and selects a first GPU from the multi-GPU system to exclusively process the first plurality of graphics commands. The first plurality of graphics commands is transmitted to the first GPU for processing and producing a first plurality of renderable data. The first plurality of renderable data is stored in a first frame buffer associated with the first GPU. A second plurality of graphics commands is received from a second graphics application and a second GPU is selected to exclusively process the second plurality of graphics commands. The second GPU processing the second plurality of graphics commands produces a second plurality of renderable data. The second plurality of renderable data is stored in a second frame buffer associated with the second GPU.

  • Pub Date: 2009/03/12
  • Number: 09041719
  • Owner: NVIDIA CORPORATION
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Geospatial telephony system

A geospatial telephony system initiates conference calls between participants based on location of participants. For example, a node within the system can receive a location at which a first communication device is geospatially located and can enable a conference call to be initiated between the first communication device and at least one other communication device based on that location.

  • Pub Date: 2009/03/12
  • Number: 08515040
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Communication channel between web application and process outside browser

One or more techniques and/or systems are disclosed herein for relaying a request to a process running on a computing device from a web client and receiving a response from the process. A bridge message client disposed in a web application, running in a browser on a computer, opens a local connection to a process running outside the browser. The bridge message client comprises a communication channel ID that identifies a communication channel to host the local connection to a bridge server, and a bridge message client ID facilitates communications from the bridge server to the web application. The bridge server is disposed outside of the browser environment, and can receive a request from the bridge message client and forward it to the process, and/or can receive a response to the request from the process and forward it to the bridge message client over the local connection.

  • Pub Date: 2009/03/12
  • Number: 09390172
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Automated merger of logically associated messages in a message queue

Embodiments of the invention provide a method, system and computer program product for message merging in a messaging queue. In an embodiment of the invention, a method for message merging in a messaging queue can be provided. The method can include receiving a request to add a new message to a message queue in a message queue manager executing in memory by a processor of a host computing platform. The method can also include a merge indicator to stipulate whether or not a merge should take place. The method also can include identifying an association key associating the new message with an existing message in the message queue and locating an associated message in the message queue corresponding to the identified association key. Finally, the method can include merging the new message with the located associated message in the message queue.

  • Pub Date: 2009/03/12
  • Number: 09361165
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods and computer program products for a comprehensive environmental benefit program associated with a commercial credit card

Systems, methods, and computer program products are provided for a comprehensive environmental benefit program associated with purchases made by a corporate entity and, more specifically, purchases associated with a commercial credit card. According to embodiments herein disclosed, environmental impact data, such as ecological or carbon footprint data may be determined based on the purchases made by a commercial entity using the commercial credit card and, in some embodiments, purchases made through other purchasing channels. In addition, environmental advisory data, such as suggestions for environmental improvements, environmental educational information or the like may be determined based on the purchases. Additionally, environmental rebates, such as carbon offsets may be determined based on the purchases/purchase amounts and customized based on commercial entity preferences.

  • Pub Date: 2009/02/12
  • Number: 08214258
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for an interactive internet radio application in an internet protocol television system

A set-top box for an Internet protocol television (IPTV) network includes a radio interface module, a remote control interface module, and a display interface module. The radio interface module accesses an Internet radio service on the IPTV network and outputs a list of Internet radio stations received from the Internet radio service to a particular IPTV channel on the display interface module, receives a selection of an Internet radio station from the remote control interface module, retrieves an Internet radio stream associated with the selected Internet radio station from the Internet radio service in response to receiving the first selection, and outputs the Internet radio steam on the particular IPTV channel of the display interface module.

  • Pub Date: 2009/02/12
  • Number: 08458749
  • Owner: AT&T Intellectual Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Rich context modeling for text-to-speech engines

Embodiments of rich context modeling for speech synthesis are disclosed. In operation, a text-to-speech engine refines a plurality of rich context models based on decision tree-tied Hidden Markov Models (HMMs) to produce a plurality of refined rich context models. The text-to-speech engine then generates synthesized speech for an input text based at least on some of the plurality of refined rich context models.

  • Pub Date: 2009/02/12
  • Number: 08340965
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Provision of troubleshooting tools in a network system

In an embodiment, a method is provided for providing a tool used for troubleshooting a component. This tool is included in an application server that is in communication with multiple client computing devices. Here, a request to activate the tool is received from one or more client computing devices. This request includes a diagnostic identifier that uniquely identifies the client computing device that transmitted the request. Upon receipt of the request, the tool is activated at the application server with the diagnostic identifier used as an input parameter. When activated, the tool can identify the client computing device based on the diagnostic identifier and can provide a functionality associated with the troubleshooting to the client computing device.

  • Pub Date: 2009/02/12
  • Number: 08706844
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Optimizing caching period of location data for network based location services

A system and associated method for optimizing caching period of location data for network based location services. A location caching server receives a location request from a mobile device. The location caching server calculates, pursuant to a predefined calculation rule, a caching period of a location cache entry for the mobile device based on a precision level requested by the mobile device and a service precision level assigned for a type of location service for which the location request was made. The location caching server obtains real location data of the mobile device of the calculated caching period is expired. The location caching server subsequently adjusts the caching period based on a distance traveled by the mobile device pursuant to a predefined adjustment rule, and updates the location cache entry.

  • Pub Date: 2009/02/12
  • Number: 08131818
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Noise correlation radar devices and methods for detecting targets with noise correlation radar

A pulsed compression noise correlation radar uses noise modulation and pulse compression technology to scramble recognizable transmit signal characteristics and reduce transmit energy. The pulsed noise correlation radar advantageously uses pulse compression technology, a pulsed linear frequency modulated noise correlation mixer, and a new and innovative noise fused waveform to automatically correlate the pulsed linear frequency modulated (LFM) noise waveform with the received signal. The pulsed noise correlation radar apparatus and system now make it possible to effectively reduce transmitting power, preserve high band widths through oversampling in the receiver, and achieve multi-channel array frequency diversity. A secure pulsed compression noise correlation radar system and methods for undetected target detection with pulsed noise correlation radar and a pulsed LFM fused noise waveform are also provided.

  • Pub Date: 2009/02/12
  • Number: 08035551
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing interactive communications campaigns with call pacing

A web-based hosted solution (a managed service or system) through which business entities create and manage communications campaigns, such as interactive campaigns that afford target recipients an opportunity to be connected to a contact center. The managed service carries out a communications campaign on behalf of a client. A “campaign” refers to a series of calls to a contact list using one or more sub-campaigns. A sub-campaign associates a list of contacts, a script, and a timeframe. An “agent” typically is a contact center operator. A “skill group” is a set of agents that are trained to handle a given script. Call pacing enhancements are implemented to allow simultaneous progress on multiple sub-campaigns under a skill group. The techniques enable control over the pacing of individual sub-campaigns when multiple sub-campaigns are running under a single skill group. The service also provides a framework by which a set of “pluggable” pacing models are provisioned and managed, preferably on a per-model basis.

  • Pub Date: 2009/02/12
  • Number: 08594312
  • Owner: Soundbite Communications, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for directly mapping web services interfaces and java interfaces

A method and system for directly mapping web services interfaces and Java interfaces. In one embodiment, a web services mapping is generated from a common mapping descriptor associated with a web services interface; updated mapping information is received, and, based on the web services mapping and the updated mapping information, a customized interface comprising a common web services and web services client interface is generated.

  • Pub Date: 2009/02/12
  • Number: 08589518
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Image-derived user interface enhancements

A device configured to select a portion of an image, the selecting being based at least on parameters associated with a user interface element of the device, is disclosed herein. The device is further configured to apply the selected portion of the image to the user interface element.

  • Pub Date: 2009/02/12
  • Number: 09003290
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


High efficiency slab-coupled optical waveguide laser and amplifier

A slab-coupled optical waveguide laser (SCOWL) is provided that includes an upper and lower waveguide region for guiding a laser mode. The upper waveguide region is positioned in the interior regions of the SCOWL. The lower waveguide region also guides the laser mode. The lower waveguide region is positioned in an area underneath the upper waveguide region. An active region is positioned between the upper waveguide region and the lower waveguide region. The active region is arranged so etching into the SCOWL is permitted to define one or more ridge structures leaving the active region unetched.

  • Pub Date: 2009/02/12
  • Number: 08571080
  • Owner: Massachusetts Institute of Technology
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Displaying content associated with electronic mapping systems

Various methods, systems and apparatus for displaying alternate content in a digital mapping system, are disclosed. One such method may include detecting a change in a zoom level of an electronic map displaying geographic content (e.g. tile-based digital map, satellite image, etc.) on a computing device (e,g. desktop/laptop, smart phone, etc, running Windows®, Linux®, Mac OS®, iOS®. Android®, etc.); determining a predetermined (eg. maximum) zoom level has been reached; retrieving alternate content, and displaying the alternate content in addition to, or in place of, some-or-all of the geographic content. The method may further include detecting a zoom-out command while the alternate content is being displayed, and in response, restoring the display of the geographic content (e.g. at the maximum zoom level and/or last state of the geographic content display prior to displaying the alternate content.) Alternate content may be associated with any portion of geographic content displayed (e.g. the portion of the geographic content visible at the maximum zoom level) and may be selected via various algorithms and be manipulate-able via map display application controls.

  • Pub Date: 2009/02/12
  • Number: 08490025
  • Details: Visit USPTO

Visit USPTO Page


System and method of multiple smart card driver support

By thoroughly investigating compatibility of a plurality of smart card drivers to applications available on a given smart card, a smart card framework module may be afforded additional flexibility in communications with the smart card. The additional flexibility is allowed by additional checking with a plurality of smart card drivers before communicating with the smart card, rather than simply using the first compatible smart card driver found. Furthermore, when employing an application available on the given smart card, a correct smart card driver is to be selected from among the plurality of smart card drivers.

  • Pub Date: 2009/01/12
  • Number: 08292165
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Ranking and selecting entities based on calculated reputation or influence scores

Ranking and selecting entities based on calculated reputation or influence scores is provided. In some embodiments, a method includes determining whether a first entity is a subject or an object; determining whether a second entity is a subject or an object; and generating a graph, in which a subset of the graph is a subject graph of subject nodes that includes at least one or more subjects (e.g., subject entities) linked to one or more other subjects, and in which the graph includes one or more objects (e.g., object entities) each linked to one or more subjects in the subject graph. In some embodiments, the graph includes directed and undirected links. In some embodiments, the graph includes one or more objects linked to one or more objects.

  • Pub Date: 2009/01/12
  • Number: 08688701
  • Owner: Topsy Labs, Inc
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of humanizing immunoglobulin variable regions through rational modification of complementarity determining residues

The present invention is based, at least in part, on the discovery that strategic modifications of non-human donor antibody CDR residue(s) can be used to humanize antibodies. Such modifications modulate the 3D structural fit between donor antibody CDRs and human acceptor antibody framework regions that comprise the variable domains of a CDR-grafted antibody. Whereas prior art methods of humanization have relied on making framework substitutions (in which selected human framework residues are backmutated to the corresponding amino acid residue present in the non-human donor antibody), the instant invention is based, at least in part, on a method of humanizing antibodies in which selected CDR residues, and optionally adjacent FR residues, are changed in order to accommodate differences in FR amino acid sequences between donor and acceptor antibodies.

  • Pub Date: 2009/01/12
  • Number: 08349324
  • Owner: Biogen Idec MA Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware acceleration of functional factoring

A hardware accelerator factors functions during the compilation of a user design. The hardware accelerator includes cofactor units, each adapted to determine a cofactor of a function in response to a specified factorization and a set of input values. The factorization specifies the constant function inputs and varying function inputs. Each cofactor unit determines the cofactor of the function in response to a different constant value. The hardware accelerator operates all of the cofactor units simultaneously to determine some or all of the cofactors of a function for a factorization in parallel. Signature generators determine attributes of the cofactors. A signature analyzer uses these attributes to identify identical cofactors, constant cofactors, and inverse cofactors. The signature analyzer returns potentially optimal factorizations to compilation software applications for possible incorporation into user designs. The hardware accelerator may be implemented using a programmable device, such as the FPGA or other programmable device.

  • Pub Date: 2009/01/12
  • Number: 07797667
  • Owner: Altera Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Estimating influence of subjects based on a subject graph

Estimating influence includes receiving a subject graph, in which the subject graph includes two or more subject nodes, in which each subject node corresponds to a subject; and determining an objective influence measure for each first subject node of the subject graph, in which the determination is based at least on part on a function of inward scores and outward scores, in which inward scores are computed from one or more paths leading to the first subject of a length of at least one, and outward scores are computed from one or more paths leading from the first subject of a length of at least one.

  • Pub Date: 2009/01/12
  • Number: 08244664
  • Owner: Topsy Labs, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Diagnosis of conditions associated with decreased arginine bioavailability

The invention features methods and compositions for diagnosis, including prognosis, of conditions associated with decreased arginine bioavailability (which can result from dysregulated arginine metabolism, e.g., due to increased arginase activity) by assessing in a sample from a subject the ratio of arginine to one or more, usually two or more, modulators of arginine bioavailability. In one embodiment, the ratio of arginine to (ornithine+citrulline) is assessed to aid in diagnosis.

  • Pub Date: 2009/01/12
  • Number: 08309320
  • Owner: The Cleveland Clinic Foundation
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Decoupled installation of data management systems

Systems and methods for providing decoupled installation of data management systems used in conjunction with computer networks are disclosed. The method comprises installing data storage software in order to facilitate communication with a second computer in order to perform data storage operations. The software may be installed without knowledge of the second computer and/or the ability to communicate with the second computer. During the installation process, configuration parameters are obtained by the first computer and stored in a data structure. At least a portion of the configuration parameters recorded in the data structure is also provided to the second computer. The first and second computers subsequently communicate in order to register the first computer for use with the second computer.

  • Pub Date: 2009/01/12
  • Number: 08943183
  • Owner: CommVault Systems, Inc.
  • Location: Tinton Falls, US
  • Details: Visit USPTO

Visit USPTO Page


Association and extraction of content artifacts from a graphical representation of electronic content

A computer implemented method and system is provided for associating and extracting content artifacts from a graphical representation of electronic content. A multi-dimensional virtual lattice comprising one or more grid layers is created. The nodes of the multi-dimensional virtual lattice represent metadata acquired from predefined content criteria. Electronic content comprising content artifacts acquired from multiple content sources is graphically represented within the multi-dimensional virtual lattice using the grid layers. Each of the content artifacts from the electronic content attaches to one or more nodes of the multi-dimensional virtual lattice. A user provides search criteria comprising keywords. The content artifacts attached to nodes of the multi-dimensional virtual lattice whose metadata matches with the keywords are extracted and displayed to the user. The graphical representation of electronic content in the multi-dimensional virtual lattice is used to associate, extract, composite, project, and organize the content artifacts acquired from the content sources.

  • Pub Date: 2009/01/12
  • Number: 08352514
  • Owner: CK12 Foundation
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Advertising based on influence

Advertising based on influence is provided. In some embodiments, advertising based on influence includes determining an influence score (e.g., based on a given dimension) for a subject (e.g., a user), in which the subject is a potential target for an advertisement; and determining targeting of the advertisement based on criteria including the influence score of potential recipients of the advertisement. In some embodiments, the influence score is a directly estimated objective measure of influence (e.g., estimated using a social graph). In some embodiments, advertising based on influence also includes determining pricing of advertisements based on criteria including the influence score of potential recipients of one or more advertisements. In some embodiments, advertising based on influence further includes sharing advertising revenue with the subject based on criteria including the influence score of the first subject (e.g., as an incentive for the subject to view the advertisement).

  • Pub Date: 2009/01/12
  • Number: 08768759
  • Owner: Topsy Labs, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Workflow information generation unit configured to construct a workflow with a plurality of processes and determine its allowability, a method of constructing the same, and an image processing apparatus configured to execute the same

A workflow information generation unit is used for constructing a workflow configured with a plurality of processes. Information of the processes is storable in a workflow information storage. The workflow information generation unit includes a process-designation information obtaining unit, an advance notice output unit, an implementation-determination information obtaining unit, a process information output unit, a result information output unit. The process-designation information obtaining unit obtains information designating a process to be included in the workflow. The advance notice output unit outputs advance notice information to notify that information of the designated process is to be stored in the workflow information storage. The implementation-determination information obtaining unit obtains implementation-determination information indicating whether the designated process is allowed to be included in the workflow. The process information output unit stores information of the designated process to the workflow information storage. The result information output unit outputs result information for the designated process.

  • Pub Date: 2009/30/11
  • Number: 08327362
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Web application network portal

The present invention provides a method and apparatus for providing real-time, two-way transactional capabilities on the Web. Specifically, one embodiment of the present invention discloses a method for enabling object routing, the method comprising the steps of creating a virtual information store containing information entries and attributes associating each of the information entries and the attributes with an object identity, and assigning a unique network address to each of the object identities. A method is also disclosed for enabling service management of the value-added network service, to perform OAM&P functions on the services network.

  • Pub Date: 2009/30/11
  • Number: 08108492
  • Details: Visit USPTO

Visit USPTO Page


Video coding complexity estimation

A system and method estimates video coding complexity of a source video for adaptively transcoding the source video. A video coding complexity engine of the system is configured to receive the source video in its native format and to encode the source video into an intermediate video format. The video coding complexity engine computes a video coding complexity score for the source video. The coding complexity score can be used by an adaptive bitrate transcoding sub-system and/or an adaptive resolution transcoding sub-system for transcoding the source video.

  • Pub Date: 2009/30/11
  • Number: 08290038
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for aggressive window probing

The present application is directed towards systems and methods for aggressively probing a client side connection to determine and counteract a malicious window size attack or similar behavior from a malfunctioning client. The solution described herein detects when a connection may be under malicious attach via improper or unusual window size settings. Responsive to the detection, the solution described herein will setup probes that determine whether or not the client is malicious and does so within an aggressive time period to avoid the tying up of processing cycles, transport layer sockets and buffers, and other resources of the sender.

  • Pub Date: 2009/30/11
  • Number: 08387143
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating and tracking field values of mortgage forms

A system for generating field values of mortgage forms. The system includes a database, a calculation module, a monitoring module. The database contains jurisdictional tax and fee information used to calculate field values for the mortgage form. The calculation module is configured to calculate field values for the mortgage form and to generate a transaction log for mortgage and related transactions. The monitoring module communicates with the database and identifies when changes in the field values of tax and fee information occur in the transaction log, and report those changes to the affected lender.

  • Pub Date: 2009/30/11
  • Number: 08326710
  • Owner: Ernst Publishing Co., LLC
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time web transactions from web applications

The present invention provides a method and apparatus for providing real-time, two-way transactional capabilities on the Web. Specifically, one embodiment of the present invention discloses a method for enabling object routing, the method comprising the steps of creating a virtual information store containing information entries and attributes associating each of the information entries and the attributes with an object identity, and assigning a unique network address to each of the object identities. A method is also disclosed for enabling service management of the value-added network service, to perform OAM&P functions on the services network

  • Pub Date: 2009/30/11
  • Number: 08346894
  • Details: Visit USPTO

Visit USPTO Page


Real-time web transaction systems to access on-line services over the web from web applications

The present invention provides a method and apparatus for providing real-time, two-way transactional capabilities on the Web. Specifically, one embodiment of the present invention discloses a method for enabling object routing, the method comprising the steps of creating a virtual information store containing information entries and attributes associating each of the information entries and the attributes with an object identity, and assigning a unique network address to each of the object identities. A method is also disclosed for enabling service management of the value-added network service, to perform OAM&P functions on the services network.

  • Pub Date: 2009/30/11
  • Number: 08244833
  • Details: Visit USPTO

Visit USPTO Page


Non-volatile memory cache performance improvement

In order to provide a more efficient persistent storage device, one or more long-term storage media are included along with a non-volatile memory. In one embodiment, one portion of the non-volatile memory is used as a write buffer and a read cache for writes and reads to the long-term storage media. Interfaces are provided for controlling the use of the non-volatile memory as a write buffer and a read cache. Additionally, a portion of the non-volatile memory is used to provide a direct mapping for specified sectors of the long-term storage media. Descriptive data regarding the persistent storage device is stored in another portion of the non-volatile memory.

  • Pub Date: 2009/30/11
  • Number: 08041904
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring cloud computing environments

A monitoring system can provide monitoring services to users of cloud computing environment. The monitoring system can receive access information from users subscribing to the monitoring services. Once received, the monitoring system can access clouds utilizing the access information and monitor the computing processes instantiated in the clouds and associated with the user. The monitoring system can monitor the computing processes and collect information such as usage of cloud resources, number and type of computing processes instantiated, software programs utilized by the computing processes.

  • Pub Date: 2009/30/11
  • Number: 09529689
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, apparatus and articles of manufacture to characterize customer-premises networks

Methods, apparatus and articles of manufacture to characterize customer-premises networks are disclosed. A disclosed example method comprises retrieving a first plurality of performance parameters for a first time interval for respective ones of a plurality of customer-premises devices, the first plurality of customer-premises devices forming a first customer-premises communication network and each communicatively coupled to a first residential gateway, retrieving a second plurality of performance parameters for a second time interval for the respective ones of the first plurality of devices, computing a first metric representative of a performance variability of the first customer-premises communication network from the first and second plurality of performance parameters, and comparing the first metric to a second metric representative of a second performance variability of a second customer-premises communication network communicatively coupled to a second residential gateway to determine whether the first customer-premises communication network is operating in accordance with a normal operating condition.

  • Pub Date: 2009/30/11
  • Number: 08515014
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method for simulating noisy radar target echoes

A method for determining target echo detection efficacy of a signal processing algorithm of a radar system involves generating a simulated noise complex envelope sequence, generating a simulated radar target echo signal complex envelope pulse sequence and adding the simulated noise complex envelope sequence to the simulated radar target echo signal complex envelope pulse sequence, thereby producing simulated noisy radar target echo signal complex envelope sequence. The simulated noisy radar target echo signal complex envelope sequence is inputted into the signal processing algorithm and the output of the signal processing algorithm is analyzed to determine target echo detection efficacy of the signal processing algorithm.

  • Pub Date: 2009/30/11
  • Number: 08334803
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for storing and distributing social and business contact information online

An information management and distribution method and system for updating contact information over a network. A plug-in associated with a cloud-based back-end unit interacts with a Web application. A virtual card comprising a set of pluggable user interface components associated with the plug-in can be displayed in a user interface associated with the Web application. The contact information with respect to a user can be updated and automatically distributed to other users associated with the Web application that is configured with the virtual card plug-in module. The back-end unit can be employed to keep track of the contact information in a database and provide management functions associated with the data via a Web services application programming interface. A hard copy version of the virtual card can also be rendered utilizing a variable data composition engine and a rendering technology.

  • Pub Date: 2009/30/11
  • Number: 08370482
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for acquiring RUI-based specialized control user interface

Methods and apparatuses are provided for acquiring a specialized Control User Interface (CUI) in a remote control device of home network. A first message is transmitted to a client requesting a User Interface (UI) list. The UI list is received from the client. The UI list comprises specialized CUI information from a server. A second message is transmitted to the client requesting the specialized CUI in accordance with the specialized CUI information in the UI list. The specialized CUI is received from the server via the client.

  • Pub Date: 2009/30/11
  • Number: 08700697
  • Owner: Samsung Electronics Co., Ltd
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Medical electrical lead with backfilled electrode sub-assembly

A medical electrical lead that includes a lead body and at least one tubular electrode sub-assembly positioned over and attached to the external surface of the lead body. The lead body includes at least one elongated conductive element, such as a cable, that is electrically connected to an electrode of the tubular electrode sub-assembly. The tubular electrode sub-assembly includes a tubular liner and an electrode embedded in the outer surface of the liner. In some embodiments, only a portion of the inner surface of the tubular liner is attached to the lead body which may potentially improve flexibility of the medical electrode lead in the area occupied by the tubular electrode sub-assembly.

  • Pub Date: 2009/30/11
  • Number: 08442650
  • Owner: Medtronic, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Mechanism for automatic adjustment of virtual machine storage

A mechanism for automatic adjustment of virtual machine (VM) storage is disclosed. A method of embodiments of the invention includes stopping, by a host computing device, a virtual machine (VM) hosted by the host computing device from running upon detecting a write error due to lack of storage on the VM, communicating, by the host computing device, an out-of-storage notification from a hypervisor of the host computing device to a host management agent, and sending, by the host computing device, data associated with the out-of storage notification and the VM to a host controller that manages the host computing device, wherein the host controller causes storage for the VM to be increased.

  • Pub Date: 2009/30/11
  • Number: 08244956
  • Owner: Red Hat Israel, Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Managing services on a network

The present invention provides a method and apparatus for providing real-time, two-way transactional capabilities on the Web. Specifically, one embodiment of the present invention discloses a method for enabling object routing, the method comprising the steps of creating a virtual information store containing information entries and attributes associating each of the information entries and the attributes with an object identity, and assigning a unique network address to each of the object identities. A method is also disclosed for enabling service management of the value-added network service, to perform OAM&P functions on the services network

  • Pub Date: 2009/30/11
  • Number: 08407318
  • Details: Visit USPTO

Visit USPTO Page


Labeling electronic data in an electronic discovery enterprise system

Embodiments herein disclosed relate to methods, systems and computer program products that provide an enterprise wide e-discovery system configured to search myriad data sources across an enterprise to identify electronic data relevant to a particular data request, harvest the relevant electronic data, filter the electronic data to identify request file types, transfer the request file types to a data store, and assign labels, such as barcodes, to the requested file types for the purpose of producing, in an organized fashion, all requested electronic data that is in the enterprise's possession.

  • Pub Date: 2009/30/11
  • Number: 08200635
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Identifying security vulnerability in computer software

Identifying a security vulnerability in a computer software application by identifying at least one source in a computer software application, identifying at least one sink in the computer software application, identifying at least one input to any of the sinks, determining whether the input derives its value directly or indirectly from any of the sources, determining a set of possible values for the input, and identifying a security vulnerability where the set of possible values for the input does not match a predefined specification of legal values associated with the sink input.

  • Pub Date: 2009/30/11
  • Number: 08468605
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Hosted IPTV system incorporating a gateway adapter for processing in a shared IPTV environment

A shared (or “hosted”) IPTV system including intermediate IPTV facilities controlled by a host operator and accessible to one or more hosted operators pursuant to a shared service arrangement includes a gateway adapter for intercepting and manipulating operator transactions with the intermediate IPTV facilities. The gateway adapter is operable to modify operator calls directed to the intermediate IPTV facilities to include indicia of data uniquely available to the operator initiating the calls, the data having been logically partitioned into respective subscriber groups; and to forward the adapted calls to the intermediate IPTV facilities to invoke the operator transactions. Advantageously, execution of the adapted call provides the sourcing operator access to account information of its corresponding subscriber group while restricting access to account information of other subscriber groups.

  • Pub Date: 2009/30/11
  • Number: 08325744
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Fingerprint check to reduce check fraud

A digital image of a surface of a check is received. A check scanning device captures the digital image as the check moves through the check scanning device. A fingerprint is impressed on the surface of the check. A computing system uses the digital image to determine a match score. The match score represents an approximate probability that the fingerprint on the check matches a reference fingerprint. An alert is presented based on the match score.

  • Pub Date: 2009/30/11
  • Number: 08582838
  • Owner: Wells Fargo Bank N.A.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Digital rights management provision apparatus, system, and method

Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.

  • Pub Date: 2009/30/11
  • Number: 08788304
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon Si, unknown
  • Details: Visit USPTO

Visit USPTO Page


Detecting events in cloud computing environments and performing actions upon occurrence of the events

A monitoring system can monitor computing processes in clouds. The monitoring system can monitor the clouds for certain events associated with the computing processes. The monitoring system can receive, from the user, a particular event and an action to perform upon the occurrence of the event. Once received, the monitoring system can compare the information collected during monitoring against the event specified by the user. Once the event occurs, the monitoring system can perform the action associated with the event.

  • Pub Date: 2009/30/11
  • Number: 09389980
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Content-based adaptive video transcoding framework

A system and method provide a video coding system for adaptively transcoding videos based on video coding complexity (VCC). A VCC engine of the system is configured to generate a measure of how difficult to encode a source video based on a trained VCC model. A video rate-distortion modeling engine of the system is configured to estimate a rate-distortion model and a scaling model. The VCC model, rate-distortion model and the scaling model are trained on a video corpus of the system. The trained VCC model, rate-distortion model and the scaling model are used by an adaptive bitrate transcoding sub-system to transcode a source video with an optimized bitrate and visual quality. The trained VCC model, rate-distortion model and the scaling model are further used by an adaptive resolution transcoding sub-system to transcode a source video with an optimized resolution and visual quality.

  • Pub Date: 2009/30/11
  • Number: 08767825
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Combustor heat panel arrangement having holes offset from seams of a radially opposing heat panel

A combustor module for a gas turbine engine is provided that includes a first annular liner assembly extending along a longitudinal axis of the engine. The first annular liner assembly includes a first annular support shell and a plurality of first heat shield panels coupled to the first annular support shell. The first heat shield panels form a segmented ring defining a plurality of first axial seams therebetween. The combustor module further includes a bulkhead coupled to the first annular liner assembly. The bulkhead provides a plurality of fuel nozzles for passing a first mass flow comprising fuel and air. The combustor module further includes a second annular liner assembly coupled to the bulkhead. The second annular liner assembly is in spaced-apart generally coaxial relationship from the first annular liner assembly by a channel height H. The second annular liner assembly includes an air admittance hole having a mean diameter D extending along a hole axis. The hole axis is offset from the first axial seam defined by the first heat shield panels.

  • Pub Date: 2009/30/11
  • Number: 09416970
  • Owner: UNITED TECHNOLOGIES CORPORATION
  • Location: Farmington, US
  • Details: Visit USPTO

Visit USPTO Page


Central configuration and transport supporting software lifecycles

Implementations of the present disclosure provide computer-implemented methods including retrieving a predefined configuration model from a plurality of predefined configuration models electronically stored in a configuration repository, the predefined configuration model providing predefined configuration data for a particular software application, comparing the predefined configuration data to existing configuration data of one or more target systems to generate a first delta, a first system landscape including the one or more target systems, determining one or more configuration actions based on the first delta, and executing the one or more configuration actions to update a configuration state of the one or more target systems from an initial configuration state.

  • Pub Date: 2009/30/11
  • Number: 08572565
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Bitrate video transcoding based on video coding complexity estimation

A system and method provides content-adaptive bitrate video transcoding of a source video for a video hosting service. The system is coupled to a video coding complexity engine and video rate-distortion modeling engine of the video hosting service. The system is configured to receive the video coding complexity score of the source video and a trained rate-distortion model and a scaling model. A target bitrate estimation module of the system is configured to calculate an initial target bitrate based on the video coding complexity using the trained rate-distortion model. A bitrate refinement module of the system is configured to adjust the initial target bitrate with respect to the resolution and/or frame rate of the transcoded source video. An adaptive video coder of the system is configured to transcode the source video with the adjusted target bitrate.

  • Pub Date: 2009/30/11
  • Number: 08897370
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive resolution transcoding for optimal visual quality

An adaptive resolution transcoding system and method adaptively transcodes a source video with an optimized resolution and visual quality based on the video coding complexity (VCC) of the source video. The transcoding system is configured to receive a source video in its native format, and to obtain the video coding complexity score of the source video from a video coding complexity engine. The transcoding system is further configured to set a resolution adjustment level based on the complexity score. Based on the resolution adjustment level, the transcoding system determines an optimal output resolution for the source video for each video output format supported by the transcoding system. Responsive to a user selection of video output format, the transcoding system determines an optimal output resolution for the source video and encodes the source video with the determined optimal output resolution.

  • Pub Date: 2009/30/11
  • Number: 09615098
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive resolution transcoding for optimal visual quality

An adaptive resolution transcoding system and method adaptively transcodes a source video with an optimized resolution and visual quality based on the video coding complexity (VCC) of the source video. The transcoding system is configured to receive a source video in its native format, and to obtain the video coding complexity score of the source video from a video coding complexity engine. The transcoding system is further configured to set a resolution adjustment level based on the complexity score. Based on the resolution adjustment level, the transcoding system determines an optimal output resolution for the source video for each video output format supported by the transcoding system. Responsive to a user selection of video output format, the transcoding system determines an optimal output resolution for the source video and encodes the source video with the determined optimal output resolution.

  • Pub Date: 2009/30/11
  • Number: 09615098
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Sound identification systems

A digital sound identification system for storing a Markov model is disclosed. A processor is coupled to a sound data input, working memory, and a stored program memory for executing processor control code to input sound data for a sound to be identified. The sample sound data defines a sample frequency domain data energy in a range of frequency. Mean and variance values for a Markov model of the sample sound are generated. The Markov model is stored in the non-volatile memory. Interference sound data defining interference frequency domain data is inputted. The mean and variance values of the Markov model using the interference frequency domain data are adjusted. Sound data defining other sound frequency domain data are inputted. A probability of the other sound frequency domain data fitting the Markov model is determined. Finally, sound identification data dependent on the probability is outputted.

  • Pub Date: 2009/26/11
  • Number: 08918343
  • Owner: Audio Analytic Ltd
  • Location: Cambridge, Cambridgeshire, GB
  • Details: Visit USPTO

Visit USPTO Page


Treatment of osteolytic disorders and cancer using CSF1R extracellular domain fusion molecules

Methods of using colony stimulating factor receptor (CSF1R) extracellular domain (ECD) fusion molecules for treating osteolytic bone loss, cancer metastasis, cancer metastasis-induced osteolytic bone loss, and tumor growth are provided. CSF1R ECD fusion molecules, polynucleotides encoding CSF1R ECD fusion molecules, and methods of making CSF1R ECD fusion molecules are also provided.

  • Pub Date: 2009/25/11
  • Number: 08183207
  • Owner: Five Prime Therapeutics, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for trace filters by association of client to vserver to services

The present disclosure is directed towards systems and methods for tracing packets via an intermediary device. The systems and methods include an intermediary device that establishes connections with clients and connections with servers. The intermediary device links a connection to a server with a connection to a client to provide a client with access to the server. When the client requests a packet trace, the intermediary device applies the trace to linked connections with the client to obtain full trace information for network packets servicing the client.

  • Pub Date: 2009/25/11
  • Number: 08271645
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Storing on a client device data provided by a user to an online application

User data used or generated by an online application is stored by the online application on the client device, rather than entirely on the system hosting the online application.

  • Pub Date: 2009/25/11
  • Number: 09069869
  • Owner: Intuit Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time signal handling in guest and host operating systems

The present invention relates to signal handling in a host operating system process executing code portions of a single- or multi-threaded application and of the embedded guest operating system. When a signal is sent from the host operating system to the operating system process, the signal handler of the guest operating system will be invoked in a deterministic time, independent of the operating system process executing code portions of the application or of the guest operating system or executing system calls of the host operating system in a masked or non-masked operation.

  • Pub Date: 2009/25/11
  • Number: 08060788
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Negative refractive index materials and methods for making same

Embodiments of the invention described herein include metamaterials that exhibit negative permittivity and negative permeability at optical frequencies, methods for preparing such materials, and devices prepared from same.

  • Pub Date: 2009/25/11
  • Number: 08325411
  • Owner: Triton Systems, Inc.
  • Location: Chelmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Method for producing cyclic organic compounds from crop oils

A method for producing products containing cyclic organic compounds from biomass oil includes adding a biomass oil to a vessel; heating the biomass oil to crack the biomass oil; removing undesired or unreacted materials, heavy ends, and light ends from the cracked biomass oil; and extracting components from the cracked biomass oil to produce a mixture of products containing between 5% and 90% cyclic organic compounds by weight. A method for producing a high-octane aviation fuel with low lead content includes cracking a biomass oil, separating a middle distillate mixture from cracked biomass oil, decarboxylating the middle distillate mixture to produce a mixture of products containing at least about 50% cyclic alkane and alkene compounds by weight, and blending the mixture of products with a fuel having an octane number below 95 to produce an aviation fuel having an octane number of at least 100.

  • Pub Date: 2009/25/11
  • Number: 08450541
  • Owner: The University of North Dakota
  • Location: Grand Forks, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system of taskbar button interfaces

The present invention provides a system or method for displaying rich presentation taskbar buttons for a corresponding application. In one example, the rich presentation taskbar button may receive content from an application through a programming interface. The present invention further relates to a system and method for displaying a rich presentation taskbar button and for displaying and/or dismissing a thumbnail of an application window associated with the rich presentation taskbar button. The present invention may further include a system and method of pinning the thumbnail on a display or dismissing a thumbnail. The present invention also relates to a system and method for displaying multiple taskbar buttons in a taskbar including controlling the size of individual taskbar buttons, consolidating taskbar buttons and placing taskbar buttons into an overflow based on the type of taskbar button in the taskbar.

  • Pub Date: 2009/25/11
  • Number: 08656300
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for transparently migrating storage objects between nodes in a clustered storage system

A method and system are provided for transparently migrating a storage object (aggregate) between nodes by one of the nodes (source), automatically verifying another node (destination) is configured to service the aggregate, and changing ownership of the aggregate based on the verifying to enable servicing of the aggregate at the destination. A cluster manager receives an aggregate migration request and provides the request to the source owning the aggregate. The source verifies the destination is configured according to a predetermined configuration for servicing the aggregate. Based on the verifying, the source offlines the aggregate and updates ownership information of the aggregate, thereafter allowing the destination to online the aggregate. The cluster manager provides the updated ownership information to all nodes in the cluster, so an access request intended for the aggregate may be received by any node and forwarded to the destination using the updated ownership information.

  • Pub Date: 2009/25/11
  • Number: 08751533
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing interactive communications campaigns with text messaging

A messaging platform includes a text messaging subsystem that includes a suite of enhancements that facilitate implementation of a multi-channel communications strategy with high level and fine-grained control over outbound message creation or inbound message handling.

  • Pub Date: 2009/25/11
  • Number: 08462918
  • Owner: Soundbite Communications, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing a context resource description language and framework for supporting the same

An apparatus for providing a framework for supporting a context resource description language may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to perform at least receiving an indication of content loaded at a browser, parsing the content for context resource description language providing an identification of properties requested in association with a service from which the content was loaded, and providing property management with respect to the identified properties for provision to the service. A corresponding method and computer program product are also provided.

  • Pub Date: 2009/25/11
  • Number: 08584208
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for presenting media segments

An approach is provided for presenting media segments. A media segment manager receives an input, from a device, for specifying a plurality of segments. Each of the plurality of segments corresponds to one or more media streams and is associated with a respective duration of time. The media segment manager then causes, at least in part, presentation of the plurality of segments in a predetermined order based on the input and the respective durations of time.

  • Pub Date: 2009/25/11
  • Number: 08631436
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for ensuring transport of user agent information

Techniques to ensure that user agent information is transported includes determining whether both a type field and a client platform information field are included in a first portion of a uniform resource locator field (URL) of a hypertext transfer protocol (HTTP) request message received from a remote client process. The first portion is different from a domain portion of the URL. The type field holds data that indicates whether the remote client inserted the client information field into a URL of an original HTTP request message. If both the type field and the client platform information field are included, then it is determined, based on data in the type field, whether to include both the type field and the client platform information field in a first portion of a URL in a link in a HTTP response message. The HTTP response message is sent to the remote client process.

  • Pub Date: 2009/25/11
  • Number: 08407351
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Managing interactive communications campaigns

A campaign strategy manager (CSM) component for a hosted communications campaign system allows users to define more granular and specific campaign strategies, including pass escalation for alternative channels (e.g., text and email) and/or based upon attempt results, contact attributes and response group data. The campaign strategy manager allows users to define pass strategies statically and dynamically, to manage lists across multiple campaigns, and to view results in real-time. A defined strategy is a static strategy created by a user for a particular campaign that, once created, typically is not modified. A dynamic strategy is one where, during the course of a day (e.g., as a sub-campaign is running), a user may alter the defined strategy, preferably just for that day (or portion thereof). In particular, the campaign strategy manager enables the user to make changes to the current strategy as a sub-campaign is running through a particular list.

  • Pub Date: 2009/25/11
  • Number: 08270575
  • Owner: Soundbite Communications, Inc.
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Logical object search framework and application programming interface

A method, computer program product, and system for executing and administering queries in a data management system, and particularly a relational data management system. Logical objects can be queried by providing a translation from a logical query in a pre-defined logical schema to a physical query against the physical data management system, such as by translating a database query constructed using an Object Query Language (OQL) into a query in Structured Query Language (SQL) without the user needing to know the details of the physical data management system such as the structure of the underlying relational databases.

  • Pub Date: 2009/25/11
  • Number: 09165043
  • Details: Visit USPTO

Visit USPTO Page


Extracting font metadata from font files into searchable metadata for package distribution

A package installer identifies a font package that facilitates rendering a font of a file being opened by a user based on font metadata downloaded from the remote server. The font metadata includes information identifying one or more font packages available for download from the remote server. Font metadata associated with each font package further indicates one or more fonts supported by the corresponding font package. A graphical user interface (GUI) is displayed to the user prompting whether the user desires to install the identified font package. The GUI further indicates that an additional font needs to be installed in order to view the file correctly. In response to an input from the user via the GUI, the package installer downloads the font package from the remote server for local installation.

  • Pub Date: 2009/25/11
  • Number: 09164967
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Determining duration of user interaction

In some implementations, methods for determining a duration of user interaction include monitoring communication between a client computer and a server, identifying a message time period, during which messages are communicated between the client computer and the server, and monitoring activity of a processor of the client computer. A first time period of processor activity is identified, the first time period including a first start time and a first end time, the first end time being within the message time period. A second time period of processor activity is identified, the second time period including a second start time and a second end time, the second start time being within the message time period. The duration of user interaction is determined based on the first start time and the second end time.

  • Pub Date: 2009/25/11
  • Number: 08316127
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Comprehensive application programming interfaces for handling logical volume manager

Some embodiments of a system and a method to provide comprehensive application programming interfaces to a logical volume manager have been presented. For instance, a processing device running on a server may provide a library having a set of application programming interfaces to interface an application and a logical volume manager (LVM). In response to an error occurring while running the application in operation with the LVM, the processing device may return an error string in a natural language, a piece of programming code associated with the error, and an error code associated with the error using one or more of the set of application programming interfaces.

  • Pub Date: 2009/25/11
  • Number: 08132060
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Touch-sensitive display method and apparatus

A portable electronic device comprises at least one force sensor configured to generate a force signal based at least in part on a force applied to a touch-sensitive display and a processor configured to receive the force signal and to provide a feedback signal when the force exceeds a force threshold. The at least one force sensor may be integrated into the touch-sensitive display.

  • Pub Date: 2009/24/11
  • Number: 09116569
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Test method

To provide a method and device for testing the size and conductivity of a foreign material adhered to a substrate for a liquid crystal display device, there is provided a method of testing whether a foreign material including a metal element is adhered to a substrate for a liquid crystal display device, the method including a first test step of detecting the size and position of the foreign material adhered to the substrate and a second test step of testing whether the foreign material includes the metal element at the position detected in the first test step.

  • Pub Date: 2009/24/11
  • Number: 07852982
  • Owner: Toppan Printing Co., Ltd.
  • Location: , JP
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods to monitor an access gateway

The present invention is directed towards systems and methods for monitoring an access gateway. The systems and methods include monitors on appliances that generate and send requests to logon agents or login page services on access gateways. Based on the responses from the logon agents or login page services, the monitors determine whether the logon agents or login page services are available.

  • Pub Date: 2009/24/11
  • Number: 08849988
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for maintaining persistence by a backup virtual server

The present disclosure presents systems and methods for maintaining persistence of a backup virtual server on connections currently serviced by the backup virtual server. A virtual server operating on an intermediary network device and identified as a primary virtual server for a first connection may receive a request via the first connection. The intermediary device may forward the first request to a backup virtual server of the virtual server in response to identifying that the virtual server is unavailable. The intermediary device may later identify that the virtual server is available. The virtual server may establish a new connection responsive to receiving a connection request while the intermediary device may forward a second request received via the first connection to the backup virtual server instead of the virtual server responsive to identifying that the virtual server is configured not to preempt the backup virtual server from maintaining connections currently maintained by the backup virtual server.

  • Pub Date: 2009/24/11
  • Number: 08780718
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for hardware based security

An asset management system is provided, which includes a hardware module operating as an asset control core. The asset control core generally includes a small hardware core embedded in a target system on chip that establishes a hardware-based point of trust on the silicon die. The asset control core can be used as a root of trust on a consumer device by having features that make it difficult to tamper with. The asset control core is able to generate a unique identifier for one device and participate in the tracking and provisioning of the device through a secure communication channel with an appliance. The appliance generally includes a secure module that caches and distributes provisioning data to one of many agents that connect to the asset control core, e.g. on a manufacturing line or in an after-market programming session.

  • Pub Date: 2009/24/11
  • Number: 08631247
  • Owner: Certicom Corp.
  • Location: Mississauga, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Self-assembled electrical contacts

Self-assembling microscale electrical and mechanical connections includes a part binding site and a part electrical binding site; and a template binding site comprising a template electrical conductor layer; a metallization layer on the template electrical conductor layer; a bump structure comprising a solder alloy positioned on the metallization layer, wherein the solder alloy is liquefied to allow the bump structure to self-assemble and align with the part electrical binding site using capillary forces, and wherein the solder alloy only liquefies at a temperature above that at which the self-assembly and alignment is performed; and a fluid on the template electrical conductor layer, wherein the fluid comprises a melting point lower than that of the solder alloy, wherein the fluid binds with the part binding site.

  • Pub Date: 2009/24/11
  • Number: 08318595
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Scanning and capturing digital images using residue detection

A mechanism for scanning and capturing digital images using residue detection. Upon detecting a document placed on a scanning surface of a scanning device, the illustrative embodiments detect a residue deposited on the document. The illustrative embodiments determine a portion of the document to be scanned based on a location of the residue on the document. The illustrative embodiments then scan the portion of the document.

  • Pub Date: 2009/24/11
  • Number: 08441702
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Scanning and capturing digital images using layer detection

A mechanism for scanning and capturing digital images using document layer detection. Upon detecting a document placed on a scanning surface of a scanning device, the illustrative embodiments identify one or more layers within the document. The illustrative embodiments then scan the one or more layers within the document on a layer by layer basis.

  • Pub Date: 2009/24/11
  • Number: 08610924
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Responsive user interface with background application logic for working on an object

A user interface can be maintained in a responsive state on a user interface thread while synchronous application logic is running on a background thread. The application logic can access an object on the background thread, and the user interface can access the same object on the user interface thread. Additionally, a request for work to be done on an object can be received. If the request is to be dispatched to a background thread, then the work can be dispatched to the background thread without blocking the user interface thread. However, if the request is to be dispatched to the user interface thread, then the work can be dispatched to the user interface thread, and the background thread can be blocked.

  • Pub Date: 2009/24/11
  • Number: 08418190
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Polyvalent RNA-nanoparticle compositions

The present invention concerns nanoparticles functionalized with duplex RNA for a variety of uses, including but not limited to gene regulation. More specifically, the disclosure provides a new strategy for conjugating RNA to a nanoparticle to achieve increased stability and activity.

  • Pub Date: 2009/24/11
  • Number: 09139827
  • Owner: NORTHWESTERN UNIVERSITY
  • Location: Evanston, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple input/gain stage Gilbert cell mixers

Multiple input and/or gain stage Gilbert cell mixer designs are disclosed. The designs allow one input to be turned on at a time, and are suitable, for example, for use in receiver and transmitter applications. In addition, the designs allow for the inputs of the multi-input Gilbert cell mixer to be connected together, thereby allowing for switching of gain states within the Gilbert cell mixer. The mixer design may include, for example, a Gilbert cell mixer stage, and a plurality of input/gain stages. Each input/gain stage has its output connected to the input of the mixer stage, and is configured for receiving an input signal and applying a gain factor to that input signal to provide a signal for mixing with the LO. Each input/gain stage is configured with stage select circuitry for enabling or disabling that stage, so that only one input/gain stage is active at a time.

  • Pub Date: 2009/24/11
  • Number: 08232831
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-chip rendering with state control

Circuits, methods, and apparatus that provide multiple graphics processor systems where specific graphics processors can be instructed to not perform certain rendering operations while continuing to receive state updates, where the state updates are included in the rendering commands for these rendering operations. One embodiment provides commands instructing a graphics processor to start or stop rendering geometries. These commands can be directed to one or more specific processors by use of a set-subsystem device mask.

  • Pub Date: 2009/24/11
  • Number: 09324174
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


MMS based photo album publishing system

An MMS publishing system comprises a management tool, an authoring tool, a storage facility, a message router, and a rendering server. The management tool authenticates a first user by using a telephone number of the first user as a user ID. The authoring tool allows the first user to associate rich media content with his telephone number. The content is then stored in the storage facility in association with his telephone number. Subsequently, the message router intercepts an MMS message sent from a mobile device over a wireless network when the MMS message includes a predetermined indicator and indicates the telephone number of the first user as a destination. The rendering server then accesses the stored content associated with the telephone number and sends the content to the mobile device, for output to a user of the mobile device.

  • Pub Date: 2009/24/11
  • Number: RE043047
  • Owner: Openwave Systems Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating or diagnosing conditions associated with elevated IL-6 using anti-IL-6 antibodies or fragments

The invention relates to the use of anti-IL-6 antibodies or antibody fragments containing a specific epitopic specificity to treat conditions involving elevated Il-6. In some embodiments the anti-IL-6 antibodies contain specific CDRs.

  • Pub Date: 2009/24/11
  • Number: 09452227
  • Owner: ALDERBIO HOLDINGS LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for handling connection setup in a network

Certain embodiments of a method and system for handling connection setup in a network may comprise a network interface hardware device (NIHW) that may be operable to receive a services list and/or connection acceptance criteria from a first guest operating system running on a host system, receive a connection request from a second guest operating system running on the host system, and determine whether to allow establishment of the requested connection based on one or both of the services list and the connection acceptance criteria. The determination may be made prior to or during connection set up. The NIHW may maintain a connection state comprising information regarding set up of the requested connection. The services list may comprises one or more of a local network address, a local transport address, a network protocol, and a transport protocol. The communicated acceptance criteria may comprises packet filtering operations and/or security operations.

  • Pub Date: 2009/24/11
  • Number: 08014312
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for programming session initiation protocol back-to-back user agents

In one embodiment, the present disclosure is a method and apparatus for programming session initiation protocol back-to-back user agents. In one embodiment, a method for programming a telecommunication feature as a session initiation protocol back-to-back user agent includes receiving source code defining the feature, the source code using at least one abstraction that hides session initiation protocol signaling details required by the feature and generating executable code that causes a session initiation protocol server to execute the feature, in accordance with the abstractions.

  • Pub Date: 2009/24/11
  • Number: 08250216
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Data traffic control in a communication network

A method and apparatus for controlling data traffic in a communications network. The server determines that network conditions are suitable for sending delay tolerant data traffic, and as a result of the determination, it transmits a grant message to at least one client device, the grant message informing the client device that it is permitted to send or receive delay tolerant data traffic.

  • Pub Date: 2009/24/11
  • Number: 08881243
  • Owner: Telefonaktiebolaget L M Ericsson (Publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Cosmetic composition comprising a supramolecular polymer and method for making up the skin and/or lips employing a composition comprising a supramolecular polymer

The present disclosure relates to a method for making up the skin and/or lips, wherein a cosmetic makeup composition comprising, in a cosmetically acceptable medium, at least one polyalkene-based supramolecular polymer is applied. The disclosure also relates to a cosmetic composition for making up the skin and/or lips, comprising, in a cosmetically acceptable medium, at least one polyalkene-based supramolecular polymer and at least one coloring material.

  • Pub Date: 2009/24/11
  • Number: 09561390
  • Owner: L'OREAL
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Cosmetic composition comprising a supramolecular polymer and method for making up the skin and/or lips employing a composition comprising a supramolecular polymer

The present disclosure relates to a method for making up the skin and/or lips, wherein a cosmetic makeup composition comprising, in a cosmetically acceptable medium, at least one polyalkene-based supramolecular polymer is applied. The disclosure also relates to a cosmetic composition for making up the skin and/or lips, comprising, in a cosmetically acceptable medium, at least one polyalkene-based supramolecular polymer and at least one coloring material.

  • Pub Date: 2009/24/11
  • Number: 09561390
  • Owner: L'OREAL
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Coating system for cement composite articles

A substrate may be coated with a various combinations of a water-dispersible polyisocyanate, a water-soluble acid or salt thereof, and/or an isocyanate-reactive compound. The resulting coated article has improved coating adhesion, especially near coated burnished surfaces such as sawn edges or grooves.

  • Pub Date: 2009/24/11
  • Number: 09133064
  • Owner: Valspar Sourcing, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Antagonists of IL-6 to prevent or treat thrombosis

The present invention is directed to therapeutic methods using IL-6 antagonists such as antibodies and fragments thereof having binding specificity for IL-6 to prevent or treat thrombosis in diseases associated with abnormal blood coagulation or fibrinolysis. In preferred embodiments these patients will comprise those exhibiting elevated D-dimer or other coagulation cascade related proteins and optionally will further exhibit elevated C reactive protein prior to treatment. The subject therapies also may include the administration of other actives such as chemotherapeutics, anti-coagulants, statins, et al.

  • Pub Date: 2009/24/11
  • Number: 08277804
  • Owner: Alderbio Holdings LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Touch input for hosted applications

A multi-touch plug-in system is described herein that exposes multi-touch data for web application developers to consume in a platform independent way. The multi-touch plug-in system receives platform-specific touch data from an operating system or touch hardware, interprets the platform-specific touch data to convert the platform-specific touch data to generic touch data, and provides the generic touch data to a hosted application running within a plug-in sandbox. Often, sandboxed environments only allow identified, trusted plug-ins to execute. By managing multi-touch data within a trusted plug-in, the plug-in can ensure that hosted applications are properly restricted to well-defined behavior, while still allowing rich features such as multi-touch interaction. Thus, the multi-touch plug-in system brings rich multi-touch interaction to a web browsing environment.

  • Pub Date: 2009/23/11
  • Number: 08633902
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and program applications for selectively restricting the placeshifting of copy protected digital media content

Systems, methods, and program products are provided for selectively restricting the transmission of copy protected digital media content from a computer system, over a network, and to a remote display. In one embodiment, a method includes the steps of capturing digital media content rendered on the local display by a media player application executed by the computer system; determining whether the media player application is accessing copy protected digital media content; and, if the media player application is not accessing copy protected digital media content, converting the captured digital media content to a media stream and transmitting the media stream over a network for presentation on a remote display.

  • Pub Date: 2009/23/11
  • Number: 08381310
  • Owner: Sling Media, Inc.
  • Location: Foster City, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer readable media for configuring a rewriteable non-volatile memory for presentation of media by a selected media presentation device model

Systems, methods, and computer readable media for managing digital media in a memory storage device associated with a mobile smart device are disclosed. According to one aspect, the subject matter described herein includes a method for configuring a rewriteable non-volatile memory for presentation of media by a selected media presentation device model. The method includes providing a rewriteable non-volatile memory configuration interface through which a user can select at least one media file and one of a plurality of media presentation device models. and providing a rewriteable non-volatile memory configuration manager, which, in response to selection of the at least one media file and the one media presentation device model via the configuration interface, accesses a database including entries corresponding to the plurality of media presentation device models and configures a rewriteable non-volatile memory according to information retrieved from the database to allow presentation of the at least one media file when the rewriteable non-volatile memory is present in the selected media presentation device model.

  • Pub Date: 2009/23/11
  • Number: 08554998
  • Owner: SanDisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for alerting to traffic proximity in the airport environment

Systems and methods for alerting to traffic proximity in the airport environment. Knowledge of the geographic position, speed, rate of change of speed, heading (or track-angle) and/or altitude of own-aircraft (or vehicle) and another, potentially conflicting aircraft (or vehicle) are used to calculate a predicted distance between the two aircraft (or vehicles) at given point of time in the future. If separation distance is predicted to be less than a predetermined acceptable value, then an alert message (aural, visual or both) is issued to the pilot or operator of the vehicle.

  • Pub Date: 2009/23/11
  • Number: 08040259
  • Owner: Honeywell International Inc.
  • Location: Morristown, US
  • Details: Visit USPTO

Visit USPTO Page


Nanofluidic preconcentration device in an open environment

This invention provides a device and methods for increasing the concentration of a charged species in solution, wherein the solution containing the concentrated species is exposed to the environment. Such solution can be formed on a surface or on a tip of a measurement device. The open-environment concentration technique overcomes the disadvantages of in-channel concentration devices, especially by eliminating flow-induced delivery processes that lead to concentration losses. Combined with direct contact dispensing, methods of this invention can be used for various applications such as immunoassay and MALDI-MS.

  • Pub Date: 2009/23/11
  • Number: 08329115
  • Owner: Massachusetts Institute of Technology
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for controlling display in a networked device

Methods and apparatus for controlling display elements within a networked device. In one embodiment, the network comprises a cable television network, and the device a digital set-top box (DSTB) with front panel display(s). A downloadable software module is provided that is adapted to discover the front panel display capabilities of the device, and control the display accordingly. This approach allows, inter alia, the cable network operator or other entity to manage the user's experience relating to the front panel display(s) on various types of client devices. The module is also optionally platform-agnostic (i.e., “universal”) so that the aforementioned capabilities are provided largely irrespective of the device hardware/software environment.

  • Pub Date: 2009/23/11
  • Number: 07877155
  • Owner: Time Warner Cable Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Flexible architecture for notifying applications of state changes

Described is a method and system a unified mechanism for storing device, application, and service state, as well as a rich notification brokerage architecture. Clients register with a notification broker to receive notifications for changes to state properties. When a registered state property changes, a notification broker determines which clients to notify of the state change and provides the client with a notification regarding the change. Clients may be notified whenever a state changes, when a state change meets a predetermined condition, or based on a schedule. An application may also be launched in response to a state change. An application programming interface (API) is provided that provides a unified way of accessing state change information across different components within the device.

  • Pub Date: 2009/23/11
  • Number: 08990695
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Financial gadgets

Methods, computer program products, and systems, related to providing financial gadgets to users. In one implementation, a method includes receiving gadgets and receiving a notification that one or more gadgets has been certified. A web page with an interface through which users can select gadgets is generated and provided to a user computer. A user selects a gadget, and the selected gadget is run, including providing the user-specific financial information to the gadget. Content based on the output of the gadget is provided to the user. User-specific financial information can be collected, and modified by the gadget. A notification can be received that a financial institution has authorized one or more of the certified gadgets and the web page can only allow users to select authorized gadgets.

  • Pub Date: 2009/23/11
  • Number: 08346615
  • Owner: Yodlee, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Determining the geographic location of a network device

Provided are techniques and apparatuses for determining the geographic location of a node on a network. In a representative embodiment, a data packet is received over the network from a second node, the data packet including a network identifier for the second node and a Time-To-Live (TTL) field that has a value, with the value of the TTL field for the data packet indicating a maximum additional number of hops that could have been made by the data packet. A probe packet addressed to the network identifier for the second node is then sent, the probe packet also including a TTL field. The initial value for the TTL field of the probe packet is set based on the value for the TTL field of the data packet.

  • Pub Date: 2009/23/11
  • Number: 08131834
  • Owner: Resource Consortium Limited
  • Location: Tortola, VG
  • Details: Visit USPTO

Visit USPTO Page


Automatic arrangement of portlets on portal pages according to semantical and functional relationship

The present invention relates to the field of network computing, and in particular to method and system for designing a Web Portal comprising a hierarchical structure of portal pages and portlets for accessing Web contents accessible via the Portal. A typical larger enterprise's portal contains large numbers, e.g., thousands of pages and portlets. Due to the complexity of an enterprise portal, manual administration is inefficient as it is time-consuming, error-prone and thus expensive. In order to overcome these disadvantages, it is proposed that a Portal according to the invention performs some mining of the portlet markup and/or that of the portlet description in order to autonomously compute and propose an enhanced portal content structure. This helps to provide a user-friendly content structure that reflects well the relationships between portlets.

  • Pub Date: 2009/22/11
  • Number: 08108395
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Type projection query of an instance space

Technologies are described herein for applying type projection queries to instance space graphs. Through the utilization of the technologies and concepts presented herein, a type projection may be used to describe the hierarchy of instance types connected by relationships within an instance space graph. A type projection query based on the type projection may be dynamically generated to query instances and relationships within the instance store. Filter criteria for the query can be expressed using a path notation. Results from of the type projection query may be provided as graphs of instances and relationships which are subgraphs of the queried instance space graph. Programmatic traversal of the resultant subgraph can navigate to each instance node within the result space.

  • Pub Date: 2009/21/11
  • Number: 08380759
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Validation pipeline

Techniques for configuring validation rules in a client-server architecture, and for enforcing such validation rules are provided. A developer is enabled to configure a display screen for an application to enable a user at a client to input data. The developer is further enabled to input a validation rule that is configured to be applied to validate the data at the client and/or at a server. The validation rule is integrated into code of the application. During execution of the application, a client-side rules engine may be present to evaluate the validation rule at the client, and a server-side rules engine may be present to evaluate the validation rule at the server. The client-side rules engine and server-side rules engine may be configured to evaluate validation rules in an asynchronous manner.

  • Pub Date: 2009/20/11
  • Number: 09026580
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for improved SAP communications

Systems and methods for improved SAP communications are provided. A terminator node is provided that acts as termination on one end of the communication channel and links to the SAP server on the other end. A server device is also provided that optionally implements this terminator node and monitors communications between an SAP server and a client. The server device optionally condenses SAP application screens to streamline user interaction with the SAP server. The server device also simulates certain types of required responses to the SAP server to allow for a persistent session between a client and the SAP server when the actual connection may be intermittent. The server device also records required records for a transaction and provides them to a client for offline processing and then synchronizes stored offline transaction data from the client with the SAP server. The system may include a client device that optionally implements the terminator node to communicate either with the server device or directly to the SAP server.

  • Pub Date: 2009/20/11
  • Number: 08140617
  • Owner: Synactive, Inc.
  • Location: Foster City, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for decentralized performance monitoring of host systems

Various embodiments of a system and method for decentralized performance monitoring of host systems are described. Embodiments may include one or more client systems, each of which may monitor the performance of one or more host systems. In some embodiments, at least some of the host systems may be members of a cloud computing environment. A given client system may collect metrics from multiple different host systems and aggregate such metrics on the client system. In various embodiments, metrics may be collected by the client system directly from the multiple different host systems without utilizing a centralized repository of metrics. In various embodiments, the given client's receipt of the metrics from the multiple different hosts systems may be an initial aggregation of those metrics together on the same computer system. The client system may generate a graphical representation of the metrics collected from multiple hosts systems.

  • Pub Date: 2009/20/11
  • Number: 08707194
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for the diagnosis and treatment of diabetes

Methods, assays and compositions for the diagnosis and treatment of diabetes, in which the glutamate transporters and/or receptors expressed in pancreatic islet cells are used as therapeutic targets or tools for the identification or treatment of individuals suffering from or susceptible to diabetes.

  • Pub Date: 2009/20/11
  • Number: 08722343
  • Details: Visit USPTO

Visit USPTO Page


Limited lifespan for outgoing data at a mobile device

An outgoing message may be generated, at a mobile communication device, based on a received application definition document, which indicates a lifespan for the message. In conjunction with generating a message in accordance with a format provided in the application definition document, a message expiry time may be generated. The message may be stored in a queue for transmission. Additionally, an indication of the expiry time may be stored in the queue in association with the message. The expiry time of the message may periodically be compared to the current time to determine whether the message has expired. Upon expiry, a user of the mobile communication device may be presented with the option to cancel transmission of the message or re-attempt transmission.

  • Pub Date: 2009/20/11
  • Number: 07764970
  • Owner: Research in Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Generation of nickname dictionary based on analysis of user communications

Methods, apparatuses and systems for generating a nickname dictionary that includes associations between names of users and candidate nicknames based on statistical analysis of user communications observed at a network communications facility, such as a social network system, an email provider and the like.

  • Pub Date: 2009/20/11
  • Number: 08433762
  • Owner: Facebook Inc.
  • Location: Menlo Park, US
  • Details: Visit USPTO

Visit USPTO Page


Test object for the validation of tracking in the presence of motion

A target motion simulator system for use in verifying target tracking with a radiation therapy device. The system comprises a radiation detection target coupled to a first motion actuator simulating a first motion of a first tissue and a fiducial coupled to a second motion actuator simulating a second motion of a second tissue offset from the first tissue, a component of the first motion being asynchronous with the second motion. A synthetic physiological signal generator is synchronized with the component of the first motion, wherein an output signal from the generator, in combination with a sensed position of the fiducial, may be used by the radiation therapy device in tracking the target.

  • Pub Date: 2009/19/11
  • Number: 08792613
  • Owner: CyberHeart, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Stream sharing for event data within an enterprise network

Merging of query elements in an enterprise system is described. The enterprise system receives queries, which may each be broken down into query components. The enterprise system identifies query components that are related to identical event information from a data source of the enterprise. The enterprise system sends a single query to the data source for the event information, receives the response, and sends the response to the query sources.

  • Pub Date: 2009/19/11
  • Number: 08538981
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Pyrazolopyridine PI3K inhibitor compounds and methods of use

  • Pub Date: 2009/19/11
  • Number: 08653098
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Medicinal implant device and cartridge

The invention includes a device for inserting a medicament within a body cavity of a mammal, and a cartridge for containing the medicament within the device, where the cartridge includes a housing, a retractable chamber for containing medicament disposed within the housing, and a substantially stationary member disposed within the barrel of the retractable chamber, where upon activation of the device, the retractable chamber is retracted about the substantially stationary member, thereby depositing medicament within the body cavity.

  • Pub Date: 2009/19/11
  • Number: 08048021
  • Owner: Orapharma, Inc.
  • Location: Warminster, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent event query publish and subscribe system

Indexing and routing to event data is described. Event data is assigned an identifier that identifies the data type and the contents of event data within an enterprise system. The event data may be real-time event data. With the identifier, a source of the event data is determined, and the source can be queried for the event data in real-time. The identifier is indexed along with other event data identifiers. Based on the location of the event data, the system sends out a query toward the data source to obtain the information, but also to route the query to the data source, rather than attempting to pull data towards the query source and process it at the query source.

  • Pub Date: 2009/19/11
  • Number: 08296303
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Integrated wireless and wireline billing and services management

Methods and systems are provided for integrating billing and services management systems across disparate telecommunications systems including wireless systems and local and long distance wireline systems. Wireless and wireline services may be charged to and billed under one periodic billing. A rollover management system is employed for managing units of call usage that may be “rolled over” from a present usage period to a subsequent usage period. An integrated services settlement system is provided which is operable for apportioning revenue associated with utilization of the wireless carrier's services to the wireless carrier and for apportioning revenue associated with the wireline carrier's services to the wireline carrier. An integrated telecommunications services ordering system is provided that is operable to synchronize subscriber orders between the subscriber's wireless and wireline carriers.

  • Pub Date: 2009/19/11
  • Number: 08606707
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Generating preview bundles corresponding to content pages

Disclosed are various embodiments for generating and/or processing a preview bundle. Embodiments include receiving a request from a client to generate a preview network page that corresponds to a production network page generated in a production environment. Embodiments further include specifying at least a portion of the preview network page as a user developed portion. Embodiments also include generating the preview network page that is based at least upon the production network page and by replacing source elements of the production network page associated with the user developed portion with at least one data structure element that contains the data elements referenced by the source elements of the corresponding production network page.

  • Pub Date: 2009/19/11
  • Number: 08041764
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Federating business event data within an enterprise network

Parsing of event queries in an enterprise system is described. The enterprise system receives queries, which are broken down into query components. The query components each represent segments of the query. The enterprise system identifies sources of event data and sends queries towards the sources of the event data. The query components are processed close to the data source. The responses are combined to generate an event query response that indicates the event data of each of the query components.

  • Pub Date: 2009/19/11
  • Number: 08214325
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Cystic fibrosis transmembrane conductance regulator protein inhibitors and uses thereof

The invention provides compositions, pharmaceutical preparations and methods for inhibition of cystic fibrosis transmembrane conductance regulator protein (CFTR) that are useful for the study and treatment of CFTR-mediated diseases and conditions. The compositions and pharmaceutical preparations of the invention may comprise one or more thiazolidinone compounds, and may additionally comprise one or more pharmaceutically acceptable carriers, excipients and/or adjuvants. The methods of the invention comprise, in certain embodiments, administering to a patient suffering from a CFTR-mediated disease or condition, an efficacious amount of a thiazolidinone compound. In other embodiments the invention provides methods of inhibiting CFTR that comprise contacting cells in a subject with an effective amount of a thiazolidinone compound. In addition, the invention features a non-human animal model of CFTR-mediated disease which model is produced by administration of a thiazolidinone compound to a non-human animal in an amount sufficient to inhibit CFTR.

  • Pub Date: 2009/19/11
  • Number: 08058295
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Common cluster model for configuring, managing, and operating different clustering technologies in a data center

A method, apparatus, and computer instructions are provided for a common cluster model for configuring, managing, and operating different clustering technologies in a data center. The common cluster model supports peer cluster domains and management server cluster domains. Each cluster domain may have one or more cluster nodes. For each cluster domains, one or more cluster resources may be defined. These resources may depend on one another and may be grouped into a resource group. A set of cluster domain and cluster resources logical device operations are provided to configure, manage, and operate cluster domains and its associated resources.

  • Pub Date: 2009/19/11
  • Number: 08843561
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for scalable rendering of diffusion curves

The systems and methods described herein may allow diffusion curve images to be displayed by a variety of applications without requiring specialized graphics hardware to render the images. The system may provide mechanisms to convert a diffusion curve representation to an alternate representation in a scalable, portable format. The conversion may include a tessellation operation, and may produce a mesh of shapes (e.g., triangles) for which diffusible attribute values (e.g. color and blur) are assigned to each node. Tessellating an image may include generating a piecewise linear approximation of the diffusion curves and triangulating the image to generate the mesh. Color values for each channel may be assigned by solving a sparse linear system in the triangle domain. The alternate representation may be displayed by another application using various interpolation techniques. The alternate representation may be resolution-independent and compact, as compared to other representations used to display diffusion curve images.

  • Pub Date: 2009/18/11
  • Number: 08614708
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing electronic toll collection to users of wireless mobile devices

Electronic toll collection for a motorist and/or subscriber having a wireless mobile device that links the device to (a) specific vehicle(s) and billing account(s) with a service provider(s), third party(s) and or toll authority(s). When a motorist having the mobile device in the vehicle approaches and passes a “virtual” toll location(s) and/or “virtual” toll barriers(s) and/or “virtual” toll boundary(s) having a given toll a central server determines whether the motorist and/or subscriber has activated an electronic ETC service associated with the mobile device, and sends a charge transaction from the central server to a service provider(s), third party(s) and/or directly to the toll authority(s) system. After every transaction, a confirmation (which may be SMS or text, vibration, voice, audible alert, email, etc.) is sent to the mobile device and/or subscriber indicating the amount paid and the status of the account.

  • Pub Date: 2009/18/11
  • Number: 08587454
  • Details: Visit USPTO

Visit USPTO Page


System and method for order placement in an electronic trading environment

A system and associated methods are provided for intelligent placement and movement of orders in an electronic trading environment. According to one example method, in addition to submitting a leg order at a calculated price level, additional orders, queue holder orders, are submitted for the leg order at prices either below or above the calculated price level. Based on this configuration, if the conditions change such that it is necessary to re-price the leg order, there will be already an order resting in the exchange order book at the re-calculated price that can be used in the strategy. Upon re-pricing the leg order, one or more additional queue holder orders will be placed in the market. Other tools are provided as well.

  • Pub Date: 2009/18/11
  • Number: 08065221
  • Owner: Trading Technologies International, Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Semiconductor integrated circuit device

A semiconductor integrated circuit device of the present invention includes a drive circuit for driving a circuit block. This drive circuit is made up of a double gate transistor with gates having different gate oxide film thicknesses. When the circuit block is in its standby state, the gate of the double gate transistor having a thinner gate oxide film is turned off and that having a thicker gate oxide film is turned on. This arrangement allows a reduction in the leakage currents of both the circuit block and the drive circuit while allowing the drive circuit to deliver or cut off power to the circuit block.

  • Pub Date: 2009/18/11
  • Number: 08330496
  • Owner: Renesas Electronics Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Native code module security for arm instruction set architectures

Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that constrain store instructions in the native code module. The SFI mechanisms also maintain control flow integrity for the native code module by dividing a code region associated with the native code module into equally sized code blocks and data blocks and starting each of the data blocks with an illegal instruction.

  • Pub Date: 2009/18/11
  • Number: 08561183
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Native code module security for 64-bit instruction set architectures

Some embodiments provide a system that executes a native code module. During operation, the system obtains the native code module. Next, the system loads the native code module into a secure runtime environment. Finally, the system safely executes the native code module in the secure runtime environment by using a set of software fault isolation (SFI) mechanisms that maintain control flow integrity for the native code module and constrain store instructions in the native code module by bounding a valid memory region of the native code module with one or more guard regions.

  • Pub Date: 2009/18/11
  • Number: 08468592
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and aqueous dispersions

An aqueous dispersion including (A) at least one base polymer selected from the group consisting of an ethylene-based co-polymer and a propylene-based co-polymer; (B) at least one polymeric stabilizing agent; and at least one filler; wherein the polymeric stabilizing agent is different from the at least one base polymer and is compatible with the at least one base polymer and the at least one filler, and wherein the dispersion has filler in the range of greater than 0 to about 600 parts per hundred parts of a combined amount of the at least one base polymer and the polymeric stabilizing agent is disclosed.

  • Pub Date: 2009/18/11
  • Number: 07799864
  • Owner: Dow Global Technologies Inc.
  • Location: Midland, US
  • Details: Visit USPTO

Visit USPTO Page


Communications system providing extensible protocol translation features and related methods

A communications system may include a plurality of data storage devices each using at least one of a plurality of different operating protocols, and a plurality of mobile wireless communications devices for accessing the plurality of data storage devices. Each mobile wireless communications device may also use at least one of the plurality of different operating protocols. The system may further include a protocol interface device. In particular, the protocol interface device may include a protocol engine module for communicating with the plurality of data storage devices using respective operating protocols, and a front-end proxy module coupled to the protocol engine. The front-end proxy module may include a respective proxy module for communicating with the plurality of mobile wireless communications devices using each different operating protocol, and at least one common core service module connected to the proxy modules.

  • Pub Date: 2009/18/11
  • Number: 08205002
  • Owner: Teamon Systems, Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for integrating a plurality of software applications

A method for integrating a plurality of existing software applications is disclosed. The method comprises executing the plurality of existing software applications. A composite graphical user interface (GUI) is created containing selected objects. A user's interactions with each of the plurality of existing software applications are recorded to record at least one function from each of the plurality of existing software applications. The at least one recorded function from each of the plurality of existing software applications is assigned to at least one of the selected objects in the composite GUI.

  • Pub Date: 2009/17/11
  • Number: 08352875
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Printhead integrated circuit with a solenoid piston

The invention provides for a printhead integrated circuit for an inkjet printer. The printhead integrated circuit includes a wafer substrate defining a nozzle outlet port. The printhead integrated circuit also includes an electromagnetic piston inside the chamber, the piston mounted to the wafer substrate via torsion springs, said piston operatively forced towards the outlet port when activated. Also included is a solenoid coil positioned on the wafer substrate about the piston to activate the piston when a current is passed through the coil.

  • Pub Date: 2009/17/11
  • Number: 07959263
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Playback apparatus, playback method, and program for performing stereoscopic playback

In performing stereoscopic view, a shift information memory () stores, as a number of pixel lengths, an offset indicating how far in a right direction or a left direction to move coordinates of pixels to realize stereoscopic view. When realizing stereoscopic view, a plane shift engine () moves the coordinates of image data in a graphics plane in the right direction or the left direction by the number of pixel lengths indicated by the offset. When a scale of video data targeted for stereoscopic view is changed by a basic graphics plane (), a shift distance of pixel coordinates by the plane shift engine () is based on a number of pixel lengths obtained by multiplying the offset by a changed scaling factor in the horizontal direction.

  • Pub Date: 2009/17/11
  • Number: 08335425
  • Owner: Panasonic Corporation
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for monitoring voice quality on a wireless communication device

Methods and apparatus for providing monitoring of voice quality and diagnostic data related to voice quality on a wireless device. Monitoring thresholds can be implemented that allow for additional precautionary measures and/or further monitoring to occur if a threshold level of voice quality performance is experienced. The results of the voice and diagnostic monitoring can be communicated to the service provider who can then collect, analyze and generate reports to assess and determine quality-related problems experienced by the communication network.

  • Pub Date: 2009/17/11
  • Number: 08311087
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Games, gaming machines, systems and method having an accumulation/matching bonus

A method of operating a game controlled by a gaming machine includes accepting a wager from a player, presenting a primary game, awarding any primary game awards to the player, and upon a triggering event, presenting a feature game. The feature game includes performing a first portion of the feature game during which a set of bonus slots is accumulated and performing a second portion of the feature game. The second portion of the feature game includes selecting at least one set of a predetermined number of target symbols, associated with a bonus award, from among a pool of bonus symbols during which selected bonus symbols are not removed from the pool, and selecting a set of match symbols, equal in number to the accumulated number of bonus slots, from among the pool of bonus symbol during which selected bonus symbols are removed from the pool. The match symbols are compared to the at least one set of target symbols. If all the symbols in the at least one set of target symbols correspond to match symbols, the bonus award associated with the at least one set of target symbols is awarded to the player.

  • Pub Date: 2009/17/11
  • Number: 08123605
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic selection of images for web pages

A gallery widget is invoked when a tag in a markup language document, such as a web page, is processed. The gallery widget selects a number of images specified in the tag and places the images in the markup language document as defined by the tag. The images are selected from a gallery containing all images available for display or from a pool of images chosen from the gallery using a gallery administration tool.

  • Pub Date: 2009/17/11
  • Number: 08335983
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting and applying database schema changes to reports

A system and method to detect database schema changes are described. In various embodiments, a method of the embodiments detects database schema changes via triggers. In various embodiments, the changes are detected by comparing database schemas and determining modifications to database tables and database columns thereof. In various embodiments, the detected changes are applied to a report by generating a parse tree relevant for the modifications to database tables and columns; and traversing the tree to produce a statement to change the report to be relevant for the modifications to database tables and columns.

  • Pub Date: 2009/17/11
  • Number: 08204848
  • Owner: Business Objects Software Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for sharing content on a mobile device

Various embodiments for providing enhanced content sharing on mobile computing devices are described. In one or more embodiments, a mobile computing device may display content and send messages of different types. The mobile computing device may include a content sharing interface to prompt a selection of a recipient for content. The selected recipient may be associated with at least one transport mechanism. The mobile computing device may format the content according to a transport mechanism associated with the selected recipient, open the formatted content in a compose view for the transport mechanism, and to send the formatted content to the selected recipient. Other embodiments are described and claimed.

  • Pub Date: 2009/17/11
  • Number: 08457604
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive device driver method and system

Aspects of the present invention provide a method of specifying a device driver design for a board device. The method includes receiving a board device with various functional elements and on-board storage to be operatively coupled to a computing device through an interconnect. The device driver design is specified through the identification of one or more device driver parameters. The device driver parameters are to be used subsequently to customize an adaptive device driver that interfaces with the board device and each of the one or more functional elements. Device driver parameters are stored in a predetermined storage construct allocated from the board device. These device driver parameters remain stored in the storage construct until there is a need for the board device and corresponding device driver. Customizing the adaptive device driver is done after the device driver parameters have been stored and typically when a computer device starts or ‘boots”. Initially, aspects of the present invention may receive an indication that a board device and one or more functional elements associated with the board device have been attached to an interconnect and requires a device driver. Next, aspect of the present invention retrieve device driver parameters from the storage constructs and customizes the adaptable device driver into a device driver for the board device in accordance with the device driver parameters.

  • Pub Date: 2009/17/11
  • Number: 09158552
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Universal annotation configuration and deployment

Systems and articles of manufacture for managing annotations made for a variety of different type data objects manipulated (e.g., created, edited, and viewed) by a variety of different type applications are provided. Some embodiments allow users collaborating on a project to create, view, and edit annotations from within the applications used to manipulate the annotated data objects, which may facilitate and encourage the capturing and sharing of tacit knowledge through annotations. Further, annotations may be stored separate from the application data they describe, decoupling the tacit knowledge captured in the annotations from the applications used to manipulate the annotated data.

  • Pub Date: 2009/16/11
  • Number: 07941444
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Reproduction device, reproduction method, and program for stereoscopic reproduction

In performing stereoscopic view, a shift information memory stores, as a number of pixel lengths, an offset indicating how far in a right direction or a left direction to move coordinates of pixels to realize stereoscopic view. When realizing stereoscopic view, a plane shift engine moves the coordinates of image data in a graphics plane in the right direction or the left direction by the number of pixel lengths indicated by the offset. When a scale of video data targeted for stereoscopic view is changed by a basic graphics plane, a shift distance of pixel coordinates by the plane shift engine is based on a number of pixel lengths obtained by multiplying the offset by a changed scaling factor in the horizontal direction.

  • Pub Date: 2009/16/11
  • Number: 08301013
  • Owner: Panasonic Corporation
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Non-blocking data transfer via memory cache manipulation

A cache controller in a computer system is configured to manage a cache. The cache controller receives commands from a processor. In response, a cache mapping maintaining information for each block in the cache is modified. The cache mapping may include an address, a dirty bit, a zero bit, and a priority for each cache block. The address indicates an address in main memory for which the cache block caches data. The dirty bit indicates whether the data in the cache block is consistent with data in main memory at the address. The zero bit indicates whether data at the address should be read as a default value, and the priority specifies a priority for evicting the cache block. By manipulating this mapping information, commands such as move, copy swap, zero, deprioritize and deactivate may be implemented.

  • Pub Date: 2009/16/11
  • Number: 08495299
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining an outage in communication systems

A method of detecting an outage includes determining at a source of data a quality metric of a link over which data is to be transmitted, modifying the quality metric by a quality metric margin, and declaring an outage event when power required for transmission of a reference signal exceeds power required for transmission of the reference signal determined form the modified quality metric. An apparatus for detecting an outage includes means for determining at a source of data a quality metric of a link over which data is to be transmitted, means for modifying the quality metric by a quality metric margin, means for determining a maximum rate of data in accordance with said modified quality metric, and means for declaring an outage event when power required for transmission of data at the maximum rate of data exceeds maximum allowable transmission power.

  • Pub Date: 2009/16/11
  • Number: 08040942
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Managing virtual hard drives as blobs

Cloud computing platforms having computer-readable media that perform methods to manage virtual hard drives as blobs are provided. The cloud computing platform includes fabric computers and blob stores. The fabric computers execute virtual machines that implement one or more applications that access virtual hard drives. The data in the virtual hard drives is accessed, via a blob interface, from blobs in the blob stores. The blob stores interface with a driver that translates some application input/output (I/O) requests destined to the virtual hard drives to blob commands when accessing data in the virtual hard drives.

  • Pub Date: 2009/16/11
  • Number: 08516137
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Generating object annotations

A computer-implemented method is disclosed for generating Dojo-conforming JavaScript Object Notation (JSON) objects for base objects of an object-oriented programming environment that have been annotated to denote which attribute declarations of the base object correspond to identified Dojo attributes. In a Java class, for example, annotations may be made to indicate which class attributes correspond to the identifier attribute of a Dojo JSON object and based on those annotations a Dojo-conforming JSON object may be generated.

  • Pub Date: 2009/16/11
  • Number: 08533665
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Coordinating group play event for multiple game devices

A networked system that provides group play features for respective end users of a plurality of game machines is provided. The gaming machines may be connected together through a peer-to-peer environment or through a network controller or other device. An eligibility score may be maintained by each gaming machine, and the eligibility score indicates eligibility to participate in the group-play bonus feature. The group-play bonus feature is initiated when a triggering event is detected. Intermediate and final results of the group-play bonus feature are provided by the eligible gaming machines to all other eligible gaming machines. Each gaming machine apportions a bonus award from a bonus pool associated with the group-play bonus feature to each player.

  • Pub Date: 2009/16/11
  • Number: 09177287
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Inkjet printhead with heaters suspended by sloped sections of less resistance

An inkjet printhead that has a pair of electrodes, a heater having contacts abutting the pair of electrodes, a heater element for generating a vapor bubble in a quantity of ink and sloped side portions extending between the heater element and the contacts and, a nozzle spaced from the heater such that ink is ejected through the nozzle in response to the generation of a vapor bubble. The heater element has higher electrical resistance than the contacts and the sloped side portions.

  • Pub Date: 2009/15/11
  • Number: 07950779
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Tracking block-level changes using snapshots

Writes to blocks of a protected storage volume that occur between the beginning of a prior backup interval and the beginning of a current backup interval are tracked using a first snapshot that is maintained through the current backup interval. At the beginning of the current backup interval, a second snapshot is generated. Blocks that are indicated by a dirty block list of the first snapshot as having been changed are read from the snapshot volume for the second snapshot and copied to a backup storage volume. For the next backup interval, the second snapshot or alternatively, a newly generated third snapshot, is used to track writes to blocks of a protected storage volume that occur between the beginning of the current backup interval and the beginning of a next backup interval.

  • Pub Date: 2009/13/11
  • Number: 08117410
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Technological infrastructure consumption index

Embodiments of the invention relate to systems, methods, and computer program products that provide for a technological infrastructure consumption index. The index is instrumental in measuring and managing technological infrastructure consumption. The consumption index is generated on a predetermined schedule as indicator of a business entity's volume of infrastructure consumption. The consumption index tracks key consumption elements, which are within the control of application teams, thereby insuring that the consumption of the key elements are being managed on an ongoing basis. Additionally, the consumption index provides for drill-down capabilities for the purpose of readily accessing data associated with specific key consumption elements of interest and specific teams/organizations within the business entity.

  • Pub Date: 2009/13/11
  • Number: 08265974
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing a game of chance over messaging services

A system and method are described for providing a game of chance over messaging services. In one embodiment a method is disclosed for receiving a message from a first user which includes an identifier of a second user. The second user is registered for the game of chance based on the identifier of the first user. A message may be sent to the second user to invite the second user to enter the identifier of another user into the game of chance. A winning identifier is identified from a set of identifiers, such as the identifiers entered into the game of chance. A message is sent the second user if the amount by which the identifier of the first user matches the winning identifier satisfies a winning threshold. The message may include an indication that the second user won a prize.

  • Pub Date: 2009/13/11
  • Number: 08292717
  • Owner: Lottelo AG
  • Location: Lachen, CH
  • Details: Visit USPTO

Visit USPTO Page


Programmatic analysis of graphical sub-programs within a graphical program

A system and method for visually indicating one or more problems in a graphical program. The graphical program may be programmatically analyzed to discover a problem (or potential problem) in the graphical program. The problem found during the programmatic analysis of the graphical program may then be visually indicated on a display device. Visually indicating the problem may comprise visually indicating one or more objects in the graphical program to which the problem corresponds. Visually indicating the graphical program object(s) may comprise displaying information or altering the appearance of the object(s) in order to call the user's attention to the object(s).

  • Pub Date: 2009/13/11
  • Number: 08327280
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for enterprise search navigation

A method can include receiving a search request from a user interface (UI), selecting one or more repositories in response to the search request, and displaying, on a display device, search results corresponding to the selected repositories. The selected repositories are a subset of a plurality of available repositories, as specified by an administrator. By selecting or de-selecting the available repositories, a user can define or refine a search of the available repositories. In various implementations, the method includes interface elements that assist a user in previewing revised search results based on revised selections of repositories, and/or selections of subcategories of information available in one or more of the repositories.

  • Pub Date: 2009/13/11
  • Number: 08706717
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive display system with contact geometry interface

An interactive display system with a contact geometry interface is disclosed. The interactive display system may include a multi-touch display, a touch detection system configured to detect a touch input on the multi-touch display and to generate contact geometry for a contact region of the touch input, and an application programming interface executed on a processor of the interactive display system. The application programming interface may be configured to receive the contact geometry and to send the contact geometry to a requesting application program for application-level processing. Further, the application programming interface may be configured to receive from the application program a display command based on the application level-processing. The application programming interface may be configured to send the display command to the multi-touch display to adjust a display of a graphical element on the multi-touch display.

  • Pub Date: 2009/13/11
  • Number: 08390600
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Decryption of electronic communication in an electronic discovery enterprise system

Apparatus, methods and computer program products are described herein for automatically decrypting electronic communication that is harvested from custodians in an enterprise-wide electronic discovery system. Automatic decryption provides for electronic communication that is encrypted to be decrypted, even in instances in which the system is not provided the password and/or decryption key(s) from the encrypting custodian. The automatic decryption process, which ensues prior to delivering data to the third party data analysis provider or the requesting party, allows for data that may otherwise be unavailable or incomprehensible to the third party or requester to be readily accessible. Thus, decryption of such data in a relatively efficient and automated manner is highly beneficial.

  • Pub Date: 2009/13/11
  • Number: 08572376
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically correcting problems found during programmatic analysis of a graphical program

A system and method for visually indicating one or more problems in a graphical program. The graphical program may be programmatically analyzed to discover a problem (or potential problem) in the graphical program. The problem found during the programmatic analysis of the graphical program may then be visually indicated on a display device. Visually indicating the problem may comprise visually indicating one or more objects in the graphical program to which the problem corresponds. Visually indicating the graphical program object(s) may comprise displaying information or altering the appearance of the object(s) in order to call the user's attention to the object(s).

  • Pub Date: 2009/13/11
  • Number: 08316311
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Web service interface and querying

Methods, systems, and computer-readable media are disclosed to generate an interface for a web service and to query the web service. A particular method includes generating a user interface associated with a web service. The user interface includes one or more input parameter options associated with the web service. The user interface is generated based on a service specification and one or more series specifications associated with the service specification. User input is received via the user interface, where the user input includes a selection of at least one of the one or more input parameter options. A query of the web service is generated based on the received user input, where the query reflects at least one selected input parameter option. The method includes invoking the generated query with respect to the web service to receive results and automatically adding the received results to the user interface.

  • Pub Date: 2009/12/11
  • Number: 08812962
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for pre-defined purchases on a mobile communication device

A system is described to facilitate online transactions via mobile communications, including a plurality of converters to interface with a plurality of controllers in different formats for delivery of premium messages, and a common format processor coupled with the plurality of converters in a common format to send the premium messages. The common format processor receives a web request from a mobile phone, in response to a user selection within a mobile application executed separately from a browser application on the mobile phone, provides a web page in response to confirm a pre-defined purchase, transmits at least one premium message to the mobile phone using a first converter to obtain funds for the pre-defined purchase, and communicates with the merchant to make the pre-defined purchase on behalf of the user.

  • Pub Date: 2009/12/11
  • Number: 08224709
  • Owner: Boku, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for application fluency policies

The present solution is directed towards embodiments of a feature generally referred to as Application Templates or AppTemplates, which allows a administrator of an intermediary, such as an appliance, to configure and manage settings per application on a basis of a subset of application network traffic. Once configured, the application settings can be exported in a file called the Application Template, and imported into other intermediary systems. The Application Template includes the settings for the application as configured via the intermediary.

  • Pub Date: 2009/12/11
  • Number: 08812714
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Progressive sampling for deduplication indexing

A system and method for efficiently reducing a number of duplicate blocks of stored data. A file server both removes duplicate data and prevents duplicate data from being stored in the shared storage. A sampling rate may be used to determine which fingerprints, or hash values, are stored in an index. The sampling rate may be modified in response to changes in characteristics of the system, such as a change in the shared storage size, a change in a utilization of the shared storage, a change in the size of the storage unit, and reaching a threshold corresponding to utilization of the index. Also, a small cache may be maintained for holding fingerprint and pointer pair values prefetched from the shared storage. Each prefetched pair may be associated with data corresponding to a previous hit in the index. The association may be related to spatial locality, temporal locality, or otherwise.

  • Pub Date: 2009/12/11
  • Number: 08311964
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Model-based virtual networking

Architecture that facilitates the virtual specification of a connection between physical endpoints. A network can be defined as an abstract connectivity model expressed in terms of the connectivity intent, rather than any specific technology. The connectivity model is translated into configuration settings, policies, firewall rules, etc., to implement the connectivity intent based on available physical networks and devices capabilities. The connectivity model defines the connectivity semantics of the network and controls the communication between the physical nodes in the physical network. The resultant virtual network may be a virtual overlay that is independent of the physical layer. Alternatively, the virtual overlay can also include elements and abstracts of the physical network(s). Moreover, automatic network security rules (e.g., Internet Protocol security-IPSec) can be derived from the connectivity model of the network.

  • Pub Date: 2009/12/11
  • Number: 09379946
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating medical conditions by neuromodulation of the cerebellar pathways

Methods of treating various medical conditions by neuromodulation of target sites of a cerebello-thalamo-cortical pathway and/or a cortical-ponto-cerebellar pathway. Such medical conditions include unilateral motor deficits, movement disorders, psychiatric disorders, epilepsy, speech or cognitive deficits associated with hemispheric lesions, visual deficits associated with hemispheric lesions, learning disorders associated with hemispheric lesions, vertigo and/or dizziness, gait disturbances, hereditary/genetic disorders, congenital malformations, infectious disease, degenerative disorders, autoimmune disorders, and metabolic disorders. A method of enhancing memory, learning and/or cognitive capacity in a normal individual by stimulating a target site of a cerebello-thalamo-cortical pathway and/or a cortical-ponto-cerebellar pathway is also provided.

  • Pub Date: 2009/12/11
  • Number: 08190263
  • Owner: The Cleveland Clinic Foundation
  • Location: Cleveland, US
  • Details: Visit USPTO

Visit USPTO Page


Managing non-destructive evaluation data

Embodiments of the invention include methods to manage non-destructive evaluation (“NDE”) data. The method includes receiving NDE data for at least a portion of an asset along with inspection information associated with the at least a portion of the asset, and determining at least one alignment algorithm to align the NDE data to a simulated model of the at least a portion of the asset based on at least one of the NDE data or the inspection information. The method further includes automatically aligning The NDE data to the simulated model with the at least one alignment algorithm and analyzing the aligned NDE data on the simulated model to determine coverage of the simulated model by the NDE data. Additional methods include retrieving NDE data that has previously been aligned to the simulated model and determining coverage or determining trends associated with indications thereof.

  • Pub Date: 2009/12/11
  • Number: 08521480
  • Owner: Etegent Technologies, Ltd.
  • Location: Cincinnati, US
  • Details: Visit USPTO

Visit USPTO Page


Interoperable systems and methods for peer-to-peer service orchestration

Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.

  • Pub Date: 2009/12/11
  • Number: 09235833
  • Owner: Intertrust Technologies Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Event logging application programming interface (API)

An event logging interface on a computer system is used to record an event when an application hosted by the computer system encounters the event. The event logging interface receives data pertaining to an event from the application. Using the event logging interface, the computer system determines a logical target of the event, and determines one or more physical destinations referenced by the logical target. The data is then dispatched to one of the physical destinations.

  • Pub Date: 2009/12/11
  • Number: 08997116
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Biomaterials for tissue replacement

This invention relates to biomaterial compositions, methods and kits for producing hydrogels with tunable physico-chemical properties. Specifically, the invention relates to producing cellulosic hydrogels having optimized physico-chemical properties enabling support of cell growth or as replacement or filler for tissue repair, reconstruction or augmentation.

  • Pub Date: 2009/12/11
  • Number: 09193948
  • Owner: The Trustees of The University of Pennsylvania
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Agent feedback tool

An agent feedback tool includes an agent feedback database and an agent feedback module. The agent feedback module may include a vendor identification program, an agent feedback settings program, an agent feedback program, an agent reporting program, an agent summary program, and an agent profile program. The agent feedback module communicates with the agent feedback database to store mapping records and details relating to agents, vendors, vendor-specific locations, and feedback for the agents. The agent feedback program is operative to autopopulate one or more fields shown in an agent feedback graphical user interface by referring to mapping records stored in the agent feedback database.

  • Pub Date: 2009/12/11
  • Number: 08359228
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for telephone call control

A system for controlling incoming and/or outgoing calls on a telephone system having a single incoming/outgoing telephone line to which multiple telephone ports are connected. The system includes a database of instructions for processing calls, with the instructions being determined by the line owner. The system also includes a central processing unit for applying one or more of the user-specified instructions to selectively process an incoming or outgoing telephone call. The system may additionally include a caller identification device for identifying incoming caller numbers, and may process incoming calls according to the identity of the caller. The system may also include instructions for processing calls according to the time of day, or other user-specified parameters. Another aspect of the invention provides a method for controlling incoming and/or outgoing telephone calls, using the system and instructions described above.

  • Pub Date: 2009/11/11
  • Number: 08335303
  • Owner: CenturyLink Intellectual Property LLC
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system to determine component deprecation

A method and system of marking the deprecation status of components, such as services, processes, operations, and data types that may be used in a computing application, and displaying this status to developers within the computing application is provided. Components may be marked as deprecated, or they may include information reflecting a sunset policy, which consists of either a specific date or an upcoming version number of the application or programming language the computing application supports. The sunset policy determines when a component has reached its end of life and is either no longer supported or will be removed from the underlying product. Using this deprecation status information, the computing application may be configured to dynamically notify developers of when components will be deprecated. The computing application may further be configured to provide automated migration support by recommending alternative components and assisting in their configurations.

  • Pub Date: 2009/11/11
  • Number: 09436444
  • Owner: ADOBE SYSTEMS INCORPORATED
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Generating random sequences based on stochastic generative model having multiple random variates

Random sequences are generated based on a stochastic generative model having multiple random variates. Inputs representative of the stochastic generative model are received. The inputs include a first random variate having a finite set of alphabets, a second random variate having a set of alphabets, and a third random variate having a finite set of alphabets. Outputs representative of the random sequences are generated based on the stochastic generative model. The outputs include a first random sequence that is a finite-length random sequence of alphabets randomly selected from the first random variate, a second random sequence having a set of alphabets selected from the second random variate, and a third random sequence having a set of alphabets randomly selected from the third random variate.

  • Pub Date: 2009/11/11
  • Number: 08161329
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Application development and execution framework

An application repository is provided. The application repository comprises a first computer having a processor and a memory, a data store, a plurality of applications stored in the data store, and a billing apportionment module stored in the memory. Each application contains an instruction to invoke a run-time license tracking application programming interface (API), the plurality of applications comprising a first application. The billing apportionment module, when executed by the processor, receives a first run-time license tracking report generated by invocation of the run-time license tracking application programming interface by the first application executing on one of a second computer and a mobile electronic device, determines a first application usage fee to bill to an account associated with a user of the first application, bills the first application usage fee to the account associated with a user of the first application, determines a first usage fee share based in part on the first application usage fee and on the first run-time tracking report, and transfers the first usage fee share to an account associated with the first application.

  • Pub Date: 2009/11/11
  • Number: 09466052
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Triazine, pyrimidine and pyridine analogs and their use as therapeutic agents and diagnostic probes

The invention relates to novel therapeutic agents and diagnostic probes. The invention also relates to phosphoinositide 3-kinase (PI3K) and mammalian target of rapamycin (mTOR) inhibitor triazine-, pyrimidine- and pyridine-based compounds^ Formula (I), their stereoisomers, geometric isomers, tautomers, solvates, metabolites, N-oxide derivatives, pharmaceutically acceptable salts, and prodrugs thereof compositions of the new compounds; either alone or in combination with at least one additional therapeutic agent, with a pharmaceutically acceptable carrier; and uses of the new compounds, either alone or in combination with at least one additional therapeutic agent, for treating disorders mediated by lipid kinases. •Methods of using compounds of Formula (I) for in vitro, in situ, and in vivo diagnosis, prevention or treatment of such disorders in mammalian cells, or associated pathological conditions, are disclosed. (Formula I)

  • Pub Date: 2009/10/11
  • Number: 08921361
  • Owner: University of Basel
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Multi-class heterogeneous clients in a clustered filesystem

A cluster of computer system nodes connected by a storage area network include two classes of nodes. The first class of nodes can act as clients or servers, while the other nodes can only be clients. The client-only nodes require much less functionality and can be more easily supported by different operating systems. To minimize the amount of data transmitted during normal operation, the server responsible for maintaining a cluster configuration database repeatedly multicasts the IP address, its incarnation number and the most recent database generation number. Each node stores this information and when a change is detected, each node can request an update of the data needed by that node. A client-only node uses the IP address of the server to connect to the server, to download the information from the cluster database required by the client-only node and to upload local disk connectivity information.

  • Pub Date: 2009/10/11
  • Number: 08396908
  • Owner: Silicon Graphics International Corp.
  • Location: Fremont, US
  • Details: Visit USPTO

Visit USPTO Page


Method of controlling view of stereoscopic image and stereoscopic image display using the same

Provided is a method of controlling view of a stereoscopic image. The method includes changing the view angle and depth information of a 3D image displayed on a display according to position information for each user; and combining at least two of a spatial division technique spatially dividing light from the display, a time division technique temporally dividing light from the display and a polarization division technique dividing light from the display into lights having polarization characteristics to divide the 3D image for the each user by using the combined technique and producing a binocular disparity of for the each user.

  • Pub Date: 2009/10/11
  • Number: 08537206
  • Owner: LG Display Co., Ltd.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for checking the diagnostic quality of a medical system

A system and a method are provided that may be used to determine the suitability of a client for use in medical diagnosis. Multimedia content may be presented on the client and used to elicit responses from a user indicative of the suitability of the client for use in medical diagnosis. The elicited responses may be used to determine the suitability of the client for medical diagnosis.

  • Pub Date: 2009/10/11
  • Number: 08977016
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Management of messages included in a message thread displayed by a handheld device

The present invention determines which messages to display in message threads to a user. An electronic communication device receives and stores numerous SMS messages transported through an SMS network, but the SMS messages are sent without explicit linking information such as a previous message or subject line. A threading module applies threading rules to determine which messages to correlate into an SMS message thread through implicit link information. The threading rules thread outgoing messages sent in response to an incoming message from a user, or incoming messages where a previous outgoing message was sent to the user. An SMS application displays threads in a user interface and indicates messages threads with an icon in one view, and displays an expanded message thread in another view.

  • Pub Date: 2009/10/11
  • Number: 08046014
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Creating secure social applications with extensible types

A social environment is provided by creating an object in response to recognition of an entity in a portion of web content, wherein the object represents the entity, the object is associated with a type selected from a set of types, and the type is associated with a schema selected from a set of schemas, where the social environment includes a set of objects including the object, wherein the objects are instances of corresponding types in a rich system of predefined types, the schemas are associated with the types, metadata is associated with the objects, and there is at least one relationship between at least two objects selected from the set of objects, where the set of objects and the metadata are extensible, such that extensions provided by a first user are available for use by a second user. In one example, metadata provided by a first user is only available to a second user having a relationship with the first user.

  • Pub Date: 2009/10/11
  • Number: 09600800
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Creating secure social applications with extensible types

A social environment is provided by creating an object in response to recognition of an entity in a portion of web content, wherein the object represents the entity, the object is associated with a type selected from a set of types, and the type is associated with a schema selected from a set of schemas, where the social environment includes a set of objects including the object, wherein the objects are instances of corresponding types in a rich system of predefined types, the schemas are associated with the types, metadata is associated with the objects, and there is at least one relationship between at least two objects selected from the set of objects, where the set of objects and the metadata are extensible, such that extensions provided by a first user are available for use by a second user. In one example, metadata provided by a first user is only available to a second user having a relationship with the first user.

  • Pub Date: 2009/10/11
  • Number: 09600800
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for optically projecting three-dimensional text, images and/or symbols onto three-dimensional objects

The present invention provides a method whereby the spatial relationship and orientations of one or more three-dimensional objects being illuminated by an optical projector, and the optical projector itself, can be very accurately defined both quickly and easily. The present invention also provides a novel computerized optical projection system whereby three dimensional data when viewed by the human eye projected onto three dimensional objects is not deformed as a result of the non-planar projection surface. The present invention could have many applications in many industries that include entertainment, apparel, marketing, and many others. In one embodiment, the invention provides computerized optical assembly or manufacturing guidance systems, and related methods, that provide step-by-step assembly or manufacturing instructions for instructing technicians how to assemble or manufacture three-dimensional objects or systems, or parts thereof, which may be extremely complex, such as an aircraft, or a part thereof (a vertical stabilizer, or the like), in a very efficient, rapid and accurate manner. The assembly instructions are in the form of calibrated three-dimensional text, images and/or symbols, and are projected by one or a plurality of optical projectors that are in operable communication with one or a plurality of computers onto the three-dimensional objects or systems, or component parts or skins thereof.

  • Pub Date: 2009/09/11
  • Number: 08610761
  • Owner: Prohectionworks, Inc.
  • Location: Kennesaw, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for a collaborative decision platform

A decision making system, method and computer program product are provided. Initially, a plurality of attributes is defined. Thereafter, first information regarding the attributes is received from a receiving business. Second information is then received regarding proposed products or services in terms of the attributes. Such second information is received from a supplying business. In use, a decision process is executed based on the first information and the second information.

  • Pub Date: 2009/09/11
  • Number: 07970722
  • Owner: Aloft Media, LLC
  • Location: Longview, US
  • Details: Visit USPTO

Visit USPTO Page


Publisher/subscriber architecture for multi-device activities

A publisher-subscriber architecture with standardized and/or dynamic event/message look up can be implemented on wagering game establishment networks to establish a robust and flexible reporting and reacting mechanism. Processes that operate in accordance with the publisher-subscriber architecture can coordinate operations across multiple devices in a wagering game establishment, and even across multiple wagering game establishments, in response to an event occurring. Processes can operate as publishers and/or subscribers, and can reside on a WGM (e.g., standalone, portable, etc.) or a server. Processes operating as publishers on a WGM can publish information about events that occur on the WGM. Processes operating as subscribers can interpret published event information from different vendors and use published event information in a number of different ways.

  • Pub Date: 2009/09/11
  • Number: 08480497
  • Owner: WMS Gaming, Inc.
  • Location: Waukegan, US
  • Details: Visit USPTO

Visit USPTO Page


Packed storage commands and storage command streams

A packed command can be received at a storage device. The packed command can include an indicator of a source data location in the storage device and an indicator of a destination data location in the storage device. In response to receiving the packed command, a storage map table in the storage device can be updated. Also, a storage processing guide can be sent to a storage device. The processing guide can include a stream indicator associating the processing guide with a storage command stream. A set of storage commands can also be sent to the storage device. One or more of the commands in the set can each include a stream indicator that matches the stream indicator in the processing guide and identifies the command with the stream.

  • Pub Date: 2009/09/11
  • Number: 08683145
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating autoimmune disorders and/or inflammatory disorders

The present invention relates to dendrimer compositions configured for treating inflammatory disorders and autoimmune disorders, and related methods of synthesis. Specifically, the present invention relates to methods for treating rheumatoid arthritis with PAMAM dendrimers having functional ligands configured for treating rheumatoid arthritis (e.g., therapeutic agents, pro-drugs, targeting agents, trigger agents, imaging agents) (e.g., methotrexate).

  • Pub Date: 2009/09/11
  • Number: 09017644
  • Owner: The Regents of the University of Michigan
  • Location: Ann Arbor, US
  • Details: Visit USPTO

Visit USPTO Page


Directional navigation of page content

A system and method for displaying and navigating through structured content, such as a webpage, is provided. The content includes focusable elements, at least one of which is a non-enableable element that is normally not capable of gaining focus when the content is displayed in a browser or other viewing application. Navigation of the content by moving focus from one element to another includes moving the focus to the focusable, non-enableable element. The non-enableable element is defined as a focusable element by an attribute. Focusable elements may also be defined with attributes for capturing directional navigation instructions and calling event handling functions in response to detected directional navigation instructions.

  • Pub Date: 2009/09/11
  • Number: 08843849
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for dynamic scaling of ADC sampling rate to avoid receiver interference

A method and apparatus for avoiding receiver interference is described herein. One or more potential interferers are determined and the frequency associated with the interferers is also determined A desired sampling frequency for the receiver is calculated to avoid the potential interferers.

  • Pub Date: 2009/09/11
  • Number: 08300680
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Unified system for authentication and authorization

A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.

  • Pub Date: 2009/06/11
  • Number: 09479509
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System for and method of validating a VoIP telephone number order

A system for and method of validating a VoIP telephone number order is presented. The described systems and methods may allow for corrupt telephone numbers to be discovered and placed in a corrupt telephone number pool. To this end, data may be mined from class 5 switches and VoIP routers and then compared to the telephone numbers in the order. If a telephone number is found to be corrupt, it may be removed from the order and stored in the corrupt telephone number repository for later review. The ordering process for any other requested telephone numbers may then continue on without interruption to the processing of the entire order.

  • Pub Date: 2009/06/11
  • Number: 08571157
  • Owner: Verizon Patent and Licensing, Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and apparatus for automatic keyword extraction

The present invention provides a method and a system for automatic keyword extraction based on supervised or unsupervised machine learning techniques. Novel linguistically-motivated machine learning features are introduced, including discourse comprehension features based on construction integration theory, numeric features making use of syntactic part-of-speech patterns, and probabilistic features based on analysis of online encyclopedia annotations. The improved keyword extraction methods are combined with word sense disambiguation into a system for automatically generating annotations to enrich text with links to encyclopedic knowledge.

  • Pub Date: 2009/06/11
  • Number: 08346534
  • Owner: University of North Texas System
  • Location: Denton, US
  • Details: Visit USPTO

Visit USPTO Page


Ensuring data persistence and consistency in enterprise storage backup systems

Ensuring data persistence and consistency in enterprise storage backup systems method and apparatus are disclosed. In one embodiment, a method includes creating a data log structure (e.g., a log file) on a storage device (e.g., a Serial ATA drive, a SCSI drive, a SAS drive, a storage are network, etc.) coupled to an application server to store a backup data generated by a filter module in a continuous backup environment and buffering the backup data generated by the filter module through a memory module that transfers the backup data to the data log structure on the storage device based on an occurrence of an event. The data log structure may be created by configuring a portion of the storage device as a dedicated resource available to the memory module to copy the backup data and the data log structure may be a file on the storage device coupled to the application server having the file system.

  • Pub Date: 2009/06/11
  • Number: 08121977
  • Owner: Iwmage Systems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Context-sensitive term expansion with multiple levels of expansion

Articles of manufacture and systems for searching collections of data using context sensitive expanded term searching are provided. The collection of data may be a relational database, text document, or any other type of searchable collection of data. In either case, a query including a search condition based on a specified search term may be modified to include additional conditions based on a set of expanded (e.g., conceptually-related) search terms. For some embodiments, a user may be given the ability to control the level of expansion and the context in which the terms may be expanded.

  • Pub Date: 2009/06/11
  • Number: 08086623
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for reducing cloud IP address utilization using a distributor registry

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external cloud address to the internal cloud addresses of the cloud workloads. The routing system comprises a virtual router configured to function as a network address translator (“NAT”); a distributor connected between the virtual router and the cloud workloads; and a distributor registry accessible by the distributor for maintaining information comprising at least one of port mappings, cloud address mappings, and cloud workload configuration information.

  • Pub Date: 2009/05/11
  • Number: 09122533
  • Owner: NOVELL, INC.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for reduced cloud IP address utilization

System and method for providing cloud computing services is described. In one embodiment, the system includes a cloud computing environment, the cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal addresses of the cloud workloads.

  • Pub Date: 2009/05/11
  • Number: 08364842
  • Owner: Novell, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing key-encrypted storage in a cloud computing environment

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.

  • Pub Date: 2009/05/11
  • Number: 09658891
  • Owner: Micro Focus Software Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing key-encrypted storage in a cloud computing environment

System and method for providing cloud computing services are described. In one embodiment, the system comprises a cloud computing environment comprising resources for supporting cloud workloads, each cloud workload having associated therewith an internal cloud address; and a routing system disposed between external workloads of an external computing environment and the cloud workloads, the routing system for directing traffic from an external address to the internal cloud addresses of the cloud workloads. A designated one of the cloud workloads obtains one key of a first pair of cryptographic keys, the first pair of cryptographic keys for decrypting encrypted storage hosted within the cloud computing environment.

  • Pub Date: 2009/05/11
  • Number: 09658891
  • Owner: Micro Focus Software Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing a secure web application entitlement service

System and method for implementing a secure web application entitlement service are described. One embodiment of the system comprises a plurality of entitlement point records each comprising a unique identifier associated therewith such that each of the enforcement point records can be associated with an enforcement point within an application; an identity service (“IS”) configured to provide a first token for enabling a user to access the application; an access gateway configured to provide a second token, the second token including a list of at least a portion of the unique identifiers; an entitlement server (“ES”) configured to receive an entitlement request from the application, the entitlement request including the second token, the ES further configured to associate the entitlement request with a user-authenticated session in the IS; and a policy decision point (“PDP”) configured to receive the list of at least a portion of the unique identifiers and to render a decision on the entitlement request based at least in part on policy information associated with ones of the enforcement point records identified by the unique identifiers of the list and attribute information from the IS; wherein subsequent to the rendering of a decision by the PDP, the decision is communicated to the application.

  • Pub Date: 2009/05/11
  • Number: 09614855
  • Owner: Micro Focus Software Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing a secure web application entitlement service

System and method for implementing a secure web application entitlement service are described. One embodiment of the system comprises a plurality of entitlement point records each comprising a unique identifier associated therewith such that each of the enforcement point records can be associated with an enforcement point within an application; an identity service (“IS”) configured to provide a first token for enabling a user to access the application; an access gateway configured to provide a second token, the second token including a list of at least a portion of the unique identifiers; an entitlement server (“ES”) configured to receive an entitlement request from the application, the entitlement request including the second token, the ES further configured to associate the entitlement request with a user-authenticated session in the IS; and a policy decision point (“PDP”) configured to receive the list of at least a portion of the unique identifiers and to render a decision on the entitlement request based at least in part on policy information associated with ones of the enforcement point records identified by the unique identifiers of the list and attribute information from the IS; wherein subsequent to the rendering of a decision by the PDP, the decision is communicated to the application.

  • Pub Date: 2009/05/11
  • Number: 09614855
  • Owner: Micro Focus Software Inc.
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile device management system

A mobile device management system including a method for monitoring a remote video camera and event scheduling, synchronization and modification using location information. Video from a remote camera is encoded by a computer and streamed in real time over a network to a mobile device for decoding and display. The computer encoder and mobile device decoder are software-based. Event calendar and schedule information is incorporated, shared and automatically updated among multiple mobile devices. Location information, such as from a locator network or a satellite-based global positioning system, is used to provide real time updates to a mobile device calendar or event schedule. A map or other indicia of the location of other mobile devices may be provided.

  • Pub Date: 2009/05/11
  • Number: 08484381
  • Owner: Pluto Technologies, Inc.
  • Location: Carlsbad, US
  • Details: Visit USPTO

Visit USPTO Page


Method for address translator traversal in 3GPP networks

In response to an ACTIVATE PACKET DATA PROTOCOL (PDP) CONTEXT REQUEST message from a host, including a global reachability request option that requests a global IP address and a global port to be allocated to the host, a serving gateway transmits a CREATE PDP CONTEXT REQUEST message to an Internet gateway device. The CREATE PDP CONTEXT REQUEST message includes the global reachability request option. In response to a CREATE PDP CONTEXT RESPONSE message from the Internet gateway, where the CREATE PDP CONTEXT RESPONSE message includes a global reachability response option specifying therein a global IP address and a global port allocated to the host, the serving gateway transmits an ACTIVATE PDP CONTEXT ACCEPT message to the host, where the ACTIVATE PDP CONTEXT ACCEPT message includes the global reachability response option. As a result, the host does not need to establish a separate connection session to the Internet gateway device to acquire the same.

  • Pub Date: 2009/05/11
  • Number: 08549117
  • Owner: Telefonaktiebolaget L M Ericsson (Publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Integrating continuous and sparse streaming data

A sparse streaming system provides a first-class means for sparse metadata to be added to streaming media presentations and to be delivered using an integrated data channel that is cacheable using readily available HTTP-based Internet caching infrastructure for increased scalability. The sparse streaming system stores a reference to a sparse track within a continuous track. If a continuous fragment arrives at the client that refers to a sparse fragment that the client has not yet retrieved, then the client requests the sparse fragment. In addition, each sparse fragment may include a backwards reference to the sparse fragment created immediately prior. The references in the continuous fragments make the client aware of new sparse track fragments, and the backwards references in the sparse track fragments ensure that the client has not missed any intervening sparse track fragments.

  • Pub Date: 2009/05/11
  • Number: 09438861
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Entity morphing in metamodel-based tools

A system and method for morphing entities in metamodel-based business process model and notation (BPMN) tools is disclosed. A command is received for an entity to be morphed from a first non-abstract entity type to a second non-abstract entity type. A modeling infrastructure (MOIN) returns all non-abstract sub-types or siblings of the entity based on an inheritance hierarchy in a metamodel associated with the entity. The second non-abstract entity type is determined from the non-abstract sub-types or siblings of the entity, and the selected entity is morphed from the first non-abstract entity type to the second non-abstract entity type.

  • Pub Date: 2009/05/11
  • Number: 08839186
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Customizing a form in a model-based system

Techniques are described herein for customizing a form (a.k.a. a dialog) in a model-based system. For instance, the form may be customized without the need to modify the form in persistent memory, such as read-only memory (ROM), a hard disk, a magnetic disk, an optical disk, etc. A representation of a customization (e.g., an extensible markup language file, a management pack, etc.) regarding the form is captured in memory, such as a random access memory (RAM), and stored in a file or a database. For instance, the representation of the customization may be stored separately from the form. The representation of the customization is retrieved from the file or the database and applied to a rendering of the form.

  • Pub Date: 2009/05/11
  • Number: 08707158
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Computer system with controller kernel and remote desktop

Remote desktop software for use with guest operating systems that run on a controller kernel. Also, remote desktop software that can be used to remotely view and/or manipulate multiple containerized guest operating systems that run on a single computer. The multiple, containerized operating systems preferably run on a controller kernel. Alternatively, the multiple containerized operating system may be controlled to run on the single computer by other software, such as a hypervisor.

  • Pub Date: 2009/05/11
  • Number: 08370856
  • Owner: FH Innovations, Ltd
  • Location: Markham, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Clustering threads based on contention patterns

Techniques for grouping two or more threads based on lock contention information are provided. The techniques include determining lock contention information with respect to two or more threads, using the lock contention information with respect to the two or more threads to determine lock affinity between the two or more threads, using the lock affinity between the two or more threads to group the two or more threads into one or more thread clusters, and using the one or more thread clusters to perform scheduling of one or more threads.

  • Pub Date: 2009/05/11
  • Number: 08645963
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Bi-directional communication between redundant storage controllers

Technologies are described herein for providing bi-directional communication between redundant storage controllers in a storage system. One of the storage controllers operates in the initiator role over a point-to-point communication channel connecting the controllers, while the other operates in the target role. To transmit a function call from a storage module executing on the initiator storage controller to a corresponding module executing on the target storage controller, the initiator storage controller issues a write command to the second storage controller over the point-to-point communication channel. In order to transmit a function call from a storage module executing on the target storage controller to a corresponding module executing on the initiator storage controller, the target storage controller responds to a pending anticipatory read command sent from the initiator storage controller over the point-to-point communication channel.

  • Pub Date: 2009/05/11
  • Number: 08650328
  • Owner: American Megatrends, Inc.
  • Location: Norcross, US
  • Details: Visit USPTO

Visit USPTO Page


Adapting audio and video content for hardware platform

A single stream synchronously forwarded from an application runtime engine and comprising at least first and second types of data is received, the single stream having a format associated with the runtime engine. A first type data stream and a second type data stream are generated from the single stream. Converted data streams are generated from the first and second type data streams by changing the format to a standard-compliant format according to a standard with which at least one hardware decoder in the electronic device complies. The method includes determining that the hardware decoder is available to decode the converted data streams. Upon the determination, the converted data streams are forwarded to the hardware decoder. The method includes generating, by the hardware decoder, at least one decoded data stream from the modified data streams. The method includes generating an output from the decoded data stream.

  • Pub Date: 2009/05/11
  • Number: 08010692
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Tissue fixation devices and assemblies for deploying the same

Tissue fasteners carried on a tissue piercing deployment wire fasten tissue layers of a mammalian body together include a first member, a second member, and a connecting member extending between the first and second members. One of the first and second members has an elongated slot permitting fastener deployment while avoiding excessive tissue compression.

  • Pub Date: 2009/04/11
  • Number: 08911473
  • Owner: EndoGastric Solutions, Inc.
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System for translation and communication of messaging protocols into a common protocol

An adapter for passing messages in a telecommunications infrastructure from a first device to a second device. The adapter comprises a messaging interface, a processor, and a bus interface. The messaging interface is in communication with the first device and is operable to receive a received message in a first messaging format from the first device. The processor is coupled to the messaging interface and is operable to receive the received message from the messaging interface and translate the received message into a common message in a common format. The bus interface is coupled to the processor and is operable to receive the common message from the processor and transmit the common message to the second device through a bus.

  • Pub Date: 2009/04/11
  • Number: 08195836
  • Owner: AT&T Mobility II, LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for delivering customized advertisements within interactive communication systems

The present invention is a system and method for delivering customized electronic advertisements in an interactive communication system. The customized advertisements are selected based on consumer profiles. and are then integrated with offerings maintained by different content providers. The preferred interactive communication system interconnects multiple consumer computers, multiple content provider computers and multiple Internet provider computers with an advertisement provider computer. Whenever a consumer directs one of the consumer computers to access an offering existing in one of the content provider computers, an advertising request is sent to the advertisement provider computer. Upon receiving the advertising request, the advertising provider computer generates a custom advertisement based on the consumer's profile. The custom advertisement is then combined with the offering from the content provider computer and displayed to the consumer. The advertisement provider computer also credits a consumer account, a content provider account and an internet provider account each time a consumer views a custom advertisement. Furthermore, the advertisement provider computer tracks consumer responses to the customized advertisements.

  • Pub Date: 2009/04/11
  • Number: 08027874
  • Owner: Hemisphere Solutions N.A., L.L.C.
  • Location: Wilminton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for capture and rendering of performance on synthetic musical instrument

Techniques have been developed for capturing and rendering musical performances on handheld or other portable devices using signal processing techniques suitable given the somewhat limited capabilities of such devices and in ways that facilitate efficient encoding and communication of such captured performances via wireless networks. The developed techniques facilitate the capture, encoding and use of gesture streams for rendering of a musical performance. In some embodiments, a gesture stream encoding facilitates audible rendering of the musical performance locally on the portable device on which the musical performance is captured, typically in real time. In some embodiments, a gesture stream efficiently codes the musical performance for transmission from the portable device on which the musical performance is captured to (or toward) a remote device on which the musical performance is (or can be) rendered. Indeed, is some embodiments, a gesture stream so captured and encoded may be rendered both locally and on remote devices using substantially identical or equivalent instances of a digital synthesis of the musical instrument executing on the local and remote devices.

  • Pub Date: 2009/04/11
  • Number: 08222507
  • Owner: Smule, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Packet validation in virtual network interface architecture

Roughly described, a network interface device receiving data packets from a computing device for transmission onto a network, the data packets having a certain characteristic, transmits the packet only if the sending queue has authority to send packets having that characteristic. The data packet characteristics can include transport protocol number, source and destination port numbers, source and destination IP addresses, for example. Authorizations can be programmed into the NIC by a kernel routine upon establishment of the transmit queue, based on the privilege level of the process for which the queue is being established. In this way, a user process can use an untrusted user-level protocol stack to initiate data transmission onto the network, while the NIC protects the remainder of the system or network from certain kinds of compromise.

  • Pub Date: 2009/04/11
  • Number: 08380882
  • Owner: Solarflare Communications, Inc.
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Reliable media streaming

A reliable streaming system increases reliability of live and on-demand streaming media events through a robust server architecture that allows fast failover and recovery in the event of network, hardware, or other failures. The system provides for failover of encoders, ingest servers, which receive encoded media data from encoders, and origin servers, which serve as the retrieval point of last resort for connecting clients. The system also provides a push proxy mechanism that allows one copy of data to feed redundant servers and pre-warm caches, saving on provisioned bandwidth. In addition, the system provides a distribution server role that allows content to be automatically syndicated to a region when needed. Thus, the reliable streaming system provides a streaming solution with no single point of failure and redundancy and fast failover built into the content network architecture.

  • Pub Date: 2009/03/11
  • Number: 08392748
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for implementing multi-touch gestures on a single-touch touch surface

Methods for activating multi-touch functionality by recognizing and processing multi-touch interactions on a touch surface of non-multi-touch computing devices. The computing device may detect a jump from the location of the first touch event to determine that a multiple touch gesture is being traced. Virtual touch events are detected and stored. Using mathematical formulae, parameters are calculated based on initial and subsequent virtual touch event locations. Based on these parameters the multi-touch functionality is determined, such as a zooming or rotating function. A transform factor may be determined and applied to the image display.

  • Pub Date: 2009/03/11
  • Number: 08957918
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Low latency cacheable media streaming

A low latency streaming system provides a stateless protocol between a client and server with reduced latency. The server embeds incremental information in media fragments that eliminates the usage of a typical control channel. In addition, the server provides uniform media fragment responses to media fragment requests, thereby allowing existing Internet cache infrastructure to cache streaming media data. Each fragment has a distinguished Uniform Resource Locator (URL) that allows the fragment to be identified and cached by both Internet cache servers and the client's browser cache. The system reduces latency using various techniques, such as sending fragments that contain less than a full group of pictures (GOP), encoding media without dependencies on subsequent frames, and by allowing clients to request subsequent frames with only information about previous frames.

  • Pub Date: 2009/03/11
  • Number: 09237387
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Establishing trust relationships between computer systems

An offline trust system establishes a trust relationship between a trust authority computer system and a target computer system without relying on an active network connection between the computer systems. The offline trust system separates the trust establishment operation into a provisioning phase and a configuration phase. The provisioning phase can be performed entirely on the trust authority, while the configuration phase can be performed entirely on the target computer system requesting trust. The two phases can be performed at different times and do not assume any connection between the two computer systems. An administrator may perform the provisioning phase for many target computer systems at the same time. Thus, the offline trust system provides a way to establish trust between computer systems that is more reliable and less prone to failure.

  • Pub Date: 2009/03/11
  • Number: 08302165
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Computing system using single operating system to provide normal security services and high security services, and methods thereof

A method of providing normal security services and high security services with a single operating system in a computing system is disclosed. A secure thread is only accessible while the computing system is in a high security environment, and relates to one of the high security services. A pseudo normal thread is to be executed while the computing system in a normal security environment, and it works as a temporary of the secure thread, and is forwarded to a thread ordering service to gain access to resources of the computing system. When the pseudo normal thread gains access to the computing system resources, the computing system is changed to the high security environment to execute the secure thread.

  • Pub Date: 2009/03/11
  • Number: 09207968
  • Owner: MEDIATEK INC.
  • Location: Hsinchu, TW
  • Details: Visit USPTO

Visit USPTO Page


Use of multiple embedded messages in program signal streams

A method of generating a program signal stream comprises creating a sequence of serial programs that include a first event and a second, later occurring event and inserting a plurality of messages in the sequence of serial programs, between the first event and the 5 second event. The messages may be indicative of a time to the second event, as measured from each respective message of an elapsed time since the first event, to each respective message. Alternatively or in addition, the messages may be at equal time intervals between the first event and second events. The first and second events may be the start and end of a program or a program portion, such as a chapter, an advertisement, unscheduled content or an 10 entire program, for example. At least one message indicative of the time to the second event may be inserted in the sequence of serial programs prior to the first event.

  • Pub Date: 2009/02/11
  • Number: 08281335
  • Owner: Time Warner Cable LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for improved identification and analysis of threats to a computing system

A security tool can access a tagging tool and the history generated by the tagging tool in order to identify potential threats and analyze the identified threats. When a potential threat is detected or an actual threat is identified, the security tool can request the history of actions from the tagging tool corresponding to the threat. The security tool can compare the potential or actual threat with the history of any action recorded by the tagging tool in order to classify a potential threat as an actual threat or determine the source or cause of an actual threat.

  • Pub Date: 2009/02/11
  • Number: 08607339
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Recurring delivery of products

Technologies are described herein for providing recurring delivery of products to a customer on a periodic basis. A customer creates a recurring delivery list that specifies a particular delivery slot indicating when orders are to be delivered. The customer adds products to the recurring delivery list, specifying a quantity and frequency of delivery for each product. Orders are periodically generated from the customer's recurring delivery list for delivery on the next occurrence of the specified delivery slot. The products included in each order are based on the frequency of delivery and a last delivery date for each product in the recurring delivery list. If the customer makes changes to the recurring delivery list, those changes may also be applied to any pending orders generated from the list.

  • Pub Date: 2009/02/11
  • Number: 08370271
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Portable dual field gradient force multichannel flow cytometer device with a dual wavelength low noise detection scheme

Systems and methods for combining dielectrophoresis, magnetic forces, and hydrodynamic forces to manipulate particles in channels formed on top of an electrode substrate are discussed. A magnet placed in contact under the electrode substrate while particles are flowing within the channel above the electrode substrate allows these three forces to be balanced when the system is in operation. An optical detection scheme using near-confocal microscopy for simultaneously detecting two wavelengths of light emitted from the flowing particles is also discussed.

  • Pub Date: 2009/02/11
  • Number: 08293089
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Network, storage appliance, and method for externalizing an external I/O link between a server and a storage controller integrated within the storage appliance chassis

A network storage appliance is disclosed. The storage appliance includes a port combiner that provides data communication between at least first, second, and third I/O ports; a storage controller that controls storage devices and includes the first I/O port; a server having the second I/O port; and an I/O connector for networking the third I/O port to the port combiner. A single chassis encloses the port combiner, storage controller, and server, and the I/O connector is affixed on the storage appliance. The third I/O port is external to the chassis and is not enclosed therein. In various embodiments, the port combiner comprises a FiberChannel hub comprising a series of loop resiliency circuits, or a FiberChannel, Ethernet, or Infiniband switch. In one embodiment, the port combiner, I/O ports, and server are all comprised in a single blade module for plugging into a backplane of the chassis.

  • Pub Date: 2009/02/11
  • Number: 09176835
  • Owner: DOT HILL SYSTEMS CORPORATION
  • Location: Longmont, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for securing a third party communication with a hosting web page

A method and system for securing hosting web pages from malicious third party modules. The method includes uploading a third party module to a hosting web page; validating a proxy API call received from the third party module, wherein the proxy API call includes at least a payload parameter provided by the third party module; generating an engine API call including at least the payload parameter; validating the engine API call; and executing the payload parameter if the engine API call is validated.

  • Pub Date: 2009/02/11
  • Number: 08347352
  • Owner: Mediamind Technologies Ltd.
  • Location: Herzliya, IL
  • Details: Visit USPTO

Visit USPTO Page


Labeling of input device components

The automated labeling system provides access to the input mechanism axes and button semantic information to applications running in a windowing environment. This enables the applications to not have to have specific information or interface with the low level drivers of the input mechanism and can rely exclusively on the windowing system and its API to interface with the input devices attached to the computer system.

  • Pub Date: 2009/02/11
  • Number: 09069630
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Device and method for contact information exchange

A method and device exchanging contact information on an electronic device. Contact information is obtained from a contact by scanning a barcode using an electronic device and decoding the barcode to recover the contact information encoded therein. The contact information may be used to reciprocate by sending user contact data in a message addressed to an electronic address obtained from the contact information. The user contact data may be encoded in a second barcode displayed on the electronic device.

  • Pub Date: 2009/02/11
  • Number: 07988037
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Communication method capable of connecting with a communication application service and gateway thereof

A communication method capable of connecting with a communication application service for an Internet protocol private branch exchange includes establishing a communication channel in the Internet protocol private branch exchange, transmitting a communication message to a channel proxy through the communication channel, and starting to communicate with the communication application service according to the communication message and transmitting the communication message to the communication application service.

  • Pub Date: 2009/02/11
  • Number: 08108530
  • Owner: Wistron Corporation
  • Location: New Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Adaptive mesh resolution in electric circuit simulation and analysis

An adaptive mesh of virtual nodes is provided to analyze the performance of a power/ground plane pair having an irregular shape. Plane transmission line characteristics and regional modal resonances can be modeled accurately, and with a significant decrease in simulation time as compared to traditional methods. A variable-sized cell structure is constructed with smaller cells in irregular regions and with larger cells in uniform regions. Grid nodes may thus stay aligned along length and width to allow parameters of equivalent circuit models to be scaled appropriate to the cell size.

  • Pub Date: 2009/02/11
  • Number: 08448117
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Updating an operating system of a computer system

The present invention provides a processor-implemented method and system of updating an operating system of a computer system, where the operating system is subject to a system lockdown that does not allow changes to a list of approved executables of the operating system and that does not allow changes to a base system configuration of the operating system. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the list of approved executables. In an exemplary embodiment, the method and system include, (1) identifying at least one trusted updater process in the operating system and (2) allowing the trusted updater process to make at least one change to the base system configuration.

  • Pub Date: 2009/30/10
  • Number: 08402553
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Testing analytics tool

Embodiments of the invention relate to systems, methods, and computer program products for testing analytics. Embodiments herein disclosed provide for automating the collection and storage of test data, automating test performance calculations across a multitude of segments within the test group and automating test result information delivery.

  • Pub Date: 2009/30/10
  • Number: 08301413
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for replaying operations using replay look-ahead instructions

A technique for reliably replaying operations in electronic-design-automation (EDA) software is described. In this technique, the EDA software stores operations performed by a user during a design session, as well as any replay look-ahead instructions, in a log file. When repeating the first operation, the replay look-ahead instruction ensures that the same state is obtained in the EDA environment as was previously obtained. For example, if an interrupt occurred when the first operation was previously performed, the replay look-ahead instruction may specify when the interrupt occurred during the performance of the operation so that the effect of the interrupt may be simulated when replaying the first operation. Alternatively, if a blocking user-interface request occurred when the first operation was previously performed (such as a mandatory query), the replay look-ahead instruction may include one or more events associated with the user answer to the blocking user-interface request so that the same user answer may be provided when replaying the first operation.

  • Pub Date: 2009/30/10
  • Number: 08397186
  • Owner: Synopsys, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of creating a restorable computer installation

A method for creating a restorable computer installation includes performing a master software installation on a master drive in a computer system using sources of files available to an end-user. A source package is created including files that cannot be restored from the sources of files used in the master software installation. A file is excluded from the source package. Restore information is included in a catalog record of a catalog file, the catalog record corresponding to each file in the master software installation.

  • Pub Date: 2009/30/10
  • Number: 08661433
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for single stack shadowing

Methods and systems directed to controlling a real-time user session of presentation layer protocol data. Methods describing a shadowing agent service receiving a connection request from a shadowing tool and initiating a rollover operation responsive to the connection request. A rollover operation including reinitializing the single protocol stack and receiving a protocol data stream from the protocol stack. The shadowing agent service receiving a second data stream from the shadowing tool and inserting data from the second protocol data stream into the protocol stack. Systems describing a controller of the shadowing agent service receiving a connection request from a shadowing tool; a recorder of the shadowing agent service initiating a rollover operation responsive to the connection request; the controller receiving a second protocol data stream from the shadowing tool; and the controller inserting data from the second protocol data stream into the protocol stack.

  • Pub Date: 2009/30/10
  • Number: 08200828
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for secure distributed storage

Embodiments relate to systems and methods for secure distributed storage. In aspects, a set of remote storage hosts, such as personal computers, servers, media devices, cell phones, or others, can subscribe or register to provide storage via a cloud-based or other distributed network. Source data from an originating computer, such as a data file, can be decomposed into data storage subunits, each of which is encrypted via a cloud management system or other logic or control. The data storage subunits can comprise data blocks or even or uneven size. The set of encrypted data storage subunits can be registered to a table or other record, and disseminated to the remote storage hosts. In the event of data loss at the originating computer or at other times, the remotely stored data storage subunits can be extracted, decrypted, and reassembled to reconstruct the original source data.

  • Pub Date: 2009/30/10
  • Number: 08375223
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing dynamic spillover of virtual servers based on bandwidth

The present solution provides a spillover management technique for virtual servers of an appliance based on bandwidth. A network administrator may configure a bandwidth threshold for one or more virtual servers, such as virtual servers providing acceleration or load balancing for one or more services. The bandwidth threshold may be specified as a number of bytes transferred via the virtual server. The bandwidth threshold may also be specified as a round trip time or derivative thereof. A user may specify the bandwidth threshold via a configuration interface. Otherwise, the appliance may establish the bandwidth threshold. The appliance monitors the bandwidth used by a first virtual server. In response to detecting the bandwidth reaching or exceeding the bandwidth threshold, the appliance dynamically directs client requests to a second virtual server.

  • Pub Date: 2009/30/10
  • Number: 08275871
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for integrated computerized banking

Systems and methods for integrated computerized financial management are presented. Financial information from disparate systems is made available to an operator through a user interface that presents a unified view of financial information from such disparate systems and enables the operator to make and execute upon financial decisions. The operator utilizes an operator computing platform to access the financial information, and may be directly or indirectly connected with one or more databases containing financial information through various networking modalities configured to operate together in the unified presentation schema. Portable computing devices and reduced content variations of user interfaces may be utilized to enhance accessibility.

  • Pub Date: 2009/30/10
  • Number: 08756131
  • Owner: Intuit Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Space efficient software package management

A space management tool can consolidate the duplicate files in the software packages while maintaining the file structure of the software packages. The space management tool can search the software packages to identify duplicate files and consolidate the duplicate files without altering the file structure of the software packages. In particular, the space management tool can consolidate the storage space utilized by the software packages by removing duplicate files in the software packages and replacing the removed files with a reference to the remaining file.

  • Pub Date: 2009/30/10
  • Number: 08806477
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Sensors and switches for detecting hydrogen

Sensors and switches for detecting hydrogen include an electrically-insulating support; a first and second electrode; and a palladium structure alone or in combination with an organic insulating film. The palladium structures of the sensors are deposited on and contact a first electrode and a portion of the palladium structure extends to and contacts the second electrode to create a conductive path. The palladium structures of the switches are deposited on and contact a first electrode and a portion of the palladium structures extend to and contact an organic insulating film deposited on the second electrode. Upon exposure of the switch to hydrogen, portions of the palladium structure extend through the film and contact the second electrode to create a conductive path. Methods of detecting hydrogen and methods of fabricating a sensor for detecting an analyte of interest are also provided.

  • Pub Date: 2009/30/10
  • Number: 08383412
  • Owner: University of Louisville Research Foundation, Inc.
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Remote feature activator feature extraction

A database record controls a license to use a computational component. An input receives an order identifier associated with an order related to a computational component and an interface retrieves order information associated with the identifier. The order information comprises at least one material code. A material code mapping agent compares the material code with at least one material code mapping table to identify corresponding computational component information associated with the material code. In another configuration, a transaction record includes first information associated with the order, the order relates to at least a first computational component and/or feature thereof, a configuration file includes second information different from the first information, the configuration file relates to at least one telecommunication switch/server, and a configuration file processing agent compares some of the first information with some of the second information to form a system record having both first and second information.

  • Pub Date: 2009/30/10
  • Number: 08620819
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Notifying a user of an available media object

Among other features, notification is presented on a mobile device to a user to advise the user of the availability of a media object that (a) has been received from a server and stored on the mobile device without the user having been aware of the receipt or storage, or (b) has newly become available for streaming from the server to the mobile device.

  • Pub Date: 2009/30/10
  • Number: 08754765
  • Owner: Penthera Partners, Inc.
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Network-based sweepstakes system and method

A system and method for automatically enrolling users of a website or other network-based service in sweepstakes. A user of 4 user computer system connects to a host computer system hosting a website or other network-based service and is awarded points for accessing features of the website or service. The points are displayed in real-time on the user's computer and transmitted to a database server, which maintains the user's point totals. The user is then automatically given a number of entries in a sweepstakes based on the number of points he or she has been awarded. Users may also be awarded points for accessing features of websites or services of third-party host computer systems.

  • Pub Date: 2009/30/10
  • Number: 08463644
  • Owner: Mindspark Interactive Network, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for joining a real-time session of presentation layer protocol data

Methods and systems directed to joining a real-time user session of presentation layer protocol data. The methods describe a user session receiving a presentation layer protocol data stream, wherein the user session comprises a single presentation layer protocol stack. The protocol stack sending a request to a virtual channel to reinitialize. The virtual channel processing an existing request until the request to reinitialize is encountered. The protocol stack modifying the presentation layer protocol data stream to contain a marker. The systems describe a single presentation layer protocol stack. The protocol stack includes a receiver, a virtual channel, and a rollover agent. The receiver receives a presentation layer protocol data stream and receives a message initiating reinitialization. The virtual channel processes a request. The rollover agent sends to the virtual channel a request to reinitialize and modifies the presentation layer protocol data stream to contain a marker.

  • Pub Date: 2009/30/10
  • Number: 08296441
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data

Methods and systems for reviewing previously recorded and real-time user session data of presentation layer protocol data. Methods describing a shadowing tool receiving a streaming real-time presentation layer protocol data stream from a shadowing agent service executing on a server; receiving a recorded presentation layer protocol data stream from the shadowing agent service; and combining the streaming real-time presentation layer protocol data stream and the recorded presentation layer protocol data stream producing a single output stream. Systems describing a shadowing tool executing on a computing device receiving a streaming real-time presentation layer protocol data stream from a shadowing agent service executing on a server; the shadowing tool receiving a recorded presentation layer protocol data stream from the shadowing agent service; and the shadowing tool combining the streaming real-time presentation layer protocol data stream and the recorded presentation layer protocol data stream producing a single output stream.

  • Pub Date: 2009/30/10
  • Number: 08935316
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for recovery during authentication

Techniques for recovery during authentication include initiating sending a HyperText Transfer Protocol (HTTP) authentication message from user equipment of a user to a merchant node of a merchant. If the user is not authenticated in response to the HTTP authentication message, then sending a Short Message Service (SMS) message from the user equipment to the merchant node is initiated. The SMS message indicates a transaction between the user and the merchant. In some embodiments, techniques include changing an access point to a network until an access point utilized is on a list of acceptable access points, in response to a buy response message that indicates a transaction between a merchant and a user. A hypertext transfer protocol authentication message is sent through the access point that is on the list of acceptable access points.

  • Pub Date: 2009/30/10
  • Number: 09195980
  • Owner: Nokia Technologies Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Location specific content for mobile communication devices

Embodiments disclosed herein allow a mobile communication device to incorporate location specific content into media for presentation to a user based on the location of the mobile communication device. In a particular embodiment, a mobile communication device wirelessly receives a plurality of media and stores the plurality of media in the mobile communication device. The mobile communication device also determines its location. The mobile communication device receives a user selection indicating a selection of the plurality of media for presentation. In response to the user selection, the mobile communication device determines location specific content for the selected media based on the location of the mobile communication device. After location specific content has been determined, the mobile communication device incorporates the location specific content into the media selection for presentation to a user.

  • Pub Date: 2009/30/10
  • Number: 08249563
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Fault surveillance and automatic fail-over processing in broker-based messaging systems and methods

An exemplary method includes attempting, by a message broker subsystem, to deliver one or more messages intended for a recipient software application to the recipient software application during a predetermined fault interval, determining, by the message broker subsystem, that the recipient software application is in a fault state after failing to deliver the one or more messages to the recipient software application during the predetermined fault interval, and automatically performing, by the message broker subsystem, a fail-over process on one or more other messages intended for the recipient software application in response to the determination that the recipient software application is in the fault st