API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Streamdata.io

Streamdata is a software vendor making real-time data accessible to all by operating a proxy turning request / response APIs into feeds of real-time events.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Wearable pump assembly

A wearable infusion pump assembly includes a reusable housing assembly, and a disposable housing assembly including a reservoir for receiving an infusible fluid. A releasable engagement assembly is configured to allow the reusable housing assembly to releasably engage the disposable housing assembly. A detachable external infusion set is configured to deliver the infusible fluid to a user.

  • Pub Date: 2008/31/12
  • Number: 09526830
  • Owner: DEKA Products Limited Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for integrating educational software systems

Systems and methods are provided for integrating educational software. In one implementation, a first method includes providing on a first server an integrated learning management system adapted to exchange education data and materials via a connector interface, providing on the first server a first component which responds to requests made by the integrated system via the connector interface to exchange education data and materials with a first source learning management system, and exchanging education data and materials between the integrated system and the first system via the first component by use of the connector interface.

  • Pub Date: 2008/31/12
  • Number: 08271420
  • Owner: Blackboard Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for unit of measurement conversion and search query expansion

A system and methods for unit of measurement conversion and search query expansion are described. The search query expansion may include identifying an initial unit of measurement associated with a property and an initial numeric value for the initial unit of measurement within a search query, automatically forming an expanded search query by expanding the search query to include at least one related unit of measurement associated with the property, and sending the expanded search query to a search engine to search a database. Other embodiments are described and claimed.

  • Pub Date: 2008/31/12
  • Number: 08504582
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for prioritizing and processing updated inventory information for event listings

A system and methods for prioritizing and processing updated inventory information for event listings are described. In one embodiment, a network-based system may receive updated ticket information from a seller for multiple event listings, categorize the updated ticket information from the seller by event, prioritize event categories comprising updated ticket information in accordance with a prioritization policy, and process a prioritized event category comprising updated ticket information for a particular event listing out-of-order with respect to one or more other event categories comprising previously-received updated ticket information for other event listings. Other embodiments are described and claimed.

  • Pub Date: 2008/31/12
  • Number: 08738409
  • Owner: Stubhub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for multimedia “hot spot” enablement

A method for creating a multimedia presentation element, comprises selecting a presentation element icon; adding information to a presentation element box defined by a presentation boundary within a first multimedia element of the multi-media presentation having a plurality of multimedia elements, the presentation element boundary resulting from the selection of the presentation element icon; and associating the presentation element box with the first multimedia element such that the presentation element box remains associated to the first multimedia element during navigation from different multimedia elements of the plurality of multimedia elements, is described herein.

  • Pub Date: 2008/31/12
  • Number: 09639505
  • Owner: EBAY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for multimedia “hot spot” enablement

A method for creating a multimedia presentation element, comprises selecting a presentation element icon; adding information to a presentation element box defined by a presentation boundary within a first multimedia element of the multi-media presentation having a plurality of multimedia elements, the presentation element boundary resulting from the selection of the presentation element icon; and associating the presentation element box with the first multimedia element such that the presentation element box remains associated to the first multimedia element during navigation from different multimedia elements of the plurality of multimedia elements, is described herein.

  • Pub Date: 2008/31/12
  • Number: 09639505
  • Owner: EBAY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for automatic media population of a style presentation

A method for automatic media population of a style presentation comprises collecting presentation media; positioning the collected presentation media on a storyboard; and selecting a style presentation; wherein the selection of the style presentation results in the automatic population of the style presentation with the presentation media positioned on the storyboard is described herein.

  • Pub Date: 2008/31/12
  • Number: 08627192
  • Owner: Ebay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of consolidated central user administrative provisioning

In one embodiment the present invention includes a computer-implemented method of reducing a quantity of business application programming interface (BAPI) calls in a hardware client-server environment. The method includes configuring a centralized provisioning system on a hardware server with access definitions for systems. The method further includes receiving, by the centralized provisioning system, a provisioning request for a user of a client to access the systems. The method further includes determining a collected BAPI call according to the access definitions. The method further includes providing access to the user according to the collected BAPI call.

  • Pub Date: 2008/31/12
  • Number: 08788666
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing social context to digital activity

The system and method for providing social context to digital activity combines mobile device contact information with user-provided website information to aid users when browsing the Internet. Users of mobile devices define identifications of themselves for websites, so that when another user in their contact list is browsing the Internet, an indicator is able to indicate that he is a known contact. The determination of whether the person is a known contact based on the identification definitions is able to be implemented either by direct interfacing between the host website and a server which stores the identification definitions, a browser plugin which communicates with the server or an API provided by the server or a mobile device.

  • Pub Date: 2008/31/12
  • Number: 08181111
  • Owner: Synchronoss Technologies, Inc.
  • Location: Bridgewater, US
  • Details: Visit USPTO

Visit USPTO Page


Synchronizing performance requirements across multiple storage platforms

Synchronization of data layouts and resource utilizations at one or more remote replica sites with the workload and data tiering decisions being made at the primary site allows for an efficient and effective workload support transfer in the event of site failover from a primary site to a remote site. Relevant data access information about workload being supported at the primary site is collected and from that raw information, characterized data access information is generated that condenses the raw data access information or otherwise provides relevant encapsulated information about the raw data access information. The characterized data access information is transmitted to the one or more remote sites allowing each remote site to make its own independent decisions on how best to utilize its available resources to match the performance requirements currently being supported by the primary site.

  • Pub Date: 2008/31/12
  • Number: 08566549
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Spectrum-adaptive networking

The present invention increases the available spectrum in a wireless network by sharing existing allocated (and in-use) portions of the RF spectrum in a manner that will minimize the probability of interfering with existing legacy users. The invention provides interference temperature-adaptive waveforms, and a variety of physical and media access control protocols for generating waveforms based on measurement and characterization of the local spectrum. The invention measures the local spectrum at a receiving node, generates an optimal waveform profile specifying transmission parameters that will water-fill unused spectrum up to an interference limit without causing harmful interference to primary and legacy transmitters using the same frequency bands, and enables simultaneous transmit and receive modes at a multiplicity of transceivers in a wireless network. The invention also provides closed loop feedback control between nodes, co-site interference management, intersymbol interference mitigation, wide sense stationary baseband signaling and modulation, and power limited signaling for avoiding detection and interception.

  • Pub Date: 2008/31/12
  • Number: 08041363
  • Owner: Raytheon BBN Technologies Corp.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Pump assembly with switch

A wearable infusion pump assembly includes a reusable housing assembly, and a disposable housing assembly including a reservoir for receiving an infusible fluid. The wearable infusion pump assembly also includes a releasable engagement assembly configured to allow the reusable housing assembly to releasably engage the disposable housing assembly. A switch assembly of the wearable infusion pump assembly is configured to effectuate a functionality of the infusion pump assembly.

  • Pub Date: 2008/31/12
  • Number: 08414563
  • Owner: DEKA Products Limited Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


On-demand loading of media in a multi-media presentation

In accordance with one or more embodiments of the present disclosure, methods and apparatus are provided for efficient and effective loading of media in a multi-media presentation, such that a user may be able to view and/or edit the presentation. In one embodiment, a method for loading media comprises providing a maximum number of layers per page of a collage document, the collage document including at least one page having a plurality of layers, and each layer being associated with a media object. The method further includes loading a first page of the collage document to a client device, and creating a list of layers of the loaded page, with each layer indexed by at least a position in the collage document. The method continues by filtering the list of layers based on at least the position in the collage document and a visual window of a user interface to thereby display visible layers of the loaded page within the visual window. In another embodiment, a method for loading media comprises receiving a request for a collage document, receiving a specification of a maximum number of layers per page of the collage document, and returning a page of the requested collage document.

  • Pub Date: 2008/31/12
  • Number: 08365092
  • Owner: Ebay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain

Methods and systems to assign an application and a video frame buffer to a protected memory domain to render an image of a keyboard from the protected memory domain to a random position of the video frame buffer and correlate user input from a pointing device to the rendered keyboard image. The keyboard image may be randomly repositioned following a user input. The keyboard image may be rendered over a secure user image. An acknowledgment image may be rendered from the protected memory domain to a random position of the video frame buffer, and may be randomly repositioned in response to a user input that does not correlate to the acknowledgment image. User inputs that do not correlate to a randomly positioned image may be counted, and one or more processes may be aborted when the number of non-correlated user inputs exceeds a threshold.

  • Pub Date: 2008/31/12
  • Number: 08364601
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems of controlling activities of financial accounts

Embodiments describe a method and a system to control activities of a financial account. A holder of the financial account may be restricted to transact only with a first set of merchants. The holder of the financial account may be prohibited from transacting with a second set of merchants. The holder of the financial account may further be restricted to transact based on at least one of category or spending limit.

  • Pub Date: 2008/31/12
  • Number: 08249986
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method for production of short chain carboxylic acids and esters from biomass and product of same

A method for producing a mixture of short chain carboxylic acids from biomass includes adding biomass to a reactor vessel, heating the biomass to crack it, removing undesired and unreacted materials and light ends from the cracked biomass, and removing a mixture containing carboxylic acids having carbon chain lengths between C2 and C16. A composition includes a carboxyl group-containing compound derived by cracking biomass and having a carboxyl carbon chain length between C2 and C16.

  • Pub Date: 2008/31/12
  • Number: 08076504
  • Owner: The University of North Dakota
  • Location: Grand Forks, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for arranging an advertising schedule

A method and system for arranging advertising breaks based on channel surfing characteristics of viewers. The surfing characteristics of a plurality of viewers is determined, the surfing characteristics bearing on a likelihood of a respective viewer channel surfing. Advertisements are assigned to time slots among a plurality of channels based on the surfing characteristics of the plurality of viewers to form an advertising schedule. Programming is delivered with the plurality of advertisements according to the advertising schedule. The reduction of simultaneous channel surfing increases availability and efficient use of a shared medium by a plurality of different users.

  • Pub Date: 2008/31/12
  • Number: 08312487
  • Owner: Qurio Holdings, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent security control system for virtualized ecosystems

Resources of a virtualized ecosystem are intelligently secured by defining and analyzing object handling security control information for one or more logical resources in the virtualized ecosystem and deriving therefrom object properties for each of the logical resources involved in the execution of a virtual machine in any given context within the virtualized ecosystem.

  • Pub Date: 2008/31/12
  • Number: 08336079
  • Owner: Hytrust, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Infusion pump assembly

A wearable infusion pump assembly includes a reservoir for receiving an infusible fluid, and an external infusion set configured to deliver the infusible fluid to a user. A fluid delivery system is configured to deliver the infusible fluid from the reservoir to the external infusion set. The fluid delivery system includes a volume sensor assembly, and a pump assembly for extracting a quantity of infusible fluid from the reservoir and providing the quantity of infusible fluid to the volume sensor assembly. The volume sensor assembly is configured to determine the volume of at least a portion of the quantity of fluid. The fluid delivery system further includes a first valve assembly configured to selectively isolate the pump assembly from the reservoir, and a second valve assembly configured to selectively isolate the volume sensor assembly from the external infusion set.

  • Pub Date: 2008/31/12
  • Number: 08496646
  • Owner: DEKA Products Limited Partnership
  • Location: Manchester, US
  • Details: Visit USPTO

Visit USPTO Page


Verification of data categorization

Verification and categorization of data in a system that interfaces with common knowledge repositories having different application programming interfaces. The system inputs a data tree structure with categories of information. The relationships in the data tree are queried against common knowledge repositories. A report of potentially erroneous categorizations in the data tree may be output for further review.

  • Pub Date: 2008/30/12
  • Number: 08346738
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for generating a single software code based on a description of a distributed architecture

The present invention relates to a system, method, and computer program product for generating a single software code based on a description of a distributed architecture. The present invention introduces a BICA-SMART development framework that implements a distributed architecture in a flexible, parallel and scalable implementation that is embodied by a single software code. Thus, using the present invention, a user can input a description of the architecture into the system, with the system automatically generating the software code to implement the architectural description.

  • Pub Date: 2008/30/12
  • Number: 09600767
  • Owner: HRL Laboratories, LLC
  • Location: Malibu, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for generating a single software code based on a description of a distributed architecture

The present invention relates to a system, method, and computer program product for generating a single software code based on a description of a distributed architecture. The present invention introduces a BICA-SMART development framework that implements a distributed architecture in a flexible, parallel and scalable implementation that is embodied by a single software code. Thus, using the present invention, a user can input a description of the architecture into the system, with the system automatically generating the software code to implement the architectural description.

  • Pub Date: 2008/30/12
  • Number: 09600767
  • Owner: HRL Laboratories, LLC
  • Location: Malibu, US
  • Details: Visit USPTO

Visit USPTO Page


Request and response decoupling via pluggable transports in a service oriented pipeline architecture for a request response message exchange pattern

A computer-implemented system and method for decoupling processing of request and response messages supporting different pluggable respective transports in a service-oriented pipeline architecture for a request-response Message Exchange Pattern (MEP) is disclosed. The method in an example embodiment includes receiving a message having coded therein information identifying a desired pluggable transport mechanism respectively for a request and a response; processing the message through a message processing pipeline; dispatching the processed message to a dispatcher; determining if the desired pluggable transport mechanism is available; activating the desired pluggable transport mechanism, if the desired pluggable transport mechanism is available; and transporting the processed message via the desired pluggable transport mechanism.

  • Pub Date: 2008/30/12
  • Number: 08341280
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for cell re-planning to obscure network topologies

Methods and systems for obscuring network topologies are described. Cell re-planning techniques can be used to modify cell identities to obscure a relationship between nodes in a communication system and their geographical location. One or more algorithms can be used to operate on, e.g., cell plan lists, cell neighbor lists and/or cell identities.

  • Pub Date: 2008/30/12
  • Number: 08676217
  • Owner: Telefonaktiebolaget L M Ericsson (Publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for distributed dynamic network provisioning

In one embodiment, a method includes detecting a virtual resource hosted by a host device, selecting a configuration template associated with the virtual resource, and providing a provisioning instruction to a virtual switch module hosted by the host device based on the configuration template. The host device is operatively coupled to a network device. The detecting is at the network device; the selecting is at the network device; and the providing is at the network device. The virtual switch module is in communication with the virtual resource. The configuration template associated with the virtual resource is selected from a library of configuration templates accessible to the network device.

  • Pub Date: 2008/30/12
  • Number: 08565118
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and computer program for identification and sharing of digital images with face signatures

The present invention solves the problem of automatically recognizing multiple known faces in photos or videos on a local computer storage device (on a home computer). It further allows for sophisticated organization and presentation of the photos or videos based on the graphical selection of known faces (by selecting thumbnail images of people). It also solves the problem of sharing or distributing photos or videos in an automated fashion between ‘friends’ who are also using the same software that enables the invention. It further solves the problem of allowing a user of the invention to review the results of the automatic face detection, eye detection, and face recognition methods and to correct any errors resulting from the automated process.

  • Pub Date: 2008/30/12
  • Number: 08750574
  • Owner: Applied Recognition Inc.
  • Location: Burlington, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for touch screen text entry

A method and system are disclosed for implementing touch screen text entry on a screen in a first orientation. A web page is used for presenting a touch screen display, which allows text selection via a virtual keyboard. Selected alphanumeric characters are displayed on the screen in an orientation matching the first orientation of the screen.

  • Pub Date: 2008/30/12
  • Number: 09170735
  • Owner: Thomson Licensings
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining a network topology during network provisioning

In one embodiment, a method includes receiving a provisioning instruction including a device identifier from an external management entity, receiving the device identifier from a network device, associating the provisioning instruction the network device, and sending a portion of the provisioning instruction to the network device. The device identifier being associated with a virtual resource. The associating is based on the device identifier of the virtual resource and a device identifier of a network device. The portion of the provisioning instruction is sent to the network device based on the associating.

  • Pub Date: 2008/30/12
  • Number: 08255496
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Interference detection, characterization and location in a wireless communications or broadcast system

A Wide Area Sensor Network (WASN) is disclosed that utilizes wideband software defined radios (SDRs) to monitor RF energy over a wide frequency range, detect when critical frequencies are being jammed or otherwise interfered with, and locate the source of the interference so that the interference can be eliminated. The WASN may use one or more geolocation techniques In addition, the WASN may detect and locate unauthorized transmitters as well as estimate the transmitted power of authorized transmitters to assure they are not transmitting more power than authorized.

  • Pub Date: 2008/30/12
  • Number: 08138975
  • Owner: TruePosition, Inc.
  • Location: Berwyn, US
  • Details: Visit USPTO

Visit USPTO Page


Inter-carrier management of messaging groups

A system and method to enable the efficient distribution of group messages sent from a mobile device that receives service from one telecommunications carrier, to groups of mobile devices that receive service from one or more other telecommunications carriers. A mobile device user or system operator generates a group distribution list for messages that are to be sent to two or more other users. The group distribution list is provided to a message distribution system that is comprised of distribution agents that are associated with each telecommunications carrier. Each distribution agent is responsible for routing a group message to those mobile devices that receive service from the associated telecommunications carrier.

  • Pub Date: 2008/30/12
  • Number: 08189609
  • Owner: T-Mobile USA, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated micro-sampling wireless receiver

Disclosed are methods and systems for filtering an intermediate frequency (IF) band when digitizing a radio frequency (RF) signal using a higher Nyquist zone several times above the sampling rate. Undersampling may be employed along with an undersampled Nyquist filtering technique to implement an integrated receiver for base station applications such as wireless base station beacon monitoring. Such a receiver may be integrated into a smaller package and consume less power at a reduced cost. In one embodiment, the receiver may operate at a high RF sampled frequency that is microsampled in the 10Nyquist zone at less than 20% undersampling. In another embodiment, the receiver may operate in the 5Nyquist zone at ½ the sampling rate with 40% undersampling. In various embodiments, sampling and processing functions may be implemented using software on a computer or other embedded computing device.

  • Pub Date: 2008/30/12
  • Number: 08340218
  • Owner: TruePosition, Inc.
  • Location: Berwyn, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic point and extend user interface

A computer-implemented method of extending a user interface of an executing application can include placing the user interface in a configure mode that allows functionality of the user interface to be extended and visually distinguishing an element of the user interface that is extendable. Responsive to a user input requesting extension of the functionality of the element, an editing window can be displayed within the user interface. The method can include receiving, within the editing window, computer-usable program code specifying extended functionality for the element and storing the computer-usable program code as part of an extension to the element. The extension can be bound to an extension point exposed for the element of the user interface.

  • Pub Date: 2008/30/12
  • Number: 08219922
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting and reordering fixed-length records to facilitate compression

Disclosed herein are one or more embodiments that facilitate compression of a source file having a fixed-length record therein. One or more of the disclosed embodiments detect the fixed-length records and determine a reordering plan for the source file, including determining a plurality of column groupings within the detected fixed-length records.

  • Pub Date: 2008/30/12
  • Number: 08149147
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Abstraction function for mobile handsets

Handset, computer software and method for protecting sensitive network information, available in the handset, from disclosure to an unauthorized server, by using an abstraction function module, the handset being connected to a network. The method includes receiving at the abstraction function module an encoding key from an abstraction server; receiving at the abstraction function module a request from a client or application for providing the sensitive network information from a control plane module of the handset, wherein the client or application resides in a user plane module, which is different from the control plane module, the sensitive network information is stored in the control plane module of the handset, and both the control plane module and the user plane module reside in the handset; retrieving by the abstraction function module the requested sensitive network information from the control plane module; encrypting, by the abstraction function module, the retrieved sensitive network information based on the received encoding key; and providing the encrypted sensitive network information to the client or application in the user plane module.

  • Pub Date: 2008/30/12
  • Number: 08831223
  • Owner: Telefonaktiebolaget L M Ericsson (Publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Third party, broadcast, multicast and conditional RDMA operations

In a multinode data processing system in which nodes exchange information over a network or through a switch, the mechanism which enables out-of-order data transfer via Remote Direct Memory Access (RDMA) also provides a corresponding ability to carry out broadcast operations, multicast operations, third party operations and conditional RDMA operations. In a broadcast operation a source node transfers data packets in RDMA fashion to a plurality of destination nodes. Multicast operation works similarly except that distribution is selective. In third party operations a single central node in a cluster or network manages the transfer of data in RDMA fashion between other nodes or creates a mechanism for allowing a directed distribution of data between nodes. In conditional operation mode the transfer of data is conditioned upon one or more events occurring in either the source node or in the destination node.

  • Pub Date: 2008/29/12
  • Number: 07953085
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for recovering data from cold images

Techniques for recovering data from cold images are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method for recovering data from cold images comprising searching storage associated with a target recovery device, identifying one or more data structures on the storage, parsing the one or more identified data structures, and recovering one or more portions of the one or more parsed data structures.

  • Pub Date: 2008/29/12
  • Number: 08140906
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and program product for identifying and providing suggestions

A system, method, and program product for identifying and providing suggestions includes registering information of a behavior of a user in an environment within a domain. Behavior processes identify the behavior, identify an item associated with the behavior, identify an identity of the user, and store the identified information. Task processes prepare a suggestion list using the information and a stored configuration. A participant account in the environment requests suggestions to serve to the user where the participant account belongs to a participant belonging to a group of affiliated participants. Suggestion processes identify a request item, identify the identity of the user and attributes associated with the request, aggregate suggestions using the stored configuration and a suggestion list set, and record served suggestions. The participant account receives the served suggestions where the participant account can offer the served suggestions on behalf of an affiliated participant.

  • Pub Date: 2008/29/12
  • Number: 09262765
  • Owner: Smartfocus Holdings Limited
  • Location: , GB
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable medium for development and deployment of self-describing controlled device modules in a control system

A system, method, and computer-readable medium for configuring a controlled device in a control system are provided. A self-describing device Module associated with a controlled device provides capabilities of a controlled device both at runtime and before installation. The controlled device Module includes a capabilities component that, when queried, provides a description of the controlled device's capabilities both as a capabilities object that can be queried at runtime and in a self-describing capabilities file implemented in an XML format prior to operational configuration of the Module or controlled device. The Module is configured to generate its runtime capabilities object and self-describing capabilities file.

  • Pub Date: 2008/29/12
  • Number: 08230113
  • Owner: AMX LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for collecting and using player information

A distributed computer system is provided for collecting player information. Further, a scoring system is provided that rates a player based on one or more elements of the collected information. Players may be rated with respect to a number of characteristics. Responsive to a determined rating or score, action may be taken by the distributed system with regard to the player. For instance, the player may be provided a complimentary offer, provided an award, and invitation to come to a gambling location, presented an advertisement, or other action may be performed involving the player. Further, the distributed computer system may permit a player to manage their frequent player accounts and receive complimentary offers based on a set of criteria specified by the player.

  • Pub Date: 2008/29/12
  • Number: 08585503
  • Owner: Scientific Games Holdings Limited
  • Location: Ballymahon, Co. Longford, IE
  • Details: Visit USPTO

Visit USPTO Page


Self-describing device module and system and computer-readable medium for the production thereof

A system, method, and computer-readable medium for generation of a controlled device Module are provided. Various components are provided to a Module designer for selection, and the designer defines the interface APIs specifying the component functionalities. The designer may specify custom commands or events for the Module including Commands, Properties, and Parameters, and custom components corresponding to the custom commands are generated. A self-describing capabilities component is then generated for each component, and a composite capabilities component may then be generated from the capabilities components of each of the components. The completed Module package is then produced by an integrated development environment station.

  • Pub Date: 2008/29/12
  • Number: 08316343
  • Owner: AMX LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Secured online financial transaction voice chat

Systems, methods, and computer program products are defined that provide for secure online financial transaction voice chat. According to present embodiments, the security provided to the voice chat stream is less likely to be intercepted by a network attacker during communication. In addition to providing heightened security to voice chat transmissions, methods, systems and computer program products provide for an alternate platform for delivering the voice chat application in the form of a game console. In this regard, the methods, systems and the like provide for voice chat/calls on platforms other than personal computers, laptops and/or telephones.

  • Pub Date: 2008/29/12
  • Number: 08156323
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Secured online financial transaction text chat

Systems, methods, and computer program products are defined that provide for secure online financial transaction text chat. According to present embodiments, the security provided to the text chat stream is less likely to be intercepted by a network attacker during communication. In addition to providing heightened security to text chat transmissions, methods, systems and computer program products provide for an alternate platform for delivering the text chat application in the form of a game console. In this regard, the methods, systems and the like provide for text chat on platforms other than personal computers, laptops and/or telephones.

  • Pub Date: 2008/29/12
  • Number: 08156324
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Secure platforms for financial transaction applications

Systems, methods, and computer program products are provided for a secure platform for conducting financial institution transactions. A game console platform is defined that provides for both individual customers and business customers to conduct financial transactions while ensuring higher integrity and confidentiality of the customer's transactions. Additionally, the platform provides for greater user-interface functionality and a heightened user experience.

  • Pub Date: 2008/29/12
  • Number: 08364567
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable, high performance and highly available distributed storage system for internet content

A method for content storage on behalf of participating content providers begins by having a given content provider identify content for storage. The content provider then uploads the content to a given storage site selected from a set of storage sites. Following upload, the content is replicated from the given storage site to at least one other storage site in the set. Upon request from a given entity, a given storage site from which the given entity may retrieve the content is then identified. The content is then downloaded from the identified given storage site to the given entity. In an illustrative embodiment, the given entity is an edge server of a content delivery network (CDN).

  • Pub Date: 2008/29/12
  • Number: 07945655
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Roaming personal information items across multiple computing devices using an IMAP server

Technologies for roaming personal information items across multiple computing devices using an IMAP server are provided. When a change is detected to a personal information item maintained by a PIM program one computing device, the data representing the personal information item is uploaded from the computing device to an IMAP server, where it is stored as a message in a user mailbox designated to hold personal information items. A second computing device then downloads the message storing the data representing the personal information item from the IMAP server and makes it available to a PIM program executing on the second computing device.

  • Pub Date: 2008/29/12
  • Number: 08161107
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Query logging in a multi-database system

Query processing statistics are logged in a multi-database system containing a plurality of system databases. A plurality of query log entries generated using information regarding the execution of a plurality of queries are temporarily stored in a database query log (DBQL). The information is received from a plurality of system databases. Each query log entry is generated using information regarding execution of one query by the plurality of system databases. Each query log entry includes a field identifying a system database that was the source of the information in that entry. An express request is created upon occurrence of a triggering event. The express request contains a subset of the query log entries temporarily stored in the DBQL cache. The created express request is transmitted to a plurality of system databases and the contents of the transmitted express request are stored in each of plurality of system databases to which it was transmitted.

  • Pub Date: 2008/29/12
  • Number: 08311989
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Providing a cellular network with connectivity to a different network

Among other things, a system for use in wireless communication includes a first device communicating via a first protocol in a first network, a cellular device communicating via a second protocol in a cellular network, the second protocol being incompatible with the first protocol, and an access point in the cellular network, the access point being accessible by the cellular device and being configured to enable communication between the first device and the cellular device.

  • Pub Date: 2008/29/12
  • Number: 08953566
  • Owner: Airvana LP
  • Location: Chelmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Method, computer-readable medium, and system for discovery and registration of controlled devices associated with self-describing modules

A system, method, and computer-readable medium for the discovery and registration of controlled devices associated with self-describing Modules in a control system are provided. A controlled device associated with a self-describing module is coupled with a master controller on which the self-describing module is installed. A remote monitoring system is communicatively coupled with the master controller, and a remote monitoring system agent is installed on the master controller. The agent discovers a Module associated with the controlled device and queries the Module for a version thereof. The agent then evaluates whether the Module is self-describing. In the event the Module is self-describing, the agent requests a run-time capabilities object from the Module and registers the controlled device with the remote monitoring system according to the capabilities object.

  • Pub Date: 2008/29/12
  • Number: 08954541
  • Owner: AMX LLC
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for enhancing software documentation and help systems

A method and system for enhancing software documentation and help systems. In one embodiment, a virtual library for a selected combination of tools is created. The virtual library is then linked to the tools in the selected combination of tools. In another embodiment, a combination of tools for designing a complex software system is selected from one or more software releases. The one or more software releases comprises a plurality of available tools. The selected combination of tools comprises less than all of the plurality of available tools. Each of the plurality of available tools is associated with one or more documents. Access to only those one or more documents associated with tools in the selected combination of tools is provided.

  • Pub Date: 2008/29/12
  • Number: 07937418
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for generalized third-party call control in session initiation protocol networks

In one embodiment, the present invention is a method and apparatus for generalized third party call control in session initiation protocol networks. In one embodiment, a method for controlling a media negotiation with one or more endpoints in a network includes determining, for each endpoint, a current state of a corresponding port on a third-party controller and transitioning the corresponding port to a new state in accordance with a finite state machine that tracks the state of the media negotiation.

  • Pub Date: 2008/29/12
  • Number: 08199745
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Metamaterial and dynamically reconfigurable hologram employing same

A negative index material (or metamaterial) crossbar includes a first layer of approximately parallel nanowires and a second layer of approximately parallel nanowires that overlay the nanowires in the first layer. The nanowires in the first layer are approximately perpendicular in orientation to the nanowires in the second layer. Each nanowire of the first layer and each nanowire of the second layer has substantially regularly spaced fingers. The crossbar further includes resonant elements at nanowire intersections between the respective layers. Each resonant element includes two fingers of a nanowire in the first layer and two fingers of a nanowire in the second layer.

  • Pub Date: 2008/29/12
  • Number: 09323217
  • Owner: SAMSUNG ELECTRONICS CO., LTD.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Interface infrastructure for a continuation based runtime

Namespace for continuation-based runtime. Some embodiments described herein are directed to a framework using continuation based runtime namespaces that pertain to an infrastructure for enabling the creation of a wide variety of continuation-based programs that perform a wide-array of tasks. The infrastructure provides a foundation for building continuation-based, declarative applications of various scale and complexity. In some embodiments, the associated application programming interfaces (APIs) are factored into a hierarchy of namespaces in a manner that balances utility, usability, extensibility, and versionability.

  • Pub Date: 2008/29/12
  • Number: 09354847
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Gaming console-specific user authentication

Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the capabilities of platforms other than conventional personal computers and laptops, such as gaming consoles and wireless devices. Unique intrinsic user activities, such as controller motions or activities, built-in hardware signatures or other input data associated with a gaming console are used as the authentication mechanism, so as to provide a higher degree of security in the overall authentication process by lessening the likelihood of password replication or interception during network communication.

  • Pub Date: 2008/29/12
  • Number: 08116453
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Collaboration agent

A collaboration agent for facilitating real-time communications on behalf of a user. The collaboration agent includes a conference bridge that anchors calls to the conference bridge. The collaboration agent uses contextual information associated with the user to manage the real-time communications. The collaboration agent can communicate with other collaboration agents associated with other users.

  • Pub Date: 2008/29/12
  • Number: 08060563
  • Owner: Nortel Networks Limited
  • Location: Mississauga, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Artificial neural network for balancing workload by migrating computing tasks across hosts

Methods and apparatuses for balancing computing workload via migrating computing tasks are disclosed. An artificial neural network (ANN) is trained based on the workload distribution over time for a host. The ANN predicts the workload for the host, and an indication may be sent to migrate at least one computing task away from the host. The indication is sent when the method is operating in a proactive mode and when the predicted workload is outside of a desired operating range. Some embodiments monitor the workload; and automatically switch the method to the proactive mode, when a difference between the monitored workload and the predicted workload is small. Other embodiments monitor the workload; and automatically switch the method to a reactive mode, when the monitored workload is outside of a failsafe operating range for the particular host.

  • Pub Date: 2008/27/12
  • Number: 09384062
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Power distribution, management, and monitoring systems and methods

Managing electrical power usage in a power distribution system. Power usage data indicative of electrical current flow through electrical outlets in the system are collected and displayed for a user. The user may select an outlet and issue a command to control current flow through that outlet. Environmental data may also be collected and displayed. Outlets in different Cabinet Power Distribution Units (CDUs) in different locations may be clustered for reporting and control. A database structure provides a “system” table for data descriptive of the system, a “tower” table for data descriptive of outlets and other elements in the system, an “infeed” table for data descriptive of input electrical power, and an “outlet” table for data descriptive of electrical power flowing through the outlets.

  • Pub Date: 2008/26/12
  • Number: 08494661
  • Owner: Server Technology, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for supporting multiple display devices

A method and a system for supporting multiple display adapters in the WDDM architecture are provided. A driver wrapper serves as the interface between the OS and the display drivers. The driver wrapper hides the display drivers from the knowledge of the OS and provides the standard display driver interface (DDI) to the OS. In the view of the OS, the driver wrapper is the single common driver which receives requests from the OS. The driver wrapper dispatches the requests from the OS to the display drivers and relays responses from the display drivers to the OS. The driver wrapper of the present invention is compatible with multiple distinct display drivers.

  • Pub Date: 2008/26/12
  • Number: 08365199
  • Owner: S3 Graphics Co., Ltd.
  • Location: Grand Cayman, unknown
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for implementing an electronic white board

An electronic whiteboard may be used alone or in a virtual environment. The electronic whiteboard has a palate of tools that enable users to quickly draw shapes on the whiteboard. Rather than using perfectly drawn shapes, however, the palate renders shapes that are not quite perfect—rectangles that are not quite square, lines that are not quite straight—to prevent users from focusing on getting the drawings perfect. This lends an informal feeling to the resulting drawings to allow the drawings to more closely simulate how drawings would appear on a traditional whiteboard. Similarly, text is rendered using a scripted font rather than type font to make words on the whiteboard appear to be hand-written. The electronic whiteboard enables users to add notes and to vote on objects. Automatic vote counting and note management is provided. Use of the whiteboard may be recorded to enable sessions to be replayed and snapshots to be obtained.

  • Pub Date: 2008/26/12
  • Number: 08806354
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Technique to classify data displayed in a user interface based on a user defined classification

Disclosed are methods and systems for classifying data displayed in a user interface based on a user defined classification and generating the user interface to display the data based on the user defined classification. The method includes importing a folder structure from a folder structure container wherein the folder structure depicts a user defined classification of the data. The data displayed in the user interface is mapped to a folder in the folder structure and a user interface object in the user interface is created for the folder. Furthermore, the mapped data is presented in the user interface object.

  • Pub Date: 2008/24/12
  • Number: 09075871
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Remotely monitoring and scheduling a data integration job

A method and system for remotely monitoring and scheduling a data-integration (DI) job. A first application includes an integration module for receiving a request for remote monitoring or scheduling of the DI job in a second application. The integration module transforms the request into one or more customized commands, which are subsequently transmitted to a listener agent. The listener agent invokes a relevant job-control application programming interface (API), associated with the second application, based on one or more parameters associated with the request. The listener agent also enables a DI server to access the second application and fetch information relating to the DI job by employing the job-control API. The listener agent transmits this information to the first application, thus extending the ability of one enterprise application, to remotely monitor and schedule a DI job, to other enterprise applications.

  • Pub Date: 2008/24/12
  • Number: 09286140
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to monitor network layer functionalities

Example methods and apparatus to monitor network layer functionalities are disclosed. A disclosed example method includes receiving a first probe packet at an input of a first server, the first probe packet being received from a router, the first probe packet being generated and transmitted from a second server that is one-hop away from the first server in a network, determining if the first server is a final destination of the first probe packet, and if the first server is not the final destination of the first probe packet, generating a second probe packet and transmitting the second probe packet to the router for transmission toward the final destination.

  • Pub Date: 2008/24/12
  • Number: 07944844
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to distribute network IP traffic

Example methods and apparatus to distribute network IP traffic are disclosed. A disclosed example method includes receiving a first IP control packet at an input of a first server, the first IP control packet being received from a first router, selecting a second router within a router array associated with the first router to send the first IP control packet, the first server selecting the second router by matching a destination IP address of the first IP control packet to a first IP address subspace associated with the second router, transmitting the first IP control packet to the second router, and updating a forwarding table in the first router by associating the destination IP address of the first IP control packet with a first control path from the first router to the second router.

  • Pub Date: 2008/24/12
  • Number: 08331369
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and computer program product for virtualizing a physical storefront

An interactive virtual model of a physical storefront can be presented to a shopper within a user interactive interface of a computing device remotely located from the physical storefront. At least a portion of the organizational structure of the interactive virtual model can be identical a portion of the organizational structure of the physical storefront. The organization structure can varies from storefront-to-storefront of different physical storefronts, each being related to a different interactive virtual model. A change involving at least one physical object within the physical storefront can be sensed. Responsive to sensing the change, a virtual object presented in the interactive virtual model can be changed so that the change to the physical object occurring in the physical storefront is reflected in the interactive virtual model and is shown in the user interactive interface.

  • Pub Date: 2008/24/12
  • Number: 07685023
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Lighting system and control method thereof

The present invention is related to a method, system and apparatus, in particular, a lighting system and method of controlling the lighting system, comprising a computer readable medium and a programmable device capable of controlling and manipulating individually addressable lights to realize a visual display at a pixel level.

  • Pub Date: 2008/24/12
  • Number: 08427274
  • Owner: SAJE Holdings, Inc.
  • Location: Carmel, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing dispute resolution for electronic payment transactions

A computer-based system and method for resolving disputes between a customer and an electronic payment provider concerning an electronic transaction between the customer and a merchant, including receiving data related to the transaction in a computer; transmitting the data from the computer to a dispute resolution server; comparing the transaction data to predetermined eligibility criteria for dispute resolution in the dispute resolution server, and if the dispute resolution criteria is met, declining future transactions from the merchant for the disputing consumer; and, comparing the transaction data to predetermined eligibility criteria for transaction credit, and if the credit criteria is met, and transmitting a credit instruction for the transaction.

  • Pub Date: 2008/23/12
  • Number: 07941352
  • Owner: Verifi, Inc.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for fast approximate focus

Fast approximate focus operations providing an approximately focused image that is sufficiently focused to support certain subsequent inspection operations. The operations are particularly advantageous when used to provide images for successive inspection operations that predominate when inspecting planar workpieces. Improved inspection throughput is provided because, in contrast to conventional autofocus operations, the fast approximate focus operations do not acquire an image stack during a run mode as a basis for determining a best focused image. Rather, during learn mode, a representative feature-specific focus curve and a focus threshold value are determined and used during run mode to provide an approximately focused image that reliably supports certain inspection operations. In one embodiment, an acceptable approximately focused inspection image is provided within a limit of two focus adjustment moves that provide two corresponding images. The adjustment moves are based on the representative feature-specific focus curve provided in learn mode.

  • Pub Date: 2008/23/12
  • Number: 08111938
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Reassembling streaming data across multiple packetized communication channels

Mechanisms are provided for processing streaming data at high sustained data rates. These mechanisms receive a plurality of data elements over a plurality of non-sequential communication channels and write the plurality of data elements directly to the file system of the data processing system in an unassembled manner. The mechanisms further perform a data scrubbing operation to determine if there are any missing data elements that are not present in the plurality of data elements written to the file system and assemble the plurality of data elements into a plurality of data streams associated with the plurality of non-sequential communication channels in response to results of the data scrubbing indicating that there are no missing data elements. In addition, the mechanisms release the assembled plurality of data streams for access via the file system.

  • Pub Date: 2008/23/12
  • Number: 08335238
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Programmatically receiving and storing transaction information in support of a database recovery engine

A system and method for restoring a database are described. The method may comprise requesting to begin receiving notifications of transactions that occur in the database. In response to the request, notifications of a plurality of transactions that occur in the database may be received, and information specifying the plurality of transactions may be stored. The method may further comprise receiving user input requesting to restore the database to a previous state. In response, the stored information may be retrieved, and a graphical user interface indicating the plurality of transactions specified by the stored information may be displayed. The method may further comprise receiving user input to the graphical user interface selecting a particular transaction of the plurality of transactions. In response, the database may be restored to a particular point in time relative to a time at which the particular transaction occurred.

  • Pub Date: 2008/23/12
  • Number: 09256599
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for observing a subject at a first location based upon quantum properties measured at a second location

A preferred embodiment comprises a method and system for (a) detecting objects or targets which may or may not be nonreflective to electromagnetic radiation, and/or (b) generating an image of a subject or area, comprising generating an entangled photon pair beam; splitting the entangled photon pair beam into first and second parts; the first parts being directed in a first direction towards a first location, and the second parts being received into a measuring device; measuring the physical characteristics of the conjugate second parts to determine whether or not the first parts have encountered the presence or absence of an object at the first location in combination with the time that the first part takes to enter the first location. The method and system incorporate a photon beam in a reference path that never directly interacts with the object yet is determinative of presence or absence of an object at the first location. The splitting of the entangled photon pair beam occurs prior to the first parts being absorbed by said object, and the measuring of the characteristics of the conjugates occurs subsequent to the splitting of the entangled photon beam.

  • Pub Date: 2008/23/12
  • Number: 07847234
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for asymmetric independent audio rendering

Methods and mobile devices are provided for asymmetric independent processing of audio streams in a system on a chip (SOC). More specifically, independent audio paths are provided for processors performing audio processing on the SOC and mixing of decoded audio samples from the processors is performed digitally on the SOC by a hardware digital mixer.

  • Pub Date: 2008/23/12
  • Number: 08200479
  • Owner: Texas Instruments Incorporated
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing location-based information

A method and apparatus for providing location-based information to a wireless communication device is disclosed. The wireless communication device receives its geographic position information and provides its geographic position information to a web server while accessing a web service provided by the web server. Based on the geographic position information received from the wireless communication device, the web server provides geographic coordinates of locations relevant to the web service in the form of web geo-cookies. The wireless communication device maintains a database of the received geographic coordinates. When the wireless communication accesses a geographic map of a route or region, the wireless communication device determines if the geographic coordinates in the database lie within boundaries of the accessed map. The geographic coordinates that lie within boundaries of the received map are annotated and displayed on the wireless communication device.

  • Pub Date: 2008/23/12
  • Number: 08391895
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Managing host application privileges

A method and system of controlling access to a hardware or software feature provided by a host is disclosed. An application seeking authorization to access a feature transmits a credential and an index to a host agent within the host. The index is associated with the requested feature. The host agent reads credential validation data from a storage location corresponding to the index in a non-volatile storage device in communication with the host. The validity of the credential is determined based on the credential validation data, and an authorization is transmitted if the credential is valid. A third party can control the outcome of the validity determination by sending an instruction to the host to replace the credential validation data with invalid data that causes the validity test to fail. The third party can also control the non-volatile storage device data used by the application to calculate the credential.

  • Pub Date: 2008/23/12
  • Number: 08590037
  • Owner: SanDisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Layer for accessing user interface elements

A user-activatable dashboard (also referred to as a unified interest layer) contains any number of user interface elements, referred to herein as “widgets,” for quick access by a user. In response to a command from a user, the dashboard is invoked and the widgets are shown on the screen. The user can activate the dashboard at any time, causing the dashboard to temporarily replace the existing user interface display on the user's screen. Once the dashboard has been activated, the user can interact with any or all of the widgets, and can configure the dashboard by adding, deleting, moving, or configuring individual widgets as desired. When the user wishes to return to the normal user interface he or she was working with, the user issues a command causing the dashboard to be dismissed. Once the dashboard has been dismissed, the previous user interface state is restored, allowing the user to resume normal interactions with the operating system.

  • Pub Date: 2008/23/12
  • Number: 08291332
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing apparatus, device information display method, and computer-readable storage medium

An information processing apparatus includes an obtaining unit configured to obtain pieces of identification information sent from devices mutually connected via a network, a determination unit configured to determine, in a case where the pieces of identification information which are obtained by the obtaining unit and sent by using mutually different protocols are identical with each other, that the devices which send the pieces of identification information are identical with each other, and a display unit configured to integrate information related to the devices determined to be identical with each other by the determination unit and display the information on a display apparatus.

  • Pub Date: 2008/23/12
  • Number: 08155019
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Heterogeneous database management system

An administration server in a database management system retrieves log files in a plurality of formats from a plurality of clients through helper programs running on the clients. The plurality of clients can include Web servers, application servers, and database servers. The log files can be generated by software modules on the clients. An administration engine converts log entries in the log files into a unified format for display. The converted log entries can be stored in a log database. Upon a user request, the administration server presents the log entries to the user in a log viewer. The log viewer can display log entries originated from heterogeneous software modules in a unified view.

  • Pub Date: 2008/23/12
  • Number: 08060470
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Framework versioning

Various embodiments are directed to framework versioning for a mobile computing device. The described embodiments may include a web browser, a plurality of application frameworks, one or more applications compatible with one or more of the plurality of application frameworks, and a loader module operative to select and load one of the plurality of application frameworks into the web browser for each of the one or more applications based on an identifier in each of the one or more applications. Other embodiments are described and claimed.

  • Pub Date: 2008/23/12
  • Number: 09032390
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed global object cache

A method is disclosed. The method includes receiving an object at a first image transform within a control unit, the first image transform searching for the object in a local cache, retrieving the object from a second image transform upon a determination that the object been previously received at the control unit and processed at the second image transform; and the first image transform performing a raster image process on the object upon a determination that the object has not been previously received at the control unit.

  • Pub Date: 2008/23/12
  • Number: 08314949
  • Owner: InfoPrint Solutions Company LLC
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Context aware biometric authentication

A biometric sample of the user is received at a biometric interface of a device as part of a biometric authentication request by the user, with the biometric sample characterized by a match score when the biometric sample matches at least one stored template that uniquely identifies the user. The presence of a context usage override condition of the biometric authentication request causes a context usage factor to be updated based upon the context usage override condition. A biometric recognition threshold required for the user to access the application and indicative of a threshold security level required for biometric authentication is calculated based on the context usage factor. The user is permitted to access the application when the match score of the biometric sample is at least equal to the biometric recognition threshold.

  • Pub Date: 2008/23/12
  • Number: 08255698
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Voice and data exchange over a packet based network with DTMF

A signal processing system which discriminates between voice signals and data signals modulated by a voiceband carrier. The signal processing system includes a voice exchange, a data exchange and a call discriminator. The voice exchange is capable of exchanging voice signals between a switched circuit network and a packet based network. The signal processing system also includes a data exchange capable of exchanging data signals modulated by a voiceband carrier on the switched circuit network with unmodulated data signal packets on the packet based network. The data exchange is performed by demodulating data signals from the switched circuit network for transmission on the packet based network, and modulating data signal packets from the packet based network for transmission on the switched circuit network. The call discriminator is used to selectively enable the voice exchange and data exchange.

  • Pub Date: 2008/22/12
  • Number: 07835407
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Telecommunication system with enhanced implementation of service operations

A telecommunication system includes a first node, a second node and a network. The first node is configured with a set of predefined functions and a group of addresses of the telecommunication network such that a session setup request targeted to any address in the group of addresses is routed to the first node, and each address in the group of addresses is associated with at least one of the predefined functions. The second node is configured to send a session setup request to a target address that corresponds to an address in the group of addresses. The first node is configured to determine the function to be performed on the basis of the target address in the session setup request. Information delivery from the second node to the first node is implemented quickly. In the second node the power consumption may be significantly reduced.

  • Pub Date: 2008/22/12
  • Number: 08989364
  • Owner: Navigil Oy
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for reporting a communication flow to a lawful intercept framework

A system, method, and computer program product are provided for reporting a communication flow to a lawful intercept framework. In one embodiment, a plurality of actions associated with at least one communication is monitored for lawful intercept purposes. Additionally, the actions are correlated into a communication flow independent of an address associated with the actions. Furthermore, the communication flow is reported to a lawful intercept framework. In another embodiment, an action associated with a communication flow is identified for lawful intercept purposes. In addition, an action is reported to a lawful intercept framework utilizing a first semantic, and a description of the action is reported to the lawful intercept framework utilizing a second semantic, where the first semantic is different from the second semantic and where in response to a determination that the description is unknown at a time that the action occurs, the reporting of the action for the purposes of lawful intercept is distinct from the reporting of the description of the action for preventing delay in reporting the action as a result of waiting for acquisition of the description of the action. In yet another embodiment, a plurality of information about individual communications sessions or circuits that are portions of a communication flow being monitored for lawful intercept purposes is collected. Further, the portions are correlated into the communication flow. Still yet, the communication flow is reported to a lawful intercept framework.

  • Pub Date: 2008/22/12
  • Number: 08234368
  • Owner: BroadSoft, Inc.
  • Location: Gaithersburg, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for securing data

The present invention provides a method for securing data distributed by a first user to at least one recipient user, comprising the steps of; responding to a request from the first user to encrypt the data with a key; and recording the location of the key in a database, wherein on the database receiving a request from the at least one recipient user for authorization, providing the key to the at least one recipient user upon authorization.

  • Pub Date: 2008/22/12
  • Number: 08806207
  • Owner: Cocoon Data Holdings Limited
  • Location: Sydney, AU
  • Details: Visit USPTO

Visit USPTO Page


System and method for accessing information processor services for a mobile communication device

A system and method for pushing information from a host system to a mobile data communication device upon sensing a triggering event is disclosed. A redirector program operating at the host system enables a user to continuously redirect user-selected data items from the host system to the user's mobile data communication device upon detecting that one or more user-defined triggering events has occurred. The redirector program operates in connection with event generating applications and repackaging systems at the host system to configure and detect particular user-defined events, and then to repackage the user-selected data items in an electronic wrapper prior to pushing the data items to the mobile device. The system includes information processing components for identifying one or more information processors in the vicinity of the mobile device and then routing an attachment or information from the host system, the device or an external information source to a selected information processor.

  • Pub Date: 2008/22/12
  • Number: 08065436
  • Owner: Research In Motion Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


Power distribution monitoring system and method

A power distribution monitoring system includes a number of power line mounted monitors. Each monitor can acquire data regarding the delivery of electrical power in the power line, wirelessly transmit and receive messages, and electromagnetically acquire and store operating electrical power from electrical current flowing in the power line. The system also includes an aggregator that can wirelessly transmit and receive messages and wirelessly output beacon messages. In response to beacon signals wirelessly output by the aggregator, each monitor co-acts with the aggregator to dynamically build a wireless communication network for the wireless communication of the data acquired by the monitor regarding the delivery of electrical power in the power line to the aggregator.

  • Pub Date: 2008/22/12
  • Number: 08065099
  • Owner: Tollgrade Communications, Inc.
  • Location: Cranberry Township, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system

A method for providing, to a first application executed by a first operating system, an interface for communicating with at least one application executed by a second operating system includes providing, by a first interface object executed by the first operating system, a mechanism for external communication with a first application executed by the first operating system. A second interface object executed by the second operating system provides a mechanism for external communication with a window handler executed by the second operating system. The first interface object receives an identification of a window displayed by the first operating system and generated by a second application executed by the second operating system and requests, from the second interface object, analysis of the identified window. The first interface object receives, from the second interface object, an identification of contact information displayed by the window resulting from the analysis by the window handler.

  • Pub Date: 2008/22/12
  • Number: 08938743
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions for articular repair

Disclosed herein are methods and compositions for producing articular repair materials and for repairing an articular surface. In particular, methods for providing articular repair systems. Also provided are articular surface repair systems designed to replace a selected area cartilage, for example, and surgical tools for repairing articular surfaces.

  • Pub Date: 2008/22/12
  • Number: 08343218
  • Owner: ConforMIS, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for video decoding by means of a graphic pipeline, computer program product therefor

A system for decoding a stream of compressed digital video images comprises a graphics accelerator for reading the stream of compressed digital video images, creating, starting from said stream of compressed digital video images, three-dimensional scenes to be rendered, and converting the three-dimensional scenes to be rendered into decoded video images. The graphics accelerator is preferentially configured as pipeline selectively switchable between operation in a graphics context and operation for decoding the stream of video images. The graphics accelerator is controllable during operation for decoding the stream of compressed digital video images via a set of application programming interfaces comprising, in addition to new APIs, also standard APIs for operation of the graphics accelerator in a graphics context.

  • Pub Date: 2008/22/12
  • Number: 08269781
  • Owner: STMicroelectronics S.r.l.
  • Location: Agrate Brianza, IT
  • Details: Visit USPTO

Visit USPTO Page


Method and system for remote visualization client acceleration

A method, system, and program product is disclosed for remote visualization in which a server window contents is displayed remotely at a client. The client creates a 3D rendering surface on a client graphics card to display a server window contents and receives update data from the server relating to the server window contents. The update data is uploaded to the client graphics card and the graphics processing unit (GPU) is used to decode the update data and render the update data to the 3D rendering surface. The graphical processing unit includes general purpose computing on graphics processing unit functionality to provide the decoding processing.

  • Pub Date: 2008/22/12
  • Number: 08253732
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for detecting a relevant utterance in a voice session

A method and apparatus for detecting use of an utterance. A voice session including voice signals generated during a conversation between a first participant and a second participant is monitored by a speech analytics processor. The speech analytics processor detects the use of an utterance. A speech recognition processor channel selected from a pool of speech recognition processor channels and is coupled to the voice session. The speech recognition processor provided speech recognition services to a voice-enabled application. The speech recognition processor channel is then decoupled from the voice session. The speech analytics processor continues to monitor the conversation for subsequent use of the utterance.

  • Pub Date: 2008/22/12
  • Number: 08548812
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Managing threads in displaying data storage system information

A method is used in managing threads in displaying data storage system information. A thread is selected having a first method for executing a background task for interacting with a data storage system and a second method for use in updating a graphical user interface display based on a result of executing the background task. From a thread pool, another thread is selected for executing the background task.

  • Pub Date: 2008/22/12
  • Number: 08234648
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Managing memory in displaying data storage system information

A method is used in managing memory in displaying data storage system information. A graphical user interface (GUI) is provided that includes a GUI component representative of a logical object in a data storage system. In an object pool, a software object is stored corresponding to the GUI component. In the object pool, the software object is made available for garbage collection when the GUI releases a reference to the software object.

  • Pub Date: 2008/22/12
  • Number: 09110790
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Internet protocol (IP) address virtualization for terminal server sessions

Techniques are disclosed for virtualizing internet protocol (IP) addresses in terminal server sessions. A client component comprises a layer service provider (LSP) and a name service provider (NSP) that intercept a socket call to associate a port with a socket for a terminal server session. The client component queries a server component for a virtual IP address, and the server component determines whether the terminal server session can use a virtual IP address. Where the session can use a virtual IP address, the server returns a virtual IP address and the client component binds the socket call to the virtual IP address. Where the session cannot use a virtual IP address, the server returns an indication of that, and the client component acts as a proxy for that socket call and any future calls for that socket.

  • Pub Date: 2008/22/12
  • Number: 09237175
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Generation and retrieval of incident reports

Upon detection of an anomaly, a report is generated that includes a description the anomaly. A description of the anomaly contained in the report is examined to determine a proposed remedy for the anomaly.

  • Pub Date: 2008/22/12
  • Number: 08495083
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Client for an appliance network

A client having at least one memory location is provided for use with an appliance network. The client includes an arbitrary software component for performing a useful function, a software architecture or a software architecture driver configured to generate or enable transmission of messages, and means to communicate by message over a network. Thus, the client can have full capability to act as an accessory to an appliance to communicate with and to enhance or alter the operation of the appliance.

  • Pub Date: 2008/22/12
  • Number: 09264252
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically analyzing and modifying a remote graphical program via a network

A system and method for programmatically analyzing and modifying a graphical program via a network. The graphical program may be stored on a memory medium at a first location. A program may be executed on a computer system at a second location. The computer system at the second location may be coupled via a network to the memory medium at the first location or may be coupled to a computer system or device which includes or has access to the memory medium at the first location. The program on the computer system at the second location may execute to programmatically analyze the graphical program via the network. In one embodiment the program on the computer system at the second location may also execute to programmatically modify the graphical program via the network, based on the programmatic analysis of the graphical program.

  • Pub Date: 2008/22/12
  • Number: 07954097
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Appliance with a graphical user interface for configuring an accessory

An appliance configured to perform a physical cycle of operation on an article includes a controller that controls the cycle of operation, an interface in network communication with the controller and adapted to connect to an accessory configurable to affect the cycle of operation, and a graphical user interface in network communication with the controller and the interface so that an accessory connected to the interface is configurable using the graphical user interface to affect the cycle of operation of the appliance.

  • Pub Date: 2008/22/12
  • Number: 08051381
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Trusted service manager (TSM) architectures and methods

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

  • Pub Date: 2008/19/12
  • Number: 08108318
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing semantically enhanced identity management

Systems and methods are provided to enhance biometric data available to authorities to identify individuals by linking the available biometric data semantically to data from other sources to improve identity management using a semantic computing server that builds a semantic graph based on the data. Using a semantic graph helps determine the identity and possible intention to deceive of certain individuals.

  • Pub Date: 2008/19/12
  • Number: 08041743
  • Owner: Semandex Networks, Inc.
  • Location: Princeton, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for mobile transactions

In accordance with one or more embodiments of the present disclosure, systems and methods for facilitating financial transactions over a network include communicating with a user via a kiosk device and a mobile communication device over the network. In various implementations, the systems and methods include accessing at least one account related to the user, depositing finds into the account based on a cash deposit request received from the user at the kiosk device, and transferring funds from the account to one or more other accounts, related and/or unrelated to the user, based on a fund transfer request received from the user via the mobile communication device.

  • Pub Date: 2008/19/12
  • Number: 08930272
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for intelligent call transcription

Intelligent call transcript systems and methods are disclosed. An intelligent call transcript system can create a transcript of a telephonic communication and supplement the transcript with additional information automatically or upon request. Additional information may be added when key words are detected, such as adding acronym expansion when an acronym is detected or adding identifying information to an important task when mention of the task is detected. Portions of the transcript may also be sent as messages, text-based or audio, upon detection of key words or at the instruction of a user or device.

  • Pub Date: 2008/19/12
  • Number: 08351581
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating a context enhanced work of communication

A system for selecting, managing, sharing and displaying narrative data files in a manner that takes into the account the contextual significance of said narrative data files to a narrative, an author(s) and an audience. A system that is able to place an absolute and relative value upon the significance of a media object is able to assist in stimulating the recollection of the author and audience, thus making every aspect more memorable and enhancing by improving the ease of use and the quality of the final result of the use of the system of this invention.

  • Pub Date: 2008/19/12
  • Number: 08219513
  • Owner: Eastman Kodak Company
  • Location: Rochester, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for allocating online storage to computer users

A system and method of allocating storage space in a computer system is disclosed. In the disclosed system, computer resources are allocated using a quota system that employs quota identifiers. An allocation system creates quota identifiers and each quota identifier is assigned a specific quota value. Computer resources are then assigned to users by assigning quota identifiers to the users. Additional amounts may be allocated to specific users by created extension quota identifiers and associating those quota identifiers with specific users.

  • Pub Date: 2008/19/12
  • Number: 08838796
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Reserving network resources during scheduling of meeting event

In one embodiment, a method comprises receiving a request for scheduling a meeting event between client endpoint devices in an Internet Protocol (IP) based network, the meeting event having a starting time and duration, the meeting event requiring identifiable network resources from the network; determining whether the network will have available network capacity to supply the identifiable network resources during the meeting event; and selectively reserving the identifiable network resources for the meeting event, from the available network capacity, based on determining the network will have the available network capacity during the meeting event.

  • Pub Date: 2008/19/12
  • Number: 08060617
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Providing permission to perform action on an electronic ticket

Described are methods and systems related to providing permission to a user to perform an action on a workflow driven ticket. The ticket is accessed to determine an action type to be performed on the ticket and a correlated object associated therewith. A role based permission tuple is determined based upon a role of the user. A ticket based permission tuple is determined by generating a universal permission tuple based upon the action type and generating a dependency map based upon the correlated object. The dependency map is mapped to the universal permission tuple to construct the ticket based permission tuple. The role based permission tuple is supplemented with the ticket based permission tuple, to provide the required permission to execute the action. Upon an execution of the action, the permission is partially revoked, by removing the ticket based permission tuple.

  • Pub Date: 2008/19/12
  • Number: 08296840
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Platform independent plug-in methods and systems for data mining and analytics

The present invention comprises methods, system, and apparatuses for generating and delivering analytic results for any simple or highly complex problem for which data exists that software or similar automated means can analyze. The present invention thus contemplates methods, systems, apparatuses, software, software processes, computer-readable medium, and/or data structures to enable performance of these and other features. In one embodiment, a method of the present invention comprises extracting and converting data using a data management component into a form usable by a data mining component, performing data mining to develop a model in response to a question or problem posed by a user.

  • Pub Date: 2008/19/12
  • Number: 08417715
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing service and method and apparatus for performing communication

A method and apparatus for providing an interactive service and a method and apparatus for performing communication are provided. An Open Cable Application Platform (OCAP) application may be directly executed in at least one broadcasting receiving apparatus by determining whether an application for providing the interactive service is independently executable using middleware installed in the broadcasting receiving apparatus and selectively requesting a set-top box to provide data needed for executing the application based on the determination result.

  • Pub Date: 2008/19/12
  • Number: 08387101
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for establishing individualized subscription plans in a switched digital video system

A content delivery system headend is provided which includes a Switched Digital Video (SDV) manager for coordinating SDV sessions requested by subscribers over an access network. The headend also includes an input for receiving content to be broadcast during the SDV sessions and a subscriber control unit. The subscriber control unit is configured to compare channel change requests received by the SDV manager from subscribers to a current subscription plan that specifies a pre-established set of channels to which the subscriber has previously subscribed. In this way tuning information for accessing channels specified in the channel change requests is only supplied if the channel change requests request channels included in the current subscription plan.

  • Pub Date: 2008/19/12
  • Number: 08407733
  • Owner: General Instrument Corporation
  • Location: Horsham, US
  • Details: Visit USPTO

Visit USPTO Page


Matching process system and method

A method for profile matching includes receiving a plurality of user profiles, each user profile comprising traits of a respective user. The method includes receiving a preference indication for a first user profile of the plurality of user profiles. The method also includes determining a potential match user profile of the plurality of user profiles based on the preference indication for the first user profile. The method also includes presenting the potential match user profile to a second user.

  • Pub Date: 2008/19/12
  • Number: 08566327
  • Owner: Match.com, L.L.C.
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware description interface for a high-level modeling system

A computer-implemented method of specifying a circuit design within a high-level modeling system (HLMS) can include, responsive to a scripted user input, instantiating a first and a second block objects within a hardware description interface (HDI) that is communicatively linked with the HLMS and, responsive to instantiating the first and second block objects, creating and displaying, within the HLMS, first and second modeling blocks representing the first and second xBlock objects respectively. Responsive to instantiating, within the HDI, a signal object bound to an output port of the first block object and an input port of the second block object, a modeling line can be created and displayed within the HLMS visually linking an output of the first modeling block with an input of the second modeling block. The first modeling block, second modeling block, and modeling line can be stored as a description of the circuit design.

  • Pub Date: 2008/19/12
  • Number: 08079013
  • Owner: Xilinx, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Handling sensors in a context-aware platform with hint signals

The context engine of a context aware platform may comprise a provider manager coupled to context providers and the provider manager may communicate with the context providers using application programming interfaces (API). To optimize the use of system resources, the provider manager may load/unload the context providers based on value of a load field of a hint signal or on prediction values. The context providers is to activate a first set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to activate state in the hint signal. The context providers is to deactivate a second set of sensors of the plurality of sensors if the preferred activity level for the first set of sensors is set to deactivate state in the hint signal.

  • Pub Date: 2008/19/12
  • Number: 08402174
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Fault replay system and method

A fault replay system uploads part or all of a log file from a subject system and replays the events detailed within the log file upon physical copies of devices present in the subject system. The replay of the log file events aid the determination of at which event a fault occurred and improves the accuracy of fault determination.

  • Pub Date: 2008/19/12
  • Number: 09064043
  • Owner: NCR Corporation
  • Location: Duluth, US
  • Details: Visit USPTO

Visit USPTO Page


Direct ultrashort laser system

A direct ultrashort laser system is provided. In another aspect of the present invention, a method of measuring laser pulse phase distortions is performed without requiring an adaptive pulse shaper or interferometry. In yet another aspect of the present invention, a system, a method of operating, a control system, and a set of programmable computer software instructions perform Multiphoton Intrapulse Interference Phase Scan processes, calculations, characterization and/or correction without requiring an adaptive pulse shaper.

  • Pub Date: 2008/19/12
  • Number: 08311069
  • Owner: Board of Trustees of Michigan State University
  • Location: East Lansing, US
  • Details: Visit USPTO

Visit USPTO Page


Direct deployment of static content

A computerized method and a system for direct deploy of static content. Static content is received at a deployment framework of an application server. The content is forwarded to a content deployment extension (CDE) for implementing the deployment of the content on the applications server. The application server operates in online mode during the deployment. The CDE selects an appropriate content handler to handle the deployment of the content. The content is deployed by the content handler on the application server in online mode. The CDE receive a feedback from the deployment of the static content.

  • Pub Date: 2008/19/12
  • Number: 08924947
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Conversion service for data dragged on web-sites

A service performs transformation for material that has been dragged in one format from a web-site and has to be transformed first in order to be dropped onto a different web-page. The transformation makes it possible for the target (drop) page to understand and process the data. A target page need only support one format rather than numerous possible formats used by source pages.

  • Pub Date: 2008/19/12
  • Number: 08504931
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Communication system, application server and communication method for server cooperation

A communication entrepreneur has an application server having message conversion function. The application server performs service function distribution processing with reference to trigger rule and message rule . The communication entrepreneur can provide various service functions without notifying individual server addresses to a service entrepreneur.

  • Pub Date: 2008/19/12
  • Number: 08656001
  • Owner: Hitachi, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Azaindolizines and methods of use

The invention relates to azaindolizines of formula I-a or I-b with anti-cancer and/or anti-inflammatory activity and more specifically to azaindolizines which inhibit MEK kinase activity. The invention provides compositions and methods useful for inhibiting abnormal cell growth or treating a hyperproliferative disorder, or treating an inflammatory disease in a mammal. The invention also relates to methods of using the compounds for in vitro, in situ, and in vivo diagnosis or treatment of mammalian cells, or associated pathological conditions.

  • Pub Date: 2008/19/12
  • Number: 08486963
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Zero downtime mechanism for software upgrade of a distributed computer system

In a distributed computer system with cluster architecture, a number of service requests are redirected from a first instance of the cluster to a second instance of the cluster for execution. A software patch is applied to one or more software components running on an application server node of the first instance of the cluster. A number of service requests are redirected from the second instance of the cluster to the first instance of the cluster for execution. The software patch is applied on the one or more software components running on an application server node of the second instance of the cluster. A number of new service requests are directed to the upgraded second instance of the cluster for processing.

  • Pub Date: 2008/18/12
  • Number: 09229707
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Wireless access point supporting control by multiple applications

A computing device configurable as a wireless network access point that can be controlled from multiple applications. The computing device provides an interface through which applications may input commands to change the state of the access point. The interface responds to these commands and other events, such as association or disassociation of a wireless client, in a manner that does not disrupt the applications or devices using the access point. To determine an appropriate response to any event, the interface may maintain state information, including a count of the number of applications and/or wireless devices that have taken action indicating an operating state of the wireless access point.

  • Pub Date: 2008/18/12
  • Number: 08855087
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Wheeled-vehicle dolly

A dolly is particularly adapted to lift, support and maneuver a four-wheel vehicle. The dolly comprises an adjustable, generally U-shaped frame assembly for each vehicle tire. The frame assembly has pairs of reciprocally opposed first and second frame members adapted to be positioned adjacent opposite sides of a tire and to lift the vehicle by way of the tires. A castering wheel assembly supports the vehicle on a ground surface. The frame assembly is pivotably mounted on a tractor.

  • Pub Date: 2008/18/12
  • Number: 08016303
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for third-party access to a network-based system for providing location-based upcoming event information

A system and methods for third-party access to a network-based system for providing location-based upcoming event information are described. The location-based upcoming event information may be accessed from the network-based system by a server-side web application implemented by a third party. The server-side web application may be configured to communicate with the network-based system that provides online marketplace and ticket fulfillment services and to generate a query based upon the location of a user and other event criteria. The server-side web application may communicate the query to the network-based system and, in response, receive location-based upcoming event information which may be displayed to a user as a list and/or information on a map. The location-based upcoming event information may comprise an aggregate of ticket inventory available from multiple online marketplaces providing the user with multiple purchasing options. Other embodiments are described and claimed.

  • Pub Date: 2008/18/12
  • Number: 08661025
  • Owner: StubHub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Supplementing user web-browsing

An apparatus and method of providing a user with a web-browser supplement is disclosed. One method includes providing access to a focal group, wherein the focal group includes at least one member having at least one association with the user. Access is provided to information associated with the at least one member having relevance to the focal group. Web browsing by the user is supplemented by the information of the members of the focal group.

  • Pub Date: 2008/18/12
  • Number: 08276079
  • Details: Visit USPTO

Visit USPTO Page


Selectively authorizing software functionality after installation of the software

Controlling access to functionality within an installed software product. The invention includes an authorization module that dynamically references authorization information when specific functionality is requested by a requesting entity such as a user or an application program to determine if the requested functionality is authorized to be executed. Further, the invention dynamically provides an opportunity to the requesting entity to purchase unauthorized functionality. In this manner, functionality within the software product may be enabled or disabled at any time (e.g., during installation, post-installation, and re-installation).

  • Pub Date: 2008/18/12
  • Number: 2071870
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Selection of access conditions for portable tokens

The invention relates to a portable token (SC) comprising a capability query mechanism (CQM). The capability query mechanism (CQM) is set to inform entities (PC, MW) willing to communicate with the portable token (SC) of at least a subset of the command(s) (C) available in the portable token (SC). The portable token (SC) is arranged to set a flag when the capability query mechanism (CQM) is invoked. When a command (C) is called, the portable token (SC) enforces first access conditions (AC) for the command (C) if the flag is set, or second access conditions (AC) if the flag is cleared.

  • Pub Date: 2008/18/12
  • Number: 08881255
  • Owner: Gemalto SA
  • Location: Meudon, FR
  • Details: Visit USPTO

Visit USPTO Page


Nanosegregated surfaces as catalysts for fuel cells

A method of preparing a nanosegregated Pt alloy having enhanced catalytic properties. The method includes providing a sample of Pt and one or more of a transition metal in a substantially inert environment, and annealing the sample in such an environment for a period of time and at a temperature profile to form a nanosegregated Pt alloy having a Pt-skin on a surface. The resulting alloy is characterized by a plurality of compositionally oscillatory atomic layers resulting in an advantageous electronic structure with enhanced catalytic properties.

  • Pub Date: 2008/18/12
  • Number: 07871738
  • Owner: UChicago Argonne, LLC
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-user, multi-timed collaborative annotation

A displayed document comprises an annotation widget, the widget associated with an annotation document and a corresponding annotation key in an annotation store. The annotation document associated with a workflow action program. A user with a predetermined privilege selects a widget and is presented with the annotation document. The user performs an annotation task modifying the annotation document and submits the annotation document to the annotation store, the submission triggering the workflow action program to progress the workflow to another step.

  • Pub Date: 2008/18/12
  • Number: 08839092
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for secure content routing

Systems and methods are described which provide handling and secure routing of an article of content in accordance with a code or instruction set identifier embedded in or associated with the article of content. In one aspect, the invention provides a content handling system that comprises a digital data store containing a plurality of instruction sets, each defining a content handling workflow. The system further includes a content handling engine in communication with the store, wherein the content handling engine identifies a code associated with an article of content and executes workflow processing in accordance with an instruction set associated with the code. In various embodiments, an article of content comprises digitally encoded information (e.g., containing one or more of text, image, audio, video, data, and PACS data) and/or information otherwise convertible to digital format (e.g., printed matter, images, film, and audio recordings).

  • Pub Date: 2008/18/12
  • Number: 08726015
  • Owner: Omtool, Ltd.
  • Location: Andover, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for monitoring and analyzing tickets

Exemplary embodiments include methods and systems for monitoring and analyzing tickets including collecting data associated with one or more parameters/keywords of tickets. The methods and systems may also include determining if a number of tickets associated the one or more parameters/keywords exceeds a count threshold associated with the one or more parameters. The methods and systems may further include outputting a result of the analysis of the collected data.

  • Pub Date: 2008/18/12
  • Number: 08706726
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Media streaming in a multi-tier client-server architecture

Systems, methods, and computer program products permit communication between servers in a server system utilizing a proxy stream communicating over a connection between the servers. A first request for content is received, at a server, and a connection is created with at least one upstream server. At the server a name associated with the content at the upstream server is identified. A second request for the content is transmitted to the at least one upstream server, where the second request identifies the name. The content is then received at the downstream server.

  • Pub Date: 2008/18/12
  • Number: 08392530
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Managing transmission protocols for group communications within a wireless communications network

Apparatuses and methods for managing transmission protocols for group communications are disclosed. In an example, an access network receives a forward link packet having a first transmission protocol, the forward link packet associated with a given group communication session. The access network determines whether the first transmission protocol is acceptable. The access network selects a second transmission protocol, if the determining step determines the first transmission protocol is not acceptable. The access network transmits the forward link packet in accordance with the second transmission protocol (e.g., by mapping the packet between transmission protocols at the access network).

  • Pub Date: 2008/18/12
  • Number: 08976722
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Maintenance assistance and control system method and apparatus

There is provided a method and an apparatus for providing assistance and control in respect of maintenance operations that are based on electronic technical documentation prescribing a set of discrete electronic maintenance instructions (“EMIs”). The EMIs are connected to one another according to a predefined hierarchy and predefined order. The apparatus of the present invention includes a navigation controller, a documentation management module and an instruction controller generator.

  • Pub Date: 2008/18/12
  • Number: 08090462
  • Owner: Mobideo Technologies Ltd
  • Location: Rosh Haayin, IL
  • Details: Visit USPTO

Visit USPTO Page


Distributing an application via a network node

A network node comprising an input, a processor and an output, the processor being coupled to the input and the output; the input and output both being connected to at least one network; in which the processor is arranged so as to receive from the input an executable application and an associated set of requirements for the application, in which the processor is arranged to determine, on receipt of an application and the associated set of requirements, a set of destination network nodes which are reachable through at least one network, to which the output is connected based upon the requirements and to send the application to the destination nodes through the output. Thus, an application can be distributed through a telecommunications network specifying only the requirements that a destination network must satisfy, rather than the addresses of the destination network nodes. Furthermore, the application can be transferred between network nodes should user equipment move through the network.

  • Pub Date: 2008/18/12
  • Number: 09531836
  • Owner: TELEFONAKTIEBOLAGET LM ERICSSON (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Determining unambiguous geographic references

A system receives a search query that includes a set of search terms, determines whether at least one of the search terms corresponds to the name of a geographic area, and determines whether the geographic area corresponds to an unambiguous geographic area when at least one of the search terms corresponds to the name of the geographic area. The system performs a local search, based on one or more of the search terms, to identify documents associated with the geographic area when the geographic area corresponds to an unambiguous geographic area.

  • Pub Date: 2008/18/12
  • Number: 08078601
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Data visualization interactivity architecture

A data visualization interactivity architecture may be provided. The architecture may allow the creation of a data visualization, such as a chart, and may expose an interactive feature on the visualization. The architecture may provide integration with multiple rendering platforms. When a user selects the exposed feature, the architecture may translate the selection into a common format and modify the data visualization according to layout rules independent of the rendering platform.

  • Pub Date: 2008/18/12
  • Number: 08176096
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Business application address determination

According to one general aspect, a method may comprise identifying a provider application that is associated with a consumer application, from amongst a plurality of provider applications hosted on a provider machine. In various embodiments, the identification may be based at least in part upon the provider application's business identifier (ID). In various embodiments, each provider application includes at least one web service. In some embodiments, the plurality of provider applications includes a plurality of instantiations of at least one of the web service. In various embodiments, the method may also include transmitting a message to one of the web services of the identified provider application.

  • Pub Date: 2008/18/12
  • Number: 08661103
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Browser-based user interface and control architecture with priority attributes

A browser-enabled device includes a browser-based user interface and control architecture, which has a browser core, a browser framework, and a user interface. The user interface is written using a markup language. In processing event registrations, the browser framework receives an event registration. The received event registration having a response unique resource identifier (URI) content and a priority field. The priority field of the received event registration is examined to determine priority of the received event registration. If the browser core is loading the response URI content of a prior event registration and if the priority of the received event registration is higher than the priority of the prior event registration, then the loading of the response URI content of the prior event registration is halted, and loading of the response URI content of the received event registration is begun.

  • Pub Date: 2008/18/12
  • Number: 08458728
  • Owner: Access Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


8-anilinoimidazopyridines and their use as anti-cancer and/or anti-inflammatory agents

  • Pub Date: 2008/18/12
  • Number: 08293763
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for tracking and guiding high intensity focused ultrasound beams

The present disclosure provides systems and methods for tracking and guiding high intensity focused ultrasound beams (HIFU). More particularly, the disclosed systems and methods involve use of acoustic radiation force impulse (ARFI) imaging to detect the focal position of an HIFU capable transducer relative to a target area. The focal position may then be 5 compared to a desired treatment location and the orientation and focus of the transducer may be adjusted accordingly so as to reconfigure and/or refocus the HIFU beam relative to the desired treatment location. The desired treatment location may be dynamically determined using bleed detection and localization (BD&L) techniques. Thus, the desired treatment location may be determined using 3D Doppler ultrasound based techniques, wherein changes in quantitative 10 parameters extracted from the Doppler spectra, e.g., Resistance Index (RI), are used to detect and localize a bleeding site for treatment.

  • Pub Date: 2008/17/12
  • Number: 09420988
  • Owner: KONINKLIJKE PHILIPS ELECTRONICS N.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for configuring, updating, and booting an alternate operating system on a portable data reader

Systems and methods are provided for updating configuration settings, updating an OS image, and booting an alternate OS on a portable data reader including a reading engine for reading data from an object. Configuration settings of a portable data reader may be updated by detecting whether a storage device having a set of updated configuration settings stored thereon has been coupled to the portable data reader and, if so, updating one or more configuration settings on the portable data reader with one or more of the updated configuration settings from the storage device.

  • Pub Date: 2008/17/12
  • Number: 09298479
  • Owner: Datalogic ADC, Inc.
  • Location: Eugene, US
  • Details: Visit USPTO

Visit USPTO Page


Stateless fibre channel sequence acceleration for fibre channel traffic over Ethernet

A method for offloading Fiber Channel transmit data in an I/O operation. The transmit data includes Fiber Channel sequences, each Fiber Channel sequence includes multiple frames. The method includes generating a single transmit sequence request descriptor for transmitting all of the plurality of frames; creating an Ethernet header, a FCoE encapsulation header, and a Fiber Channel header for each frame in response to information in the transmit sequence request descriptor; creating start of frame and end of frame delimiters; inserting data into each frame; computing Fiber Channel CRC and Ethernet FCS for each frame; and transmitting the plurality of frames over a network. In each of the plurality of frames, the Ethernet header precedes the FCoE encapsulation header, which precedes the Fiber Channel header, which precedes the data. The data is followed by the Fiber Channel CRC, which is followed by the Ethernet FCS.

  • Pub Date: 2008/17/12
  • Number: 08923322
  • Owner: Emulex Corporation
  • Location: Costa Mesa, US
  • Details: Visit USPTO

Visit USPTO Page


Ruggedized memory device

A non-volatile storage device with built-in ruggedized features is disclosed. The device processes a write command to a logical block address by writing the data from the command to a non-volatile memory within the non-volatile storage device and conditionally associating the data received from the command with its corresponding logical block address. Two or more received write commands define a set of commands associated with an atomic transaction. When an end of set command is received, the device unconditionally associates the received data with each write command with its corresponding logical block address. If a power loss interrupts the reception of a set of commands, the non-volatile storage device may recover the last consistent data state before the atomic transaction was started. A write command transaction identifier allows the device to associate the command with a thread of commands that define an atomic transaction in a multithreaded system.

  • Pub Date: 2008/17/12
  • Number: 08266365
  • Owner: SanDisk IL Ltd.
  • Location: Kfar Saba, IL
  • Details: Visit USPTO

Visit USPTO Page


Persistent local storage for processor resources

Local storage may be allocated for each processing resource in a process of a computer system. Each processing resource may be virtualized and may have a one-to-one or a many-to-one correspondence with with physical processors. The contents of each local storage persist across various execution contexts that are executed by a corresponding processing resource. Each local storage may be accessed without synchronization (e.g., locks) by each execution context that is executed on a corresponding processing resource. The local storages provide the ability to segment data and store and access the data without synchronization. The local storages may be used to implement lock-free techniques such as a generalized reduction where a set of values is combined through an associative operator.

  • Pub Date: 2008/17/12
  • Number: 08887162
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Parallel signal processing system and method

A system and method for processing a plurality of channels, for example audio channels, in parallel is provided. For example, a plurality of telephony channels are processed in order to detect and respond to call progress tones. The channels may be processed according to a common transform algorithm. Advantageously, a massively parallel architecture is employed, in which operations on many channels are synchronized, to achieve a high efficiency parallel processing environment. The parallel processor may be situated on a data bus, separate from a main general purpose processor, or integrated with the processor in a common board or integrated device. All, or a portion of a speech processing algorithm may also be performed in a massively parallel manner.

  • Pub Date: 2008/17/12
  • Number: 08515052
  • Details: Visit USPTO

Visit USPTO Page


Network-based application late binding

The claimed subject matter provides late network binding functionality to network or web-based applications or services. An application gateway component exposes generic interfaces for different types of network applications allowing client application developers to utilize generic functionality. Client applications can invoke the generic interfaces, at which point the application gateway component can determine contextual information related to the end user. Using the contextual information, the application gateway component can perform late network binding to a network or web-based application or service by generating and transmitting a request thereto based at least in part on the generic interface invocation and user context. The contextual information can include explicit binding information or data that can be utilized to determine or infer binding preferences.

  • Pub Date: 2008/17/12
  • Number: 07925735
  • Owner: AT&T Intellectual Property I, L
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for searching data

A method and system for searching data is provided. An index of a search engine is accessed. Distribution data is extracted from the index of the search engine. A value index is generated from the distribution data. A search request is received from a client. A query is generated based on the search request and the value index. The query is forwarded to the search engine for execution.

  • Pub Date: 2008/17/12
  • Number: 08321399
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for recursion check and low-level code generation for directed graph

A method and a system for fast recursion check and low-level code generation for directed graph. In a directed graph each vertex is connected to at least one other vertex with a directed edge to form an ordered pair of a source vertex and a target vertex. Low-level codes are assigned to the vertices of the directed graph, where for each ordered pair the low-level code of the target vertex is bigger than the low-level code of the source vertex. A new edge is added to connect a first vertex and a second vertex of the graph, where the first vertex is the source vertex and the second vertex is the target vertex of the new ordered pair. The low-level code of the target vertex of the new ordered pair is not bigger than the low-level code of the source vertex. For the new ordered pair and all ordered pairs that descend from the new ordered pair, the low-level codes of the target nodes are changed to values bigger than the low-level codes of the corresponding source vertices, when necessary.

  • Pub Date: 2008/17/12
  • Number: 08275645
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing wireless communication between user equipments

A method of wireless communication between user equipments includes retrieving user data and a criterion via a software application on a first wireless user equipment having communication interfaces. One of the interfaces is selected based on the criterion. The interface is used to identify wireless user equipments in a proximity of the first user equipment. A total number of user equipments in the proximity of the first user equipment is determined, and, when the number is below a value, another interface is selected. The other interface is used to identify wireless user equipments in the proximity of the first user equipment. A match between the user data of the first user equipment and user data of a second user equipment, causes initiation of wireless communication between the first and the second user equipments by sending to any of the user equipments a message associated with the match.

  • Pub Date: 2008/17/12
  • Number: 08406691
  • Owner: Telefonaktiebolaget L M Ericsson (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for print queue management

A method and system suitable for use with a plurality of multifunction devices (MFDs) for managing one or more print queues associated with the plurality of MFDs, the system including a user interface application for permitting users to electronically communicate with a queue managing service (QMS); wherein the QMS automatically detects, identifies, and analyzes the one or more print queues associated with the plurality of MFDs in order to provide a status of the plurality of MFDs and continuously notify the users of the updates relating to the one or more print queues.

  • Pub Date: 2008/17/12
  • Number: 08477343
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Interface for exchanging context data

A facility for exchanging context attributes is described. A characterization module receives an invocation request to provide an attribute value that was generated by a requesting attribute consumer. The received invocation request identifies the attribute whose value is to be provided. In response to receiving the invocation request, the characterization module provides a value for the identified attribute to the requesting attribute consumer.

  • Pub Date: 2008/17/12
  • Number: 07945859
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Interchangeable preconcentrator connector assembly

An interchangeable preconcentrator assembly comprises an outer housing and an inner housing defining a chamber. A biased urging member is held at least partially within the outer housing and slidably biased toward a surface of the inner housing. When the biased urging member is at least partially retracted, a space is defined between the urging member and the surface of the inner housing for accommodating at least one preconcentrator chip. A continuous fluid flow path is defined through the outer housing and through the space. The interchangeable preconcentrator assembly may further comprise at least one modular preconcentrator carriage.

  • Pub Date: 2008/17/12
  • Number: 08178045
  • Owner: University of Louisville Research Foundation, Inc.
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Accessing a data structure

There is disclosed a method, apparatus, computer program and computer program product for facilitating access by an application to a data structure comprising a plurality of objects. A request is received from the application which initiates the return of the data structure. A handle is assigned to each of at least some of the plurality of objects. Objects in the data structure are retrieved and the application is informed of assigned handles thereby enabling the application to access retrieved objects.

  • Pub Date: 2008/17/12
  • Number: 08086586
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing interaction between a user and an interactive system

A scalable system is provided for managing the interaction of cell phone users and users of other communication devices with public and private digital display systems and other interactive digital devices and systems.

  • Pub Date: 2008/16/12
  • Number: 08897737
  • Owner: Play Megaphone
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Shared memory burst communications

A method and apparatus are provided for sharing multipath-accessible memory between a plurality of processors, the method including connecting the plurality of processors in read/write communication to a same shared memory region; connecting the plurality of processors in read communication to a same semaphore area; selectably connecting one of the plurality of processors in write communication to the same semaphore area; exchanging shared memory access command messages between two processors for negotiating access to the same shared memory region; and storing protected variables indicative of the currently negotiated access to the same shared memory region in the same semaphore area, wherein the shared memory region has a channel relative to each processor, each channel having at least one buffer disposed for transferring a plurality of data packets in a burst mode.

  • Pub Date: 2008/16/12
  • Number: 08230180
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-Si, Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Sentiment classification using out of domain data

Providing sentiment classification of out of domain data are disclosed herein. In some aspects, a source domain having a trained classifier is matched to a target domain having a target classifier. The trained classifier may include identifiers that may be used to predict the sentiment of opinion data for the source domain. The target classifier may use the identifiers of the trained classifier to determine the sentiment of opinion data for the target domain.

  • Pub Date: 2008/16/12
  • Number: 08605996
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of inhibiting proliferation or immunoglobulin production of B cells using human tumor necrosis factor receptor TR-17 polypeptides

The present invention relates to a novel protein, TR17, which is a member of the tumor necrosis factor (TNF) receptor superfamily. In particular, isolated nucleic acid molecules are provided encoding the human TR17. TR17 polypeptides are also provided as anti TR17 antibodies and vectors, host cells and recombinant methods for producing the same. The invention further relates to methods of killing cells using the antibodies of the invention.

  • Pub Date: 2008/16/12
  • Number: 08518389
  • Owner: Human Genome Sciences
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for performing software verification

Described is a method, system, and computer program product that provides control of a hardware/software system, and allows deterministic execution of the software under examination. According to one approach, a virtual machine for testing software is used with a tightly synchronized stimulus for the software being tested. A verification tool external to the virtual machine is used to provide test stimulus to and to collect test information from the virtual machine. Test stimulus from the verification tool that is external to the virtual machine provides the stimulation that incrementally operates and changes the state of the virtual machine. The stimulus is created and coverage is collected from outside the virtual machine by first stopping the virtual machine, depositing stimulus, and then reading coverage directly from the virtual machine memory while the machine is stopped.

  • Pub Date: 2008/16/12
  • Number: 08930912
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a front end graphical user interface for a plurality of text based commands

A method, computer program product, and system are disclosed for generating a graphical user interface (GUI) for a plurality of text based commands, in which environment mapping definitions may link generic GUI components with predefined command structures. The plurality of text based commands may be command-line interface (CLI) commands. The environment mapping definitions may be applied to a command specification defining characteristics of the plurality of text based commands in a standard format in order to build a GUI from generic GUI components. The command specification may be generated by providing an interpretation reference defining CLI conventions and parsing a command description to extract the command specification with reference to the interpretation reference.

  • Pub Date: 2008/16/12
  • Number: 08954869
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Autonomic test case feedback using hardware assistance for code coverage

A method, apparatus, and computer instructions for presenting coverage data for code. The coverage data containing instruction access indicators associated with the code is obtained. Particular instruction access indicators that have been set by a processor in the data processing system in response to execution of the code by the processor are identified to form set instruction access indicators. Each set instruction access indicator is associated with a portion of the code. A presentation for the coverage data is generated. The set instruction access indicators are identified in the presentation. This presentation may be, for example, a graphical presentation.

  • Pub Date: 2008/16/12
  • Number: 07926041
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Algorithm for managing data loss in software demodulators

Embodiments of methods for receiving and processing multi-band signals in wideband and narrowband environments are described herein. Other embodiments may be described and claimed.

  • Pub Date: 2008/16/12
  • Number: 08059687
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


TLS key and CGI session ID pairing

The prevention of impersonation attacks based on hijacked common gateway interface (CGI) session IDs is disclosed. In accordance with one embodiment, a secured communication channel is formed between a server and a client using an initial transport layer security (TLS) key. Additionally, an authenticated CGI session is formed over the secured communication channel based on an initial CGI session identifier (ID). Further, the initial CGI session ID and the initial TLS key are combined into a pair. Next, incoming data that includes an incoming CGI session ID is received via a secured communication channel. An incoming TLS key of the secured communication channel that carries the incoming CGI session ID is then retrieved. Based on the retrieved incoming TLS key, the incoming data is permitted to execute on the server when the incoming TLS key matches the initial TLS key of the pair.

  • Pub Date: 2008/15/12
  • Number: 08275984
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for securely performing reputation based analysis using virtualization

Techniques for securely performing reputation based analysis using virtualization are disclosed. In one particular exemplary embodiment, the techniques may be realized as a computer implemented method for performing reputation based analysis comprising detecting a specified activity associated with a virtual client, determining a reputation associated with the specified activity, and performing an action associated with the determined reputation.

  • Pub Date: 2008/15/12
  • Number: 08484739
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multi-layer network analysis and design

Techniques for providing a method and system for multi-layer network analysis and design are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method, comprising determining, using a computer model of a network, a minimum probability of failure path between a pair of network nodes at a first network layer for one or more pairs of network nodes, calculating, using a processor and stored network data, a value for the minimum probability of failure for the identified minimum probability of failure path between the pair of network nodes at the first network layer for the one or more pairs of network nodes. The method may include identifying a maximum of the determined minimum probability of failure values for the one or more pairs of network nodes for the first network layer. The method may include probability of failure calculations for one or more secondary network layers.

  • Pub Date: 2008/15/12
  • Number: 07839789
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Practical method of COsequestration

A process and device to capture of COat its originating source, such as a power plant, is disclosed. Absorbent material is recharged by desorbing CO, so that it may be sequestered or used in another application. Continual recharging results in loss of absorbent surface area, due to pore plugging and sintering of particles. Calcium oxide or calcium hydroxide was immobilized to a fibrous ceramic-based fabric substrate as a thin film and sintered, creating an absorbent material. The samples were characterized, showing continuous cyclic carbonation conversions between about 62% and 75% under mild calcination conditions at 750° C. and no COin N. Under the more severe calcination condition at 850° C. and 20 wt % COin N, yttria fabric was superior to alumina as a substrate for carbon dioxide capture and the reactivity of the calcium oxide absorbent immobilized to yttria was maintained at the same level in the 12 cycles.

  • Pub Date: 2008/15/12
  • Number: 07896953
  • Owner: University of South Florida
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Microelectromechanical systems ignition safety device

The present disclosure provides a microelectromechanical systems (MEMS) igniter which is an ignition safety device (ISD) in a small, low-cost, low-power, and highly reliable design. The MEMS igniter provides both out-of-line safety and an ignition mechanism for a rocket motor. The igniter is initially held in a safe, out-of-line position with respect to a propellant. Upon receiving appropriate arm and fire commands and sensing the correct environment, MEMS mechanisms move an ignition component into alignment and the device can function.

  • Pub Date: 2008/15/12
  • Number: 07971532
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method for manipulating objects in a SOA registry

A registry object in a service oriented architecture (SOA) is manipulated by an application. A mapping is defined between a registry object type and an application object type. The application object type is instantiated in the application. The instantiated object facilitates manipulation of the registry via the defined mapping.

  • Pub Date: 2008/15/12
  • Number: 09183040
  • Owner: SOFTWARE AG
  • Location: Darmstadt, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing multiple instance subscriber records in unified messaging systems

A method and system for automatically managing changes to organizational data in a unified messaging (UM) platform are disclosed. A database snapshot is retrieved from a client human resources database. Added user information associated with a user is detected in the database snapshot, and an existing mailbox associated with the user in the UM platform is detected. Organizational data in the UM platform is automatically modified to combine the added user information and the existing mailbox in the UM platform. When the existing mailbox is detected in the UM platform for the user, it is possible for the UM platform to automatically compose and send a message to at least one user associated with the added user information including potential modifications of the organization data. The organizational data in the UM platform can then be modified in response to receiving approval of the potential modifications of the organizational data from at least one user associated with the added user information.

  • Pub Date: 2008/15/12
  • Number: 08260745
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing changes in organizational data in unified messaging systems

A method and system for automatically managing changes to organizational data in a unified messaging (UM) platform are disclosed. A database snapshot is retrieved from a client human resources database. The database snapshot includes human resources information organized in an organizational hierarchy. A change is detected in the database snapshot from a previous database snapshot, and organizational data in the UM platform is automatically modified to reflect the detected change in the database snapshot. When the change is detected in the database snapshot, it is possible for the UM platform to automatically compose and send a message to at least one user associated with the change including potential modifications of the organization data. The organizational data in the UM platform can then be modified only in response to receiving approval of the potential modifications of the organizational data from at least one user associated with the change.

  • Pub Date: 2008/15/12
  • Number: 08099390
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for automatically defining organizational data in unified messaging systems

A method and system for automatically defining and provisioning organizational data in a unified messaging (UM) platform are disclosed. An adapter in a unified messaging platform connects to at least one client human resources database. Human resources information that is organized in an organizational hierarchy is retrieved from the human resources database, and hierarchical organizational data is automatically generated in the UM platform based on the organizational hierarchy of the human resources information retrieved from the human resources database. UM mailboxes are provisioned to messaging centers in the UM platform based on the hierarchical organizational data.

  • Pub Date: 2008/15/12
  • Number: 08200716
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for generating a location signal

A frequency generation unit (FGU) in a communication device includes a voltage controlled oscillator (VCO), an adjustable filter having a capacitive element for wideband operation, a current source with variable gain, and chirp generation control circuitry (CGC) that is used to generate location signals. The FGU receives, from a reference device, at least one location signal control parameter that defines linear frequency slope characteristics for a location signal. The CGC configures, based on the at least one location signal control parameter, the gain and a polarity of the current source to generate a first current during a first time period for charging the capacitive element to generate a control signal that is coupled to the VCO to generate a first part of the location signal having the defined linear frequency slope characteristics, wherein the first part of the location signal is transmitted using a transceiver of the communication device.

  • Pub Date: 2008/15/12
  • Number: 08169369
  • Owner: Motorola Solutions, Inc.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for determining location of a communication device

A reference device determines its distance from a communication device by first using a training process to determine a calibrated time delay for the communication device when the communication device is at a known distance from the reference device. The calibrated time delay is a steady state internal processing delay for the communication device. Subsequently, when the reference device is at an unknown distance from the communication device, the reference device determines the unknown distance using the previously determined calibrated time delay along with a measured signal travel time at the unknown distance.

  • Pub Date: 2008/15/12
  • Number: 08131215
  • Owner: Motorola Solutions, Inc.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Click quality classification and delivery

In one embodiment, a method includes receiving a packet flow associated with a click-through from an end user node destined for an advertiser server; extracting information from the packet flow; analyzing the extracted information to determine one or more characteristics of the packet flow; and classifying the packet flow based on the determined one or more characteristics; modifying the packet flow to include classification information to provide classification information indicating a quality level of the click-through. The packet flow may include a hypertext transfer protocol GET request. Modifying the packet flow may include adding a tag with classification information that indicates a likelihood of fraudulent click behavior associated with the packet flow.

  • Pub Date: 2008/15/12
  • Number: 08670334
  • Owner: Cisco Technology, Inc
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine

The present invention is directed to various systems and/or methods relating to a software platform that provides for authentication of a requestor. Preferably, this authentication happens before there is an opportunity for any resource intensive request to harm operation of the system. Preferably, a reliability level is based on authentication so that the amount and/or type of resource access is controlled based, at least in part, on the authentication information. Preferably, heap usage is controlled by this reliability level. Preferably, the software platform is a virtual machine, preferably the Java Virtual Machine.

  • Pub Date: 2008/12/12
  • Number: 08312268
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Use of unsaturated sphingosine compounds as chemotherapeutic agents for the treatment of cancer

The present invention is directed to unsaturated sphingosine compounds which are useful as therapeutic agents for the treatment of cancer and for the treatment of other diseases including diabetes and infection with intracellular bacteria. This invention is also directed to methods of using the compounds and pharmaceutical compositions comprising the compounds in treating these diseases.

  • Pub Date: 2008/12/12
  • Number: 08741967
  • Owner: Research Foundation of the City University of New York
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Traffic allocation

A method may include storing rules associated with processing calls. Each of the rules may include a maximum number of calls per unit of time. The method may also include determining whether the maximum number of calls per unit of time associated with a first one of the rules is greater than a threshold. The method may further include allocating by a first node, when the maximum number of calls per unit of time is greater than the threshold, a number of calls per unit of time to the first node based on the number of calls satisfying the first rule that were received by the first node and a total number of calls satisfying the first rule that were received by all of the nodes.

  • Pub Date: 2008/12/12
  • Number: 08363552
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Saving program execution state

Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.

  • Pub Date: 2008/12/12
  • Number: 08370493
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Rendering source content for display

A method for rendering source content for display in a destination figure is provided. The method may include receiving the source content of the file, replicating the source content in a region surrounding the source content, such that replicated source content is aligned with the source content, extracting an axis-aligned rectangular tile containing the source content from the region, and rendering the axis-aligned rectangular tile onto the destination figure.

  • Pub Date: 2008/12/12
  • Number: 08587610
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Real-time system for verification and monitoring of protective device settings within an electrical power distribution network and automatic correction of deviances found

A system for real-time verification of protective device system configuration settings on a monitored system, is disclosed. The system includes a data acquisition component, a virtual system model database, a protective device system verification engine. The data acquisition component is communicatively connected to a sensor configured to real-time protective device configuration data output from a protective device that is part of the monitored system. The virtual system model database is configured to update a virtual mode of the system based on the status of the protective devices and to store a virtual system model of the monitored system, including preset protective device configuration settings for the protective device. The protective device system verification engine configured to monitor the real-time protective device configuration data and the preset protective device configuration settings and generate a warning when there is a difference between the real-time protective device configuration data and the preset protective device configuration settings.

  • Pub Date: 2008/12/12
  • Number: 08165723
  • Owner: Power Analytics Corporation
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-video synthesis

Embodiments that provide multi-video synthesis are disclosed. In accordance with one embodiment, multi-video synthesis includes breaking a main video into a plurality of main frames and break a supplementary video into a plurality of supplementary frames. The multi-video synthesis also includes assigning one or more supplementary frames into each of a plurality of states of a Hidden Markov Model (HMM), where each of the plurality of states corresponding to one or more main frames. The multi-video synthesis further includes determining optimal frames in the plurality of main frames for insertion of the plurality of supplementary frames based on the plurality of states and visual properties. The optimal frames include optimal insertion positions. The multi-video synthesis additionally includes inserting the plurality of supplementary frames into the optimal insertion positions to form a synthesized video.

  • Pub Date: 2008/12/12
  • Number: 08207989
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multiphase converter apparatus and method

An ac/ac converter for accepting a pulsating dc input with encoded sinusoidal modulation and providing a multiphase modulated output. The converter comprises a bridge including a plurality of switches having switch legs for modulating the pulsating dc input at a carrier frequency over a plurality of phases. The bridge is coupled at one end to a pulsating dc source and coupled at another end to a modulated signal output. A controller is provided for the plurality of switches for causing, for each of the plurality of phases, under unity power factor, one of the switch legs to modulate the pulsating dc input at the carrier frequency while the other switch legs do not modulate the pulsating dc input at the carrier frequency.

  • Pub Date: 2008/12/12
  • Number: 07768800
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for generating a unified virtual snapshot and systems thereof

A method, computer readable medium, and system for generating a unified virtual snapshot in accordance with embodiments of the present invention includes invoking with a file virtualization system a capture of a plurality of physical snapshots. Each of the physical snapshots comprises content at a given point in time in one of the plurality of data storage systems. A unified virtual snapshot is generated with the file virtualization system based on the captured plurality of the physical snapshots.

  • Pub Date: 2008/12/12
  • Number: 08352785
  • Owner: F5 Networks, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to trigger maintenance and upgrades of access networks

Example methods and apparatus to trigger maintenance and upgrades of access networks are disclosed. An example method comprises obtaining a first value representing a number of unassigned ports associated with a first digital subscriber line access multiplexer (DSLAM), obtaining a second value representing a projected number of ports associated with the first DSLAM needed to satisfy at least one of anticipated, projected or pending service requests, and determining whether to automatically submit a preventative maintenance trouble ticket for the first DSLAM based on the first and second values.

  • Pub Date: 2008/12/12
  • Number: 08249222
  • Owner: AT&T Intellectual Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to pre-qualify user communities for communication services

Example methods and apparatus to pre-qualify user communities for communication services are disclosed. An example method comprises configuring a first remote network demarcation associated with a first loop to a loop-back state, interrogating the first loop to determine a first parameter representative of the first loop, configuring a second remote network demarcation associated with a second loop to the loop-back state, interrogating the second loop to determine a second parameter representative of the second loop, and compiling a report based on the first and second parameters, the report containing a value that represents a degree to which a communication service can be provided to a user community associated with the first and second loops.

  • Pub Date: 2008/12/12
  • Number: 08345560
  • Owner: AT&T Intellectual Property I, LP
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Managing use of program execution capacity

Techniques are described for managing execution of programs. In some situations, program execution is managed for multiple users using excess program execution capacity of one or more computing systems. In some such situations, excess or otherwise unused program execution capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess program execution capacity may be terminated at any time if other preferred use for the excess program execution capacity arises. The excess program execution capacity may in some situations be provided in conjunction with other dedicated program execution capacity that is allocated to particular users, such as to use unused dedicated capacity of some users as excess capacity for other users. In some situations, the techniques are used in conjunction with a fee-based program execution service that executes multiple programs on behalf of multiple users of the service.

  • Pub Date: 2008/12/12
  • Number: 08249904
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Management of multimedia content

Disclosed are method and apparatus for managing multimedia content. The uniform resource locators of multimedia content accessed via the Internet are saved in collections stored in the database of a multimedia access system, which is shared by multiple users via individual user accounts. Collections may be copied from one user account to another user account, e-mailed, and posted on a website. Collections in the database may be searched by keywords associated with the collections.

  • Pub Date: 2008/12/12
  • Number: 08356012
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Isolated application server

Dynamically isolating application servers, wherein only active application servers are indicated to client applications to prevent access to inactive application servers by the client applications. A central server of a distributed system determines a state of application servers in a system, and generates a list of application servers that includes all application servers of the system including an indication of the state of the application servers. The central server also generates a filtered list of application servers that excludes inactive application servers or application servers in an inactive mode. The filtered list is passed to client applications, which enables the client applications to only access the active application servers, but not access the inactive application servers.

  • Pub Date: 2008/12/12
  • Number: 08051152
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Electronic profile development, storage, use, and systems therefor

Examples of the present invention include profiling systems that store, manage, and utilize profile information to take predictive or deterministic action. Embodiments of the invention allow the profiling system to be used as a trusted intermediary where the profile owning entity controls access to their profile information across their network of devices and services.

  • Pub Date: 2008/12/12
  • Number: 08255396
  • Owner: Atigeo LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically binding a logic component to a processing point in a software execution flow

A method for use in a communications node includes exposing at least one processing point in an execution flow of base software executing in the communications node. A logic component can be dynamically bound to the exposed processing point, where the logic component specifies actions to be performed by the communications node.

  • Pub Date: 2008/12/12
  • Number: 08813062
  • Owner: Genband US LLC
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Deterministic serialization in a transactional memory system based on thread creation order

A hardware and/or software facility for controlling the order of operations performed by threads of a multithreaded application on a multiprocessing system is provided. The facility may serialize or selectively-serialize execution of the multithreaded application such that, given the same input to the multithreaded application, the multiprocessing system deterministically interleaves operations, thereby producing the same output each time the multithreaded application is executed. The facility divides the execution of the multithreaded application code into two or more quantum specifying a deterministic number of operations, and the facility specifies a deterministic order in which the threads execute the two or more quantum. The facility may operate together with a transactional memory system. When the facility operates together with a transactional memory system, each quantum is encapsulated in a transaction that, may be executed concurrently with other transactions, and is committed according to the specified deterministic order.

  • Pub Date: 2008/12/12
  • Number: 08694997
  • Owner: University of Washington
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Providing payroll software application as enterprise services

Methods and apparatus, including systems and computer program products, for a service architecture design that provides enterprise services having payroll functionality at the level of an enterprise application. The design includes a set of service operations, process components, and optionally deployment units. Suitable business objects are also described.

  • Pub Date: 2008/11/12
  • Number: 08671035
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Optimized backup for a clustered storage system

A system and method for backing up data from a clustered storage system are described herein. The method may operate to automatically determine the configuration of the clustered storage system, e.g., by detecting each storage node in the clustered storage system, detecting the storage volumes hosted by each storage node, and detecting the backup storage devices to which each storage node is connected. The method may operate to backup the plurality of storage volumes by performing a plurality of backup tasks. Performing each respective backup task may comprises selecting a particular storage volume to backup from a particular storage node to a particular backup storage device depending upon the configuration information and information indicating currently active backup tasks in the clustered storage system.

  • Pub Date: 2008/11/12
  • Number: 08244998
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system of externalising / internalising a data record that allow processing of part or all of the record

A method of external data storage in a system including a primary processing device, having a processor and a primary data storage unit, adapted to run application programs for processing active records in the processor and configured to store data belonging to active records in the primary data storage unit; and a secondary data storage system, accessible to the primary processing device, includes loading data belonging to an active record into the primary data storage unit and externalising the record by transferring at least a piece of data belonging to the record to the secondary data storage system for storage. The step of externalising a record includes the making of a call by an application program using data belonging to the record to an interface, arranged to transfer the piece of data to the secondary data storage system.

  • Pub Date: 2008/11/12
  • Number: 07814269
  • Owner: Irdeto Access B.V.
  • Location: Hoofddorp, NL
  • Details: Visit USPTO

Visit USPTO Page


Method and system of enhanced messaging

Methods and apparatus for providing rich media for enhancing user interaction with a messaging program. The rich media includes user perceptible content and content specific information. User perceptible content may include a small animated picture with an embedded sound file that messaging program users can send to each other during a messaging session. Content specific information may include a description of the perceptible content, context menu items including universal resource identifiers that link to information related to the content and information related to other messaging program content. In addition computer code is provided to allow communication between the rich media and the messaging program so that the messaging program and the rich media can interoperate.

  • Pub Date: 2008/11/12
  • Number: 08799758
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for enabling managed code-based application program to access graphics processing unit

One embodiment of the present invention sets forth a method for enabling an intermediate code-based application program to access a target graphics processing unit (GPU) in a parallel processing environment. The method includes the steps of compiling a source code of the intermediate code-based application program to an intermediate code, translating the intermediate code to a PTX instruction code, and translating the PTX instruction code to a machine code executable by the target graphics processing unit before delivering the machine code to the target GPU.

  • Pub Date: 2008/11/12
  • Number: 08570333
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated process for preparing a carboxylic acid from an alkane

The present invention relates to an integrated process for producing unsaturated carboxylic acids from the corresponding C-Calkane. The process begins with performance of thermally integrated dehydrogenation reactions which convert a C-Calkane to its corresponding C-Calkene, and which involve exothermically converting a portion of an alkane to its corresponding alkene by oxidative dehydrogenation in an exothermic reaction zone, in the presence of oxygen and a suitable catalyst, and then feeding the products of the exothermic reaction zone to an endothermic reaction zone wherein at least a portion of the remaining unconverted alkane is endothermically dehydrogenated to form an additional quantity of the same corresponding alkene, in the presence of carbon dioxide and an other suitable catalyst. The alkene products of the thermally integrated dehydrogenation reactions are then provided to a catalytic vapor phase partial oxidation process for conversion of the alkene to the corresponding unsaturated carboxylic acid or nitrile. Unreacted alkene and carbon dioxide are recovered from the oxidation product stream and recycled back to the thermally integrated dehydrogenation reactions.

  • Pub Date: 2008/11/12
  • Number: 08080686
  • Owner: Rohm and Haas Company
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for web services exposing line of business applications

Exposing functionality from a line of business application as a web service. A method includes receiving user input requesting information about objects exposed by a line of business application. Metadata is gathered about a first set of objects exposed by the line of business application. The metadata is returned to the user. User input is received selecting a second set of objects from among the first set of objects to be exposed as a web service. A web service model is constructed that exposes the second set of objects. The web service model includes a service description, metadata map, and configuration information. The web service model is published to allow for web service clients to access the second set of objects by accessing the web service model. The web service can then be used to translate messages between a line of business application and one or more web service clients.

  • Pub Date: 2008/11/12
  • Number: 08145593
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Creating step descriptions for application program interfaces

Among other disclosed subject matter, a computer program product is tangibly embodied in a computer-readable storage medium and includes instructions that when executed by a processor perform a method for interfacing with an application program. The method includes receiving, from an application program that has an interface, an interface description defining how to make an input into the application program using the interface. The method includes generating a screen for a user to define a step corresponding to a task to be performed in the application program by another user, the screen generated using the interface description. The method includes forwarding a step description for receipt by the application program, the step description created using a definition made under guidance of the screen, and configured consistently with the interface for the application program to create the task.

  • Pub Date: 2008/11/12
  • Number: 08370858
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Constraint management and validation for template-based circuit design

A technique for constraint management and validation for template-based device designs is disclosed. The technique includes generating a template-level representation of an electronic device design based on a transistor-level representation of the electronic device design. The template-level representation includes one or more hierarchies of templates. Each template represents a corresponding portion of the electronic device design. The technique further includes determining constraint declarations associated with the electronic device design and verifying whether there is a functional equivalence between the template-level representation to a register-transfer-level (RTL) representation of the electronic device design. The technique additionally includes verifying whether the constraint declarations are valid and verifying the electronic device design responsive to verifying the functional equivalence and verifying the constraint declarations.

  • Pub Date: 2008/11/12
  • Number: 08010920
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Video player

Methods, systems, and tangible computer-readable memory media are disclosed that relate to a video player configured to play a video file. During playback, the video player, in one embodiment, is configured to access metadata relating to, but separate from, the video file to dynamically display graphical content distinct from the video file. A server system may receive, from a client computer system (e.g., of the video owner), information specifying metadata for the video file. This metadata may specify the display of overlay graphics and/or navigation graphics, the overlay of audio, etc. Additionally, the metadata may specify items needed to perform a process depicted in an instructional video; upon playing the video, the video player may provide one or more purchase links for such items. In one embodiment, a server system may edit the underlying video file—e.g., to include overlay graphics.

  • Pub Date: 2008/10/12
  • Number: 08209396
  • Owner: Howcast Media, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Providing location-specific network access to remote services

Techniques are described for providing users with access to computer networks, such as to enable users to create and configure computer networks that are provided by a remote configurable network service for the users' use. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. In addition, access to remote resource services may be configured and provided from such computer networks in various manners, such as to automatically include access control information to limit access to particular resources to computing nodes at the location of that provided computer network.

  • Pub Date: 2008/10/12
  • Number: 09524167
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Providing local secure network access to remote services

Techniques are described for providing users with access to computer networks, such as to enable users to create computer networks that are provided by a remote configurable network service for use by the users. Such provided computer networks may be configured to be private computer networks accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. In addition, access to remote resource services may be configured and provided from such computer networks in various manners, such as to include a local access mechanism as part of a provided computer network that is configured to forward communications sent to the access mechanism to a particular remote resource service.

  • Pub Date: 2008/10/12
  • Number: 09137209
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Providing access to configurable private computer networks

Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.

  • Pub Date: 2008/10/12
  • Number: 08230050
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method for forwarding and storing session packets according to preset and/or dynamic rules

A system and method for recording and/or monitoring data by forwarding it, with or without analyzing or otherwise filtering the data itself are provided. According to embodiments of the invention, the system and method are operative over IP networks. According to an embodiment of the invention, there is provided a system and method for forwarding data according to at least one characteristic of the data, such as the session's metadata for example, without analyzing or otherwise filtering the data itself. According to another embodiment of the invention, before the data is forwarded to the recording device, pre-processing algorithms are performed according to a system preset or according to one or more rules.

  • Pub Date: 2008/10/12
  • Number: 08094587
  • Owner: Nice Systems Ltd.
  • Location: Raanana, IL
  • Details: Visit USPTO

Visit USPTO Page


Limiting data transmission to and/or from a communication device as a data transmission cap is approached and graphical user interface for configuring same

A data transmission cap represents a maximum amount of data that can be transmitted to and/or from a communication device during a subscriber billing cycle without incurring a penalty under a subscriber rate plan. To limit data transmission to and/or from the communication device as the data transmission cap is approached, a graphical user interface (GUI) is displayed. The GUI includes one or more GUI controls for selecting a data transmission limiting tactic from a plurality of distinct data transmission limiting tactics and for specifying a data transmission threshold at which the selected tactic is to take effect, the threshold being below the operative cap. Upon user interaction with the GUI control(s), user input indicating the selected data transmission tactic and specified data transmission threshold is received. The communication device or another electronic device in communication therewith is configured to effect the selected data transmission limiting tactic when the specified data transmission threshold is reached.

  • Pub Date: 2008/10/12
  • Number: 09380167
  • Owner: BlackBerry Limited
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


GUI testing

Controls of a graphical user interface (GUI) in an application under test (AUT) can be tested where the AUT utilizes an accessibility support framework. An accessibility application programming interface (API) can be used to expose controls in the GUI along with their properties. Using an identified control's properties, a set of valid events can be determined for a desired control. Based on the events, parameters for input data for a desired control can be defined, for example, to include data types and data type limitations. Equivalence partitions can be determined for the input data based on the defined parameters, and events can be passed to the accessibility API, along with corresponding input data from the equivalence partitions, to be performed in the desired control of the AUT.

  • Pub Date: 2008/10/12
  • Number: 09141518
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


For and method of providing portfolio risk information to investors without revealing position information

A system for and method of providing investors with risk information regarding a portfolio, while protecting a strategy associated with the portfolio from public disclosure, is presented. The information allows investors to calculate a variety of risk statistics at virtually any level of granularity in analyzing divisions of the portfolio. The system and method also provide benefits for portfolio managers. Specifically, a portfolio manager may release detailed simulated returns, from which investors may calculate a variety of risk statistics, without revealing position information sufficient for the investors to reverse engineer a strategy associated with the portfolio.

  • Pub Date: 2008/10/12
  • Number: 08924274
  • Owner: Riskmetrics Solutions, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Establishing secure remote access to private computer networks

Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer networks that are provided by the configurable network service for use by the users. Secure private access between a computer network provided for a user by the configurable network service and one or more other remote computing systems of the user (e.g., a remote private network) may be enabled in various ways. For example, a user may programmatically invoke an API provided by the configurable network service to obtain assistance in establishing remote access from a remote location to a provided computer network of the configurable network service, such as to establish a VPN connection from the remote location to the provided computer network using hardware and/or software supplied to the remote location in response to the API invocation.

  • Pub Date: 2008/10/12
  • Number: 08201237
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Analysis, inference, and visualization of social networks

A method and system for automated generation of social networks. A graphical user interface receives a user query for an entity of interest, and outputs a graphical network showing entities and associations related to the entity of interest. A search engine interface transmits the query to a search engine, and receives references to documents. A named entity extractor downloads a selection of the documents, and generates a list of named entities referenced in the downloaded documents. A network inference module receives each list of named entities, and generates associations between the named entities in each list. An entity matcher operates on the associations to consolidate them in instances wherein differently named entities are determined to be the same named entity, and provides a consolidated list of named entities and associations to the user interface for display as a graphical network.

  • Pub Date: 2008/10/12
  • Number: 08862622
  • Owner: Sprylogics International Corp.
  • Location: Concord, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


User-mode based remote desktop protocol (RDP) encoding architecture

Techniques are disclosed for a user-mode based remote desktop protocol (RDP) encoding architecture. A user mode desktop application and user mode virtual channel application run in user-mode session space. Virtual channel data from the virtual channel application is marshaled and sent to a RDP encoder process in user-mode system space. There it is converted to RDP protocol data units (PDU) and sent to a remote client across a communications network. Graphics data from the desktop application is sent to a display driver in kernel-mode session space and then to a graphics reflector that marshals the graphics data and sends it to the RDP encoder for a similar transformation.

  • Pub Date: 2008/09/12
  • Number: 08180905
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System for object retransmission without a continuous network connection in a digital media distributor system

The present invention provides a system and computer readable medium for object retransmission in an asynchronous environment without a continuous network connection in a digital media distributor (DMD) system. The system and computer readable medium include receiving objects in a receiver from a central site, generating a response document in the receiver, and sending the response document asynchronously to the central site. The received response documents are then utilized in the central site to determine which object to retransmit to the receiver. In another aspect of the present invention, the central site manages the inventory of objects in the receiver by instructing the receiver to delete objects not needed.

  • Pub Date: 2008/09/12
  • Number: 07818765
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for wiring systems analysis and verification

A method for visually verifying an implementation of a design is described. The method includes integrating logical design data, physical design data, and physical implementation data into a common data format and graphically displaying the commonly formatted data to provide a visualization of the design, the visualization including a spatial context component associated with the physical implementation data.

  • Pub Date: 2008/09/12
  • Number: 08949751
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for document image classification

A method of classifying an input image includes the initial steps of labeling an input image in accordance with a class and extracting at least one connected component from the input image. The method also includes the steps of calculating at least one feature of the input image and generating a model based on the at least one calculated feature. The method also includes the steps of repeating at least one of the previous steps for at least one other input image and comparing the at least one other input image with the model. The at least one other input image is classified in accordance with the class of the model if the at least one calculated feature of the at least one other input image is substantially similar to that of the model.

  • Pub Date: 2008/09/12
  • Number: 08520941
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Handling exceptions in a data parallel system

A method of handling exceptions in a data parallel system includes forwarding exceptions thrown by concurrent worker tasks to a coordination task. The thrown exceptions are aggregated into an aggregation exception structure. It is determined whether the aggregation exception structure will be handled by an exception handler. The concurrent worker tasks are unwound when it is determined that the aggregation exception structure will be handled.

  • Pub Date: 2008/09/12
  • Number: 08365198
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Discarding of vertex points during two-dimensional graphics rendering using three-dimensional graphics hardware

This disclosure describes techniques for removing vertex points during two-dimensional (2D) graphics rendering using three-dimensional (3D) graphics hardware. In accordance with the described techniques one or more vertex points may be removed during 2D graphics rendering using 3D graphics hardware. For example, the techniques may remove redundant vertex points in the display coordinate space by discarding vertex points that have the substantially same positional coordinates in the display coordinate space as a previous vertex point. Alternatively or additionally, the techniques may remove excess vertex points that lie in a straight line. Removing the redundant vertex points or vertex points that lie in a straight line allow for more efficient utilization of the hardware resources of the GPU and increase the speed at which the GPU renders the image for display.

  • Pub Date: 2008/09/12
  • Number: 08269775
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Credential sharing between multiple client applications

Disclosed are techniques for sharing user credentials between multiple client applications when connecting to a set of remote resources. The mechanism enables a single sign-on between a terminal server web access service and the remote applications, remote desktops and corresponding terminal servers accessible through the service. User credentials may be received by one of the client applications and passed to a credential store running as a local software object in association with the user's logon session. Further requests to launch a new remote connection may then pass through the credential store. Upon successful validation of the request, the credential store may attach user credential information to the request and pass the request to the requested client. The requested client may also execute as a software object associated with the current logon session. The client may then use the supplied credential for authentication to the requested resource or application.

  • Pub Date: 2008/09/12
  • Number: 08413210
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Storage management for renderfarm

Systems and methods for storing assets in storage systems external to asset management systems while still allowing the asset management systems to track the stored assets are disclosed. One method begins by first receiving an asset to be stored in an asset management system. Next, a first location on a storage managed by the asset management system is determined. A second location on a storage system external to the asset management system is then determined. The external storage system has been configured to store the asset. The asset is then stored at the second location. A logical link is then determined to the second location. Finally, the logical link is stored at the first location. The disclosed systems and methods allow for an administrator to separate the storage methods used by asset management systems from the asset tracking and logging capabilities of asset management systems.

  • Pub Date: 2008/08/12
  • Number: 08219637
  • Owner: Pixar
  • Location: Emeryville, US
  • Details: Visit USPTO

Visit USPTO Page


Secure framework for invoking server-side APIs using AJAX

Techniques for securely invoking a server-side API from client-side Web application code using AJAX. In one set of embodiments, a request to invoke a server-side API is received from a client-side component of a Web application, where the request is sent asynchronously using AJAX. One or more security handlers are then invoked to process the request in a manner that mitigates various security attacks. In one embodiment, a security handler is invoked to defend against a plurality of different types of Web application/AJAX security attacks. In another embodiment, authentication and authorization security handlers are invoked to authenticate a user of the Web application that originated the request and determine whether the user is authorized to call the server-side API. In yet another embodiment, configuration is implemented at the data storage tier to enforce user-access and data security on data that is retrieved/stored as a result of invoking the server-side API.

  • Pub Date: 2008/08/12
  • Number: 08332654
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Optimization technique using heap sort

A method and a corresponding computer-readable medium are provided for optimizing a decision assignment based on a sought benefit. The optimization operations include mapping agents to actors into pairs, designating a benefit to each pair for a set of nodes, arranging the nodes into heaps (with each heap corresponding to an agent), selecting the node with the sought benefit as the head of the heap for all the heaps, and summing each benefit of the heads to establish a cumulative benefit. The benefit designation further includes associating the node with the benefit, action and agent that correspond to that pair, and disposing the node into the heap that corresponds to the agent. Arranging the heap further includes comparing first and second nodes to determine which has the sought benefit within the heap, and ordering the peak node as the head of the heap. Further operations include deconflicting first and second heaps that have heads with equal benefit, and truncating tail nodes from the head of each heap.

  • Pub Date: 2008/08/12
  • Number: 08095491
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for creating an image using quantum properties of light based upon spatial information from a second light beam which does not illuminate the subject

A preferred embodiment comprises a method and system for generating an image of a subject or area comprising a processor; at least one incoherent light source which illuminates the subject or area; a first receiver for receiving light reflected from the subject or area operatively connected to the processor; a second receiver for receiving light from at least one incoherent light source operatively connected to the processor; the first receiver collecting the amount of light reflected from the subject and transmit a value at specific intervals of time; the second receiver comprising a second detector which detects and transmits spatial information regarding the incoherent light source independent of any data concerning the subject at specific intervals of time; wherein the processor correlates the value transmitted by the first receiver with the spatial information derived from the second receiver at correlating intervals of time to create an image of the subject or area. Alternatively, sound or quantum particles may replace the incoherent light source.

  • Pub Date: 2008/08/12
  • Number: 07812303
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Media content management

System, computer implemented process and computer program product for managing media content among a plurality of devices which includes the exchange of device status data among two or more devices. The exchanged device status data includes individual device capabilities and indicia of available media content stored within each of the devices. Each device determines from the exchanged device status data whether any differences exist in available media content stored among the plurality of devices and also whether any of the determined differences in media content will require transcoding to compatible data formats. Once the determinations have been completed, synchronizing and optionally transcoding of the available media content is performed based on the determinations made from the exchanged device status data. Any required transcoding may be performed either before or after media content synchronizing.

  • Pub Date: 2008/08/12
  • Number: 09361298
  • Owner: APPLE INC.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Generating and supplying user context data

Techniques are described for providing information about a context that is modeled with multiple context attributes. In some situations, at least some of the context attributes have values used by modules for generating values of other context attributes, and the providing includes determining that a first module is generating a first value of a first of the context attributes of the modeled context and determining that a circular reference exists when it is determined that a module is to generate another value of the first context attribute such that the generating of the another value is caused by the generating of the first value of the first context attribute.

  • Pub Date: 2008/08/12
  • Number: 08346724
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Equipment for insertion of objects into smoking articles

Apparatus incorporating a filter tow processing unit adapted to supply filter tow to a continuous rod forming unit includes an object insertion unit that positions objects within the filter tow to manufacture a filter rod containing objects positioned at predetermined intervals. The apparatus also includes an upper hopper that acts as a reservoir for a plurality of objects, and provides for supply of objects to a lower hopper. The lower hopper is shaped so that objects are stacked therein. The bottom of the lower hopper is shaped so as to cooperate with a portion of upper region of a rotating wheel. The peripheral face of the rotating wheel incorporates a plurality of spaced pockets, each pocket being of sufficient shape and size to accommodate one object. Objects within the lower hopper are aligned in a single line along a portion of the peripheral face in the upper region of the rotating wheel. Each object then is positioned at predetermined intervals within a continuous supply of filter material. Then, the filter material is formed into a continuous rod having individual objects positioned at predetermined spaced intervals within that rod. The continuous rod then is subdivided at predetermined intervals so as to form a plurality of filter rods (e.g., four-up filter rods containing four spaced objects).

  • Pub Date: 2008/08/12
  • Number: 08882647
  • Owner: R.J. Reynolds Tobacco Company
  • Location: Winston-Salem, US
  • Details: Visit USPTO

Visit USPTO Page


Communications device with a plurality of processors and compatibility synchronization module for processor upgrades and related method

A multiprocessor device includes a plurality of device subsystems each having a processor dependent on a respective other processor in another device subsystem for device operation. Each processor has at least one independent channel for updating a respective software version within the respective processor. A compatibility synchronization module has a database storing a table of compatible software versions for each processor. It is updated when a new software version for a processor is created. This table is independent of software images for the software versions. The compatibility synchronization module is operative for verifying if the software version for a processor is compatible with other software versions at other processors and instructs a respective device subsystem to revert back to a compatible software version within a respective processor or prevent any incompatible software updates within the processor.

  • Pub Date: 2008/08/12
  • Number: 08561052
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Command remoting

Various techniques for remoting graphics are described in the claims, drawings, and text forming a part of the present disclosure.

  • Pub Date: 2008/08/12
  • Number: 08654134
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Command remoting techniques

Techniques for improved command level remoting are disclosed. In embodiments of the invention, commands to generate vertices are sent in a terminal service session. As commands to draw vertices are generated by a server to be sent to a client to display, they are analyzed by the server. Where some of those vertices have been previously sent to the client, such as to generate a previous bitmap image, the server determines not to send those vertices to the client, and sends the client the new vertices.

  • Pub Date: 2008/08/12
  • Number: 09639963
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Command remoting techniques

Techniques for improved command level remoting are disclosed. In embodiments of the invention, commands to generate vertices are sent in a terminal service session. As commands to draw vertices are generated by a server to be sent to a client to display, they are analyzed by the server. Where some of those vertices have been previously sent to the client, such as to generate a previous bitmap image, the server determines not to send those vertices to the client, and sends the client the new vertices.

  • Pub Date: 2008/08/12
  • Number: 09639963
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Accurate and timely enforcement of system resource allocation rules

A computer-implemented method, apparatus and article of manufacture for optimizing a database query. A query execution plan for the database query is generated using estimated cost information; one or more steps of the query execution plan are executed to retrieve data from a database stored on the computer system. Actual cost information is generated for each of the executed steps, and the estimated cost information is re-calculated using the actual cost information. One or more resource allocation rules defined on one or more steps of the query execution plan are executed, based on the estimated cost information, wherein the resource allocation rules include one or more defined actions. The estimated cost information may be re-calculated using the actual cost information when confidence in the estimated cost information is low, but the estimated cost information may not be re-calculated when confidence in the estimated cost information is high. In addition, the estimated cost information may be re-calculated using the actual cost information, only when the step has one or more resource allocation rules defined thereon.

  • Pub Date: 2008/08/12
  • Number: 08762367
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for orchestration of customization for a user experience

A system and method for orchestration of customization for a user experience is disclosed. The apparatus in an example embodiment includes identifying a plurality of modules included in a webpage; discovering dependencies between each of the modules of the plurality of modules; designating at least one module of the plurality of modules for retaining dependency state information, the dependency state information including information indicative of states of dependencies between modules of the plurality of modules; and executing the modules of the webpage in an order indicated by the dependency state information.

  • Pub Date: 2008/05/12
  • Number: 08904345
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for platform independent fault management

A method for fault management. The method includes generating, in firmware of a computer system, a physical resource inventory (PRI) of a plurality of hardware components of the computer system, wherein the PRI defines a hierarchy of the hardware components. The method further includes traversing, by an enumerator executing in a fault manager, the PRI to generate a topology of the plurality of hardware components. The topology is used for fault management of the computer system.

  • Pub Date: 2008/05/12
  • Number: 07992044
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for geometry-based virtual memory management in a tiled virtual memory

Methods and systems are provided for geometry-based virtual memory management. The methods and systems use Boolean space algebra operations to manage allocation and deallocation of tiled virtual memory pages in a tiled virtual memory provided by a tiled virtual memory subsystem. A region quadtree may be maintained representing a current allocation state of tiled virtual memory pages within a container. The region quadtree may be used to locate a rectangle or two dimensional (2D) array of unallocated tiled virtual memory pages, and physical memory pages may be mapped to tiled virtual memory pages in the rectangle by updating a lookup table used to translate tiled virtual memory page addresses to physical memory page addresses. A union or intersection of region quadtrees may be performed to generate a new region quadtree representing a new current allocation state of the tiled virtual memory pages.

  • Pub Date: 2008/05/12
  • Number: 08245011
  • Owner: Texas Instruments Incorporated
  • Location: Dallas, US
  • Details: Visit USPTO

Visit USPTO Page


Mapping proprietary SSL APIs onto openssl APIs

Techniques are described for mapping an emulated SSL implementation to, for example, OpenSSL. An exemplary method includes receiving a request to initiate a communication session from an application, running in an emulation environment, with a first SSL API of an emulated SSL implementation running in the emulation environment, sending the request to a communication interface process that is running in a base computing environment, wherein the emulation environment is a process running on the base computing environment, extracting, with the communication interface process, communication session information from the request, calling, with the communication interface process, procedures provided by a second SSL API of an SSL implementation, in accordance with the request, to initiate a communication session with a computing device, wherein the SSL implementation is a program running in the base computing environment, initiating the communication session with the computing device, and transferring data to the computing device.

  • Pub Date: 2008/05/12
  • Number: 08042156
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Keystroke sound suppression

An audio signal is received that might include keyboard noise and speech. The audio signal is digitized and transformed from a time domain to a frequency domain. The transformed audio is analyzed to determine whether there is likelihood that keystroke noise is present. If it is determined there is high likelihood that the audio signal contains keystroke noise, a determination is made as to whether a keyboard event occurred around the time of the likely keystroke noise. If it is determined that a keyboard event occurred around the time of the likely keystroke noise, a determination is made as to whether speech is present in the audio signal around the time of the likely keystroke noise. If no speech is present, the keystroke noise is suppressed in the audio signal. If speech is detected in the audio signal or if the keystroke noise abates, the suppression gain is removed from the audio signal.

  • Pub Date: 2008/05/12
  • Number: 08213635
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Electrical system of a motor vehicle with a master security module

The invention relates to an electrical system of a motor vehicle with control apparatuses, which communicate with one another by means of a data bus. To recognize manipulations to the electrical system of a motor vehicle, in particular on the software of the control apparatuses of the electrical system, and to derive suitable measures, it is proposed that a master security module is provided in a first control apparatus and a client security module is provided in each case in a plurality of the further second control apparatuses, and the master security module of the first control apparatus, preferably a central gateway control apparatus, signs a message and sends the signed message to at least one of the second control apparatuses by means of the data bus. The client security module of the second control apparatus checks the signed message received from the master security module as to whether it comes from an authorized master security module.

  • Pub Date: 2008/05/12
  • Number: 08380978
  • Owner: Bayerische Motoren Werke Aktiengesellschaft
  • Location: Munich, DE
  • Details: Visit USPTO

Visit USPTO Page


Dynamic updating of trusted certificates and certificate revocation lists in a computing system

This application generally describes techniques for dynamically updating trusted certificates and CRLs, generally referred to herein as certificate information. That is, techniques are described for updating trusted certificates and CRLs without terminating existing communication sessions. An exemplary method includes the steps of receiving an initial configuration that includes a trusted certificate authority, receiving certificate information that includes a certificate revocation list (CRL) and a first certificate from the trusted certificate authority, storing the certificate information in the configuration, initiating a communication session for an application, receiving an update to the certificate information, and updating the configuration to reflect the update to the certificate information without terminating the communication session. A computing device may receive the update to the certificate information from a user, as well as receiving a command from the user to apply the update to the certificate information to current communication sessions.

  • Pub Date: 2008/05/12
  • Number: 08032742
  • Owner: Unisys Corporation
  • Location: Blue Bell, US
  • Details: Visit USPTO

Visit USPTO Page


Any-to-any system for doing computing

Methods for constructing an Any-to-Any data machine (consisting of Any-to-Any data components and their environmental requirements) and an Any-to-Any code machine (consisting of Any-to-Any code components and their environmental requirements) and relating them together so that they harmoniously interact and so that the data Any-to-Any machine controls and is also acted upon by the code Any-to-Any machine so as to produce an Any-to-Any system that transforms data in a manner that is useful and which is analogous to the harmonious interaction of the Any-Any binary code and Any-to-Any transistor systems, and which handles data and transforms it in a sufficiently similar manner to the manner in which the human handles and transforms data that the human finds it easy and intuitive to operate, all supported by methods that enable data to be stored in a single logical grid structure that can accept and correctly relate, transmit and receive any data, together examples of methods to derive benefits from these inventions.

  • Pub Date: 2008/05/12
  • Number: 08397222
  • Details: Visit USPTO

Visit USPTO Page


Transaction aware, flexible interface for a state correlation and transition execution engine

The subject matter disclosed herein provides methods and apparatus, including computer program products, for state alignment and transaction coupling to enable reliable communication between an application, such as a backend system, and a correlation engine (or rules engine). In one aspect there is provided a method. The method may provide a first interface to receive information from an adapter for an application separate from a state correlation engine and provide a second interface to receive information from the state correlation engine to the adapter. The first and second interfaces may provide state alignment between the application and the state correlation engine. Related systems, apparatus, methods, and/or articles are also described.

  • Pub Date: 2008/04/12
  • Number: 09058572
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for application programming interfaces for shipping services

Systems and methods provide shipping services information. In one implementation, a method is provided in which an e-commerce server receives a request for shipping information from an end-user. The e-commerce server generates an extensible markup language (XML) request based on the requested shipping information and sends the XML request to an application programming interface (API) server. The API server determines, based on the XML request, one of a plurality of API modules stored in the API server to process the XML request and generates an XML response based on data included in the XML request. The API server sends the XML response to the e-commerce server, which sends the XML response to the end-user.

  • Pub Date: 2008/04/12
  • Number: 08676671
  • Owner: United States Postal Service
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for analyzing samples and collecting sample fractions

Methods and apparatus for analyzing a sample using at least one detector are disclosed.

  • Pub Date: 2008/04/12
  • Number: 08115930
  • Owner: Alltech Associates, Inc.
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Method of decoupling the mode of automatic following of the lateral profile and the mode of automatic following of the vertical profile

The present invention relates to a method of decoupling the mode of automatic following of the lateral profile and the mode of automatic following of the vertical profile of an automatic guidance system of an aircraft (A) flying on a reference trajectory (T). The mode of automatic following of the vertical profile is not disengaged immediately on disengaging the mode of automatic following of the lateral profile. After disengaging the mode of automatic following of the lateral profile, the mode of automatic following of the vertical profile is disengaged automatically only if at least one criterion of lateral separation between the current or short-term position of the aircraft and the lateral profile corresponding to the reference trajectory is satisfied, having regard to the position error.

  • Pub Date: 2008/04/12
  • Number: 08838299
  • Owner: Thales
  • Location: Neuilly sur Seine, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for efficient tracing and profiling of memory accesses during program execution

A system and method for performing efficient program instrumentation for memory profiling. A computing system comprises a memory profiler comprising a static binary instrumentation (SBI) tool and a dynamic binary analysis (DBA) tool. The profiler is configured to selectively instrument memory access operations of a software application. Instrumentation may be bypassed completely for an instruction if the instruction satisfies some predetermined conditions. Some sample conditions include the instruction accesses an address within a predetermined read-only area, the instruction accesses an address within a user-specified address range, and/or the instruction is a load instruction accessing a memory location determined from a data flow graph to store an initialized value. An instrumented memory access instruction may have memory checking analysis performed only upon an initial execution of the instruction in response to determining during initial execution that a read data value of the instruction is initialized. Both unnecessary instrumentation and memory checking analysis may be reduced.

  • Pub Date: 2008/04/12
  • Number: 08478948
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent tutoring system

An intelligent tutoring system can be implemented using filters, predictive modeling, and a knowledge warehouse, which allows content to be dynamically selected for individualized presentation to a learner. Such an intelligent tutoring system can be implemented using a variety of techniques, including polynomial vector equations in modeling, extensible markup language storage formats for presentation data, and a knowledge warehouse with information stored in data cubes.

  • Pub Date: 2008/04/12
  • Number: 08356997
  • Owner: Accella Learning, LLC
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Automated business system and method of vending and returning a consumer product

System and method of dispensing disc-based media and other consumer products. A user can interact with an automated business system to select disc-based media for rental and/or purchase. The automated business system can retrieve the selection from the interior of the automated business system and dispense the selection through a port to the user. The automated business system can retrieve the selection from the port in a return process.

  • Pub Date: 2008/04/12
  • Number: 08086349
  • Owner: NCR Corporation
  • Location: Duluth, US
  • Details: Visit USPTO

Visit USPTO Page


Video service blackout events

A method is disclosed that includes receiving a command to blackout a full screen version of content at a component of a multimedia content distribution system. The method includes updating a first entry within a control matrix to reflect that the full screen version of the content is to be blacked out. The method also includes automatically updating a second entry within the control matrix to reflect that a picture-in-picture (PIP) version of the content is to be blacked out.

  • Pub Date: 2008/03/12
  • Number: 08104056
  • Owner: AT&T Intellectual Property, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing rights of data via dynamic taint analysis

A method for managing rights associated with data is described. A request to access encrypted data is intercepted. Credentials associated with the request are verified. The data is decrypted if the credentials are verified. The decrypted data is marked with an identifier. Predetermined operations directed to the decrypted data are monitored.

  • Pub Date: 2008/03/12
  • Number: 08260711
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for gyrotron power regulation

A system to regulate gyrotron power is configured to raise the filament voltage of a gyrotron to a standby voltage, then set the filament voltage to the normal standby voltage plus a current offset voltage before pulsing the gyrotron. The system is further configured to increase the filament voltage to a boost voltage that is higher than the standby voltage, thereby inducing a temperature increase in the cathode that offsets the cooling effect of radiating. The system is also configured to analyze a beam power of the gyrotron and adjust the filament voltage to bring a beam current within a range, and reduce the filament offset to zero such that the filament voltage is equal to the standby voltage.

  • Pub Date: 2008/03/12
  • Number: 08450951
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for emulating different user agents on a server

A system and method for emulating a multitude of different user agents on a server-side is disclosed herein. On a server-side, an acceptable user agent string for receiving full content from the web-site with a browser sniffing agent is identified. The acceptable user agent is emulated by transmitting a HTTP request with the acceptable user agent string, allowing for access to the full content of the web-page of the web-site.

  • Pub Date: 2008/03/12
  • Number: 08285813
  • Owner: Appcelerator, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Providing user-spot (U-Spot) services in a communication system

A mobile communication device may be utilized to establish a localized user network that is accessible by client devices when the client devices are communicatively coupled to the mobile communication device. The mobile communication device is then operable to determine services that may be provided in the user network to the client devices, and to advertise these services within the user network. The services comprise network and/or data accessibility, and bandwidth availability. Mobile communication devices are also operable to provide, directly or via local and/or remote resources, additional services, comprising audio/video processing capability, storage, and/or processing. Offering of services in user networks is incentivized to the mobile communication devices and/or to client devices. Incentives comprise offering pay and/or credit to the mobile communication devices. Providing access to, blocking, limiting and/or modifying available/offered services is managed in U-Spot networks, based on incentives and/or availability of resources.

  • Pub Date: 2008/03/12
  • Number: 08537793
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Providing private access point services in a communication system

A private access point may be utilized to establish a local network that is accessible by client devices when the client devices are communicatively coupled to the private access point. The private access point is then operable to determine services that may be provided in its local network to the client devices, and to advertise these services within its local network. The services comprise network and/or data accessibility, and bandwidth availability. Private access points are also operable to utilize local and/or remote resources to provide additional services, comprising audio/video processing capability, storage, and/or processing. Offering of services in private access point networks is incentivized to the private access points and/or to client devices. Incentives comprise offering pay and/or credit to the private access points. Providing access to, blocking, limiting and/or modifying available/offered services is managed in private access point networks, based on incentives and/or availability of resources.

  • Pub Date: 2008/03/12
  • Number: 08797943
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Digital video camera with retractable data connector and resident software application

A digital video camera may include a digital video image sensor for capturing digital video footage to be stored on an internal memory. The digital video image sensor and internal memory may be housed in a camera body. A retractable arm having a data connector may be attached to the camera body. The arm can be extended from and retracted into the camera body, while the data connector can be used to transfer digital video footage to an external device, such as a computer. The data connector may conform to a standard for connecting peripheral devices, such as the Universal Serial Bus (USB) standard or the Institute of Electrical and Electronics Engineers 1394 (IEEE 1394) standard.

  • Pub Date: 2008/03/12
  • Number: 08325239
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for selling project-based services application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing the selling of project-based services are disclosed. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service operations, each being implemented for a respective process component. The process components include a Project Processing process component that supports the management of projects, a Supplier Invoice Processing process component that manages supplier invoices, an Accounting process component that records relevant business transactions, a Customer Invoice Processing process component that manages customer invoices, and a Goods and Service Acknowledgement process component that receives a confirmation from an employee of goods received or services rendered.

  • Pub Date: 2008/03/12
  • Number: 08321306
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Active clearance control for a centrifugal compressor

Apparatus and method of operating a centrifugal compressor and active control system includes a centrifugal compressor with compressor blades mounted on an impeller, an annular cavity bounded in part by a shroud adjacent to the blades, and an active control system for controlling a clearance between the shroud and the blades by controlling a cavity pressure in the cavity. An electronic controller for controlling a control pressure valve for pressurizing using a source of compressor discharge pressure air and depressurizing the cavity respectively may open and close the valves using pulse width modulation. Pressure and clearance sensors positioned for measuring the cavity pressure the blade tip clearance respectively in signal supply communication with the electronic controller may be used. The shroud may be supported by radially spaced apart annular radially outer and inner supports connected to a casing by a bolted joint bounding the cavity.

  • Pub Date: 2008/03/12
  • Number: 08087880
  • Owner: General Electric Company
  • Location: Schenectady, US
  • Details: Visit USPTO

Visit USPTO Page


Method for loading credentials into a mobile communication device such as a mobile phone

The invention relates to a personal token () for being associated with a mobile telecommunication device () and for storing credentials for access to an operator's network, characterized that the personal token () is arranged for loading the credentials into a memory () of the mobile telecommunication device (), so that the mobile telecommunication device () is taken away from the personal token () and operative for connecting to the operator's network with the credentials in its memory ().

  • Pub Date: 2008/02/12
  • Number: 08483661
  • Owner: Gemalto SA
  • Location: Meudon, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for saving money with a group of mobile devices

A plurality of users have a savings goal, and a plurality of mobile devices each belong to a user. An electronic message from a user's mobile device is received. The electronic message comprises a description of a service or product not purchased and the amount of money not spent because it was not purchased. The description and amount are stored and a running total of the amount of money not spent is computed. A second electronic message is transmitted to all of the plurality of mobile devices except the first mobile device. The second electronic message comprises the description, amount, and an identifier of the user of the first mobile. Receiving, storing, computing, and transmitting are repeated until the savings goal is reached. A system includes the plurality of mobile devices, at least one communication network, and a computer in communication with the communication network. The system may also include a bank.

  • Pub Date: 2008/02/12
  • Number: 08090656
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for influencing the selection of peer data sources in a P2P network

Disclosed is a method of selecting a data source node from a plurality of data source nodes, the selected data source node being used to send data to a data requesting node over a packet data network. The method includes, at an intermediate node of the network, intercepting at least one message sent to or from the data requesting node, the message(s) relating to data source node suitability, determining a cost of communication between the data requesting node and each of the data source nodes to which the message(s) relate, and influencing data source node suitability information sent to the data requesting node to take account of the cost to enable the data requesting node to use the information to select a data source node.

  • Pub Date: 2008/02/12
  • Number: 09130960
  • Owner: Telefonaktiebolaget L M Ericsson (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Medicinal implant cartridge

The invention includes a cartridge for use in a device for inserting a medicament within a body cavity of a mammal, the cartridge including a housing, a retractable chamber disposed within the housing and having a lumen having a uniform cross-section sized to contain the medicament therein, a substantially stationary member disposed within the lumen of the retractable chamber and having a uniform cross-section sized to provide a sliding fit within the lumen suitable to provide for retraction of the retractable chamber about the substantially stationary member upon actuation of the device; and means for retracting the retractable chamber about the substantially stationary member while maintaining the substantially stationary member in a substantially stationary position upon actuation of the device.

  • Pub Date: 2008/02/12
  • Number: 07976490
  • Owner: Orapharma, Inc.
  • Location: Warminster, US
  • Details: Visit USPTO

Visit USPTO Page


Late frame recovery method

Method of processing a transmitted encoded media data stream is received. If a data element arrives prior to, or at, a predetermined playout deadline, the data element is decoded, the media represented by the decoded data element is played, and the data element is provided to a decoder state machine to update a decoder state. If a data element arrives after the predetermined playout deadline, the data element is provided to the decoder state machine to update the decoder state. In one embodiment, if the specified data element fails to arrive by the playout deadline, a subsequently received data element is saved in memory. Then, if the specified data element arrives after the predetermined playout deadline, the specified data element and the saved, subsequently received, data element are provided to the decoder state machine to update the decoder state.

  • Pub Date: 2008/02/12
  • Number: 08174981
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Information handling systems including network adapters and methods of booting the information handling systems using boot configuration information from remote sources

A system can be operable to receive boot configuration information from a remote source independent of the type of initiator (e.g., software or hardware) used by an information handling system. The information handling system having the initiator can be coupled to the remote source, which includes the boot configuration information, and a storage array that includes a boot image. While operating within a pre-operating system (pre-OS) environment, the information handling system can create a boot configuration table and populate the boot configuration table with the boot configuration information. The boot configuration information can include an address for the boot image and information for configuring an OS initiator to be used when loading the OS.

  • Pub Date: 2008/02/12
  • Number: 08380971
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Device for delivering medicinal implants

The invention includes a device for inserting a medicament within a body cavity of a mammal, the device including a cartridge for containing the medicament therein, the cartridge including a housing, a retractable chamber disposed within the housing and having a lumen, a substantially stationary member disposed within the lumen of the retractable chamber and having a uniform cross-section sized to provide a sliding fit within the lumen to provide for retraction of the retractable chamber about the substantially stationary member upon actuation of the device, and means for retracting the retractable chamber about the substantially stationary member while maintaining the substantially stationary member in a substantially stationary position upon actuation of the device; the device further including means for activating the means for retracting the retractable chamber.

  • Pub Date: 2008/02/12
  • Number: 07976489
  • Owner: OraPharma, Inc.
  • Location: Warminster, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive web mining of bilingual lexicon

Embodiments for the adaptive mining of bilingual lexicon are disclosed. In accordance with one embodiment, the adaptive mining of bilingual lexicon includes retrieving one or more bilingual web pages, wherein each of the bilingual web page including a search term and one or more additional terms. The adaptive mining also includes forming a plurality of candidate translation pairs for each of the terms and extracting one or more translation layout patterns from the plurality of candidate translation pairs. The adaptive mining further includes deriving a term translation in a second language for the search term. The term translation being derived based on a hidden conditional random field (HCRF) model that includes the one or more candidate translations, the one or more translation layout patterns, and one or more additional features. The term translation is further stored in a lexicon repository.

  • Pub Date: 2008/02/12
  • Number: 08306806
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Actuators for device for delivering medicinal implants

The invention includes an actuator for actuating a device for inserting a medicament within a body cavity of a mammal, the actuator including a handle case having a proximal portion for gripping and a distal portion including means for attaching the actuator to a cartridge for containing medicament, and means for creating a proximal to distal linear motion with respect to the handle case, wherein the cartridge includes a retractable chamber for containing the medicament disposed therein, a substantially stationary member and means for retracting the retractable chamber about the substantially stationary member while maintaining the substantially stationary member in a substantially stationary position.

  • Pub Date: 2008/02/12
  • Number: 07976491
  • Owner: OraPharma, Inc.
  • Location: Warminster, US
  • Details: Visit USPTO

Visit USPTO Page


Write circuit for providing distinctive write currents to a chalcogenide memory cell

A write circuit for providing distinctive write currents to a chalcogenide memory cell is disclosed. The write circuit includes a current amplitude trim module, a current amplification and distribution module, and a write current shaping module. The current amplitude trim module provides a well-compensated current across a predetermined range of temperatures, voltage supplies and process corners intended for programming a chalcogenide memory cell. The current amplification and distribution module amplifies the well-compensated current in order to meet a programming requirement of the chalcogenide memory cell. The write current shaping module supplies an appropriate amount of write “0” current or write “1” current, based on the amplified current, to program the chalcogenide memory cell accordingly.

  • Pub Date: 2008/01/12
  • Number: 08027191
  • Owner: Ovonyx, Inc.
  • Location: Rochester Hills, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for variable distribution and access control for purchased event tickets

A system and methods for providing variable distribution and access control for purchased event tickets are described. In one embodiment, a network-based system receives an order for electronic tickets purchased by a buyer, receives one or more recipients other than the buyer for one or more of the electronic tickets, receives delivery options for the recipients from the buyer, receives delivery information for the recipients from the buyer, and delivers electronic ticket information to the recipients. Other embodiments are described and claimed.

  • Pub Date: 2008/01/12
  • Number: 08870089
  • Owner: Stubhub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for generating configurations used for accessing electronic mailboxes

A system and method generates configurations used for accessing electronic mailboxes. A database stores the configuration conventions that are sets of e-mail expressions formed by symbols. A transformer module expands configuration conventions stored in the database to generate configurations based on user supplied context data.

  • Pub Date: 2008/01/12
  • Number: 08838702
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for distribution, redemption and processing of electronic coupons

In a method of executing a transaction using an electronic coupon, coupon campaign information is provided to an engine. The coupon campaign information defines a discount value, a product family and a number of coupons to be distributed. Each coupon within the coupon campaign has a coupon identification (ID). Coupon publications are provided including a machine-readable portion that encodes coupon data describing the coupon campaign information. The coupon data is retrieved from the machine-readable portion of the coupon publication using a personal electronic device. The coupon data is used to retrieve a coupon ID that is stored in the personal electronic device. The coupon ID is transmitted to a point of sale (POS) system using the personal electronic device. The POS system communicates with the engine to verify a validity of the coupon ID. A discount is applied to a transaction in accordance with the discount value.

  • Pub Date: 2008/01/12
  • Number: 08046257
  • Owner: Contactless Data, Inc.
  • Location: Tucson, US
  • Details: Visit USPTO

Visit USPTO Page


Secure use of externally stored data

A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.

  • Pub Date: 2008/01/12
  • Number: 07896247
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


MiR-124 regulated genes and pathways as targets for therapeutic intervention

The present invention concerns methods and compositions for identifying genes or genetic pathways modulated by miR-124, using miR-124 to modulate a gene or gene pathway, using this profile in assessing the condition of a patient and/or treating the patient with an appropriate miRNA.

  • Pub Date: 2008/01/12
  • Number: 08071562
  • Owner: Mirna Therapeutics, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for the formulation and manufacture of artesunic acid for injection

A method for the manufacture of a sterile intravenous or intramuscular formulation of artesunic acid and the formulation are the subject of this invention. First the artesunic acid powder is sterilized with ethylene oxide and placed into a sterile container. The contained sterilized powder is then dissolved in sterile sodium phosphate buffered solution to produce an injectable intravenous or intramuscular formulation. The sodium phosphate dissolves and dilutes the artesunic acid powder without caking or frothing resulting in an improved drug product. The invention also relates to the formulation and a method of treating a patient with either uncomplicated or severe and complicated malaria.

  • Pub Date: 2008/01/12
  • Number: 07678828
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Managing advisories for complex model nodes in a graphical modeling application

A system for managing advisories for complex model nodes that can include a complex model, a graphical modeling application, and an advisory manager. The complex model can be configured to graphically represent a user-defined system as multiple nodes and relationships. The graphical modeling application can be configured to execute operations upon the complex model. The graphical modeling application can store data defining the graphical characteristics of the complex model as a notation model and data defining the semantic characteristics of the complex model as a semantic model. The notation model and the semantic model can be stored as separate data entities. The advisory manager can be configured to aggregate notifications and potential resolutions for the nodes of the complex model. The notifications and potential resolutions can be visually presented within the graphical modeling application.

  • Pub Date: 2008/01/12
  • Number: 09015593
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


In-place function modification

Modifying computer program code can be performed at or immediately prior to runtime of the computer code in a runtime environment of a common language infrastructure of a language-neutral framework for developing and executing computer applications. A function in a computer program can be modified at runtime by injecting arbitrary code, while mitigating an alteration of a program's call stack. A just-in-time compilation service is used to compile and execute intermediate language code of the program, and the runtime environment sends callback functions to an event-based profiling agent (profiler) attached to the runtime environment. The profiler can trap desired functions, as determined by configuration data, and inject modification code from stub methods in a stub assembly file. The modified code can be sent back to the runtime environment to be executed by the just-in-time compilation service.

  • Pub Date: 2008/01/12
  • Number: 09645912
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


In-place function modification

Modifying computer program code can be performed at or immediately prior to runtime of the computer code in a runtime environment of a common language infrastructure of a language-neutral framework for developing and executing computer applications. A function in a computer program can be modified at runtime by injecting arbitrary code, while mitigating an alteration of a program's call stack. A just-in-time compilation service is used to compile and execute intermediate language code of the program, and the runtime environment sends callback functions to an event-based profiling agent (profiler) attached to the runtime environment. The profiler can trap desired functions, as determined by configuration data, and inject modification code from stub methods in a stub assembly file. The modified code can be sent back to the runtime environment to be executed by the just-in-time compilation service.

  • Pub Date: 2008/01/12
  • Number: 09645912
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Image rendering

Systems, methods, and computer program products receive an image request identifying an image having a width and a height. A number of interleaved buffers is identified, each of the interleaved buffers operable to store data associated with the image. The image is split into each of the interleaved buffers on a computing device. An interleaved image is displayed corresponding to at least one of the interleaved buffers, where the interleaved image having substantially the same width and height of the image.

  • Pub Date: 2008/01/12
  • Number: 09159155
  • Owner: Autodesk, Inc.
  • Location: San Rafael, US
  • Details: Visit USPTO

Visit USPTO Page


Anticipatory responses to commands

Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success.

  • Pub Date: 2008/01/12
  • Number: 08274380
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Adjustable write pulse generator within a chalcogenide memory device

An adjustable write pulse generator is disclosed. The adjustable write pulse generator includes a band-gap reference current, a programmable ring oscillator, a frequency divider and a single pulse generator. The band-gap reference current circuit generates a well-compensated current over a predetermined range of temperatures needed to program a chalcogenide memory cell. The programmable ring oscillator generates a first set of continuous write “0” and write “1” pulse signals based on the well-compensated current. The frequency divider then divides the first set of continuous write “0” and write “1” pulse signals into a second set of continuous write “0” and write “1” pulse signals. The single pulse generator subsequently converts the second set of continuous write “0” and write “1” pulse signals into a single write “0” pulse signal or a single write “1” pulse signal when programming the chalcogenide memory cell.

  • Pub Date: 2008/01/12
  • Number: 08059454
  • Owner: Ovonyx, Inc.
  • Location: Rochester Hills, US
  • Details: Visit USPTO

Visit USPTO Page


Signal dependent dither

A new technique on the dithering of one-dimensional signals is presented. The novel technique determines whether dither is needed when reducing the bit depth and evaluates whether the total error of the un-dithered quantization is white noise. If this is the case, then no undesired harmonics are added in the quantization or re-quantization process. The novel technique presents a state of the art signal-dependent dither having a lower quantization noise.

  • Pub Date: 2008/30/11
  • Number: 07876247
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for secure display of visual content

Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system such as a computer, a television, a video player, a public display system (including but not limited to a movie theater), a mobile phone, an automated teller machine (ATM), voting booths, kiosks, security screening workstations, tactical displays and other systems where information is displayed for viewing.

  • Pub Date: 2008/29/11
  • Number: 08462949
  • Owner: Oculis Labs, Inc.
  • Location: Owings Mills, US
  • Details: Visit USPTO

Visit USPTO Page


Providing hardware updates in a software environment

A provisioning server can remotely determine target machines, requiring a hardware update, and remotely provide the hardware updates to the target machines. The provisioning server can identify hardware updates for target machines in a network it serves. The provisioning server can operate in conjunction with a network management server in order to identify the target machines, requiring the hardware update. The provisioning server can generate the hardware update for the target machines and provide the hardware update to the target machines.

  • Pub Date: 2008/28/11
  • Number: 08775578
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Providing a rescue Environment in a software provisioning environment

A provisioning server can remotely deliver a rescue environment to a malfunctioning target machine. The provisioning server can operate in conjunction with a network management server in order to identify malfunctioning target machines, for example, target machines with damaged operating systems. Once a malfunctioning target machine is identified, the provisioning server can be configured to identify a rescue environment to repair the malfunctioning target machine and provide the rescue environment to the malfunctioning target machine.

  • Pub Date: 2008/28/11
  • Number: 08832256
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring hardware resources in a software provisioning environment

A provisioning server can provide and utilize a diagnostic tool to test and interrogate hardware on target machines and to collect data from the hardware. The diagnostic tool can operate on the target machine independently of software already installed on the target machine. The diagnostic tool can interrogate hardware of the target machine and collect data from the hardware of the target machine. The provisioning server can select the diagnostic tool from a set of pre-generated diagnostic tools or generate a custom diagnostic tool tailored to a specific target machine. The provisioning server can interact directly with the diagnostic tool or interact with the diagnostic tool utilizing a network management server. Once data is collected, the provisioning server can be configured to store the collected data and/or output the data to other parties or systems.

  • Pub Date: 2008/28/11
  • Number: 08782204
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for collecting and disseminating information over a computer network

A device of and method for collecting and disseminating information over at least one computer network is disclosed. The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user to link to at least a portion of said digital information associated with said second user and for the second user to link to at least a portion of said digital information associated with said first user, at least one manipulations module for manipulating said digital information stored in said at least one database, and at least one display device associated with each of the at least first user and second user for respectively displaying at least said linked digital information to each of said at least first user and second user, wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.

  • Pub Date: 2008/28/11
  • Number: 07966369
  • Owner: MBLAST
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Encoder with multiple re-entry and exit points

An encoder is disclosed that is partitioned into discrete hardware modules. The discrete modules include multiple re-entry and exit points that allow enhanced control by software. The software can control the discrete modules during the encoding process and make adjustments according to CPU bandwidth and/or user requirements allowing for enhanced quality control and seamless hardware/software operations. In one embodiment, a media stream is received into an encoder that includes a pipeline of multiple hardware stages for encoding. An intermediate result is provided from at least one of the hardware stages to an encoding control module that processes the intermediate result to determine configuration instructions for a next hardware stage in the pipeline. Thus, the encoding process can be modified dynamically through hardware and software interactions as the media stream progresses through the pipeline of the encoder.

  • Pub Date: 2008/28/11
  • Number: 08320448
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Cell culture apparatus and mass automatic cell culture device having it

The present invention relates to a cell culture apparatus and a mass automatic cell culture device having it. There is provided a cell culture apparatus comprising a cylindrical cell culture flask which is air-tightly sealed and formed of a transparent material to observe an internal portion thereof, an injection unit for supplying the cell and the culture solution into the cell culture flask, a collection unit for discharging the cells and the culture solution from the cell culture flask, and a cell culture flask receiving part which is comprised of first and second vertical frames in which a plurality of injecting parts and collecting parts, and plate type connection parts which are respectively disposed between upper ends and lower ends of the two opposed vertical frames to be spaced apart from each other in regular intervals, and a mass automatic cell culture device having it.

  • Pub Date: 2008/28/11
  • Number: 09057715
  • Owner: CORESTEM CO., LTD.
  • Location: Cheongwon-gun, Chungcheongbuk-do, KR
  • Details: Visit USPTO

Visit USPTO Page


Micro-electromechanical fluid ejection mechanism having a shape memory alloy actuator

Provided is a micro-electromechanical fluid ejection mechanism. The mechanism includes a substrate defining an ink passage in fluid communication with a tapered ink chamber having an ink ejection port, as well as a shape memory alloy (SMA) actuator arranged within the chamber. The actuator is configured to straighten when heated and to return to a bent state upon subsequent cooling to facilitate ejection of ink via the ejection port.

  • Pub Date: 2008/27/11
  • Number: 07753492
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Method for controlling home network device using universal web application and apparatus thereof

A method of controlling a home network device by using a universal web application. In the method, the universal web application may receive control information, for controlling the home network device, from a server. A control command, which is issued to control the home network device, may be sent to a control point module by using a script application program interface (API) that is included in the received control information. Accordingly, result data that is obtained by executing the control command on the home network device may be received by the control point module.

  • Pub Date: 2008/27/11
  • Number: 09281959
  • Owner: SAMSUNG ELECTRONICS CO., LTD.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


System for improving utilization of GPU resources

A method, executable on a digital computer that includes a central processing unit (CPU) and a graphics processing unit (GPU), executes a series of instructions, in which a GPU data type is defined and at least one data unit is designated with the GPU data type. A series of instructions is executed on the central processing unit. The method determines that a first unit of instruction code, included in the series of instructions, will be scheduled to operate on a GPU data type-designated data unit within a predetermined number of cycles. The GPU data type-designated data unit is caused to be operated on by a second unit of instruction code, that functionally corresponds to the first unit of instruction code. The second unit of instruction code is executed on the graphics processing unit.

  • Pub Date: 2008/26/11
  • Number: 08339404
  • Owner: Accelereyes, LLC
  • Location: Austell, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamic search result formatting

An online search result formatting system and method. The system receives the results of an online search conducted by a user. A view assignment module selects a view template from a plurality of predefined view templates. A content templating module formats the results per the chosen template. An image request system obtains an image representing each search result from the image generation, delivery, and management system. A content population module prepares the content with the results and images in accordance with the selected view template for ultimate display in the user's graphical user interface. The user may select from among the plurality of predefined view templates to alter the display accordingly.

  • Pub Date: 2008/26/11
  • Number: 08635528
  • Owner: Nexplore Technologies, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Supporting multiple name servers in a software provisioning environment

A provisioning server can be configured to include a network configuration module that can set-up, configure, and manage network connections served by the provisioning server including name servers, such as Domain Name System (DNS) servers, in the network connections. The provisioning server can be configured to maintain a set of network modules, each network module corresponding to a different type of name server. Each of the network modules can be configured to include logic for generating or altering a configuration file for the corresponding type of name server.

  • Pub Date: 2008/26/11
  • Number: 09124497
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Snapsheet animation visualization

To assist users in identifying the contributions of specific computer graphics variable or animation variable knots to the timing, rhythm, and expression of complicated animations, an animation software interface includes a snapsheet mode for visualizing and authored poses of objects. The snapsheet mode presents a series of rendered still images corresponding with the authored poses of one or more selected entities. The snapsheet mode may use one or more computer graphics variables, one or more objects, or arbitrary frames or shot time values as selected entities. The snapsheet mode associates each still image with a portion of the shot time of the overall animation corresponding with the selected entity's influence in the animation. Users may modify animation data via the snapsheet mode using each image may act as a proxy for manipulating associated authored values of one or more computer graphics variables.

  • Pub Date: 2008/26/11
  • Number: 08228335
  • Owner: Pixar
  • Location: Emeryville, US
  • Details: Visit USPTO

Visit USPTO Page


Securing appliances for use in a cloud computing environment

An originator of an appliance can independently secure the appliance for instantiation in the cloud, separate from the security level of the cloud. The originator can secure the appliance utilizing a secure rights application. The secure rights application can be configured to “wrap” an appliance in a security container. The security container can limit access to the applications and operating systems contained in the appliance, but allow the appliance to operate normally once instantiated in the cloud. The secure rights application can be configured to cryptographically secure the appliance in order limit the ability of unauthorized parties from accessing the components of the appliance while maintaining the functionality of the appliance.

  • Pub Date: 2008/26/11
  • Number: 09210173
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Providing access control to user-controlled resources in a cloud computing environment

A cloud computing environment can be configured to allow third party, user-controlled resources to be included in the pool of resources available in the cloud. The user-controlled resources can include a cloud application to communicate with a cloud management system to coordinate access to the user-controlled resources. The cloud application allows the user to specify the specific set of resources that the cloud can access, such as specific hardware and software resources.

  • Pub Date: 2008/26/11
  • Number: 08984505
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Online service syndication

Embodiments described herein are directed to syndicating an online service to at least one syndication partner of a syndicator. In one embodiment, a computer system determines that a syndication relationship has been established between a syndicator and a syndication partner, where the syndication relationship is established to provide syndicated services to syndication partners and clients. The computer system indicates which services provided by the syndicator are available for syndication to the syndication partner and which type of usage information the partner is to provide in order to use the syndicator's services. The computer system receives usage information from the syndication partner specifying which services are to be syndicated and specifying parameters for those services indicating operating parameters specific to the use of the syndicated services. Based on the received usage information, the computer system provides the service to the syndication partner in the manner indicated by the received usage information.

  • Pub Date: 2008/26/11
  • Number: 08311947
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Non-toxic pyrotechnic delay compositions

A novel pyrotechnic delay composition for use in metal delay fuse cartridges, including as its primary constituent Si—Al—FeOprepared from powdered form. The delay composition yields a progressive burning zone and burns substantially gas-free, is safe to handle, is resistant to moisture and degradation over time, can be incorporated within the confines of existing detonator shells, and poses no environmental hazards.

  • Pub Date: 2008/26/11
  • Number: 07883593
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple cloud marketplace aggregation

Embodiments relate to systems and methods for multiple cloud marketplace aggregation. An aggregation engine communicates with a set of multiple cloud marketplaces, each of which communicates with an associated set of clouds. A requesting entity, such as a user requesting the instantiation of a set of virtual machines, can transmit a resource request to the aggregation engine. The aggregation engine can fan out or distribute a replicated request to the set of multiple cloud marketplaces. Each cloud marketplace can receive the request and respond to indicate available resources that can be produced from their respect set of clouds. The aggregation engine can collect the responses of the various marketplaces, and can generate one or more selections based on selection logic such as best match, cost factors, or other criteria. In embodiments, a user can manually select the desired marketplace(s) to instantiate or update their virtual machine or other target objects.

  • Pub Date: 2008/26/11
  • Number: 09037692
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for displaying a representation of a traffic intersection

A method and apparatus for displaying a representation of a traffic roundabout having a central island surrounded by a circulatory lane is disclosed. The method involves receiving an operator selection of a design vehicle that is expected to use the roundabout, and receiving operator input of a design dimension for the roundabout, the design dimension defining a size of one of the central island and an outer perimeter of the circulatory lane. The method also involves generating a circulatory path of the design vehicle traveling within the design dimension along the circulatory lane, and generating vehicle extent locations associated with passage of the design vehicle along the circulatory path. The method also involves using the vehicle extent locations to compute a circulatory lane width, and generating display signals for causing the display to display an image representing the roundabout.

  • Pub Date: 2008/26/11
  • Number: 08650004
  • Owner: Transoft Solutions, Inc.
  • Location: Richmond, British Columbia, CA
  • Details: Visit USPTO

Visit USPTO Page


Hardware acceleration for remote desktop protocol

A method for offloading remote terminal services processing tasks to a peripheral device that would otherwise be performed in a computer system's processor and memory. In one embodiment, the disclosed method is utilized in a layered network model, wherein computing tasks that are typically performed in network applications are instead offloaded to a peripheral such as a network interface card (NIC).

  • Pub Date: 2008/26/11
  • Number: 08572251
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Engine control system having fuel-based timing

A control system for an engine having a cylinder is disclosed having an engine valve movable to regulate a fluid flow of the cylinder and an actuator associated with the engine valve. The control system also has a sensor configured to generate a signal indicative of an amount of an air/fuel mixture remaining within the cylinder after completion of a first combustion event and a controller in communication with the actuator and the sensor. The controller may be configured to compare the amount with a desired amount, and to selectively regulate the actuator to adjust a timing of the engine valve associated with a subsequent combustion event based on the comparison.

  • Pub Date: 2008/26/11
  • Number: 08150603
  • Owner: Caterpillar Inc.
  • Location: Peoria, US
  • Details: Visit USPTO

Visit USPTO Page


Engine control system having fuel-based adjustment

A control system for an engine having a cylinder is disclosed having an engine valve configured to affect a fluid flow of the cylinder, an actuator configured to move the engine valve, and an in-cylinder sensor configured to generate a signal indicative of a characteristic of fuel entering the cylinder. The control system also has a controller in communication with the actuator and the sensor. The controller is configured to determine the characteristic of the fuel based on the signal and selectively regulate the actuator to adjust a timing of the engine valve based on the characteristic of the fuel.

  • Pub Date: 2008/26/11
  • Number: 07905206
  • Owner: Caterpillar Inc
  • Location: Peoria, US
  • Details: Visit USPTO

Visit USPTO Page


Embedding a cloud-based resource request in a specification language wrapper

Embodiments relate to systems and methods for embedding a cloud-based resource request in a specification language wrapper. In embodiments, a set of applications and/or a set of appliances can be registered to be instantiated in a cloud-based network. Each application or appliance can have an associated set of specified resources with which the user wishes to instantiate those objects. For example, a user may specify a maximum latency for input/output of the application or appliance, a geographic location of the supporting cloud resources, a processor throughput, or other resource specification to instantiate the desired object. According to embodiments, the set of requested resources can be embedded in a specification language wrapper, such as an XML object. The specification language wrapper can be transmitted to a marketplace to seek the response of available clouds which can support the application or appliance according to the specifications contained in the specification language wrapper.

  • Pub Date: 2008/26/11
  • Number: 08782233
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Computer monitor having flat panel display and printhead

A computer monitor is provided having a flat panel display for displaying images and a printhead disposed adjacent a lower portion of the computer monitor. The monitor is configured such that print media to be printed is fed manually into a feed path that directs the print media from a region adjacent the upper edge of the flat panel display, past the printhead for printing, then out of the monitor adjacent a lower edge of the flat panel display.

  • Pub Date: 2008/26/11
  • Number: 07618104
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Combining multiple objective functions in algorithmic problem solving

Combining multiple objective functions to perform algorithmic problem solving is described. A first algorithm performs processing on a complex problem and generates multiple solutions to the problem. One or more solutions as generated by the first algorithm are send to one or more additional algorithms for further processing of complex sub-problems bounded by the first algorithm. The solutions to the first algorithm are used as input to the additional algorithms, where those solutions include at least one boundary condition under which the additional algorithms process the sub-problems. Ultimate solutions satisfy boundary conditions of the first algorithm, and all conditions of the additional algorithms. Algorithms may be executed in combinations of parallel and/or sequential operation to generate a final solution considering multiple different sub-problems to the complex problem.

  • Pub Date: 2008/26/11
  • Number: 08195496
  • Owner: SAP Aktiengesellschaft
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Analog access circuit for validating chalcogenide memory cells

An analog access circuit for characterizing chalcogenide memory cells is disclosed. The analog access circuit includes an analog access control module, an address and data control module, and an analog cell access and current monitoring module. The analog access control module selectively controls whether a normal memory access or an analog memory access should be performed on a specific chalcogenide memory cell. The address and data control module allows a normal memory access to the chalcogenide memory cell according to an input address. The analog cell access and current monitoring module performs an analog memory access to the chalcogenide memory cell according to the input address, and monitors a reference current from a sense amplifier associated with the chalcogenide memory cell.

  • Pub Date: 2008/26/11
  • Number: 07986550
  • Owner: Ovonyx, Inc.
  • Location: Rochester Hills, US
  • Details: Visit USPTO

Visit USPTO Page


Utilizing bandwidth in ring network using path cost and protection techniques

The disclosed network includes two rings, wherein a first ring transmits data in a clockwise direction, and the other ring transmits data in a counterclockwise direction. The traffic is removed from the ring by the destination node. During normal operations (i.e., all spans operational), data between nodes can flow on either ring. Thus, both rings are fully utilized during normal operations. The nodes periodically test the bit error rate of the links (or the error rate is constantly calculated) to detect a fault in one of the links. The detection of such a fault sends a broadcast signal to all nodes to reconfigure a routing table within the node so as to identify the optimum routing of source traffic to the destination node after the fault.

  • Pub Date: 2008/25/11
  • Number: 07957324
  • Owner: Adtran, Inc.
  • Location: Huntsville, US
  • Details: Visit USPTO

Visit USPTO Page


Utilizing a replacement pathway for lost packet delivery during media reception in a set-top box (STB)

A replacement pathway in an STB is utilized to determine loss of packets and delivery error during reception of media broadcasts, and to retrieve replacement data from one or more replacement media servers. The retrieval of the replacement data is performed during playback of the received media broadcasts. The communication of media broadcast incorporates delays to accommodate the retrieval of replacement data. Alternatively, received broadcast media streams are buffered to enable retrieval of replacement data and to provide seamless presentation of media content in the media broadcasts. The replacement media server performs access authentication operations during replacement data retrieval. The replacement media server is accessed via markup language, for example, HTML and/or XML, based interfaces and/or dedicated APIs. The replacement media server may deny replacement data based on plurality of service criteria such as acceptance and denial criteria, which may comprise allowable bandwidth and/or error rates.

  • Pub Date: 2008/25/11
  • Number: 08064343
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for object rate limiting

The present application is generally directed to systems and method for throttling a rate of requests between a client and a server using user specified inputs. A rate of requests for an object may be throttled by an intermediary which receives requests transmitted between a client and a server and via the intermediary. The intermediary may receive a request from a client for an object of a server. The intermediary may identify a policy specifying a mode of throttling for the request, the policy specifying a mode of throttling, a rate threshold and a period of time for the rate threshold. The rate throttler of the intermediary may determine whether the request exceeds the rate threshold for the period of time based on the mode of throttling of the policy and allow or block the request responsive to the determination.

  • Pub Date: 2008/25/11
  • Number: 08631149
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for load balancing real time streaming

The present application relates to systems and methods for managing of Real Time Stream Protocol (RTSP) sessions by an intermediary located between a client and a server. An intermediary located between a client and a server receives a response from the server to a request of the client to setup a media stream. The response may include a first session identifier established by the server. The intermediary may encode a port of the server and an internet protocol address of the server into the first session identifier to form a second session identifier. The intermediary may modify the response to identify the second session identifier as the session identifier provided by the server. The intermediary may transmit the modified response to the client responsive to the request of the client to setup the media stream.

  • Pub Date: 2008/25/11
  • Number: 08135850
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for HTTP callouts for policies

A method of identifying an action of a policy in association with communications between a client and one or more servers includes determining, by an intermediary, a policy action based on using a callout based policy. In one aspect, an intermediary receives communications between a client and one or more servers. The intermediary identifies a policy for the communications, the policy specifying a request and a server to communicate the request. Responsive to the policy, the intermediary transmits the request to the server. Based on the server response to the request, the intermediary determines an action of the policy. In another aspect, a system for the present method includes an intermediary and a policy engine for identifying a policy to specify a request and a destination server. Responsive to a server response to the request, the intermediary determines an action of the policy.

  • Pub Date: 2008/25/11
  • Number: 08955033
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for health based spillover

The present solution provides a spillover management technique for virtual servers of an appliance based on health. Using a health based spillover technique, a network appliance may direct requests to a backup or second virtual server upon determining that a predetermined percentage of services being load balanced are down. In this manner, the spillover will occur based on a user controlled determination of a level of services being down to the number of services enabled. Instead of waiting for a last service of a virtual server to be marked down to spillover to another virtual server, the spillover may occur based on a user specified percentage. For example, the appliance may spillover from one virtual server to another virtual server when the number of services marked down relative to the number of enabled services falls below a specified percentage.

  • Pub Date: 2008/25/11
  • Number: 08560695
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for GSLB site persistence

The present invention provides systems and methods for maintaining site persistence in a hierarchical Global Server Load Balancing (GSLB) deployment. Via configuration of GSLB services locally and remotely on each of the GSLB appliances and LB appliances at a site, a site appliance identifies and associates requests from the GSLB with the site. Furthermore, the site appliance may receive a GSLB cookie with the client request and confirms the request is from the expected GSLB in the site hierarchy. When the load balancers receives a response from a server, the appliance may include the GSLB cookie with the response back to the client. The appliance may also include an LB cookie to identify the server selected by the LB. When the client sends another request, the request may include the GSLB and LB cookie. With this information, the GSLB and LB appliance may maintain site persistence for the client as well as server persistence at the site.

  • Pub Date: 2008/25/11
  • Number: 08260926
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for GSLB remote service monitoring

The present invention provides improvements to the integration between a metric exchange protocol and a monitoring mechanism supporting load balancing by a Global Server Load Balancing (GSLB) appliance in a GSLB hierarchy of appliances, using a method for triggering a monitor on a remote service. The method includes receiving, by a first appliance, metrics of a second appliance via a metric exchange connection between the first and second appliances. The first appliance includes a GSLB service and identifies a service provided via the second appliance as a remote service for GSLB. The first appliance may identify via the metrics that a state of the service is up, and determine that the metric exchange connection is down. Responsive to the determination, the first appliance may trigger a monitor to monitor the status of the service. Further, the first appliance may obtain via the monitor a second status of the service.

  • Pub Date: 2008/25/11
  • Number: 08171124
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for GSLB auto synchronization

Centralized system for synchronizing a Global Server Load Balancing (GSLB) site hierarchy across a plurality of appliances in a multi-site deployment. With synchronization, differences in configurations across appliances may be determined and changes to configurations may automatically be distributed and applied on each appliance at each site to operate all the sites with a common single GSLB site hierarchy configuration. This reduces the challenging in configuration maintenance for the multi-site deployment.

  • Pub Date: 2008/25/11
  • Number: 09128770
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for batchable hierarchical configuration

A centralized configuration of a Global Server Load Balancing (GSLB) site hierarchy may be batched across a plurality of appliances in a multi-site deployment. A single GSLB site hierarchy configuration may be distributed and operated on each appliance at each site. This reduces the configuration maintained for the multi-site deployment. Furthermore, in this manner, each appliance across multiple sites has an understanding of the entire topology of the multi-site deployment. Responsive to this configuration and understanding, each appliance may perform and optimize operations according to the site topology. For example, the appliances may selectively determine which sites to establish connections with in order to share metrics. In another example, appliances may select which remote sites to monitor services according to the topology.

  • Pub Date: 2008/25/11
  • Number: 09235448
  • Owner: CITRIX SYSTEMS, INC.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Switch for dynamically rerouting traffic due to detection of faulty link

The disclosed network includes two rings, wherein a first ring transmits data in a clockwise direction, and the other ring transmits data in a counterclockwise direction. The traffic is removed from the ring by the destination node. During normal operations (i.e., all spans operational), data between nodes can flow on either ring. Thus, both rings are fully utilized during normal operations. The nodes periodically test the bit error rate of the links (or the error rate is constantly calculated) to detect a fault in one of the links. The detection of such a fault sends a broadcast signal to all nodes to reconfigure a routing table within the node so as to identify the optimum routing of source traffic to the destination node after the fault.

  • Pub Date: 2008/25/11
  • Number: 07929428
  • Owner: Adtran, Inc.
  • Location: Huntsville, US
  • Details: Visit USPTO

Visit USPTO Page


Retrieving substitute data to replace damaged media data for playback in a media player

A media player is utilized to determine presence of defects in storage devices, and to retrieve replacement data from media management servers. The retrieval of the replacement data is performed during playback and/or use of the storage devices. The replacement data is only utilized during real time playback of the storage devices. The replacement data can also be stored within the data storage player, into the storage devices, and/or into external storage devices accessible during playback operations. Addressing information is created and/or modified to enable use of stored replacement data. A new copy of the data can be created in the same or in new storage device. The media management server performs access authentication operations during replacement data retrieval. The media management server is accessed via user-based webpage-like interfaces and/or dedicated APIs.

  • Pub Date: 2008/25/11
  • Number: 08667087
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Recording method, recording apparatus, and computer-readable medium

A program extraction engine of an automatic recording module extracts recommended programs, recording of which is recommended, out of programs scheduled to be broadcasted. A scheduling program of the automatic recording module does not store the recommended programs in the storage medium when a provisional free capacity of the storage medium does not exceed a first threshold or when a provisional total data amount exceeds a second threshold even if the provisional free capacity exceeds the first threshold.

  • Pub Date: 2008/25/11
  • Number: 08160427
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Providing power management services in a software provisioning environment

A software provisioning server can communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power state, such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions.

  • Pub Date: 2008/25/11
  • Number: 08898305
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Platform for enabling terminal services virtualization

Disclosed are techniques for providing a platform and application program interface (API) that leverages a terminal services session broker infrastructure to support third party plug-in applications. In a typical scenario, when a user requests for a connection to access third party plug-in applications, the application program interface may interact with the session broker process to identify sessions or suitable servers to which the user can be connected. The user may access the third party plug-in applications through the identified sessions or suitable servers.

  • Pub Date: 2008/25/11
  • Number: 09009329
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Physician recommendation system

A method for recommending a physician, comprising obtaining user feedback for the physician prior to obtaining a plurality of search criteria, obtaining the plurality of search criteria specifying physician expertise, identifying a plurality of physicians based on a search of the plurality of search criteria, wherein the search is performed on a user generated physician expertise data set, performing a comparison of the plurality of physicians, and displaying a recommendation for one of the plurality of physicians based on the comparison.

  • Pub Date: 2008/25/11
  • Number: 08103524
  • Owner: Intuit Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-platform video delivery configuration

A system and a method are disclosed for delivering a video to a destination device using multiple sources and multiple protocols. The video can be on demand or a live video. A video is divided into several chunks distributed across devices and servers in the network. A node is selected for delivering a video chunk based on criteria including the cost of delivery of the chunk from the node to the destination node. This also improves the throughput of the entire system. Different nodes can use different communication protocols for delivering chunks of videos. Portions of videos are forward-cached to a node before a request for the video is made by the node. Activities associated with a device are gathered to determine a profile for the device. The profile of the device is used to select videos to be forward-cached to the peer device.

  • Pub Date: 2008/25/11
  • Number: 08169916
  • Owner: Media Melon, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Micropulse laser guidance

A laser tracking processor is provided for integrating measured target-reflection signals used in directional control. The integration is performed to distinguish pulses reflected from the target against a noise background. The processor includes an optical detector, an accumulator, a correlator, a phase-lock loop and an integrator array. The optical detector receives the measured signals distributed among several guidance channels. The accumulator sums the measured signals as a combined signal for all the channels. The correlator temporally identifies an event that occurs to indicate a target-reflection pulse within the combined signal. The phase-lock loop synchronizes the event with a clock reference to produce a pulse window within which to search the combined signal for the pulses. The integrator array superimposes the measured signals within the pulse window for each channel to produce channel-specific integrated pulse signals. The processor can further include a sum integrator, a noise comparator and a reset trigger. The sum integrator superimposes a temporal sequence of combined signals from the accumulator as sum integration signals. The noise comparator determines whether the sum integrated signals exceed a noise threshold to set a detection satisfaction condition. The reset trigger initializes the temporal sequence of the integrator array and the sum integrator in response to the detection satisfaction condition, so that as the processor approaches the target, the guidance system can receive updates from the measured signals after becoming distinguishable above the noise.

  • Pub Date: 2008/25/11
  • Number: 07714989
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for realization of web 2.0 features

A method to shape one or more features of Web 2.0 in the form of Web 2.0 solutions, using Web 2.0 realization framework, to the plurality of enterprises is disclosed. The method includes identifying the respective enterprises computing infrastructure and a business application needs of the respective enterprises. The respective enterprises current support system is also measured to find the feasibility of implementing the features of the Web 2.0. The method further comprises offering one or more Web 2.0 features to the respective enterprises based on the business activity. The method includes providing the Web Realization Cycle (WRC) for controlled implementation of Web 2.0 features to the respective enterprises.

  • Pub Date: 2008/25/11
  • Number: 08402425
  • Owner: Infosys Technologies Limited
  • Location: , IN
  • Details: Visit USPTO

Visit USPTO Page


Automatically showing additional relevant search results based on user feedback

This disclosure describes various exemplary application user interfaces, methods, and computer program products for information retrieval or search technology by automatically showing additional relevant search results based on user feedback. The search describes receiving a submitted query from a user, identifying multiple query search results in a relationship to the submitted query, and presenting the multiple query search results in a single structured presentation with a thumbs-up icon, a thumbs-down icon, or an unmarked status to enhance the user experience. Furthermore, the search results illustrate the relationships between each of the multiple query search results and the submitted query in a textual description.

  • Pub Date: 2008/25/11
  • Number: 08554768
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Antagonists of IL-6 to prevent or treat thrombosis

The present invention is directed to therapeutic methods using IL-6 antagonists such as antibodies and fragments thereof having binding specificity for IL-6 to prevent or treat thrombosis in diseases associated with abnormal blood coagulation or fibrinolysis. In preferred embodiments these patients will comprise those exhibiting elevated D-dimer or other coagulation cascade related proteins and optionally will further exhibit elevated C reactive protein prior to treatment. The subject therapies also may include the administration of other actives such as chemotherapeutics, anti-coagulants, statins, et al.

  • Pub Date: 2008/25/11
  • Number: 08252286
  • Owner: Alderbio Holdings LLC
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Adjusting hardware acceleration for video playback based on error detection

Adjustment of hardware acceleration level in a video decoder utilizing hardware acceleration is described. Errors are detected in a bitstream as it is decoded using different levels of error detection based on decoding characteristics. A statistical analysis is performed on the error values as they are detected. In one technique, if the bitstream is categorized as fitting a high error rate state in a bitstream model, then hardware acceleration is dropped. In another technique, error statistics based on run-lengths of good and bad bitstream units are kept, and compared to predetermined thresholds. If the thresholds are exceeded, the hardware acceleration level is dropped. The level is dropped in order to take advantage of superior error handing abilities of software-based decoding over hardware-accelerated decoding.

  • Pub Date: 2008/25/11
  • Number: 09131241
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Writable virtual disks of read-only snapshot file objects

A technique enables creation and use of a writable, read-only snapshot of an active file system operating on a storage system, such as a multi-protocol storage appliance. The writable, read-only snapshot comprises a read-only “image” (file) residing in a snapshot and a writable virtual disk (vdisk) residing in the active file system. The writable vdisk is a “shadow” image of the snapshot file image and, as such, includes an attribute that specifies the snapshot file as a backing store.

  • Pub Date: 2008/24/11
  • Number: 08423732
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Test apparatus and method for testing interoperability of wireless communication devices

A test apparatus and method are provided for testing interoperability of a first device to communicate with a second device via wireless communication. The test apparatus includes a wireless interface configured to interface via wireless communication with devices. The test apparatus also includes a processor, memory and logic stored in memory and executed by the processor. The logic causes the test apparatus to sequence through a plurality of wireless communication actions to communicate with a first device, monitor behavior of the first device during the actions, and store characteristics of the monitored behavior in memory so that the test apparatus may be used to emulate the first device when wirelessly communicating with a second device.

  • Pub Date: 2008/24/11
  • Number: 08213928
  • Owner: Delphi Technologies, Inc.
  • Location: Troy, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for scalable architecture for web-based collaborative annotation of page-based documents

A system for managing the communication of multi-page documents. The system may use a software module document splitter adapted to receive a multi-page document being uploaded as a single file and to split the multi-page document into a plurality of independent files, with each independent file representing a single page of the document. The software module document splitter may also associate meta data with each single page that enables the single pages to be downloaded, one at a time, by an electronic device being used by a user, from a file storage device remote from the electronic device. This provides the appearance to the user that the electronic device is in possession of single, multi-page file.

  • Pub Date: 2008/24/11
  • Number: 08135776
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for 3D radar image rendering

A 3D rendered image of a radar-scanned terrain surface is provided from a radar return signal from the surface, wherein the return signal includes data indicative of azimuth, elevation, and range of a radar-illuminated area of the surface. The data are processed for transformation into X, Y, and Z coordinates. The X and Y coordinates corresponding to each illuminated area are triangulated so as to create a mesh of triangles representing the terrain surface, each of the triangles in the mesh being defined by a vertex triplet. 3D imaging information (grey scale shading and/or coloring information) is added to each triangle in the mesh, based on the amplitude of the radar return signal from the coordinates represented by each vertex in the triplet and the value of the Z coordinate at each vertex, so as to form the 3D rendered image.

  • Pub Date: 2008/24/11
  • Number: 07688248
  • Owner: Sierra Nevada Corporation
  • Location: Sparks, US
  • Details: Visit USPTO

Visit USPTO Page


Secure detection network system

A secure detection network system includes plurality of remote nodes, each remote node comprising a set of detector interfaces configured to couple to a set of detectors disposed to detect the presence of an illegal asset within a shipping container; at least one server node configured to initialize, install, and authenticate each remote node in the plurality of remote nodes, including delivering to each remote node an agent module, said agent module for each remote node comprising a node specific configuration file defining a set of nodes with which the remote node can communicate and a different encryption means corresponding to each node in the set of nodes; and a communication path coupling the plurality of remote nodes and the at least one server node.

  • Pub Date: 2008/24/11
  • Number: 07930761
  • Owner: Angel Secure Networks, Inc.
  • Location: Orono, US
  • Details: Visit USPTO

Visit USPTO Page


Proxy server for distributing aircraft software parts

A computer implemented method, apparatus, and computer program product for managing aircraft software parts. In one advantageous embodiment, a method includes retrieving a set of aircraft software parts and metadata about the set of aircraft software parts from a library in an aircraft network data processing system to form a set of retrieved aircraft software parts. The set of aircraft software parts is stored in a file system. Metadata is stored in a database. The set of aircraft software parts and the metadata is sent to an onboard electronic distribution system, a communications link between an on ground component interface, and the onboard electronic distribution system. Status information about activity on the communications link is maintained.

  • Pub Date: 2008/24/11
  • Number: 08930310
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Providing notifications using voice-to-text conversion

Methods and systems for providing electronic notifications are described. A server is configured to serve an interface, such as a Web page, to a terminal that requests from a user a first set of user contacts to be used to provide notifications to the user by a telephonic notification system in response to a notification process initiated by an organization associated with the user. The interface further requests a first set of priorities corresponding to the first set of user contacts, wherein the notification system will attempt to provide notifications to the first set user contracts in an order based at least in part on the first set of priorities. A database is configured to store the first set of user contacts and the first set of priorities. A voice interface circuit is configured to transmit a voice notification to at least one of the first set of user contacts.

  • Pub Date: 2008/24/11
  • Number: 08175224
  • Details: Visit USPTO

Visit USPTO Page


Providing notifications using text-to-speech conversion

Methods and systems for providing electronic notifications are described. A server is configured to serve an interface, such as a Web page, to a terminal that requests from a user a first set of user contacts to be used to provide notifications to the user by a telephonic notification system in response to a notification process initiated by an organization associated with the user. The interface further requests a first set of priorities corresponding to the first set of user contacts, wherein the notification system will attempt to provide notifications to the first set user contracts in an order based at least in part on the first set of priorities. A database is configured to store the first set of user contacts and the first set of priorities. A voice interface circuit is configured to transmit a voice notification to at least one of the first set of user contacts.

  • Pub Date: 2008/24/11
  • Number: 08149995
  • Owner: Everbridge, Inc.
  • Location: Glendale, US
  • Details: Visit USPTO

Visit USPTO Page


Providing circuit switched calls and services over a broadband network

The present invention is directed to a method, a switching server, a terminal device and system for providing circuit switched calls and services to terminal devices connected to a switching server via an IP Multimedia Subsystem. The method comprises a step of providing (S) a first interworking entity () in the terminal device () for interworking between circuit switched signalling messages and signalling messages related to packet switched sessions towards the IMS (). The method further comprises providing (S) a second interworking entity () in the switching server () towards the IMS (). The terminal device () is thus capable of accessing circuit switched calls and services directly from the switching server ().

  • Pub Date: 2008/24/11
  • Number: 09148451
  • Owner: TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Printhead having nozzle arrangements with radial actuators

A printhead for an inkjet printer has a wafer that defines a plurality of nozzle chambers and ink supply channels in fluid communication with the nozzle chambers to supply the nozzle chambers with ink. An ink ejection port is associated with each nozzle chamber. A series of actuators is associated with each nozzle chamber and is radially positioned with respect to the nozzle chamber. The actuators are operable so that, when activated, they are displaced into the nozzle chamber to generate an ink meniscus at the ink ejection port and, when deactivated, return to an original position resulting in the necking and breaking of the ink meniscus to eject an ink drop.

  • Pub Date: 2008/24/11
  • Number: 07669973
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Personal video recording with storage space distributed among remote personal video recorders

Automated personal video recording comprising scheduling a show for a user having allocated storage space on a personal video recorder (“PVR”), wherein the show has a storage space requirement that exceeds the user's free space, and the PVR is coupled for data communications to a storage space provider; and transmitting to the storage space provider an order to record the show through the storage space provider in storage space on a remote PVR that is coupled for data communications to the storage space provider. Receiving in a storage space provider from a personal video recorder (“PVR”) an order to record a show on a remote PVR, the order comprising an identification of a show and a schedule for recording the show; selecting a remote PVR; and recording the show, in dependence upon the show identification and the schedule for recording the show, in storage space on the selected remote PVR.

  • Pub Date: 2008/24/11
  • Number: 08396352
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Packet processing profile selection and delivery in wireless communication systems

What is disclosed is a method of operating a communication system which includes a plurality of packet processing systems that each comprises one of a plurality of packet payload inspection systems. The method includes receiving a registration request from a wireless communication device, and in response, selecting one of the packet processing systems for the wireless communication device, obtaining a user profile for the wireless communication device, and obtaining a location for the wireless communication device. The method also includes transferring data indicating the wireless communication device, the user profile for the wireless communication device, and the location for the wireless communication device for delivery to the one of the packet payload inspection systems included in the selected one of the packet processing systems. The method also includes receiving the data in the one of the packet payload inspection systems, and in response, inspecting packet payloads associated with the wireless communication device based on the data.

  • Pub Date: 2008/24/11
  • Number: 08159966
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Onboard electronic distribution system

A computer implemented method, apparatus, and computer program product for transferring information with an aircraft. A connection is established between an onboard electronic distribution system executing in an aircraft data processing system in the aircraft and an on ground component. Responsive to a request for a command from the on ground component, the command for execution is identified. The identified command is sent to the onboard electronic distribution system from an on ground component. A transaction identifier is assigned to the command. A transaction associated with the command is maintained on the onboard electronic distribution system and the on ground component using the transaction identifier. An uplink is initiated by the on ground component. An aircraft software part is sent to the onboard electronic distribution system from the on ground component to perform the uplink. A status of a transfer of the aircraft software part on ground component is stored.

  • Pub Date: 2008/24/11
  • Number: 08442751
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Notification system management

Methods and systems for providing electronic notifications are described. A server is configured to serve an interface, such as a Web page, to a terminal that requests from a user a first set of user contacts to be used to provide notifications to the user by a telephonic notification system in response to a notification process initiated by an organization associated with the user. The interface further requests a first set of priorities corresponding to the first set of user contacts, wherein the notification system will attempt to provide notifications to the first set user contracts in an order based at least in part on the first set of priorities. A database is configured to store the first set of user contacts and the first set of priorities. A voice interface circuit is configured to transmit a voice notification to at least one of the first set of user contacts.

  • Pub Date: 2008/24/11
  • Number: 08280012
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for processing commands in an aircraft network

A method, apparatus, and program code for processing commands in a network. A process creates a set of commands for an aircraft. The commands are in queues in a library in the network. Responsive to an event, the stored set of commands is sent to a proxy server application executing on the network data processing system. A connection is established between the proxy server application and an onboard electronic distribution system on an aircraft data processing system on the aircraft. The commands are requested by the onboard electronic distribution system. The distributed commands are received from the proxy server application by the onboard electronic distribution system. The received commands are processed by the onboard electronic distribution system and a set of aircraft software parts is forwarded to a set of target data processing systems on the aircraft using the processed set of commands if the commands are uplink commands.

  • Pub Date: 2008/24/11
  • Number: 08185609
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing granular restoration of data objects from machine images stored on sequential backup media

A method and apparatus for performing granular restoration from machine images stored on sequential backup media is disclosed. In one embodiment, the method for performing granular restoration from machine images stored on sequential backup media includes processing at least one machine image file to identify at least one database file and at least one data object that is arranged within the at least one database file and generating mapping information regarding the at least one data object within the at least one machine image file, wherein the at least one machine image is to be stored on the sequential backup media.

  • Pub Date: 2008/24/11
  • Number: 08315983
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers

The present invention is a method and apparatus for effectuating bilateral buyer-driven commerce. The present invention allows prospective buyers of goods and services to communicate a binding purchase offer globally to potential sellers, for sellers conveniently to search for relevant buyer purchase offers, and for sellers potentially to bind a buyer to a contract based on the buyer's purchase offer. In a preferred embodiment, the apparatus of the present invention includes a controller which receives binding purchase offers from prospective buyers. The controller makes purchase offers available globally to potential sellers. Potential sellers then have the option to accept a purchase offer and thus bind the corresponding buyer to a contract. The method and apparatus of the present invention have applications on the Internet as well as conventional communications systems such as voice telephony.

  • Pub Date: 2008/24/11
  • Number: 08135650
  • Owner: priceline.com, Incorporated
  • Location: Stamford, US
  • Details: Visit USPTO

Visit USPTO Page


Execution context infrastructure

Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).

  • Pub Date: 2008/24/11
  • Number: 07930687
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Discovering and interacting with service providers

Embodiments provide searching features and functionality that can be used to provide service provider data, but are not so limited. In an embodiment, a computing system can include a client application or client that includes functionality to provide a number of service providers associated with a particular function, service, and/or other provider feature(s). In one embodiment, a computing device can include a client that can be used in conjunction with other end-user applications to automatically provide a number of service providers based in part on a user request.

  • Pub Date: 2008/24/11
  • Number: 08706842
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Aircraft software part library

A computer implemented method, apparatus, and computer program product for managing aircraft software parts. An aircraft software part is received at a library. The received part is stored in the library with other aircraft software parts. A user interface is provided to manipulate the aircraft software parts. Responsive to receiving a user input from the user interface to uplink a selected aircraft software part to a target aircraft data processing system, a command is created to send the selected part to an aircraft in which the target aircraft data processing system is located. The uplink command is stored in a queue in the storage in the library. The uplink command is distributed to a proxy server application in response to a request for commands. Responsive to receiving a request from the proxy server application processing the stored uplink command, the selected part is sent to the proxy server application.

  • Pub Date: 2008/24/11
  • Number: 08490074
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Unified storage for configuring multiple networking technologies

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules.

  • Pub Date: 2008/21/11
  • Number: 08615570
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Unified interface for configuring multiple networking technologies

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules.

  • Pub Date: 2008/21/11
  • Number: 08683046
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for providing location-based upcoming event information using a client-side web application implemented on a client device

A system and methods for providing location-based upcoming event information using a client-side web application implemented on a client device are described. The location-based upcoming event information may be provided to users of an online secondary ticket marketplace using a client-side web application implemented as desktop or mobile widget or within a web browser toolbar. The client-side web application may be configured to communicate with a network-based system that provides online marketplace and ticket fulfillment services and generate a query based upon the location of a user and other event criteria. The client-side web application may communicate the query to the network-based system and, in response, receive location-based upcoming event information which may be displayed to a user as a list and/or information on a map. The client-side web application may display an aggregate of ticket inventory available from multiple online marketplaces providing the user with multiple purchasing options.

  • Pub Date: 2008/21/11
  • Number: 08732007
  • Owner: Stubhub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for accessing non-compatible content repositories

Systems and methods access non-compatible content repositories that are not natively accessible to a content management system. A metadata registry maintains metadata about content stored in both compatible and non-compatible repositories. For content in a non-compatible repository, the metadata indicates a repository interface capable of accessing the non-compatible repository. The content manager communicates with the repository interfaces to access the content in non-compatible repositories. The content manager may receive a request for content in a non-compatible repository, refer to the metadata registry to select a repository interface to employ, transmit a request for the requested content to the selected repository interface, and receive the requested content from the repository interface. A repository interface registry maintains information about available repository interfaces. Entries may be added to either the metadata registry and the repository interface registry, thus allowing the systems and methods to be extended to be able to access additional non-compatible repositories.

  • Pub Date: 2008/21/11
  • Number: 08260815
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Software for integrated modeling of user interfaces with applications

This disclosure provides various embodiments of software for providing a user interface (UI) model. In one aspect, the software identifies one or more components associated with a particular work center. The software then collects modeling information from the one or more components identified as being associated with the particular work center, and integrates the collected modeling information into a UI model associated with the particular work center. In some instances, the particular work center may be associated with or defined by a corresponding work center model illustrating the particular work center's UI layout, including at least a portion of components associated with the particular work center.

  • Pub Date: 2008/21/11
  • Number: 08429597
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system of building a grammar rule with baseforms generated dynamically from user utterances

A method () of building a grammar with baseforms generated dynamically from user utterances can include the steps of recording () a user utterance, generating () a baseform using the user utterance, creating or adding to () a grammar rule using the baseform, and binding () the grammar rule in a grammar document of a voice extensible markup language program. Generating a baseform can optionally include introducing a new element to VoiceXML with attributes that enable generating the baseform from a referenced recording such as the user utterance. In one embodiment, the method can be used to create () a phonebook and a grammar to access the phonebook by repeatedly visiting a form containing the grammar rule with attributes that enable generating the baseform from the referenced recording.

  • Pub Date: 2008/21/11
  • Number: 07962343
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical editor with incremental development

Techniques for developing a graphical editor using an incremental development approach. Externally-stored descriptors are used to specify information on which a graphical editor engine operates to create a graphical editor. Developers can thus redefine the look and feel of the graphical editor by modifying these descriptors, effectively re-configuring the elements of visual models without changing the code of the graphical editor engine. Visual models for modeling a domain can be created and used, without first requiring the domain model to be defined.

  • Pub Date: 2008/21/11
  • Number: 08117594
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Creating cross-technology configuration settings

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules.

  • Pub Date: 2008/21/11
  • Number: 08751612
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Crate tool

A computer implemented method, apparatus, and computer program product for processing aircraft software parts. A crate containing an aircraft software part is received from a source. Signatures are validated for the crate and the aircraft software part. If the signatures are valid, the crate is unpacked. The contents of the incoming crate are displayed. The aircraft software part is unpacked. Responsive to a request to upload the stored part to a library in the aircraft software part management apparatus, a determination is made as to whether the stored part meets a policy. If the stored part meets the policy, the part is signed. The signed part is placed in a crate and is signed to form a signed crate wherein signatures for the signed aircraft software part and the signed crate are different from the set of signatures in the incoming crate. The signed crate is sent to the library.

  • Pub Date: 2008/21/11
  • Number: 08165930
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Common configuration application programming interface

A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules.

  • Pub Date: 2008/21/11
  • Number: 08676942
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Client-server visualization system with hybrid data processing

The invention comprises a system of client-server visualization with hybrid data processing, having a server digital data processor, that allows for server side rendering and processing image data, and client digital data processors simultaneously connected to the server, which receives messages from the clients, creates rendered images of data sets or other data processing results and sends those rendered images and results to the clients for display or further processing. Performing certain image rendering operations on either the server or the client according to which is better suited for the tasks requested by the user at any point in time, and possibly adjusting this division of work dynamically, improves rendering speed and application responsiveness on the clients.

  • Pub Date: 2008/21/11
  • Number: 09019287
  • Owner: PME IP Australia Pty Ltd
  • Location: Richmond, AU
  • Details: Visit USPTO

Visit USPTO Page


Protein kinase inhibitors

Compounds that inhibit protein kinases, compositions containing the compounds and methods of treating diseases using the compounds are disclosed.

  • Pub Date: 2008/20/11
  • Number: 08067409
  • Owner: Abbott Laboratories
  • Location: Abbott Park, US
  • Details: Visit USPTO

Visit USPTO Page


Non-volatile memory systems and methods including page read and/or configuration features

A high speed voltage mode sensing is provided for a digital multibit non-volatile memory integrated system. An embodiment has a local source follower stage followed by a high speed common source stage. Another embodiment has a local source follower stage followed by a high speed source follower stage. Another embodiment has a common source stage followed by a source follower. An auto zeroing scheme is used. A capacitor sensing scheme is used. Multilevel parallel operation is described.

  • Pub Date: 2008/20/11
  • Number: 07848159
  • Owner: Silicon Storage Technology, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Modular flexible software architecture for TV

Rather than have a unique code set per TV product, a common code base is provided to service multiple products and even multiple product lines. Embedded systems can be upgraded through a network connection. The software architecture provides a flexible approach to supporting multiple product offerings through a plug-in modular middle-ware and to providing standardized hardware acceleration for both 2D and 3D graphics. The plug-in capability provides for feature additions and upgrades after sale.

  • Pub Date: 2008/20/11
  • Number: 08339514
  • Owner: Sony Electronics Inc.
  • Location: Park Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile advertising syndication

Apparatus and methods for distributing advertising content to a mobile device. An application is executed on a mobile device containing an advertising opportunity. Advertising content is requested from an advertisement syndication interface. A filtering constraint applicable to the advertising content request is identified and used to select and advertisement from a local advertising cache. The selected advertisement is rendered in a composite with rendering of content of the application.

  • Pub Date: 2008/20/11
  • Number: 08738431
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to infer the status of border gateway protocol sessions

Methods and apparatus to infer the status of BGP sessions are disclosed. A disclosed example method comprises querying a configuration file of a router of a first AS to identify a BGP session to a second AS, querying the file to determine whether the BGP session is a single hop, when the BGP session is a single hop, setting a status flag to a first value, querying the file to determine whether there is a valid IP configuration for the BGP session, when there is a valid IP configuration, setting the status flag to a second value, querying a router syslog file for the router to identify a syslog message associated with the BGP session, determining whether the session is stale, and when the session is not stale and the status flag is set to the second value, adding the second AS to a list of actual AS neighbors.

  • Pub Date: 2008/20/11
  • Number: 07894461
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to draw attention to information presented via electronic displays to process plant operators

Example methods and apparatus to draw attention to information presented via electronic displays to process plant operators are disclosed. A disclosed example method to draw attention to information presented to a process plant operator comprises presenting an electronic process plant display, collecting process plant data, processing the process plant data to identify a portion of a process plant, and modifying the electronic process plant display to at least partially obscure substantially all of the process plant display except for the identified portion.

  • Pub Date: 2008/20/11
  • Number: 08103367
  • Owner: Fisher-Rosemount Systems, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to detect border gateway protocol session failures

Methods and apparatus to detect border gateway protocol (BGP) session failures are disclosed. A disclosed example apparatus comprises a database interface to obtain provisioned configuration information for a provider edge (PE) router, a BGP engine to receive one or more BGP messages from a route reflector, the one or more BGP messages representing a list of active routes for the PE router, and a session analyzer to compare the list of active routes with the provisioned configuration information to determine whether a provisioned route is not present in the list of active routes, and to declare a BGP session failure when the provisioned route is not present in the list of active routes.

  • Pub Date: 2008/20/11
  • Number: 07804781
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method of controlling first information apparatus connectable to second information apparatus

According to an aspect of an embodiment, a method of controlling a first information apparatus connectable to a second information apparatus having a display, the second information apparatus being capable of reproducing video image based on video information obtained from a remote source independently from the first information apparatus, the method has storing command code information of the second information apparatus in association with identification information of the second information apparatus, receiving a command indicating a power-on operation of the second information apparatus while the second information apparatus is connected to the first information apparatus, executing a software program upon confirmation of the command indicating the power-on operation of the second information apparatus in reference to the command code information and outputting image data produced by the software program to the second information apparatus so as to display an image corresponding to the image data on the display.

  • Pub Date: 2008/20/11
  • Number: 08355082
  • Owner: Fujitsu Limited
  • Location: Kawasaki, JP
  • Details: Visit USPTO

Visit USPTO Page


Lead-free piezoelectric ceramic films and a method for making thereof

This invention relates to lead-free piezoelectric ceramic films and a method of making thereof. Specifically, the invention is directed to a method for fabricating lead-free piezoelectric free standing films having enhanced piezoelectric properties. The films may be used for a number of applications including incorporation in microelectronic devices such as energy harvesting devices and sensor technologies.

  • Pub Date: 2008/20/11
  • Number: 08241569
  • Owner: Drexel University
  • Location: Philadephia, US
  • Details: Visit USPTO

Visit USPTO Page


Goal based system utilizing a table based architecture

A system is disclosed that provides a goal based learning system utilizing a rule based expert training system to provide a cognitive educational experience. The system provides the user with a simulated environment that presents a business opportunity to understand and solve optimally. Mistakes are noted and remedial educational material presented dynamically to build the necessary skills that a user requires for success in the business endeavor. The system utilizes an artificial intelligence engine driving individualized and dynamic feedback with synchronized video and graphics used to simulate real-world environment and interactions. A robust business model provides support for realistic activities and allows a user to experience real world consequences for their actions and decisions and entails realtime decision-making and synthesis of the educational material. The system is architectured around a table of components to manage and control the system.

  • Pub Date: 2008/20/11
  • Number: 08429112
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Commerical mobile alert system interface

A system and method for facilitating the distribution of emergency alert messages to electronic devices via a communications network, such as a commercial mobile wireless network. The system includes a commercial mobile service provider (CMSP) gateway that is in communication with an alert gateway and the communications network. The CMSP gateway has a commercial mobile alert system (CMAS) interface, such as an application programming interface (API), that is configured to receive an emergency alert message from the alert gateway. The emergency alert message includes elements that have been mapped from a corresponding emergency alert message that was issued by an alert initiator. The CMAS interface is further configured to process the emergency alert message into a format suitable for distribution to electronic devices that are in communication with the communications network. The emergency alert message is then distributed to the appropriate electronic devices via the communications network.

  • Pub Date: 2008/20/11
  • Number: 08554169
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for creation, issuance, redemption, conversion, offering, trading, and clearing a debt obligation convertible into cash plus a spot foreign exchange contract that is priced to reflect the value of the debt obligation in a base currency in relation to the value of a reference currency

Securities trading systems and methods for creating, issuing, offering, trading, redeeming, converting, and clearing a novel debt obligation convertible into cash plus a foreign exchange spot or forward contract that is priced to reflect the value of the debt obligation in a base currency in relation to the value of a reference currency. In the system, an order book server aggregates bid and offer information for the debt obligations. Best bid and offer information is communicated to one or more trading terminals. The trading terminals are capable of displaying best bid and offer and other information relevant to trading, redeeming, and converting the debt obligations in real time and allow a trader to trade, redeem, and convert C-Notes™ by interacting with the display on the trading terminal. The order book server and issuer calculate and track accrued interest on the debt obligations.

  • Pub Date: 2008/19/11
  • Number: 08429057
  • Owner: Curex Innovations LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for linking eProcurement to virtual communities

An e-commerce system, comprising a master console software application executing on a first network-connected server and accessible to a plurality of external systems used by merchants, a shopping cart software application executing on a second network-connected server and coupled to the first server, and interface software executing on the second server for interacting with content associated with a first user is disclosed, wherein a merchant interacts with the master console software application to load information about a product available for promotion and sale by the first user, the master console software application makes that information available to the shopping cart software application, and the interface software provides information and code related to the specific product to the content, the code compatible with the content, and upon the code being activated in the content by a second user, the second user is connected to the shopping cart software application, and is thereby enabled to buy the product.

  • Pub Date: 2008/19/11
  • Number: 08175928
  • Owner: Pure Verticals Inc.
  • Location: Benecia, US
  • Details: Visit USPTO

Visit USPTO Page


Data de-duplication for information storage systems

Technologies for eliminating duplicate data within a storage system can efficiently identify and eliminate duplication by remapping borrower regions to share physical storage space with lender regions. Block-level de-duplication can co-exist with storage architectures for thin provisioning and snapshot management. Lending maps can track redirected pointers from borrower regions to shared physical storage from lender regions. The lending maps can track the freed status of regions to support efficient write I/O operations without defaulting to unnecessary read-modify-write cycles to complete data writes. Redundancy of de-duplicated data can maintain one or more copies to support recovery from media errors. Candidate regions for de-duplication can be identified by monitoring the times and patterns of data access operations. A sampled mechanism for calculating and comparing signatures of data blocks can support the efficient identification of duplicated data within the storage system.

  • Pub Date: 2008/19/11
  • Number: 08732411
  • Owner: American Megatrends, Inc.
  • Location: Norcross, US
  • Details: Visit USPTO

Visit USPTO Page


Workflow engine for execution of web mashups

A software-implemented workflow engine is described that executes a Web mashup within the context of a Web browser running on a computer. The workflow engine is configured to parse a Web mashup definition obtained from a remote server to identify distinct units of execution within the Web mashup, referred to as components. The workflow engine is further configured to obtain programming logic and metadata associated with each type of component identified in the Web mashup definition from the remote server and to use such information to generate executable versions of the identified components. Finally, the workflow engine is configured to run each of the executable components, thereby executing the Web mashup. The workflow engine is configured to manage the order of execution of each of the executable components so that the Web mashup runs in an optimized and reliable fashion.

  • Pub Date: 2008/18/11
  • Number: 08875098
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System for the centralized storage of wireless customer information

A system for storing subscriber information in a centralized location includes a processor, memory coupled to the processor, and a data storage device coupled to the processor. The data storage device includes a subscriber profile portion for storing personal information about a subscriber. The subscriber profile portion includes a subscriber identification portion for storing an identification string. The subscriber profile portion is associated with an account type portion for storing account information, a portal portion for storing portal information, and an account status portion for storing account status information. The data storage device further includes a subscription portion for storing subscription information. The subscription portion is associated with a device portion for storing device information, a services portion for storing services information, and a mobile subscription portion for storing mobile subscription information.

  • Pub Date: 2008/18/11
  • Number: 07831240
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Performing a collaborative search in a computing network

Method for performing a collaborative search in a computing network. In one implementation, the method may include receiving a search criteria from a user, identifying one or more agents who have performed a search using the search criteria, the agents and the user belonging to the computing network, identifying one or more search results that the agents have previously selected as being relevant to the search criteria, ranking the search results, and displaying the search results according to the ranking.

  • Pub Date: 2008/18/11
  • Number: 08015177
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Navigable website analysis engine

An optimization engine allows website publishers and other network document publishers to view and navigate statistics and scoring methodologies of a search engine. Publishers may thus gain a better understanding of how their website or network document is scored and how to optimize those documents to increase a search engine score. The user is thus able to navigate the network from the perspective of a search engine, viewing webpages, websites, and links in the same way a search engine would analyze them. Upon making changes to a website or network document, publishers may further request on-demand re-crawling of their website or network document to view changes in the score. Alerts may also be activated by a user to notify the user when certain conditions are met.

  • Pub Date: 2008/18/11
  • Number: 08447751
  • Owner: Efficient Systems, LLC
  • Location: Cheyenne, US
  • Details: Visit USPTO

Visit USPTO Page


Loan origination system interface for online loan application processing

A loan origination system interface module, methods and computer program products. One computer program product for processing loan application data including instructions to extract loan application data including retrieving identification information for a loan application associated the loan application data from a broker device and displaying on the broker device a list of loan applications available to process in an interface that is consistent with a loan origination computer program associated with the broker device. In response to command input from the broker device selecting a loan application from the list of loan applications, the computer program product includes instructions to reformat loan application data for the selected loan application to a format compatible with that required by a lender device and transmit reformatted loan application data to a lender device.

  • Pub Date: 2008/18/11
  • Number: 08117117
  • Owner: Ellie Mae, Inc.
  • Location: Pleasanton, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient caching for dynamic webservice queries using cachable fragments

A method and apparatus for intelligent caching is provided. A thin layer of business logic on a web server receives URL requests sent to the web server from clients and resolves the URLs into URLs corresponding to component parts of the requested document according to the rules of a rule set. Thus only the component resources of a composite document are cached in the web server's caching layer. The rule set defines a format for the requests sent to the web server, the manner in which properly formatted requests should be resolved, and the manner in which the component resources should be assembled into the composite document.

  • Pub Date: 2008/18/11
  • Number: 07962502
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Customizing player-generated audio in electronic games

Methods and apparatuses for customizing player-generated audio in electronic games are provided. Sound generated by a player may be recorded in an audio clip. A modification is selected by a player, and the modification is applied to the audio clip. The modified audio clip is associated with a game event designated by the player. When the designated game event is detected, the associated audio clip may be played. In some embodiments, playing the modified audio clip includes broadcasting the modified audio clip to another player in a network.

  • Pub Date: 2008/18/11
  • Number: 09262890
  • Owner: SONY COMPUTER ENTERTAINMENT AMERICA LLC
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-domain communication technique for execution of web mashups

A system and method is described for communicating requests from a Web mashup being executed within the context of a Web browser to third-party Web services in a manner that does not violate the Same Origin Policy (SOP) observed by many Web browsers. In one embodiment, a workflow engine operating in the context of a Web browser executes a plurality of executable components comprising a Web mashup. The workflow engine transparently redirects Web service requests generated by the executing components to a proxy server that acts as an intermediate between the workflow engine and third-party Web services. The proxy server, which is not subject to SOP, transmits the Web service requests to the third-party Web service and obtains requested data therefrom. The proxy server further returns the requested data in a manner that is useable by the Web mashup components.

  • Pub Date: 2008/18/11
  • Number: 07941546
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Actively managing resource bottlenecks in a database system

A computer-implemented method, apparatus and article of manufacture for optimizing a database query. Resource usage of one or more resources of the computer system are monitored. A condition code representative of the monitored resource usage is stored. A cost model is modified using the stored condition code. A query execution plan is generated for the database query using the modified cost model. The query execution plan is then executed in order to retrieve data from a database stored on the computer system, wherein the retrieved data is presented to a user for subsequent use and analysis.

  • Pub Date: 2008/18/11
  • Number: 08423534
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Method for chromatographic finger printing and standardization of single medicines and formulations

The present invention provides a method for the chromatographic fingerprinting, chemical and therapeutic standardization, bar-coding of the fingerprints and preparation of a data base for Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) machines and applications of medicines in general and traditional medicines in particular; this invention includes a software based instrumental method and a novel method of fingerprinting and standardization is proposed for the above purpose and the said method for the chromatographic finger printing which facilitates to correlate the traditional therapeutic standardization methods with the chemical properties of the medicines and humors and provides a rational basis to understand the methods used for the said purpose.

  • Pub Date: 2008/17/11
  • Number: 07662638
  • Owner: Council of Scientific and Industrial Research
  • Location: New Delhi, IN
  • Details: Visit USPTO

Visit USPTO Page


Intelligent analysis based self-scheduling browser reminder

A computer-implemented method for reminding a user to browse a regularly visited website comprising tracking websites visited by the user and ranking each website by visitation frequency and browsing duration. An average recurring time each website is visited is calculated and it is determined whether the current time is equal to the average recurring time for a particular website. The user is reminded to visit the particular website if it is determined that the user is not currently browsing the particular website when the current time equals the average recurring time for the particular website.

  • Pub Date: 2008/17/11
  • Number: 07669136
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Inkjet heater with heater element supported by sloped sides with less resistance

An inkjet printhead that has a chamber for holding a quantity of ink, a nozzle in fluid communication with the chamber, a pair of electrodes and, a heater for generating a vapor bubble in the ink to eject a drop through the nozzle. The heater has contacts for electrical connection with the pair of contacts, a heater element suspended in the chamber between the contacts and the nozzle, and sloped side portions extending between the heater element and the contacts. The heater element has higher electrical resistance than the contacts and the sloped side portions.

  • Pub Date: 2008/17/11
  • Number: 07628471
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Game with award based on sub-game outcomes and method

Disclosed are games, gaming machines, gaming systems and methods including a primary game award at least partially based on the outcomes of one or more sub-games. The outcomes are related according to a pay table associated with the primary game.

  • Pub Date: 2008/17/11
  • Number: 08613647
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed system checker

A distributed system checker may check a distributed system against events to detect bugs in the distributed system. The events may include machines crashes, network partitions, and packet losses, for example. The distributed system checker may check a distributed system that can have multiple threads and multiple processes running on multiple nodes. To obtain control over a distributed system, a distributed system checker may insert an interposition layer between a process and the operating system on each node.

  • Pub Date: 2008/17/11
  • Number: 07984332
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for treating purpura

Embodiments of the present invention are directed to compositions and methods for the treatment of purpura. Preferred compositions comprise an α adrenergic receptor agonist selected from selective αadrenergic receptor agonist, selective αadrenergic receptor agonist, non-selective α/αadrenergic receptor agonist, agents with αadrenergic receptor agonist activity and combinations thereof, in a pharmaceutically acceptable carrier in order to treat and improve the cosmetic appearance of hemorrhagic (purpuric) lesions in the skin.

  • Pub Date: 2008/17/11
  • Number: 08114898
  • Owner: Allergan, Inc.
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for establishing virtual devices

Techniques for establishing virtual devices are presented. A legacy control system is encapsulated as a virtual device. The virtual device is isolated within a host hardware associate with a host OS and access to and from the virtual device is authenticated and controlled by the host OS. Legacy hardware used by the legacy control system is connected to the host hardware, thereby permitting the legacy control system to continue to access the legacy hardware when the virtual device processes.

  • Pub Date: 2008/14/11
  • Number: 08051432
  • Owner: Novell, Inc.
  • Location: Provo, US
  • Details: Visit USPTO

Visit USPTO Page


System for collecting computer application usage data of targeted application programs executed on a plurality of client devices

A system and method for collecting computer application usage data from a plurality of client devices. The system may include a monitoring program executable on each of the plurality of client devices. The monitoring program may be configured to receive from a server via a computer network monitoring data including one or more application identifiers, and to identify one or more target application programs executed on the client device as matching one of the identifiers. The monitoring program may further be configured to gather usage data for the target application program over a period of time, and send a message back to the server including the usage data. Reports may be generated based on the usage data.

  • Pub Date: 2008/14/11
  • Number: 08713157
  • Owner: Interpret, LLC
  • Location: Santa Monica, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for comparing and reviewing documents

A document processing system for accurately and efficiently analyzing documents and methods for making and using same. Each incoming document includes at least one section of textual content and is provided in an electronic form or as a paper-based document that is converted into an electronic form. Since many categories of documents, such as legal and accounting documents, often include one or more common text sections with similar textual content, the document processing system compares the documents to identify and classify the common text sections. The document comparison can be further enhanced by dividing the document into document segments and comparing the document segments; whereas, the conversion of paper-based documents likewise can be improved by comparing the resultant electronic document with a library of standard phrases, sentences, and paragraphs. The document processing system thereby enables an image of the document to be manipulated, as desired, to facilitate its review.

  • Pub Date: 2008/14/11
  • Number: 08196030
  • Owner: PricewaterhouseCoopers LLP
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Protected information stream allocation using a virtualized platform

A protected stream manager includes one or more subsystems to receive a content stream in a virtual environment, obfuscate the content stream, and prioritize use of a processor to process the content stream.

  • Pub Date: 2008/14/11
  • Number: 09405931
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Programming APIS for an extensible avatar system

Disclosed is an application programming interface (API) that provides for an extensible avatar system. In one embodiment an API may allow video game applications to retrieve structures of data which represent an avatar. The game can then take those structures and incorporate the data into its own rendering system. In another embodiment an API may allow a video game application to render an avatar to a render target or texture wherein the video game system performs rendering and animation functions.

  • Pub Date: 2008/14/11
  • Number: 08446414
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service

In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services.

  • Pub Date: 2008/14/11
  • Number: 08584212
  • Owner: salesforce.com, inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-tenancy using suite of authorization manager components

Embodiments described herein are directed to implementing a multi-tenancy service component configured to provide multi-tenancy capabilities for submitted services. In one embodiment, a computer system instantiates a hosting service that includes a multi-tenancy component configured to provide resource access to multiple users through a single multi-tenant resource instance. The computer system receives a submitted service submitted to be hosted by the hosting service. The submitted service includes a portion of use information usable to configure parameters of the multi-tenancy component. The computer system configures the multi-tenancy component to provide resource access for multiple users through a single multi-tenant resource instance, where each user provides a resource instance claim indicating a resource instance level authorization for the user. The computer system also provides resource access to each of the users through the single multi-tenant resource instance, based on the resource instance level authorization included in the resource instance claim.

  • Pub Date: 2008/14/11
  • Number: 08271536
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for rapid and cost-effective development of user generated content

An express content metadata system (“ECM”) may provide functionality for uploading, querying and downloading game content without heavy coding requirements on the part of the developers. The ECM may provide fast indexing, searching and data retrieval of content. The ECM may manage evolving changes to content definitions by providing flexible and efficient versioning control over content definitions that allows multiple versions of game content to coexist and be independently searchable.

  • Pub Date: 2008/14/11
  • Number: 08356059
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for preserving virtual desktops for e-discovery through an agent-less solution

A method and apparatus for preserving virtual desktops for e-discovery using an agent-less solution is provided. In one embodiment, the method for providing an agent-less solution to prevent at least one virtual desktop from expiration comprises processing a directory to identify at least one virtual machine used by at least one data custodian as at least one virtual desktop and automatically communicating at least one snapshot of the at least one virtual machine to preserve the at least one virtual desktop.

  • Pub Date: 2008/14/11
  • Number: 08707299
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating public records of supply transactions

A platform facilitates buyers, sellers, and third parties in obtaining information related to each other's transaction histories, such as a supplier's shipment history, the types of materials typically shipped, a supplier's customers, a supplier's expertise, what materials and how much a buyer purchases, buyer and shipper reliability, similarity between buyers, similarity between suppliers, and the like. The platform aggregates data from a variety of sources, including, without limitation, customs data associated with actual import/export transactions and facilitates the generation of reports as to the quality of buyers and suppliers, the reports relating to a variety of parameters that are associated with buyer and supplier quality.

  • Pub Date: 2008/14/11
  • Number: 08473354
  • Owner: Panjiva, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Display of taxi route control point information

Methods, systems, and computer-readable media described herein provide for the display of taxi route control point information in conjunction with an alphanumeric taxi route display in an aircraft. Taxi route data is received and compared with airport map information to determine any taxi route control points along the taxi route. Information associated with the taxi route control points is then collected and displayed on a display unit of the aircraft in conjunction with an alphanumeric display of the taxi route. The information associated with the taxi route control points may include ATC clearance information, runway and taxiway status information, runway orientation information, runway and taxiway traffic information, or taxi route information such as distance remaining to the taxi route control point.

  • Pub Date: 2008/14/11
  • Number: 08386167
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Coating composition, a coated article, and method of forming such articles

The instant invention is a coating composition, a coated article, and method forming such coated articles. The coating composition comprises (a) a dispersion; and (b) a solution acrylic polymer, an emulsion polymer latex, or combinations thereof. The dispersion comprises at least one or more base polymers selected from the group consisting of an ethylene-based thermoplastic polymer, a propylene-based thermoplastic polymer, and mixtures thereof; at least one or more stabilizing agents; and a fluid medium. A coated article comprises a substrate comprising cellulosic materials; and at least one or more coating layers present on at least one or more surfaces of the substrate. The one or more coating layers may be derived from a coating composition comprising (a) a dispersion; and (b) a solution acrylic polymer, an emulsion polymer latex, or combinations thereof. The dispersion comprises at least one or more base polymers selected from the group consisting of an ethylene-based thermoplastic polymer, a propylene-based thermoplastic polymer, and mixtures thereof; at least one or more stabilizing agents; and a fluid medium. The method of forming a coated article comprises the steps of (1) selecting a substrate comprising cellulosic materials; (2) selecting a coating composition comprising (a) a dispersion comprising at least one or more base polymers selected from the group consisting of an ethylene-based thermoplastic polymer, a propylene-based thermoplastic polymer, and mixtures thereof; at least one or more stabilizing agents; and a fluid medium; and (b) a solution acrylic polymer, an emulsion polymer latex, or combinations thereof; (3) applying said coating composition to at least one or more surfaces of said substrate; (4) removing a at least a portion of the water; and (5) thereby forming said coated article.

  • Pub Date: 2008/14/11
  • Number: 08859661
  • Owner: Dow Global Technologies LLC
  • Location: Midland, US
  • Details: Visit USPTO

Visit USPTO Page


Bi-directional optical link between multiple data sources and a processing node in an avionics platform

A fiber optic link for platforms with data sources including, e.g., sensors, cameras, radars and antennas. An array of optical transmitter/receiver pairs is coupled to an integrating network of the platform. Data modules are each coupled to certain ones of the data sources and include a receiver for detecting control data, and a modulator for modulating a light signal according to signals from the module's data sources. At least one optical fiber is coupled between a given transmitter/receiver pair of the array, and a corresponding data module. A laser source associated with each transmitter supplies a light signal with the control data to a corresponding data module downstream over an optical fiber. The light signal is modulated by the signals from the module's data sources, and the modulated light signal is returned to an array receiver upstream over an optical fiber.

  • Pub Date: 2008/14/11
  • Number: 08032032
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for volume rendering on multiple graphics processing units (GPUs)

A method for volume rendering a volumetric dataset with multiple graphics processing units (GPUs) coupled to a computer system, comprises building a block hierarchical structure of blocks for the volumetric dataset, the block hierarchy comprising a block sequence; partitioning the block sequence into a plurality of groups; determining a target work load for each GPU; allocating each group of the plurality to a respective GPU in accordance with the target load; rendering respective intermediate images by the respective GPUs; and compositing for a final image by blending the respective intermediate images.

  • Pub Date: 2008/14/11
  • Number: 08330763
  • Owner: Siemens Aktiengesellschaft
  • Location: Munich, DE
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for automatically analyzing program for detecting malicious codes triggered under specific event/context

Provided is an apparatus and method for automatically analyzing a program in order to detect window malicious codes that are programmed to perform malicious behaviors when a specific event occurs, when the specific event does not occur, when a specific program execution condition is satisfied, and when the specific program execution condition is not satisfied.

  • Pub Date: 2008/14/11
  • Number: 08584101
  • Owner: Electronics and Telecommunications Research Institute
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


User interface for software applications

A user interface for software applications enables the full use of graphical user interface (GUI) software, particularly engineering design software, by visually impaired individuals. The interface combines tactile representations of graphical elements, non-visual cues, and a hardware element to allow the effective placement and interconnection of graphic elements using design software.

  • Pub Date: 2008/13/11
  • Number: 08201090
  • Owner: The Board of Trustees of the University of Arkansas
  • Location: Little Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for collaboratively creating applications using a multiple source file project that can be accessed and edited like a single file

Certain embodiments facilitate collaboration between designers and developers in the creation of software applications. Designers and developers can work on the same multi-file-based software development project, without the designer having to address or even be aware of the multi-file structure of the project or the management of different versions of the project. Instead the designer can receive and send the project as a single file and work with it as if it were a single document. A developer or another user can address conflicts and other versioning issues that may result from collaborators making changes concurrently.

  • Pub Date: 2008/13/11
  • Number: 08453112
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for interfacing interactive systems with social networks and media playback devices

A system and method for interfacing interactive systems with social networks and media playback devices is described. For example, a system for generating and interacting with media content is described. In one embodiment, the system includes an interactive system that displays media content, wherein the interactive system includes a first computer and sensors for recording a user's interaction with the displayed media content, and a kiosk that allows a user to share the interactive media content with social networks and media playback devices, wherein the interactive media content includes the media content and metadata representing the user's recorded interaction with the media content.

  • Pub Date: 2008/13/11
  • Number: 08745502
  • Owner: Snibbe Interactive, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Self-learning integrity management system and related methods

An integrity management system predicts abnormalities in complex systems before they occur based upon the prior history of abnormalities within the complex system. A topology of the nodes of a complex system is generated and data is collected from the system based on predetermined metrics. In combination with dynamic thresholding, fingerprints of the relevant nodes within a complex system at various time intervals prior to the occurrence of the abnormality are captured and weighted. The fingerprints can then be applied to real-time data provide alerts of potential abnormality prior to their actual occurrence.

  • Pub Date: 2008/13/11
  • Number: 07801703
  • Owner: Integrien Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Query proxy system for client-specified models

A system for translating a query expression for a client-specified model (CSM) to a plurality of query expressions compatible with the object model(s) for a plurality of source systems. The source systems comprise a plurality of databases. The databases comprise source information and X sets of response data. The source information comprises mapping metadata and object model metadata. The X sets of response data is data response to a client query. The client comprises client-specified mapping metadata, a CSM, and a query proxy. The query proxy comprises an import module, a client interface module, and a translator module. The import module imports the source information from the plurality of source systems and determines the mapping metadata and the object model metadata. The client interface module receives the CSM, the client-specified mapping metadata, and a query from a client. The translator module parses the query expression and translates a plurality of query expressions compatible with the object model(s) for the plurality of source systems.

  • Pub Date: 2008/13/11
  • Number: 08918412
  • Owner: Progress Software Corporation
  • Location: Bedford, US
  • Details: Visit USPTO

Visit USPTO Page


Method for treating carbon nanotubes, carbon nanotubes and carbon nanotube devices

A method for treating carbon nanotubes is provided. In the method for treating carbon nanotubes (CNTs), the CNTs are treated with SOgas at an elevated temperature, for example, at a temperature in the range of 385° C. to 475° C.

  • Pub Date: 2008/13/11
  • Number: 07887773
  • Owner: Sony Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method, apparatus, and product for prohibiting unauthorized access of data stored on storage drives

A method, apparatus, and computer program product are disclosed in a data processing system for prohibiting unauthorized access of data that is stored on storage drives. Multiple logical partitions are generated. A different unique randomizer seed is associated with each one of the logical partitions. In response to one of the logical partitions needing to access a storage drive, the logical partition transmits a seed to the storage drive. The transmitted seed is associated with the one of the logical partitions. A transmitting one of the logical partitions is unable to transmit a seed that is other than a seed that is associated with the transmitting one of the logical partitions. The storage drive utilizes the transmitted seed to randomize and de-randomize data for the one of the logical partitions. Data randomized for one of the logical partitions cannot be de-randomized for a different one of the logical partitions.

  • Pub Date: 2008/13/11
  • Number: 07865690
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Management of sub-problems in a dynamic constraint satisfaction problem solver

A solver solves a dynamic constraint satisfaction problem that is modeled as a constraint network of variables and constraints. The solver generates a dynamic sub-problem facility that includes one or more sub-problem pools that each comprises a sub-problem type, one or more sub-problems for the sub-problem type, and one or more clients for the sub-problem type. The solver generates a sub-problem set domain that comprises zero or more included sub-problems and zero or more excluded sub-problems. The solver synchronizes the sub-problem set domain with the dynamic sub-problem facility.

  • Pub Date: 2008/13/11
  • Number: 08065255
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Image processing apparatus, and method for controlling the same

An information processing apparatus fully utilizing contents available on a network by processing content that cannot be displayed on a built-in browser. A web browser displays in a pop-up fashion a dialog window that queries a user about the process to be performed on undisplayable data if the received data is undisplayable. The user can select between “print” and “send” as an alternative process for the undisplayable data.

  • Pub Date: 2008/13/11
  • Number: 07992083
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Facilitating transition of network operations from IP version 4 to IP version 6

Methods, apparatuses and systems directed to facilitating transitions from IPv4 to IPv6 networks. In particular implementations, the invention facilitates or enables accessibility of network application services between IPv4 and IPv6 hosts, or traversal of network paths including both IPv6 or IPv4 domains. Particular implementations of the invention are directed to selective mapping of network layer addresses between IPv6 and IPv4 protocols and Domain Name System records under one or more policy controls. Other implementations of the invention are directed to a proxy-to-proxy based tunnel architecture allowing hosts implementing a first network layer protocol, such as IPv4, to traverse a network implementing a second network layer protocol, such as IPv6.

  • Pub Date: 2008/13/11
  • Number: 07924832
  • Owner: Blue Coat Systems, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Executable template

Systems, methods, and other embodiments associated with executable templates are described. One example method includes generating an executable template from a set of template data. When an executable template is executed, the executable template creates one or more instantiated entities. These instantiated entities may then be combined with entities created from portions of the original template that were not compilable into the executable format.

  • Pub Date: 2008/13/11
  • Number: 08321846
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic constraint satisfaction problem solver

A system for solving a dynamic constraint satisfaction problem comprises a constraint network of variables and constraints. The system creates a first sub-problem model that includes a first model type, one or more first variables and zero or more first constraints. The system propagates the first constraints through the constraint network and determines if a first conflict is detected from propagating the first constraints. If the first conflict is detected, the system restores the constraint network variables to a first previous state before the first constraints were propagated. The system creates a first sub-problem set that includes a second model type and one or more sub-problem models. The system connects the first sub-problem model to the first sub-problem set via a second constraint and propagates the second constraint through the constraint network.

  • Pub Date: 2008/13/11
  • Number: 08504501
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Cross-browser toolbar and method thereof for facilitating cross-browser interoperability

A cross-platform toolbar and method thereof is disclosed. The toolbar includes a toolbar render object defining at least user interface elements of the cross-browser toolbar; a script file defining at least event handlers associated with the user interface elements; toolbar libraries including at least application programming interfaces (APIs) and script files supporting a specific web browser type; and a unique dynamic-link library (DLL) file assigned with the toolbar libraries and the script file.

  • Pub Date: 2008/13/11
  • Number: 08341608
  • Owner: Visicom Media, Inc.
  • Location: Brossard (Quebec), CA
  • Details: Visit USPTO

Visit USPTO Page


User authorization system and methods

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A computerized authorization system authorizes users access to the slot management system.

  • Pub Date: 2008/12/11
  • Number: 08201229
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for validating download or configuration assignment for an EGM or EGM collection

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify different game devices and other related activities. The slot management system includes a validator that validates assignments to modify game devices.

  • Pub Date: 2008/12/11
  • Number: 08347280
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for one-way delivery of notifications from server-to-clients using modified multicasts

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A notification system and method is provided for providing one-way delivery of notifications to clients of a server.

  • Pub Date: 2008/12/11
  • Number: 08275848
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for controlling a digital video recorder in response to a telephone state transition

A system and method for controlling a digital video recorder on a cable network. Signaling associated with the answering or initiation of a digital telephone call by a digital telephone subscriber is used to issue commands to a digital video recorder (DVR). A signal is generated by an MTA when the telephone is enters an “off-hook” state and sent to the DVR to initiate recording of a program being viewed by the called party. When the phone goes “on-hook”, the called party resumes watching the program from exactly where it was interrupted. The MTA may be connected directly to the VTD/DVR and the telephone state is determined by the DVR from information provided by the MTA. Alternatively, a soft switch monitors signaling from the MTA indicative of the state of the called telephone. A telephone state message comprising the telephone state information is then sent over an out-of-band channel/path to a DVR client within the VTD. The DVR client uses the telephone state information to control a DVR.

  • Pub Date: 2008/12/11
  • Number: 08204354
  • Owner: Time Warner Cable, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Rapid and sensitive method to measure endonuclease activity

A rapid and sensitive method to measure endonuclease activity comprising reacting a substrate suspected of having endonuclease activity with a synthetic nucleotide to induce endonuclease cleavage of the synthetic nucleotide followed by measurement of activity by carrying out a polymerase chain reaction (PCR). When no polymerase chain reaction takes place when carrying out the method it is indicative of no endonuclease activity in the substrate. Synthetic oligonucleotides, primers, and probes useful for carrying out the method are disclosed.

  • Pub Date: 2008/12/11
  • Number: 08129149
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for identifying an application and controlling its network utilization

In embodiments of the present invention improved capabilities are described for improving network quality of service, such as through controlling the bandwidth consumed by a client computing facility. To affect this, the software applications operating through the client computing facility may be identified to determine which applications are requesting network access, and confirming which are permitted only restricted bandwidth when making network communications. The requesting software application that is permitted only restricted bandwidth may then be allowed to make the network communications through a bandwidth restricted network connection.

  • Pub Date: 2008/12/11
  • Number: 08346923
  • Owner: Sophos PLC
  • Location: Abingdon, GB
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing download and configuration job progress tracking and display via host user interface

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A download tracking system and method is provided for providing dynamic monitoring and displaying of download progress.

  • Pub Date: 2008/12/11
  • Number: 09082258
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Knowledge storage and retrieval system and method

A system and method for representing, storing and retrieving real-world knowledge on a computer or network of computers is disclosed. Knowledge is broken down into permanent atomic “facts” which can be stored in a standard relational database and processed very efficiently. It also provides for the efficient querying of a knowledge base, efficient inference of new knowledge and translation into and out of natural language. Queries can also be processed with full natural language explanations of where the answers came from. The method can also be used in a distributed fashion enabling the system to be a large network of computers and the technology can be integrated into a web browser adding to the browser's functionality.

  • Pub Date: 2008/12/11
  • Number: 08468122
  • Owner: Evi Technologies Limited
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Gaming machine collection and management

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A computerized method and system manage a collection of electronic gaming machines.

  • Pub Date: 2008/12/11
  • Number: 08131829
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Download and configuration management engine for gaming system

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. A download and configuration system controller and method is provided for managing the download and configuration server-based sub-system.

  • Pub Date: 2008/12/11
  • Number: 08930461
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Assignment template and assignment bundle in a gaming configuration and download system

A slot management system including a download and configuration server-based sub-system and method is disclosed for use with game devices, systems, and methods is provided to enable users to monitor, control, and modify game devices and other related activities. An assignment-creator/modifier is provided for creating and modifying assignment templates for assignments that include at least one job to modify a gaming machine.

  • Pub Date: 2008/12/11
  • Number: 08920233
  • Owner: Bally Gaming, Inc.
  • Location: Las Vegas, US
  • Details: Visit USPTO

Visit USPTO Page


Alteration of tobacco alkaloid content through modification of specific cytochrome P450 genes

Compositions and methods for reducing the level of nornicotine and N′-nitrosonornicotine (NNN) in plants and plant parts thereof are provided. The compositions comprise isolated polynucleotides and polypeptides for cytochrome P450s that are involved in the metabolic conversion of nicotine to nornicotine in these plants. Expression cassettes, vectors, plants, and plant parts thereof comprising inhibitory sequences that target expression or function of the disclosed cytochrome P450 polypeptides are also provided. Methods for the use of these novel sequences to inhibit expression or function of cytochrome P450 polypeptides involved in this metabolic conversion are also provided. The methods find use in the production of tobacco products that have reduced levels of nornicotine and its carcinogenic metabolite, NNN, and thus reduced carcinogenic potential for individuals consuming these tobacco products or exposed to secondary smoke derived from these products.

  • Pub Date: 2008/12/11
  • Number: 08124851
  • Owner: University of Kentucky Research Foundation
  • Location: Lexington, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program for selecting at least one predefined workflow based on an interaction with a user

A system, method, and computer program product are provided for selecting at least one predefined workflow based on an interaction with a user. In operation, a plurality of predefined workflows are stored. Additionally, information regarding an interaction with a user is received. Furthermore, at least one of the predefined workflows is selected, based on the information.

  • Pub Date: 2008/11/11
  • Number: 09459764
  • Owner: Amdocs Software Systems Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Programmable effects for a user interface

A programmable effects system for graphical user interfaces is disclosed. One embodiment comprises receiving one or more effect elements to apply to an element in a graphical user interface for a device, ordering the effect elements in a pipeline of operations, and storing the pipeline of operations in an effect template. Then, after the graphics hardware capability for a device is determined, the effect template may be used to create a shader that includes supported effects to render an element in the graphical user interface.

  • Pub Date: 2008/11/11
  • Number: 08614709
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Image storing and printing device with replaceable casing

An image storage device comprising a chassis carrying a memory for storing at least one image, a pagewidth print head for printing said stored image, an ink supply means for supplying ink to the print head, a supply of print media on to which said stored image is printed, and a casing surrounding and encasing said chassis so that the supply of print media is unable to be accessed without destruction of the casing. The casing comprises a front shell and a back shell, the front and back shells adapted to be snap-on fitted to each other. The back shell comprises a clamp strip adapted to clamp to the cover a wrapper label.

  • Pub Date: 2008/11/11
  • Number: 07864212
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Dual-component state token with state data direct access index for systems with high transaction volume and high number of unexpired tokens

Access to state data by a client process such as state data in an Online Transaction Processing arrangement is controlled through generation of and exchanging of a dual-component token. The first component of the token is an Index value which indirectly points to a block of state data assigned to process or user. The second component of the token is a sequence value, such as a Random Unique Sequence value, which is also associated with the block of state data for a process. With each transaction request, a user process provides the token to the OLTP server, which then verifies the sequence numbers of the state data and the token match before allowing access to the data.

  • Pub Date: 2008/11/11
  • Number: 07689701
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Composite endpoint mechanism

A multimedia call from an originating device is provided. At least one session may be created at an application server in response to receiving the multimedia call. An endpoint may be created within the session for communication between the originating device and the application server. The endpoint may be a composite endpoint for communication between the originating device and two or more terminating devices. The composite endpoint may be include two or more logical endpoints for communicating with and respectively associated with the two terminating devices. A portion or more of the multimedia call may be delivered from the application server to each of the terminating devices using the logical endpoint associated with each terminating device.

  • Pub Date: 2008/11/11
  • Number: 09374391
  • Owner: BroadSoft, Inc.
  • Location: Gaithersburg, US
  • Details: Visit USPTO

Visit USPTO Page


Compact modeling of circuit stages for static timing analysis of integrated circuit designs

Systems, apparatus, and methods of timing analysis with a multi-operating region gate model are disclosed, including modeling a logic gate with a constant direct current (DC) voltage source during a steady state region of operation; in response to a transition from the steady state region of operation, modeling the logic gate with a time-varying voltage dependent current source during a varying current region of operation; and, in response to a transition from the variable current region of operation, modeling the logic gate with a time-invariant voltage dependent current source during an asymptotic region of operation. Instantaneous output current provided by the time varying voltage dependent current source in the VCR region is responsive to time and the instantaneous output voltage of the logic gate. Instantaneous output current provided by the time-invariant voltage dependent current source in the AR region is responsive to the instantaneous output voltage of the logic gate.

  • Pub Date: 2008/11/11
  • Number: 08302046
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Cloning virtual machines

While current solutions for cloning virtual machines can involve copying and duplicating files associated to a virtual machine (VM), systems and techniques can be devised to create thin clones of a VM using the VM's associated storage system to copy and deduplicate storage for the VMs. One can create a base VM in a directory of a storage container attached to a hypervisor, and then map the storage container to a volume on a storage system. One can clone the base VM using a snapshot of respective files associated to the base VM, which can comprise creating metadata that identified a physical storage location of the files. Further, the metadata can then be copied to a desired location on the storage container, to create a VM clone. Once copied, the cloned VM can be customized and registered within the hypervisor.

  • Pub Date: 2008/11/11
  • Number: 08566821
  • Owner: NetApp Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Biometric adjustments for touchscreens

In some embodiments, a touchscreen may display a graphical user interface with one or more input options and may detect which input options are selected by a user by detecting a user's contact on the touchscreen. The system may determine a new graphical user interface configuration to increase the size and/or spacing of the input options. In some embodiments, one or more of the input options may be removed to increase the space available to increase the size of the other input options. In some embodiments, the system may maintain a history of input option use to determine which input options to remove. In some embodiments, the new graphical user interface configuration may include smaller (and/or additional) input options (e.g., if the contact areas are detected as consistently within the displayed input options).

  • Pub Date: 2008/11/11
  • Number: 08704775
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system and method for exchanging lead information

An apparatus, system and method is described for exchanging lead information in a bid process that provides end users, consumers, lead buyers, aggregators and sellers that aggregate the leads through marketing a platform to bid on the leads based on pre-determined criteria such as zip code, buy price field, etc without having duplicate lead information pass to any one entity.

  • Pub Date: 2008/11/11
  • Number: 08010416
  • Owner: Lead Bid, Inc.
  • Location: Islip, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for processing backup data for identifying and handling content

Techniques for processing backup data for identifying and handling content are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for analyzing data for backup comprising analyzing data to identify target data, identifying target data, and handling the identified target data according to one or more pre-determined conditions.

  • Pub Date: 2008/10/11
  • Number: 08484737
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and software application for enabling a user to view and interact with a visual map in an external application

The present invention provides a system, method, and software program for enabling a user to view and interact with a visual map in an external application. According to one embodiment of the invention, a visual mapping application creates a file with (i) visual map data and (ii) software code capable of being executed by an external application to display the visual map and provide select visual mapping application in the external application. In one embodiment, such functionality includes the ability to expand and collapse map topics, scroll the map, zoom in and out, follow hypertext links in the map, find content in the map, and print the map. The created file can be thought of as a “visual map player” in that an external application can “play” the created file, resulting in a live map in the external application.

  • Pub Date: 2008/10/11
  • Number: 09396455
  • Owner: Mindjet LLC
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and software application for displaying data from a web service in a visual map

The present invention provides a system, method, and software application for enabling a user to view data from an external data source in a visual map, wherein the external data source has a web services interface. Visual mapping software on a computer provides a visual mapping interface in which a user can create, edit, and/or view a visual map. Within the visual mapping interface, the visual mapping software provides the user with an option to obtain data from one or more data sources associated with a web service. In response to the user selecting a data source associated with a web service, the visual mapping software builds a web service request for the web service associated with the selected data source. The visual mapping application makes a call to the applicable web service with the web service request. The visual mapping application subsequently receives data from the web service and transforms the data into a format that can be used to generate visual map data. The visual mapping software then displays the data in a visual map.

  • Pub Date: 2008/10/11
  • Number: 09047388
  • Owner: Mindjet LLC
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multipoint video teleconferencing

In accordance with one or more embodiments of the present disclosure, systems and methods disclosed herein provide for multipoint video teleconferencing via a communication network utilizing a relay communication device. The system comprises a plurality of video teleconferencing sites adapted to transmit and receive audio and video data via the relay communication device. Each video teleconferencing site is adapted to transmit audio and video data to the relay communication device. Each video teleconferencing site is adapted to receive audio and video data from the relay communication device, assemble the received audio and video data from each of the other video teleconferencing sites, and present the assembled audio and video data to one or more viewers via an audio and video interface.

  • Pub Date: 2008/10/11
  • Number: 08194116
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Semantic data migration

Migrating data within a storage area network is disclosed. A migration plan is created, the migration plan to move data stored in the storage area network, wherein each element of data is to be moved from a source location to a destination location according to a mapping therebetween. A virtual identifier is assigned to each mapping according to the migration plan. The migration plan is executed. Upon completion of the movement of an element of data, the virtual identifier for the mapping of that element of data is assigned to a resultant location to which that element of data is moved. Upon completion of the execution of the migration plan, the movement of the data is verified by comparing, for each element of data, the virtual identifier of the mapping and the virtual identifier of the resultant location.

  • Pub Date: 2008/10/11
  • Number: 08275748
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Recommended application evaluation system

A code evaluation tool greatly reduces time, cost, and other resource expenditures needed to validate that an application implements desired functionality. The tool is a search, navigation and visualization tool that accepts high-level processing concepts as inputs to identify, rank, and return the code of a recommended application. A software developer may use the tool to validate that functional requirements are met by the recommended application. The tool provides an efficient way to improve the evaluation of application logic to validate that the application meets specified functional requirement and implements the desired high-level processing concepts.

  • Pub Date: 2008/10/11
  • Number: 09021416
  • Owner: Accenture Global Service Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus related to transmission of confidential information to a relying entity

In one embodiment, a method includes defining a request for confidential information from a domain of confidential information based on an input from a relying entity. The domain of confidential information can be associated with a subject entity. A response to the request can be defined at an information provider. The method can also include sending the response to the relying entity when the response has been approved by the subject entity.

  • Pub Date: 2008/10/11
  • Number: 08464313
  • Details: Visit USPTO

Visit USPTO Page


End to end data transfer

A method, apparatus and system for data transfer is disclosed. For example, settings from multiple entities arranged in a multi-tier control plane are used to set data transfer policies. The policies are use to govern data transfers such as between end users or from an origin server.

  • Pub Date: 2008/10/11
  • Number: 07720933
  • Owner: Limelight Networks, Inc.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Active access monitoring for safer computing environments and systems

Techniques for controlling access are disclosed. The techniques can be used for reference monitoring in various computing systems (e.g., computing device) including those that may be relatively more susceptible to threats (e.g., mobile phones). Allowed access can be disallowed. In other words, permission to access a component can be effectively withdrawn even though access may be on-going. After permission to access a component has been allowed, one or more disallow access conditions or events can be effectively monitored in order to determine whether to withdraw the permission to access the component. As a result, allowed access to the component can be disallowed. Access can be disallowed by effectively considering the behavior of a component in the aggregate and/or over a determined amount of time. By way of example, a messaging application can be disallowed access to a communication port if the messaging application sends more messages than an acceptable limit during a session or in 4 hours. Disallow-access policies, rules and/or conditions can be defined and modified, for example, by end-users and system administrators, allowing a customizable and flexible security environment that is more adaptable to change.

  • Pub Date: 2008/10/11
  • Number: 08631468
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon, KR
  • Details: Visit USPTO

Visit USPTO Page


Representing scene description in databases

Digital production assets and their attributes are stored directly in a scene description database, without any association with a specific enclosing asset data file. Software applications perform database queries to retrieve assets and attributes from the database. Changes to assets or new assets are stored in the database. Query results may be cached to improve performance. Heterogeneous opinion sets including sparse opinions of attribute values may be used to specify scene description data. The database stores heterogeneous opinion set data in association with attribute values. Database-aware applications may change the scene description data in the database without loading, parsing, and instantiating scene description data. An application generates database queries and instantiates scene description data from query results for access and manipulation by other applications.

  • Pub Date: 2008/08/11
  • Number: 08352443
  • Owner: Pixar
  • Location: Emeryville, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for executing applications using native code modules

Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system provides input data associated with the web application to the native code module and processes the input data using the native code module to obtain output data. Finally, the system provides the output data to the web application for use by the web application.

  • Pub Date: 2008/07/11
  • Number: 09176754
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Installer-free applications using native code modules and persistent local storage

Some embodiments provide a system that executes an application. During operation, the system obtains a resource list associated with the application and stores a set of resources including a native code module from the resource list through communications over a network connection, wherein the resources are stored in persistent local storage. The application then loads the application in the web browser and loads the native code module into a secure runtime environment. Next, the application executes the application independently of the network connection using the native code module and the stored resources.

  • Pub Date: 2008/07/11
  • Number: 08626919
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Incorporating player-generated audio in an electronic game

Incorporating player-generated audio in an electronic game is disclosed. Incorporation may include receiving an audio clip from an electronic game player, applying a modification to the audio clip to generate a chant, associating the chant to the execution of an event in the electronic game, retrieving the chant when the event in the electronic game is executed, and initiating the play of the chant upon execution of the event in the electronic game.

  • Pub Date: 2008/07/11
  • Number: 09352219
  • Owner: Sony Interactive Entertainment America LLC
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware-accelerated graphics for web applications using native code modules

Some embodiments provide a system that executes a web application. During operation, the system loads the web application in a web browser and loads a native code module associated with the web application into a secure runtime environment. Next, the system writes a set of rendering commands to a command buffer using the native code module and concurrently reads the rendering commands from the command buffer. Finally, the system renders an image for use by the web application by executing the rendering commands using a graphics-processing unit (GPU).

  • Pub Date: 2008/07/11
  • Number: 08294723
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Hardware-accelerated graphics for user interface elements in web applications

Some embodiments provide a system that renders a user interface (UI) element for a web application. During operation, the system loads the web application in a web browser and obtains a rendering request for the UI element from the web application. Next, the system generates a graphics-processing unit (GPU) command stream corresponding to the UI element based on the rendering request. Finally, the system sends the GPU command stream to a GPU, where the UI element is rendered by the GPU.

  • Pub Date: 2008/07/11
  • Number: 09508108
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Command buffers for web-based graphics rendering

The described embodiments provide a system that renders graphics for a computer system. During operation, the system loads a software client and a software service in the computing system. Next, the system receives a set of rendering commands from the software client in a command buffer, wherein the rendering commands include at least one of a state change command, a resource allocation command, a direct memory access (DMA) command, buffer data, and a synchronization command. Finally, the system uses the software service to render an image corresponding to the rendering commands by reading the rendering commands from the command buffer and executing the rendering commands.

  • Pub Date: 2008/07/11
  • Number: 08675000
  • Owner: Google, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network

A method and computer executable program code are disclosed for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.

  • Pub Date: 2008/06/11
  • Number: 08706576
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for image generation, delivery, and management

A system and method for digital image generation, delivery, and management is provided. The automated image generation, delivery, and management system and method serves processed images over a network. A requesting application provides a URL in addition to field values. The image delivery system retrieves and serves an image based on the requested URL. A sized image and a default image are saved in a database for rapid retrieval. If the system can generate an image sized to the request, it does so. Otherwise, the system visits the URL to obtain a snapshot of the rendered webpage. If no webpage is available with the URL as provided, the URL is truncated until a displayable webpage is rendered.

  • Pub Date: 2008/06/11
  • Number: 08260800
  • Owner: Nexplore Technolgies, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic search result highlighting

A dynamic highlighting system initially applies a high-level highlight to occurrences of one or more keywords in a search result that fades to a low-level highlight effect. The system receives search results from a search engine and identifies occurrences of keywords in the search results. The system applies a first highlight effect to identified occurrences of the keywords and displays the search results incorporating the highlighted keywords. Upon detecting the occurrence of a highlighting change event, such as the expiration of a timer, the system applies a second highlight effect to the displayed search results. The second highlight effect may include removing the highlight or displaying a muted highlight effect. Thus, the dynamic highlighting system provides an initial noticeable highlight that fades to a level that is still noticeable but is less likely to distract the user from other elements of the user interface.

  • Pub Date: 2008/06/11
  • Number: 08259124
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for control systems with objects that are associated with live data

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/06/11
  • Number: 08225271
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless network selection management

Providing for network selection management for a mobile communication environment is provided herein. By way of example, the network selection can supersede default network selection configurations of a mobile terminal. Usage behaviors of mobile terminals can be monitored to gauge service demand for individual terminals. Based on the service demand, a particular network can be selected as a default for a terminal. The network selection can be utilized for load balancing terminals among suitable mobile networks, optimizing network resources, improving services for terminal devices, or the like.

  • Pub Date: 2008/05/11
  • Number: 08385200
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine file system restriction system and method

A method includes creating a virtual machine including a remote file system, a file system service, and a security application. Access to the remote file system is restricted with the security application upon an unknown malicious code outbreak. The more that is known about the threat, the more precise are the restrictions placed upon the file system thus reducing the impact on users of the file system to an absolute minimum.

  • Pub Date: 2008/05/11
  • Number: 09450960
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Restroom convenience center

A restroom monitoring system for monitoring attributes of fixtures within a restroom using sensors. Additional attributes are determined from the monitored attributes. Consumable usage levels are estimated based on predetermined consumption levels associated with usage states of the fixtures. The restroom monitoring system provides an indication of the need for replenishment of consumables based on the monitored attributes of the fixtures. In addition, restroom monitoring system may provide additional information regarding the restroom attributes to a service provider, a manager or a user.

  • Pub Date: 2008/05/11
  • Number: 08364546
  • Owner: Sloan Valve Company
  • Location: Franklin Park, US
  • Details: Visit USPTO

Visit USPTO Page


Research rapidity and efficiency improvement by analysis of research artifact similarity

Methods for comparing query-related objects are provided. In one embodiment, a first plurality of query-related objects for a first user is compared to a second plurality of query-related objects for a second user to determine a degree of similarity between the first and second plurality of query-related objects. A notification of the degree of similarity is issued.

  • Pub Date: 2008/05/11
  • Number: 08583624
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Printhead unit cell having welled heater element

A unit cell of a printhead is provided having a multi-layer substrate defining an ink inlet, one or more side walls extending from the substrate around the ink inlet, a nozzle plate supported by the side walls to define a chamber in fluid communication with the ink inlet, where the nozzle plate defines an aperture through which ink in the chamber can be ejected, and a looped and elongate heater element suspended within the chamber, which can be heated so that bubbles are generated in ink within the chamber and ink is ejected from the aperture. The elongate heater element terminates in a peripheral well in which the side walls are received.

  • Pub Date: 2008/05/11
  • Number: 2064324
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Origin request with peer fulfillment

A method, apparatus and system for data transfer is disclosed. For example, settings from multiple entities arranged in a multi-tier control plane are used to set data transfer policies. The policies are use to govern data transfers such as between end users or from an origin server.

  • Pub Date: 2008/05/11
  • Number: 08090860
  • Owner: Limelight Networks, Inc.
  • Location: Tempe, US
  • Details: Visit USPTO

Visit USPTO Page


Network device driver architecture

The invention proposes a network device driver architecture with functionality distributed between kernel space and user space. The overall network device driver comprises a kernel-space device driver () and user-space device driver functionality (). The kernel-space device driver () is adapted for enabling access to the user-space device driver functionality () via a kernel-space-user-space interface (). The user-space device driver functionality () is adapted for enabling direct access between user space and the NIC () via a user-space-NIC interface (), and also adapted for interconnecting the kernel-space-user-space interface () and the user-space-NIC interface () to provide integrated kernel-space access and user-space access to the NIC (). The user-space device driver functionality () provides direct, zero-copy user-space access to the NIC, whereas information to be transferred between kernel space and the NIC will be “tunneled” through user space by combined use of the kernel-space device driver (), the user-space device driver functionality () and the two associated interfaces ().

  • Pub Date: 2008/05/11
  • Number: 08332875
  • Owner: Telefonaktiebolaget LM Ericsson (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for reporting a missile threat to a commercial aircraft

An automatic system is provided for alerting ground personnel as to the existence of a threat to commercial aircraft in which the threat is determined by a classified system, but in which the local area network employed by the military missile warning is isolated from an unclassified local network coupled to the aircraft's transponder which transmits the threat existence and status to ground personnel. The barrier to transmitting classified information involves both filtering between the classified LAN and unclassified LAN, the use of only discrete signaling lines in the classified LAN isolated by opto-electronics to provide physical separation between the two local area networks, and communications formatting which precludes the transmission of classified information across the barrier between the classified local area network and the unclassified local area network.

  • Pub Date: 2008/05/11
  • Number: 08179288
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Metal ferrite spinel energy storage devices and methods for making and using same

1-100 nm metal ferrite spinel coatings are provided on substrates, preferably by using an atomic layer deposition process. The coatings are able to store energy such as solar energy, and to release that stored energy, via a redox reaction. The coating is first thermally or chemically reduced. The reduced coating is then oxidized in a second step to release energy and/or hydrogen, carbon monoxide or other reduced species.

  • Pub Date: 2008/05/11
  • Number: 08397508
  • Owner: The Regents of the University of Colorado
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Emotive text-to-speech system and method

Information about a device may be emotively conveyed to a user of the device. Input indicative of an operating state of the device may be received. The input may be transformed into data representing a simulated emotional state. Data representing an avatar that expresses the simulated emotional state may be generated and displayed. A query from the user regarding the simulated emotional state expressed by the avatar may be received. The query may be responded to.

  • Pub Date: 2008/05/11
  • Number: 09495787
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Emotive engine and method for generating a simulated emotion for an information system

Information about a device may be emotively conveyed to a user of the device. Input indicative of an operating state of the device may be received. The input may be transformed into data representing a simulated emotional state. Data representing an avatar that expresses the simulated emotional state may be generated and displayed. A query from the user regarding the simulated emotional state expressed by the avatar may be received. The query may be responded to.

  • Pub Date: 2008/05/11
  • Number: 08812171
  • Owner: Ford Global Technologies, LLC
  • Location: Dearborn, US
  • Details: Visit USPTO

Visit USPTO Page


Control systems and methods with versioning

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/05/11
  • Number: 08229579
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Control systems and methods with smart blocks

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/05/11
  • Number: 08028275
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Control systems and methods with composite blocks

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/05/11
  • Number: 07984420
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Control system configurator and methods with object characteristic swapping

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/05/11
  • Number: 08060222
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


Control system configurator and methods with edit selection

Methods and apparatus for configuring process, environmental, industrial and other control systems generate and/or utilize models representing configurations of control systems and/or the systems controlled by them. Records of changes to the models or the configurations represented by them are maintained, thereby, for example, providing bases for determining current states, prior states and histories of changes. Objects in the model have characteristics, such as an object type characteristic and an area characteristic. Users can have corresponding permissions. A security mechanism apparatus controls access by users to the objects. Composite objects are defined by definition objects and are displayed in encapsulated or expanded formats. Objects can include an edit control type identifier that determines how they are presented for editing. Functionality responds to user commands by transferring characteristics of a first object depicted by the graphical user interface to a second object. Configuration-time formulas contained objects are evaluated to constants prior to downloading to the control system.

  • Pub Date: 2008/05/11
  • Number: 08028272
  • Owner: Invensys Systems, Inc.
  • Location: Foxboro, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for developing, deploying, managing and monitoring a web application in a single environment

A system and method for developing, deploying, managing and monitoring a web application in a single environment is disclosed herein. The single environment is preferably an integrated development environment (“IDE”). The system and method preferably allows for deployment to a cloud provider, and preferably allows for use of Web resources from multiple cloud providers. One preferred IDE is the APTANA® STUDIO IDE. An operator can use a user interface to access the integrated development environment and the cloud manager over the network, specifically the Internet.

  • Pub Date: 2008/04/11
  • Number: 07596620
  • Owner: Aptana, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Printhead unit cell having rimmed nozzle plate

A unit cell of a printhead is provided having a multi-layer substrate defining an ink inlet, one or more side walls extending from the substrate around the ink inlet, a nozzle plate supported by the side walls to define a chamber in fluid communication with the ink inlet, where the nozzle plate defines an aperture through which ink in the chamber can be ejected, and a looped and elongate heater element suspended within the chamber, which can be heated so that bubbles are generated in ink within the chamber and ink is ejected from the aperture. The nozzle plate defines a protruding rim bounding the aperture.

  • Pub Date: 2008/04/11
  • Number: 07984972
  • Owner: SIlverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Optical aberration correction for machine vision inspection systems

A system and method for correcting surface height measurements for optical aberration is provided. Heights determined by an autofocus tool, which may depend on surface feature angles in a focus region of interest (ROI) and on the ROI location in the field of view, are corrected based on a novel error calibration. Error calibration data includes height corrections for different feature angles in images, and for multiple locations in a field of view. Height corrections are determined by weighting and combining the angle dependent error calibration data, e.g., based on a gradient (edge) angle distribution determined in the ROIs. When Z-heights are determined for multiple ROIs in a field of view, storage of image data from particular images of a global image stack may be efficiently controlled based on determining early in processing whether a particular image is a sufficiently focused “near-peak” focused image or not.

  • Pub Date: 2008/04/11
  • Number: 08311311
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Mixer with adaptive post-filtering

A noise reduction system includes multiple transducers that generate time domain signals. A transforming device transforms the time domain signals into frequency domain signals. A signal mixing device mixes the frequency domain signals according to a mixing ratio. Frequency domain signals are rotated in phase to generate phase rotated signals. A post-processing device attenuates portions of the output based on coherence levels of the signals.

  • Pub Date: 2008/04/11
  • Number: 08121311
  • Owner: QNX Software Systems Co.
  • Location: Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for mounting logical unit numbers (LUNS) of snapshots

A computer system and method for caching configuration information for use in mounting and/or unmounting snapshot LUNs of a network-based storage system are disclosed. During a first request to mount a snapshot LUN, a discovery operation is performed at a host system to discover various configuration information used in mounting and unmounting various LUNs of a storage system to a host system. The configuration information is used to process the first request and then the configuration information is cached. During a subsequent request to mount a second snapshot LUN, the cached configuration information can be used to mount the second snapshot LUN, thereby avoiding a second discovery operation.

  • Pub Date: 2008/04/11
  • Number: 08312231
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Inter-gadget communication

Disclosed is an inter-gadget communication architecture or framework that allows information from different sources to be independently viewed or correlated from within a browser. The inter-gadget communication architecture or framework comprises gadgets or iFrames, which communicate or interact with other gadgets on the displayed page by accessing other iFrames/gadgets on the same web page. The inter-gadget communication architecture or framework allows gadgets to be vendor application agnostic, providing platform independence.

  • Pub Date: 2008/04/11
  • Number: 08156441
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Application programming interfaces for data parallel computing on multiple processors

A method and an apparatus for a parallel computing program calling APIs (application programming interfaces) in a host processor to perform a data processing task in parallel among compute units are described. The compute units are coupled to the host processor including central processing units (CPUs) and graphic processing units (GPUs). A program object corresponding to a source code for the data processing task is generated in a memory coupled to the host processor according to the API calls. Executable codes for the compute units are generated from the program object according to the API calls to be loaded for concurrent execution among the compute units to perform the data processing task.

  • Pub Date: 2008/04/11
  • Number: 08286198
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for design and control of engineering systems utilizing component-level dynamic mathematical model

A control system comprises a controller for positioning an actuator in a working fluid flow and a model processor for directing the controller as a function of a model feedback. The model processor comprises an output module, a comparator and an estimator. The output module generates the model feedback as a function of a constraint, a model state and a model input describing fluid parameters measured along the working fluid flow. The comparator generates an error by comparing the model feedback to the model input. The estimator generates the constraint and the model state, such that the error is minimized.

  • Pub Date: 2008/03/11
  • Number: 08090456
  • Owner: United Technologies Corporation
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Process and apparatus for forming nanoparticles using radiofrequency plasmas

Methods and apparatus for producing nanoparticles, including single-crystal semiconductor nanoparticles, are provided. The methods include the step of generating a constricted radiofrequency plasma in the presence of a precursor gas containing precursor molecules to form nanoparticles. Single-crystal semiconductor nanoparticles, including photoluminescent silicon nanoparticles, having diameters of no more than 10 nm may be fabricated in accordance with the methods.

  • Pub Date: 2008/03/11
  • Number: 08016944
  • Owner: Regents of the University of Minnesota
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Multidimensional evidence grids and system and methods for applying same

Mapping, localization, and navigation systems for use with a mobile unit are provided that use a sensor model with adjustable parameters. The system includes range sensors configured to collect range data and a data storage system having stored therein an evidence grid representing an environment and a sensor model comprising adjustable parameters representing inaccuracies of the range sensors. A grid engine adjusts the adjustable parameters based on received range data from the range sensors. A navigation module can direct the mobile unit though the environment using the evidence grid, received range data, and adjustable parameters. The grid engine can also locate the mobile unit within the environment by using the adjusted sensor model parameters to compare the received range data against the evidence grid.

  • Pub Date: 2008/03/11
  • Number: 08427472
  • Owner: Seegrid Corporation
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for analyzing data related to possible online fraud

Various embodiments of the invention provide methods, systems and software for analyzing data. In particular embodiments, for example, a set of data about a web site may be analyzed to determine whether the web site is likely to be illegitimate (e.g., to be involved in a fraudulent scheme, such as a phishing scheme, the sale of gray market goods, etc.). In an exemplary embodiment, a set of data may be divided into a plurality of components (each of which, in some cases, may be considered a separate data set). Merely by way of example, a set of data may comprise data gathered from a plurality of data sources, and/or each component may comprise data gathered from one of the plurality of data sources. As another example, a set of data may comprise a document with a plurality of sections, and each component may comprise one of the plurality of sections. Those skilled in the art will appreciate that the analysis of a particular component may comprise certain tests and/or evaluations, and that the analysis of another component may comprise different tests and/or evaluations. In other cases, the analysis of each component may comprise similar tests and/or evaluations. The variety of tests and/or evaluations generally will be implementation specific.

  • Pub Date: 2008/03/11
  • Number: 09026507
  • Owner: Thomson Reuters Global Resources
  • Location: Baar, CH
  • Details: Visit USPTO

Visit USPTO Page


Method for implementing an internet protocol (IP) charging and rating middleware platform and gateway system

A method for Internet Protocol (IP) charging and rating gateway within a system having a proxy server for connection to an Authentication, Authorization, and Accounting (AAA) server, an access gateway, an IP classification engine for connection between a data network and the access gateway and a gateway controller connected to the proxy server and the IP classification engine, including the steps of receiving IP packets at the IP classification engine, the IP packets originating from the data network and destined for a subscriber device via the access gateway, classifying the IP packets according to the protocol of each of the packets at the IP classification engine and selectively instructing the IP classification engine to permit or deny the flow of IP packets between the data network and the access gateway at the gateway controller. Preferably, the proxy server is configured to emulate the access gateway and the AAA server.

  • Pub Date: 2008/03/11
  • Number: 07644158
  • Owner: Redknee Inc.
  • Location: , CA
  • Details: Visit USPTO

Visit USPTO Page


Method for a microfluidic weaklink device

The present invention relates to an electrokinetic (EK) pump capable of creating high pressures electroosmotically, and capable of retaining high pressures. Both pressure creation and retention are accomplished without the need for moving parts. The EK pump uses a polymerizable fluid that creates the pressure-retaining seal within the EK pump when polymerization is initiated, typically by exposure to UV radiation. Weaklink devices are advantageously constructed including such a pressure-retaining EK pump since, among other advantages, the response of the weaklink device relies on predictable and reliable chemical polymerization reactions.

  • Pub Date: 2008/03/11
  • Number: 2042684
  • Owner: Sandia Corporation
  • Location: Livermore, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for mobile services

A method for providing mobile services, such as mobile financial services, includes providing a wireless handset or other device as an adjunct access device for a user account. The device is assigned a unique identification number, such as an MDN, MEID, or both. The unique identification number is associated with the account and in an exemplary embodiment, comprises at least a portion of the account number(s) with the service provider. Transactions are conducted with the handset access device and enhanced multi-factor and biometric security authentication may be provided. Handset voice, data, or other usage is settled and billed within the financial account. The service provider is able to download software, advertising, or content applications to the adjunct device and maintains the capability to disable the device. In a further aspect, a system for the execution of mobile transactions is provided.

  • Pub Date: 2008/03/11
  • Number: 2092179
  • Details: Visit USPTO

Visit USPTO Page


Method and system for evaluating expansion of a business

A method for evaluating expansion of a business where the business is located in a first geographic area. The method includes receiving information about the business, querying a business information source and a demographic information source using the information, receiving data from the business information source and the demographic information source in response to the querying, processing the data using business expansion factors to obtain a rank order, where the data comprises a plurality of potential geographic areas for expanding the business, where the plurality of potential geographic areas are evaluated on the business expansion factors to determine a similarity to the first geographic area to obtain a rank order, and presenting, in the rank order, each of the plurality of potential geographic areas.

  • Pub Date: 2008/03/11
  • Number: 08095412
  • Owner: Intuit Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive transcription system and method

A method and system which seamlessly combines natural way of handwriting (real world) with interactive digital media and technologies (virtual world) for providing a mixed or augmented reality perception to the user is disclosed.

  • Pub Date: 2008/03/11
  • Number: 08358320
  • Owner: National University of Singapore
  • Location: Singapore, SG
  • Details: Visit USPTO

Visit USPTO Page


Graphic-information flow method and system for visually analyzing patterns and relationships

A display control and information management system seamlessly integrates layered and slotted formatted data from local and remote sources to provide a highly versatile information display. The system permits selective control of display and display features so that complex data and data flows can be seamlessly accessed with enhanced cognition of salient information by a user.

  • Pub Date: 2008/03/11
  • Number: 08745529
  • Owner: Tavusi Data Solutions LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling haptic sensations for vibrotactile feedback interface devices

An apparatus comprises an actuator that includes an eccentric mass that is coupled to a rotatable shaft of the actuator which defines an axis of rotation. A circuit is coupled to the actuator, the circuit is configured to produce a control signal such that, when the control signal is received by the actuator. The actuator is configured to produce a force effect having a magnitude and a frequency by rotating the mass about the axis of rotation in a first direction. The magnitude of the vibration is based on a duty cycle of the control signal and independent of the frequency. An obstacle member is coupled to the actuator and includes a compliance portion configured to increase energy in the movement of the mass in a second direction opposite to the first direction when the mass comes into contact with the obstacle member.

  • Pub Date: 2008/03/11
  • Number: 09492847
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for treating pruritus

The present invention encompasses methods and compositions for alleviating pruritis. The compositions may comprise an analgesic agent.

  • Pub Date: 2008/03/11
  • Number: 09044510
  • Owner: Washington University
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Bounded hash table sorting in a dynamic program profiling system

A system and method for efficient bounded hash table sorting during dynamic whole program profiling of software applications. A computing system comprises a dynamic binary instrumentation (DBI) tool coupled to a virtual machine configured to translate and execute binary code of a software application. The binary code is augmented with instrumentation and analysis code during translation and execution. A dynamic binary analysis (DBA) tool identifies hierarchical layers of cycles within the application that describe the dynamic behavior of the application. Corresponding characterization information is stored in a hash table. Periodic sorting of entries of the hash table occur for highly accessed entries in deep buckets within the hash table. Repositioning the entries within the hash table may reduce pointer chasing problems and identify program phase changes within the dynamic behavior of the application.

  • Pub Date: 2008/03/11
  • Number: 08024719
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Wagering game apparatus and method to provide a trusted gaming environment

A method of configuring a wagering game system to provide a trusted gaming environment includes the acts of randomly selecting at least one simulated physical imperfection from a plurality of available simulated physical imperfections to associate with at least one element of a video image output to a wagering game machine video display and associating the selected simulated physical imperfection with at least one element of the video image.

  • Pub Date: 2008/31/10
  • Number: 08262457
  • Owner: WMS Gaming Inc.
  • Location: Waukegan, US
  • Details: Visit USPTO

Visit USPTO Page


Systems for rewarding influencers

The present disclosure relates generally to systems for rewarding influencers in a Web 2.0 environment. More specifically, in some implementations, a system is configured to assess an influence of an electronically-accessed content on an involvement between an accessor and a third party, and may also be configured to facilitate a reward to one or more influencers based on one or more assessed influences.

  • Pub Date: 2008/31/10
  • Number: 08831973
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for upcoming event notification and mobile purchasing

Various embodiments relate generally to providing upcoming event notification and mobile purchasing and, more specifically but not exclusively relate to a system and methods for providing notifications of upcoming events to users of an online secondary ticket marketplace and allowing the users to purchase tickets to upcoming events using a mobile device. In one embodiment, a network-based system may receive a registration request from a user to receive alert notifications for upcoming events. The registration request may comprise a telephone number for a mobile device of the user. The network-based system may send an alert notification for an upcoming event to the mobile device of the user over a mobile telephone network. The alert notification may comprise a text message including relevant static or dynamic event information as well as an embedded hyperlink for allowing the user to transact a mobile purchase.

  • Pub Date: 2008/31/10
  • Number: 08731526
  • Owner: StubHub, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Protein scaffolds

The invention provides protein scaffolds and methods of preparing, screening, engineering and using such protein scaffolds.

  • Pub Date: 2008/31/10
  • Number: 08633297
  • Owner: MedImmune, LLC
  • Location: Gaithersburg, US
  • Details: Visit USPTO

Visit USPTO Page


Product for providing a scalable trusted platform module in a hypervisor environment

Multiple logical partitions are provided in a data processing system. A unique context is generated for each one of the logical partitions. When one of the logical partitions requires access to the hardware TPM, that partition's context is required to be stored in the hardware TPM. The hardware TPM includes a finite number of storage locations, called context slots, for storing contexts. Each context slot can store one partition's context. Each one of the partitions is associated with one of the limited number of context storage slots in the hardware TPM. At least one of the context slots is simultaneously associated with more than one of the logical partitions. Contexts are swapped into and out of the hardware TPM during runtime of the data processing system so that when ones of the partitions require access to the hardware TPM, their required contexts are currently stored in the hardware TPM.

  • Pub Date: 2008/31/10
  • Number: 07996687
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to dynamically control connectivity within virtual private networks

Methods and apparatus to dynamically control connectivity within VPNs are disclosed. A disclosed example route server to control connectivity within a VPN comprises a memory to implement a database, a border gateway protocol (BGP) engine to process BGP advertisements, a network interface to receive a first BGP advertisement, which a first route target (RT) associated with the first PE router, from a first provider edge (PE) router associated with the VPN, and an intra-VPN connectivity controller to, in response to the first BGP advertisement, query the database to determine whether the first PE router is to be communicatively coupled to a second PE router of the VPN and when the first and second PE routers of the VPN are to be communicatively coupled, direct the BGP engine to form a second BGP advertisement that includes a second RT associated with the second PE router based on the first BGP advertisement.

  • Pub Date: 2008/31/10
  • Number: 08121118
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to dynamically control access from virtual private networks to network-based shared resources

Methods and apparatus to dynamically control access from VPNs to shared resources are disclosed. A disclosed example route reflector comprises a memory to implement a database, a user interface module to receive a request to permit access for a VPN to a shared resource, a BGP engine to process BGP advertisements, a network interface to receive a first BGP advertisement from a PE router associated with the VPN that includes a first RT associated with the VPN, and a shared resource access controller to update the database based on the request, to query the database to determine whether the VPN has access to the shared resource in response to the first BGP advertisement, and to direct the BGP engine to form a second BGP advertisement based on the first BGP advertisement that includes a second RT associated with the shared resource when the VPN has access to the shared resource.

  • Pub Date: 2008/31/10
  • Number: 08549616
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for model-based replication of data

Techniques for replicating data in a system having a data tier with a plurality of data sources and an application tier with a plurality of applications are provided. Such techniques can include creating an instance of an information model of the data that is specified by a schema. The model can be created in a form that is suitable for manipulation by at least one of the applications and that forms at least a portion of a model tier that is intermediate the data tier and the application tier. A replica of an instance of the information model can be created in a form suitable for remote transmission, and a consistency policy can be obtained that specifies a level of consistency required between the instance of the information model and the replica.

  • Pub Date: 2008/31/10
  • Number: 08108338
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive machine learning advice facility

In embodiments of the present invention improved capabilities are described for helping a user make a decision through the use of a machine learning facility. The process may begin with an initial question being received by the machine learning facility from the user. The user may then be provided with a dialog consisting of questions from the machine learning facility and answers provided by the user. The machine learning facility may then provide a decision to the user based on the dialog and pertaining to the initial question, such as a recommendation, a diagnosis, a conclusion, advice, and the like. In embodiments, future questions and decisions provided by the machine learning facility may be improved through feedback provided by the user.

  • Pub Date: 2008/31/10
  • Number: 07958066
  • Owner: Hunch Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Generation of engineering change order (ECO) constraints for use in selecting ECO repair techniques

Static timing and/or noise analysis are performed on a netlist of an integrated circuit, to estimate behavior of the netlist and to identify at least one violation by said behavior of a corresponding requirement thereon, such as setup time, hold time or bump height in a quiescent net. Thereafter, effect of engineering change order (ECO) to correct the violation are automatically analyzed, based on the layout, the parasitics, the timing and/or noise behavior, and the violation, followed by generation of a constraint on the behavior (called “ECO” constraint), such as a timing constraint and/or a noise constraint. Next, the ECO constraint is automatically used, e.g. in a place and route tool, to select an ECO repair technique, from several ECO repair techniques that can overcome the violation. The selected ECO repair technique is automatically applied to the layout, to generate a modified layout which does not have the violation.

  • Pub Date: 2008/31/10
  • Number: 07962876
  • Owner: Synopsys, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic in-page advertising

Advertisements displayed in a web page are enabled to be changed as a context of the web page changes without reloading the web page. A first set of one or more advertisements may be displayed on a web page. One or more of the displayed advertisements may be replaced with one or more alternative advertisements. Selection of the alternative advertisements is triggered based on the occurrence of one or more events that cause a change in a context of the web page. The display of the alternative advertisements is performed dynamically, without the web page needing to be reloaded. In this manner, the advertisements displayed on a web page may be changed based on the change in web page context, to provide advertisements to users that correspond to the changing context.

  • Pub Date: 2008/31/10
  • Number: 08175922
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Centralized execution of snapshot backups in a distributed application environment

Systems and methods for centralizing database manipulation for a plurality of heterogeneous databases are disclosed. A single or limited number of central servers can be used to manage a plurality of hosted client systems. With such a technique, database consistent backups can be performed without requiring altering of the central server, even when different database engines are used across the hosted client systems.

  • Pub Date: 2008/31/10
  • Number: 08930497
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Bidirectional iterative beam forming

Bidirectional iterative beam forming techniques are described. An apparatus may include a wireless device having an antenna control module operative to initiate beam formation operations using an iterative training scheme to form a pair of communications channels for a wireless network, the antenna control module to communicate training signals and feedback information with a peer device via the transceiver and phased antenna array using partially or fully formed high rate channels, and iteratively determine antenna-array weight vectors for a directional transmit beam pattern for the phased antenna array using feedback information from the peer device. Other embodiments are described and claimed.

  • Pub Date: 2008/31/10
  • Number: 08626080
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing enhanced mobile messaging services

Various embodiments for providing enhanced mobile messaging services are described. In one or more embodiments, a mobile computing device may send messages of different types. The mobile computing device may allow a sender to compose a message independently of message type. The mobile computing device may automatically determine both a message type for the message and the transfer medium by which to send the message. The mobile computing device may consider factors including message contents, network availability and reliability, historical data, cost, sender preferences, recipient preferences, etc. Other embodiments are described and claimed.

  • Pub Date: 2008/31/10
  • Number: 08583807
  • Owner: PALM, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Allocating resources in a compute farm to increase resource utilization by using a priority-based allocation layer to allocate job slots to projects

Some embodiments provide a system for allocating resources in a compute farm. During operation, the system can receive resource-requirement information for a project. Next, the system can receive a request to execute a new job in the compute farm. In response to determining that no job slots are available for executing the new job, and that the project associated with the new job has not used up its allocated job slots, the system may execute the new job by suspending or re-queuing a job that is currently executing, and allocating the freed-up job slot to the new job. If the system receives a resource-intensive job, the system may create dummy jobs, and schedule the dummy jobs on the same computer system as the resource-intensive job to prevent the queuing system from scheduling multiple resource-intensive jobs on the same computer system.

  • Pub Date: 2008/31/10
  • Number: 09465663
  • Owner: SYNOPSYS, INC.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Access control list checking

Method and system for dynamically checking an access control list during the data transfers between a client web browser and a web server. The method and system allow checking of access control list by an application firewall, independent from the web application. The rules, upon which the checking is based, can be easily updated without affecting the web application.

  • Pub Date: 2008/31/10
  • Number: 07805513
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Web page performance scoring

A browser-based tool is provided that loads a Webpage, accesses the document object model (DOM) of the page, collects information about the page structure and parses the page, determines through the use of heuristics such factors as how much text is found on the page and the like, produces statistical breakdown of the page, and calculates a score based on performance of the page. Key to the operation of the invention is the ability to observe operation of the Webpage as it actually loads in real time, scoring the page for several of various performance factors, and producing a combined score for the various factors.

  • Pub Date: 2008/30/10
  • Number: 08078614
  • Owner: AOL Inc.
  • Location: Dulles, US
  • Details: Visit USPTO

Visit USPTO Page


Uses and isolation of stem cells from bone marrow

The presently disclosed subject matter provides populations of stem cells that are purified from bone marrow, peripheral blood, and/or other sources. Also provided are methods of using the stem cells for treating tissue and/or organ damage in a subject.

  • Pub Date: 2008/30/10
  • Number: 09155762
  • Owner: UNIVERSITY OF LOUISVILLE RESEARCH FOUNDATION, INC.
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for the developing content and applications in hosted and non-hosted development environments

Certain embodiments of the present disclosure provide methods and systems for developing content and applications in both hosted and non-hosted environments, including developing interactive content and applications in such environments. Certain embodiments provide development application components that are used through a generic execution engine, for example, through a web browser and/or interactive media player technology that is available in both a hosted environment and a non-hosted environment. Elements of a user interface and other features of a traditional desktop application can thus be preserved from one environment to the other, which allows seamless migration of a development application. Certain embodiments use a service access component that is capable of talking to different development services, such as for example, using different remote procedure calls (“RPCs”) to access remote services or simply accessing local services, depending on the environment.

  • Pub Date: 2008/30/10
  • Number: 08645489
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing a print job in a printing system

There is disclosed a system and method of processing a document corresponding with a printable format in a print path. A browser, communicating with a user interface (having a display) and a network, is used to access a services interface, the services interface including at least one selectable service available by way of the network. A browser activating system, communicating with the browser and a print driver, is used to open the browser to display the at least one selectable service of the services interface on the user interface display. Responsive to selecting the at least one selectable service from the displayed services interface, the at least one selectable service is applied to the document corresponding with the printable format.

  • Pub Date: 2008/30/10
  • Number: 08842313
  • Owner: Xerox Corporation
  • Location: Norwalk, US
  • Details: Visit USPTO

Visit USPTO Page


Subpopulations of bone marrow-derived adherent stem cells and methods of use therefor

The presently disclosed subject matter provides an isolated subpopulation of bone marrow-derived adherent stem cells that are purified from bone marrow-derived adherent cells. Also provided are methods for isolating the subpopulation of bone marrow-derived adherent stem cells from bone marrow-derived adherent cells and for using the isolated subpopulation of bone marrow-derived adherent stem cells for treating tissue and/or organ damage in a subject.

  • Pub Date: 2008/30/10
  • Number: 08431162
  • Owner: University of Louisville Research Foundation, Inc.
  • Location: Louisville, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and apparatus for presenting forms and publishing form data

A method for presenting forms and publishing form data are provided. A software component determines if a request for a network resource containing a form has been received. The software component then determines whether a previously compiled class file should be utilized to respond to the form request. If a previously compiled class file cannot be utilized, the software component compiles a class file capable of generating the fields of the requested form. When the class file is compiled, a field engine table is consulted and field names for the fields to be placed on the requested form are retrieved. A field name specified in the field engine table is associated with the correspondence fields in a form. When a submission containing response data for the fields in the form is received, the software component saves the response data in an output table having fields named identically to the fields in the form.

  • Pub Date: 2008/30/10
  • Number: 07877434
  • Owner: AT&T Intellectual I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing a trusted platform module in a hypervisor environment

A method is presented for implementing a trusted computing environment within a data processing system. A hypervisor is initialized within the data processing system, and the hypervisor supervises a plurality of logical, partitionable, runtime environments within the data processing system. The hypervisor reserves a logical partition for a hypervisor-based trusted platform module (TPM) and presents the hypervisor-based trusted platform module to other logical partitions as a virtual device via a device interface. Each time that the hypervisor creates a logical partition within the data processing system, the hypervisor also instantiates a logical TPM within the reserved partition such that the logical TPM is anchored to the hypervisor-based TPM. The hypervisor manages multiple logical TPM's within the reserved partition such that each logical TPM is uniquely associated with a logical partition.

  • Pub Date: 2008/30/10
  • Number: 2068233
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for establishing security inflow contracts

A method and apparatus for establishing a security inflow contract between a work-initiating system and a work-performing system. A portable, generic security inflow contract between an EIS/connector and an application server is provided that enables the connector to establish security information while submitting a work instance for execution to a work manager and while delivering messages to message endpoints of the application server. The security inflow contract enables all activities of a work instance that is submitted by a connector to be performed in the context of an established identity, thus insuring that all interactions between an application server and an EIS/connector are secure, and may prevent unauthorized access to application components deployed in an application server.

  • Pub Date: 2008/30/10
  • Number: 08381278
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent drilling advisor

An information integration environment identifies the current drilling sites, and drilling equipment and processes at those current drilling sites. Based upon that identification, and upon data received from the drilling sites, servers access and configure software agents that are sent to a host client system at the drilling site; these software agents operate at the host client system to acquire data from sensors at the drilling site, to transmit that data to the information integration environment, and to derive the drilling state and drilling recommendations for the driller at the drilling site. These software agents include one or more rules, heuristics, or calibrations derived by the inference engine, and called by the information integration environment. In addition, the software agents sent from the information integration environment to the host client system operate to display values, trends, and reliability estimates for various drilling parameters, whether measured or calculated.

  • Pub Date: 2008/30/10
  • Number: 08121971
  • Owner: BP Corporation North America Inc.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Insensitive rocket motor

There is disclosed a solid fuel rocket motor including a center-perforated solid fuel grain. The solid fuel grain may be adapted to burn outwardly from a center surface facing the center perforation when ignited by a primary igniter during a normal mode of operation. The solid fuel grain may be further adapted to burn longitudinally from an end face when ignited by a secondary igniter during a safety mode of operation.

  • Pub Date: 2008/30/10
  • Number: 08191351
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Web-based file management system and service

A system and method for integrating a plurality of web-based applications with a web-based file management system. The web-based application may provide a service to the users of the web-based file management system, such that the web-based application can interact with the files of said users. The integration of the service of the web-based application with the web-based file management system is achieved through a simple web interface to configure the service, without the developer of the web-based application having to change the application programming interface (API) of the application. The user of the web-based file management system may add services of a plurality of available web-based applications and use these services with one or more files that are stored on the web-based file management system.

  • Pub Date: 2008/29/10
  • Number: 08326814
  • Owner: Box, Inc.
  • Location: Los Altos, US
  • Details: Visit USPTO

Visit USPTO Page


Voice and data exchange over a packet based network with timing recovery

A signal processing system which discriminates between voice signals and data signals modulated by a voiceband carrier. The signal processing system includes a voice exchange, a data exchange and a call discriminator. The voice exchange is capable of exchanging voice signals between a switched circuit network and a packet based network. The signal processing system also includes a data exchange capable of exchanging data signals modulated by a voiceband carrier on the switched circuit network with unmodulated data signal packets on the packet based network. The data exchange is performed by demodulating data signals from the switched circuit network for transmission on the packet based network, and modulating data signal packets from the packet based network for transmission on the switched circuit network. The call discriminator is used to selectively enable the voice exchange and data exchange.

  • Pub Date: 2008/29/10
  • Number: 08189477
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for fraud monitoring and detection using application fingerprinting

Techniques for fraud monitoring and detection using application fingerprinting. As used herein, an “application fingerprint” is a signature that uniquely identifies data submitted to a software application. In an embodiment, a plurality of historical application fingerprints are stored for data previously submitted to a software application. Each historical application fingerprint is associated with one or more contexts in which its corresponding data was submitted. When new (i.e., additional) data is subsequently submitted to the application, a new application fingerprint is generated based on the new data, and the new application fingerprint is associated with one or more contexts in which the new data was submitted. The new application fingerprint is then compared with one or more historical application fingerprints that share the same, or substantially similar, context(s). Based on this comparison, a risk score is generated indicating a likelihood that the new data was submitted for a fraudulent/malicious purpose.

  • Pub Date: 2008/29/10
  • Number: 08739278
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Sliding antenna apparatus

Various embodiments of a mobile computing device are described. In one embodiment, the mobile computing device comprises an internal antenna system and a first housing coupled to a second housing by one or more electrically conductive sliding portions, the one or more electrically conductive sliding portions to operate as radiating arms for the internal antenna system. Other embodiments are described and claimed.

  • Pub Date: 2008/29/10
  • Number: 08451179
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Mode switching user device

An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. In one representative implementation, a user device includes a mode switching wireless communication module. The mode switching wireless communication module is adapted to receive a first paging signal via a first communication protocol when in a first mode of operation and adapted to receive a second paging signal via a second communication protocol when in a second mode of operation. The user device also includes a to-do list processing module. In response to receiving one of the first or second paging signal, the to-do list processing module sends a request to a remote network device. The request requests that one or more instructions be sent from the remote network device.

  • Pub Date: 2008/29/10
  • Number: 08442560
  • Details: Visit USPTO

Visit USPTO Page


Inbound receiving system

Systems and methods of the present invention for receiving inbound shipments are provided. Bar code information may be decoded, and various types of information can be identified from the decoded bar code information. Such information may include, for example, recipient name, recipient address, a sender account number with the shipping vendor, etc. A database is searched based on such identified information. The database may further include other information associated with the identified information. A report including such information may be generated concerning the shipment. Such report may be stored and retrieved for reference when a future shipment with similar information is received.

  • Pub Date: 2008/29/10
  • Number: 07938325
  • Owner: Lynch Marks LLC
  • Location: Albany, US
  • Details: Visit USPTO

Visit USPTO Page


High throughput chemical munitions treatment system

A new High-Throughput Explosive Destruction System is disclosed. The new system is comprised of two side-by-side detonation containment vessels each comprising first and second halves that feed into a single agent treatment vessel. Both detonation containment vessels further comprise a surrounding ventilation facility. Moreover, the detonation containment vessels are designed to separate into two half-shells, wherein one shell can be moved axially away from the fixed, second half for ease of access and loading. The vessels are closed by means of a surrounding, clam-shell type locking seal mechanisms.

  • Pub Date: 2008/29/10
  • Number: 08047978
  • Owner: Sandia Corporation
  • Location: Livermore, US
  • Details: Visit USPTO

Visit USPTO Page


Efficient conversion of voice messages into text

A system and method for efficiently transcribing verbal messages transmitted over the Internet (or other network) into text. The verbal messages are initially checked to ensure that they are in a valid format and include a return network address, and if so, are processed either as whole verbal messages or split into segments. These whole verbal messages and segments are processed by an automated speech recognition (ASR) program, which produces automatically recognized text. The automatically recognized text messages or segments are assigned to selected workbenches for manual editing and transcription, producing edited text. The segments of edited text are reassembled to produce whole edited text messages, undergo post processing to correct minor errors and output as an email, an SMS message, a file, or an input to a program. The automatically recognized text and manual edits thereof are returned as feedback to the ASR program to improve its accuracy.

  • Pub Date: 2008/29/10
  • Number: 08239197
  • Owner: Intellisist, Inc.
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Strict validation of inference rule based on abstraction environment

An article of manufacture for processing rule sets and, more particularly, for processing abstract rule sets. One embodiment provides a computer-readable storage medium containing a program which, when executed by a processor, performs operations for managing execution of an analysis routine. The operations comprise accessing an analysis routine configured to process one or more inputs. The analysis routine is defined by at least one abstract rule set having one or more abstract rules each having a conditional statement and a consequential statement. The operation further comprises determining, from the retrieved analysis routine, a predefined validating condition that needs to be satisfied by at least one of the inputs, and validating a particular data value defining the at least one of the inputs on the basis of the predefined validating condition. If the particular data value is not validated, a predefined action configured to avoid execution of the analysis routine on invalid inputs is performed.

  • Pub Date: 2008/28/10
  • Number: 08145628
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Persistent synthetic environment message notification

Persistent synthetic environment message notification is described, including retrieving synthetic environmental data associated with an event occurring within a synthetic environment, identifying one or more formats to configure the synthetic environmental data and to transmit the synthetic environmental data, generating a message comprising the synthetic environmental data, the message being generated based on at least one of the one or more formats, and sending the message comprising the synthetic environmental data to an endpoint.

  • Pub Date: 2008/28/10
  • Number: 08626863
  • Owner: Trion Worlds, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Network-attached media plug-in

An embodiment is a method and apparatus to provide a network-attached media plug-in. A network interface interfaces with a client and a server. The network interface receives an input from the client requesting content from the server. The client has a network plug-in interface. A network processor extracts a media stream from the requested content. A multimedia processor dynamically modifies the media stream according to the input from the client.

  • Pub Date: 2008/28/10
  • Number: 08301792
  • Owner: Panzura, Inc
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for enhancing a filter component of a smoking article, and associated method

An apparatus and method for manufacturing a rod member for a cigarette filter element is provided. Each rod member defines a longitudinal axis and includes a generally longitudinally-extending filter material. A rod-forming unit is configured to form a continuous supply of a filter material into a continuous cylindrical rod member. An object insertion unit is configured to introduce a plurality of objects into engagement with the rod member along the longitudinal axis. A dispensing device is configured to selectively dispense a liquid substance into the filter material, substantially commensurately with the introduction of the plurality of objects into engagement with the rod member, wherein the liquid substance is configured to affect an attribute associated with the objects. A rod-dividing unit is configured to divide the rod member into a plurality of rod portions such that each rod portion includes at least one object and a portion of the liquid substance.

  • Pub Date: 2008/28/10
  • Number: 08308623
  • Owner: R.J. Reynolds Tobacco Company
  • Location: Winston-Salem, US
  • Details: Visit USPTO

Visit USPTO Page


Voice and data exchange over a packet based network with AGC

A signal processing system which discriminates between voice signals and data signals modulated by a voiceband carrier. The signal processing system includes a voice exchange, a data exchange and a call discriminator. The voice exchange is capable of exchanging voice signals between a switched circuit network and a packet based network. The signal processing system also includes a data exchange capable of exchanging data signals modulated by a voiceband carrier on the switched circuit network with unmodulated data signal packets on the packet based network. The data exchange is performed by demodulating data signals from the switched circuit network for transmission on the packet based network, and modulating data signal packets from the packet based network for transmission on the switched circuit network. The call discriminator is used to selectively enable the voice exchange and data exchange.

  • Pub Date: 2008/27/10
  • Number: 07924752
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


Universal phosphoramidite for preparation of modified biomolecules and surfaces

Reagents useful for attaching biomolecules (e.g., proteins, oligonucleotides, and other biomolecules) to a surface, processes of attaching molecules to a surface to form modified surfaces using these reagents, and methods of detecting a target compound using these modified surfaces are disclosed.

  • Pub Date: 2008/27/10
  • Number: 07829735
  • Owner: Northwestern University
  • Location: Evansion, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for seamlessly integrating separate information systems within an application

The present invention is, in one embodiment, a system and method based on a client-server architecture for seamlessly integrating various information systems. In one embodiment, a bundle of files is deployed to a collaboration client, in order to enable the integration of the collaboration client with disparate information systems and content. In one embodiment, content within a mailbox item is allowed to become a “live” object, and is associated with trigger events, and actions, including sending all or part of the content to a separate information system. In one embodiment, mailbox items are subjected to predefined searches to assess whether they include certain content objects. In another embodiment, panel item elements are visible in the overview panel of the collaboration client. The user may interact with the panel items by dragging content onto them, double clicking them, and invoking actions from a context menu if one is available.

  • Pub Date: 2008/27/10
  • Number: 08631065
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Script based computer health management system

A management system may use a human readable script in which is defined executable statements that may gathers status information from various services. The status information may be displayed within a management user interface, which may also include various summary statistics including an overall security state. The services may be locally running services, and services provided or accessible over a local area network or wide area network. In some cases, the human readable script may include statements for starting or resuming the services, querying a running service, or querying a database related to a service. The user interface may be refreshed when the human readable script is updated and re-executed. The services may include security related services, among others.

  • Pub Date: 2008/27/10
  • Number: 08250196
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Mediating conflicts in computer users context data

Techniques are described providing mediated information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state, receiving from a second source an indication of a second value for the indicated state attribute, and, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.

  • Pub Date: 2008/27/10
  • Number: 08181113
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Material data processing pipeline

A method for generating a shader that is used by a rendering engine to render a visual representation of a computer model. A shader generation engine receives a set of surface data that describes a surface in view of various lighting conditions. The shader generation engine compresses the set of surface data to generate a compressed representation of the set of surface data based on a selected compression algorithm. The shader generation engine generates a shader based on the compressed representation that is configured to be implemented with a rendering engine, and generates a set of shader data based on the compressed representation that includes a set of material characteristics for coloring pixels of the visual representation. Advantageously, the shader generation process is simplified because different compression algorithm-rendering engine shader combinations can be generated without manually programming the shaders.

  • Pub Date: 2008/27/10
  • Number: 09342901
  • Owner: AUTODESK, Inc.
  • Location: San Rafael, US
  • Details: Visit USPTO

Visit USPTO Page


Macromonomers and hydrogels

Macromonomers capable of both physical crosslinking and chemical crosslinking. The combination of chemical crosslinking and physical crosslinking provides the ability to generate rapidly gelling hydrogels for many different applications. Moreover, the macromonomers may incorporate functional groups that allow for two different gelation mechanisms—thermal gelation and ionic gelation—further improving mechanical stability of hydrogels formed from the disclosed macromonomers.

  • Pub Date: 2008/27/10
  • Number: 08349982
  • Owner: William Marsh Rice University
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Eliminating unnecessary statistics collections for query optimization

A method and system for eliminating unnecessary statistics collections for query optimization in a database stored on a computer. Statistics are unnecessary when a re-generated query execution plan that does not use the statistics is equivalent to an original query execution plan that uses the statistics. To determine this, an original query execution plan is created for each query in a specified workload using the statistics in the database. A search is performed of the statistics in order to enumerate one or more candidate sets of statistics to be eliminated. One or more of the candidate sets of statistics are removed from consideration prior to creating the re-generated query execution plan for each query in the specified workload. The re-generated query execution plan, which was created with one or more of the candidate sets of statistics removed from consideration, is compared with the original query execution plan, which was created using the statistics, in order to determine whether the re-generated query execution plan and the original query execution plan are equivalent. The one or more of the candidate sets of statistics removed from consideration are identified as unnecessary when the re-generated query execution plan and the original query execution plan are equivalent.

  • Pub Date: 2008/27/10
  • Number: 08135702
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Detecting network interface card level malware

Computers are monitored for malware communicating directly with the NIC. The infection of computers with NIC level malware is detected. Operating system level network packet transmission statistics are monitored, as are transmission counters maintained by the NIC. The operating system level transmission statistics are compared to the NIC level transmission counters for a given period of time. If the NIC counters indicate the occurrence of a greater number of transmissions than as is indicated by the operating system level statistics, it is concluded that the computer is infected with NIC level malware.

  • Pub Date: 2008/27/10
  • Number: 08112806
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Active optical limiting semiconductor device and method with active region transparent to light becoming opaque when not biased

An optical switching system comprising an embodiment with a high pass filter operable to eliminate a portion of frequencies present in an image and an optical device operative to receive the spectrally modified image from the high pass filter, alternatively amplify the spectrally modified image, and propagate at least those frequency components in the spectrally modified image exhibiting a frequency less than an absorption frequency of the optical switching device when the optical switching device is active. Alternatively, the optical switching system may transmit an image only when the system is active. The optical switching system may, for example, comprise superluminescent light emitting diodes which may be, for example, formed in the shape of an inverted truncated prism. For human viewing purposes, the operative transmission ranges may closely coincide with the maximum sensitivity of the photopic response of the corresponding red, blue and green cones in human eyes.

  • Pub Date: 2008/27/10
  • Number: 09051177
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-touch object inertia simulation

The inertia system provides a common platform and application-programming interface (API) for applications to extend the input received from various multi-touch hardware devices to simulate real-world behavior of application objects. To move naturally, application objects should exhibit physical characteristics such as elasticity and deceleration. When a user lifts all contacts from an object, the inertia system provides additional manipulation events to the application so that the application can handle the events as if the user was still moving the object with touch. The inertia system generates the events based on a simulation of the behavior of the objects. If the user moves an object into another object, the inertia system simulates the boundary characteristics of the objects. Thus, the inertia system provides more realistic movement for application objects manipulated using multi-touch hardware and the API provides a consistent feel to manipulations across applications.

  • Pub Date: 2008/26/10
  • Number: 08477103
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-touch manipulation of application objects

The manipulation system described herein provides a common platform and application-programming interface (API) for applications to communicate with various multi-touch hardware devices, and facilitates the interpretation of multi-touch input as one or more manipulations. Manipulations map more directly to user intentions than do individual touch inputs and add support for basic transformation of objects using multiple touch contacts. An application can use manipulations to support rotating, resizing, and translating multiple objects at the same time. The manipulation system outputs two-dimensional (2D) affine transforms that contain rotation, scale, and translation information. Thus, using the manipulation system the application author can focus more on building touch-capable applications and let the manipulation system handle the underlying transformations and communication with the multi-touch hardware.

  • Pub Date: 2008/26/10
  • Number: 08466879
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for using a timeline to develop objects and actions in media content

Certain embodiments provide an intuitive interactive media content development environment that simplifies the creation of actions. For example, it may allow users to easily specify that a shape will move when the media content is first executed or that a web page will be opened when a button is clicked within the media. Certain embodiments provide a timeline interface showing the sequence and duration of one or more such actions. For example, a timeline component may allow a user to change the delay or duration associated with an action by manipulating the timeline. A timeline may comprise one or more visual components representing actions and action attributes and allow a user to adjust action attributes by manipulating the visual components.

  • Pub Date: 2008/24/10
  • Number: 08516440
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for financial deposits by electronic message

An image of a negotiable instrument may be communicated from a user to a financial institution using a messaging application so that funds associated with the negotiable instrument may be deposited into a user's bank account. A user may launch an instant messaging application and establish a communications session with a predetermined account at the financial institution to communicate the image. The image may be stored in a file or created by a capture device under control of the instant messaging application. The image file may be processed and verified by the financial institution, where it may be deposited in an account associated with the user.

  • Pub Date: 2008/24/10
  • Number: 07970677
  • Owner: United Services Automobile Association (USAA)
  • Location: San Antonio, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for integrating a dark trading facility and a securities exchange

A system and method are described for the providing securities exchange members increased liquidity for affecting trades. Securities exchange members will have access to both a Dark Trading Facility and securities exchange for trading. When trading on the security exchange, these members will be able to access the Dark Trading Facility using the security exchange infrastructure. Further, when such members enter orders onto the Dark Trading Facility, they will have access to the security exchange display book from the dark pool of the Dark Trading Facility. The trading transactions executed in the Dark Trading Facility or initiated by the Dark Trading Facility, preferably, are automatic and anonymous.

  • Pub Date: 2008/24/10
  • Number: 08271375
  • Owner: NYBX, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Providing functionality to client services by implementing and binding contracts

Methods, systems, and computer-readable media for automating the expression of functional aspects of a target service to a client service via a vehicle referred to herein as a contract are provided. Generally, the methods are performed in the context of a distributed computing environment configured to underlie operations of service application(s). In embodiments, the contract is implemented and bound upon ascertaining that the expressed functional aspects satisfy dependencies of the client service. Generally, the contract defines interfaces and maintains properties that configure the interfaces during installation. During the implementation, one of the interfaces is established and parameterized in accordance with the properties associated therewith. During the binding, the target service and the client service are linked via communication channels that are routed through the established interface. Accordingly, calls from the client service over the communication channels allow for reaching and employing the functional aspects of the target service.

  • Pub Date: 2008/24/10
  • Number: 07904508
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


NETCONF/DMI-based secure network device discovery

A system receives discovery rule inputs that include addresses, verifies one or more device identifiers for one or more addresses, obtains device information from each verified device associated with the one or more verified device identifiers, determines whether each verified device is a discovered device based on the device information, and automatically adds each verified device as a discovered device to a management system without human intervention when it is determined that the verified device is discovered. The system further creates device configuration information, creates an identifier and password, provides device configuration information, the identifier, and the password, to each of the discovered devices based on the NETCONF or the Device Management Interface standards, waits for a connection from the discovered devices, imports device configuration information from the discovered devices when the connection has been established, and indicates that the discovered devices are managed devices.

  • Pub Date: 2008/24/10
  • Number: 08621211
  • Owner: Juniper Networks, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring agent programs in a distributed computing platform

Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed computing platform and for indexing and analyzing the information within a data store are provided. Monitoring involves a monitoring agent that is integrated within an operating system of computing devices that make up the distributed computing platform. In operation, the monitoring agent retrieves information from the role instances and converts the information into parameters that are assembled to documents. Generally, the parameters are assembled to a uniform-structured format in accordance with a schema imposed by the distributed computing platform. Accordingly, each of the documents across the platform have a common format that promotes processing and analysis without a need for reconfiguration. Accordingly, the health of the service application, although dispersed throughout the distributed computing environment, may be observed and evaluated in a consistent manner.

  • Pub Date: 2008/24/10
  • Number: 08301759
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for device independence in storage device wear algorithms

A device, methods and systems that provide device independence in storage device wear algorithms are disclosed. A storage device that provides such device independence includes a device-specific wear algorithm, and may also include an integrated wear algorithm. The device-specific wear algorithm is configured to be loaded into a wear algorithm space and is at least a portion of a wear algorithm. The device-specific wear algorithm is stored in the storage device. The integrated wear algorithm, if employed, is resident in the storage device. A method that provides such device independence is also disclosed. The method includes loading a device-specific wear algorithm from a storage device into a wear algorithm space. The device-specific wear algorithm is configured to be stored in the storage device and loaded into the wear algorithm space. The device-specific wear algorithm is at least a portion of a wear algorithm.

  • Pub Date: 2008/24/10
  • Number: 08626984
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Interprogram communication using messages related to order cancellation

A trad