This website is currently dormant!

API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Computer-implemented method for translating among multiple representations and storage structures

This is a computer-implemented method for managing translating among, and understanding multiple representations and storage structures of data by accessing and updating physical storage through a relational representation. The present invention supports both data independence and automatic derivation of descriptions of data representations by manipulating membership abstractions in the logical representation, while the prior art is restricted to user-supplied denotations and catalog entries.

  • Pub Date: 2006/31/12
  • Number: 2040244
  • Details: Visit USPTO

Visit USPTO Page


Web container extension classloading

A system and method for integrating a diverse set of web/remote user interface technologies into one runtime architecture using a Web container extension is described. This integration simplifies execution, cross-usage, and technology integration between different user interface technologies and other application server offerings.

  • Pub Date: 2006/29/12
  • Number: 08499311
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Web container extension architecture

A system and method for integrating a diverse set of web/remote user interface technologies into one runtime architecture using a Web container extension is described. This integration simplifies execution, cross-usage, and technology integration between different user interface technologies and other application server offerings.

  • Pub Date: 2006/29/12
  • Number: 08087035
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Virtualization of file input/output operations

Various embodiments of a system and method for providing input/output virtualization for a file are disclosed. The system may include a filter program that intercepts a write request for a particular file and stores change information specifying the data and the write location indicated by the write request. However, the file itself is not modified. The filter program may also intercept a read request referencing the file and determine whether change information representing a write request to write data at the location specified by the read request has been previously stored. If so then the data specified by the change information is returned in response to the read request.

  • Pub Date: 2006/29/12
  • Number: 08918427
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Using a hypervisor to provide computer security

A computer includes a virtual machine controlled by a hypervisor. The virtual machine runs a virtualized operating system with running processes. A security initialization module sets the state in the virtual machine to pass execution from the virtual machine to the hypervisor responsive to a process making a system call in the virtualized operating system. Responsive to execution being passed from the virtual machine to the hypervisor, a security module analyzes the process making the system call to determine whether it poses a security threat. If a security threat is found, the security module takes remedial action to address the threat.

  • Pub Date: 2006/29/12
  • Number: 07996836
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


User-level privilege management

In one embodiment, the present invention includes a method for receiving a request from a user-level agent for programming of a user-level privilege for at least one architectural resource of an application-managed sequencer (AMS) and programming the user-level privilege for the at least one architectural resource using an operating system-managed sequencer (OMS) coupled to the AMS. Other embodiments are described and claimed.

  • Pub Date: 2006/29/12
  • Number: 08074274
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for integrating a distributed object system component with a service oriented architecture application

A method for receiving user event at a distributed object system component, passing the received user events to a service oriented architecture (SOA) application for processing and receiving the result of the processed user events at the distributed object system component from the SOA application.

  • Pub Date: 2006/29/12
  • Number: 08612996
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Taxonomy engine and dataset for operating an appliance

A control system for controlling the operation of a useful system comprises at least one controller configured to control an operation of the useful system in response to a well formed command from a group of well formed commands. At least one taxonomy engine of the system is adapted to generate a taxonomy dataset establishing the group of well formed commands, and at least one command generator of the system is adapted to generate a well formed command using the taxonomy dataset. The taxonomy engine is configured to deliver the taxonomy dataset to the command generator, and the command generator is configured to deliver the well formed command to the controller.

  • Pub Date: 2006/29/12
  • Number: 08005780
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for securely storing and organizing SDARS content with DRM and non-DRM protected media content, and for facilitating obtaining purchased or subscription-based media based on received SDARS content

Disclosed are a device and method for securely storing and organizing SDARS content on a portable player. SDARS audio content is stored on a private partition of the device not available to a client PC. Shadow files are stored on a public partition of the device. The shadow files contain metadata related to the corresponding SDARS audio and a reference to the SDARS audio on the private partition. Playlists can be organized on the device intermixing stored SDARS content with DRM and non-DRM protected media content. Downloading of purchased or subscription-based media files based on observed or received SDARS content is facilitated. Digital Rights Management features are included to control authorized actions with respect to SDARS content. Firmware updates are performed using encrypted firmware unique to the particular device to thwart firmware hacking.

  • Pub Date: 2006/29/12
  • Number: 08005419
  • Owner: XM Satellite Radio Inc.
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for reducing the static footprint of mixed-language JAVA classes

A system and a method for minimizing the functionality-gap between JAVA™ and native platforms while keeping the impact on each JAVA™ API static footprint as small as possible. A JAVA™ Runtime Dynamic Invocation API is used for low-level bridging between JAVA™ and C/C++, enabling the dynamic invocation of native C/C++ functions and C++ class/object methods from the JAVA™ side without adding any additional ad hoc implemented native code to the overall JAVA™ component implementation. Thereby, the need to write new native code when implementing a JAVA™ component that needs to invoke some native functionality is reduced.

  • Pub Date: 2006/29/12
  • Number: 08756616
  • Owner: Core Wireless Licensing S.A.R.L.
  • Location: Luxembourg, LU
  • Details: Visit USPTO

Visit USPTO Page


System and method for addressing data containers using data set identifiers

A system and method addresses data containers in a clustered storage system. Each instantiation of a volume, or other container set, is associated with a data set identifier (DSID). All instantiations of data that represent a single point in time are associated with a master data set identifier (MSID). A volume location database (VLDB), utilizing a replicated database among the nodes of the cluster, stores a data set data structure containing appropriate mapping information between the MSIDs and DSIDs. Clients of the clustered storage system utilize MSIDs to reference data that is desired to be accessed. When a storage system receives a data access request containing a MSID, the storage system accesses the VLDB to identify an appropriate DSID to which to forward the request. The data access request is then forwarded to the appropriate storage system for processing.

  • Pub Date: 2006/29/12
  • Number: 08489811
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system and method for operating an appliance in multiple operating modes

In one embodiment, a system for controlling a plurality of devices having at least two operating modes comprises a first software operating layer configured to control the operation of at least one of the devices in a first operational mode and a second software operating layer configured to control the operation of at least one of the devices in a second operational mode. In another embodiment, a control system for controlling a plurality of devices connected by a communications network comprises a user interface configured to receive the selection of a cycle of operation; a first system element isolated from the network and configured to implement the selected cycle of operation to define a first control state; and a second system element exposed to the network and configured to implement the selected cycle of operation to define a second control state.

  • Pub Date: 2006/29/12
  • Number: 07813831
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system and method for operating an appliance exposing key press functionality to a network

A network control system for an appliance has a software operating layer that is responsive to a plurality of appliance function calls. A physical user interface on the appliance is capable of generating directly some of the appliance function calls. A virtual user interface connected remotely over the network is also configured to invoke some of the appliance function calls. But the virtual user interface can further invoke one or more of the function calls that the physical user interface cannot generate directly.

  • Pub Date: 2006/29/12
  • Number: 09401822
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system and method for discovering components within an appliance using fuctionality identifiers

A network comprising a plurality of nodes, and each of the nodes has at least one identifier from pre-determined group of identifiers, with each identifier identifying at least one functionality applicable such node. A method of identifying the nodes comprises at least one node sending over the network a message configured to ask for the presence of at least one identifier from the pre-determined group of identifiers. At least one other node sends a feedback message affirming the existence of the at least one identifier on the at least one other node.

  • Pub Date: 2006/29/12
  • Number: 08155120
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system and method for communication with, and management of, components within an appliance utilizing functionality identifiers

A network system comprising a system of devices having a plurality of nodes defining a communications network. At least one identifier from a pre-determined group of identifiers is associated with each of the nodes and identifies the functionalities that are applicable to that node or device associated with that node. In one embodiment, at least one of the nodes can transmit the at least one identifier by a message sent over the communications network for receipt by at least one of the nodes to thereby publish the functionalities over the communications network.

  • Pub Date: 2006/29/12
  • Number: 08345686
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Ranking custom search results

A system searches a first search index based on a search query to obtain first search results and searches a second search index based on the search query to obtain second search results. The system further ranks the first search results using a first ranking algorithm and one or more first ranking parameters to produce ranked first search results, and ranks the second search results using a second ranking algorithm and one or more second ranking parameters to produce second search results, where the one or more first ranking parameters are different than the one or more second ranking parameters and where the one or more second ranking parameters include at least one of previous user feedback associated with custom content that corresponds to the second search index, annotations of the custom content provided by a user, or usage patterns associated with users previously accessing and searching the custom content. The system also provides the ranked first and second search results to a user.

  • Pub Date: 2006/29/12
  • Number: 07987185
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for presenting information on mobile devices

Methods and systems for presenting media content (e.g., scrolling text) on a mobile device are provided. A broadcast may be received from a network via a wireless communication link, the broadcast may include media content (e.g., a text feed) and information (e.g., metadata) associated with characteristics of the media content. The media content may be extracted, and at least one characteristic associated with presenting the media content on the mobile device may be identified. The media content may be presented on the mobile device in accordance with the at least one identified characteristic.

  • Pub Date: 2006/29/12
  • Number: 08019271
  • Owner: Nextel Communications, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for monitoring the insertion of local media content into a program stream

Methods and apparatus for monitoring locally inserted media content are disclosed. A disclosed method includes obtaining identification data and inserting the identification data in the media content after the media content has been received at a media consumption location. Another disclosed method includes receiving media content before the media content is output by a consumer receiving device and monitoring the received media content. Monitoring the received media content may include extracting signatures from the received media content and transmitting the extracted signatures to another location.

  • Pub Date: 2006/29/12
  • Number: 08924995
  • Owner: The Nielsen Company (US), LLC
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Method for notifying task providers to become active using instant messaging

A method and system for correlating a work request to a provider based on content of the work request and delegating the work request to the provider using an instant message (IM) service. An instant message service including those offered by existing IM service providers is used to notify a provider that a request has been received requesting work to be performed. The instant message may include a link to details of the work being requested, establish an electronic mail communication, point to a web site or initiate an application that communicates with web-enabled services on a server connected to the Internet.

  • Pub Date: 2006/29/12
  • Number: 08671008
  • Owner: ChaCha Search, Inc
  • Location: Carmel, US
  • Details: Visit USPTO

Visit USPTO Page


Method for code execution

Method for executing a software application is provided. The method includes detecting a host operating system; executing a virtual operating system in a virtual environment, wherein the virtual operating system is stored in a non-volatile memory device; and executing a software application in the virtual environment, wherein the software application is stored in the non-volatile memory device; and the virtual operating system and the software application are executed independently of the host operating system execution.

  • Pub Date: 2006/29/12
  • Number: 07890723
  • Owner: SanDisk Corporation
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Method for autonomously monitoring and reporting sound pressure level (SPL) exposure for a user of a communication device

A method for monitoring and reporting sound pressure level exposure for a user of a first communication device () is implemented in one embodiment when the device measures a sound pressure level (SPL) of the surrounding environment. The device stores at least the SPL measurement in a memory, producing an SPL exposure record, and displays a visual representation of the SPL exposure record on a display screen (). In another embodiment, the SPL is measured by a second communication device () and combined with a known SPL for an output audio transducer () of the second device, producing a user sound exposure level. The user sound exposure level is transmitted to the first communication device. The user is notified when the user sound exposure level exceeds a predetermined threshold. A server () may also be used to track SPLs over time and recommend corrective action when exposure limits are exceeded.

  • Pub Date: 2006/29/12
  • Number: 07983426
  • Owner: Motorola Mobility, Inc.
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Hybrid machine/human computing arrangement

A hybrid machine/human computing arrangement which advantageously involves humans to assist a computer to solve particular tasks, allowing the computer to solve the tasks more efficiently. In one embodiment, a computer system decomposes a task, such as, for example, image or speech comparison, into subtasks for human performance, and requests the performances. The computer system programmatically conveys the request to a central coordinating server of the hybrid machine/human computing arrangement, which in turn dispatches the subtasks to personal computers operated by the humans. The humans perform the subtasks and provide the results back to the server, which receives the responses, and generates a result for the task based at least in part on the results of the human performances.

  • Pub Date: 2006/29/12
  • Number: 07801756
  • Owner: Amazon Technologies, Inc.
  • Location: Incline Village, US
  • Details: Visit USPTO

Visit USPTO Page


Event notification system for an appliance

A system comprising a memory heap generated dynamically by useful software and a data acquisition engine. The memory heap comprises a plurality of event structures, each including at least one each of pointers into memory external to the event structure, event operators, and arguments. The data acquisition engine is configured to look into the memory heap, evaluate event conditions as true or false based on the at least one each of the pointers, operators, and arguments, and generate a notification message when a true condition is found.

  • Pub Date: 2006/29/12
  • Number: 07917914
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Event data translation system

An event translator system for receiving input information, parsing event data on the input information to produce a result event data set and generating an event list based on an analysis of the event the result data set, performing an event listing and displaying event list to a user interface module. The event translation system translating event data also include receiving user feedback on the event listing and using the user feedback to improve subsequent operations of at least one harvesting algorithm. Translating event data also includes at least two harvesting algorithms for performing the input information to generate a plurality of result event data sets and creating an event listing for display to a user interface module based on an analysis of the plurality of result event data sets.

  • Pub Date: 2006/29/12
  • Number: 07577963
  • Owner: Public Display, Inc.
  • Location: Providence, US
  • Details: Visit USPTO

Visit USPTO Page


Embedded system for diagnostics and prognostics of conduits

A set of sensors to be used with an apparatus providing a means for assessment of the integrity of insulated conduits, harnesses, cables, pipelines and other interconnection systems constructed with integral sensitized media, discrete sensors, and electronics providing a means for transforming sensed data into information and a means for communicating information for the purpose of understanding the location, degree and risk of damage and deterioration, and the probable causes thereof.

  • Pub Date: 2006/29/12
  • Number: 07590496
  • Details: Visit USPTO

Visit USPTO Page


Data acquisition method with event notification for an appliance

A data acquisition method comprising looking into a memory heap of event structures having condition parameters of at least one of memory pointers, event operators, and arguments; identifying event conditions that evaluate as true by evaluating the condition parameters for the even structures; and generating a notification message when a true condition is found.

  • Pub Date: 2006/29/12
  • Number: 07921429
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Custom search index

A system includes an application programming interface, an indexer, a security unit and at least one search engine. The application programming interface uploads user-selected custom content from a first user. The indexer indexes the custom content to produce a first search index. The security unit authenticates a user and the at least one search engine receives a search query from the user, searches the first search index based on the search query, and searches a second search index based on the search query and based on results of the user authentication, where the second search index is different than the first search index.

  • Pub Date: 2006/29/12
  • Number: 2075435
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Content display monitor

The invention can enable monitoring of the display of content by a computer system. Moreover, the invention can enable monitoring of the displayed content to produce monitoring information from which conclusions may be deduced regarding the observation of the displayed content by an observer. The invention can also enable monitoring of the display at a content display site of content that is provided by a content provider site over a network to the content display site. Additionally, the invention can enable the expeditious provision of updated and/or tailored content over a network from a content provider site to a content display site so that the content provider's current and appropriately tailored content is always displayed at the content display site. Aspects of the invention related to transfer of content over a network are generally applicable to any type of network. However, it is contemplated that the invention can be particularly useful with a computer network, including private computer networks (e.g., America Online™) and public computer networks (e.g., the Internet). In particular, the invention can be advantageously used with computer networks or portions of computer networks over which video and/or audio content are transferred from one network site to another network site for observation, such as the World Wide Web portion of the Internet.

  • Pub Date: 2006/29/12
  • Number: 08713428
  • Owner: comScore, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Automated ranking of electronic communications

Various methods and systems for automatically ranking electronic communications such as emails based on both content and social factors are disclosed. One method assigns a rank to an electronic communication, where assigning the rank involves both assigning a content-based rank to the electronic communication and assigning a social rank to the electronic communication. The rank assigned to the electronic communication can include both the content-based and social rank. Alternatively, the rank can be derived from the content-based and social ranks (e.g., the rank can be an average of the content-based and social ranks).

  • Pub Date: 2006/29/12
  • Number: 08510389
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Threading model analysis system and method

A method and computer program product for detecting an attempt by a first thread to engage a synchronization object. A determination is made as to whether an earlier thread has already engaged the synchronization object. In response to determining that the earlier thread has already engaged the synchronization object, a determination is made as to whether the number of threads waiting to engage the synchronization object is greater than a highwater mark.

  • Pub Date: 2006/28/12
  • Number: 08356284
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Substituted pyrazolo[3,4-d]pyrimidines as protein kinase inhibitors

  • Pub Date: 2006/28/12
  • Number: 2094233
  • Owner: Abbott Laboratories
  • Location: Abbott Park, US
  • Details: Visit USPTO

Visit USPTO Page


Session-based public key infrastructure

A method and system for issuing anonymous, or user-independent, certificates for secure communication over a network, such as the Internet, to provide authentication and automated login to electronic services. A pool of user-independent certificates is generated. Once the user is identified, a user-independent roaming certificate is automatically transferred to the user's computer for encryption of communications during a single session. Once the user completes the online session or transaction, the issued digital certificate and associated key material is released back to the pool of digital certificates and can be re-used.

  • Pub Date: 2006/28/12
  • Number: 08219808
  • Owner: BCE Inc.
  • Location: Montreal, Quebec, CA
  • Details: Visit USPTO

Visit USPTO Page


Seamless roaming across wireless subnets using source address forwarding

To enable devices to detect L3 roaming users and to take appropriate forwarding actions, L3 knowledge is introduced inside a bridge in a non-intrusive way. In particular, as a client moves from a subnet associated with a first network element to a subnet associated with a second network element, a determination is made regarding whether the client is roaming. This is done by evaluating a source IP address within a L3 packet header within a first frame received at the second network element. If, as a result of the evaluating step, it is determined that the client is roaming, an L2 bridge forwarding table in the second network element is configured to include a source MAC address of the client together with information identifying at least a destination interface for use in directing client data traffic back towards the subnet associated with the first network element. The first frame is then forwarded. In one embodiment, the traffic is directed back towards the subnet associated with the first network element via a GRE encapsulation tunnel, although any convenient tunneling mechanism can be used. According to another feature, given information cached at the foreign access point is used to enable the roaming client to continue to seamlessly receive inbound traffic prior to or during the configuration of the L2 bridge forwarding table (i.e., before any outbound traffic is actually sent from the client).

  • Pub Date: 2006/28/12
  • Number: 08018900
  • Owner: Hewlett-Packard Company
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Providing enterprise management of amorphous communities

A method of managing online communities within an online community management system can include declaratively specifying a taxonomy of online community types, declaratively specifying a plurality of roles for members of online communities, and declaratively specifying a security policy that associates permissions with roles and online community types. A plurality of online community profiles can be maintained. Each online community profile can represent an online community, specify an online community type from the taxonomy, and specify a list of members of that online community as well as an associated role for each member. Access can be provided to a selected online community according to the online community type of the selected online community, a role within the selected online community that is associated with a user attempting to access the selected online community, and the security policy.

  • Pub Date: 2006/28/12
  • Number: 07849496
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method for selecting conductors of an overhead power transmission line

Methods for selecting a conductor configuration of an overhead power transmission line tension section between two dead-end towers when the conductor configuration includes at least two different types of conductors. Geographical profile information and overhead power transmission line preferences are used along with predetermined selection rules when selecting the appropriate conductor configuration. Some examples of overhead power transmission line preferences include electrical characteristics and conductor sag between towers, while examples of selection rules include conductor costs and conductor tension.

  • Pub Date: 2006/28/12
  • Number: 07921005
  • Owner: 3M Innovative Properties Company
  • Location: St. Paul, unknown
  • Details: Visit USPTO

Visit USPTO Page


Method for distributing and executing service logic

A method of distributing and executing service logic across private and public networks for the generation and provision of telecommunication services is disclosed. The functionality and capabilities associated with both Intelligent Network (IN) and non-IN compliant elements of a public telecommunications system are abstracted using a set of control and informational parameters and variables which are associated with a given network element or network element category. A service creation and execution application programming interface provides access to a service creation and execution environment which is distributed in public network gateways, private network gateways, and in compatible software platforms. The distributed service creation and execution environment enable the generation, provisioning, and execution of applications across private and public telecommunication networks in order to provide novel telecommunication services via the serial or concurrent invocation of one or more distributed applications.

  • Pub Date: 2006/28/12
  • Number: 07881286
  • Owner: Redknee Inc.
  • Location: , CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for operating applications for remote terminal devices

Method for allowing a user of a mobile terminal device having predetermined computational resources to remotely develop and operate upgraded content delivery applications. A client-side application and a corresponding remote application are installed on the terminal device and on a server connected to the terminal device. The remote application dynamically splits the tasks to be performed by the content delivery application between the client-side application and remote application, according to its computational resources and processes, in real-time, the content and its associated logic and input data to be delivered to the terminal device. The processed content is then transmitted to the terminal device over the data network and the content is rendered by the client-side application. The client-side application responds to inputs from the user and/or to messages from the server or further connected devices.

  • Pub Date: 2006/28/12
  • Number: 07747683
  • Owner: Pike Ltd.
  • Location: Rosh Ha'Ayin, IL
  • Details: Visit USPTO

Visit USPTO Page


Lock suitability analysis during execution of computer program under test

A method and computer program product for detecting an attempt to engage a synchronization object. A tracking list for a line of code that attempted to engage the synchronization object is updated.

  • Pub Date: 2006/28/12
  • Number: 08332858
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data synchronization system and method

A method and system for synchronizing data between a network server and a mobile device is provided. In an embodiment, a plurality of object instances may be received from the network server, and at least one object instance may be selected. For each selected object instance, the plurality of object instances may be recursively searched to identify related object instances, the related object instances may be sorted, and the sorted object instances may be sent to the mobile device, followed by the selected object instance. In this manner, data synchronization between the network server and the mobile device may advantageously include only those object instances that are needed by the mobile device, thereby preventing redundant, or omitted, data transfers.

  • Pub Date: 2006/28/12
  • Number: 09165047
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Checkpoint and consistency markers

Described are a method, computer program product, and system for obtaining a copy of source data in a consistent state. One or more file operations having a corresponding time sequence which modify said source data are recorded. A request for a copy of the source data in a consistent state is received. It is determined at which point in the corresponding time sequence said source data is in a consistent state as a result of applying a portion of the file operations. The point in the corresponding time sequence at which the source data is in a consistent state is marked. The portion of file operations determined to place the source data in a consistent state is applied to the copy of the source data.

  • Pub Date: 2006/28/12
  • Number: 07788458
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Automated dereferencing of electronic communications for archival

Various methods and systems for automatically obtaining documents that are referenced by an electronic communication, such as an email or instant message, for archival are disclosed. One method involves searching at least a portion (e.g., the header and/or body) of an electronic communication for a reference to a document and, in response to detecting the reference, automatically obtaining an electronic copy of the document. The electronic copy of the document can then be archived.

  • Pub Date: 2006/28/12
  • Number: 08341177
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Application access control in a mobile environment

A system and method are described whereby a mobile device controls access to mobile applications based on access conditions associated with a current access network. To prevent mobile applications from running when the access conditions are not suitable, the mobile device includes a policy database used to store a list of access conditions that are inappropriate for launching the installed applications. The access conditions are based on the type of the current access network used by the mobile device for launching or maintaining the requested application session. The access conditions indicate whether the mobile device is currently accessing its home network or roaming on another provider's network. Similarly, the access conditions indicate the type of network access interface used by the current network to provide the data connection necessary to run the requested application. The policy database correlates predetermined actions with the access conditions associated with a given application session.

  • Pub Date: 2006/28/12
  • Number: 08326267
  • Owner: United States Cellular Corporation
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Alert log activity thread integration

Embodiments of the present invention address deficiencies of the art in respect to alert management in an activity-centric collaborative computing environment and provide a novel and non-obvious method, system and computer program product for activity thread integration of an alert log. In one embodiment of the invention, an alert log activity thread integration method can be provided. The method can include logging a reference to an alert for an activity in an activity thread, and, in response to the selection of the alert from within the activity thread, displaying the content of the alert. For instance, logging a reference to an alert for an activity in an activity thread can include creating a branch of the activity thread for inserting all alerts pertaining to the activity and inserting the reference to the alert in the created branch.

  • Pub Date: 2006/28/12
  • Number: 07822848
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Ultrasonic imaging system having computer coupled to receive and process raw data

An ultrasound machine is configured for developing new modes for obtaining images or other useful information from ultrasound signals. The machine has a data processor configured to control a transmit circuit to generate ultrasound signals. Echo signals are received and digitized to yield RF data that is stored in a memory accessible to the data processor. A user can operate design mode application software to change the manner in which the RF data is processed to yield images or other useful information. New modes can be developed rapidly. The data processor may comprise a conventional personal computer equipped with suitable interfaces. An ultrasound machine may include and use a floating point processor for processing ultrasound signals.

  • Pub Date: 2006/27/12
  • Number: 08491479
  • Owner: Ultrasonix Medical Corporation
  • Location: Richond, BC, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for keyword extraction

A computer-implemented system and method for keyword extraction are disclosed. The system in an example embodiment includes a keyword extraction component to extract relevant keywords from content of a web page, to identify items relevant to the extracted keywords, and to rank the relevant items.

  • Pub Date: 2006/27/12
  • Number: 08209320
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for keyword extraction and contextual advertisement generation

A computer-implemented system and method for keyword extraction and contextual advertisement generation are disclosed. The system in an example embodiment includes a keyword extraction service to obtain information related to user activity on a host site and to extract relevant keywords from content of a web page, the information related to user activity on the host site being used to determine relevancy of the extracted keywords, and a contextual advertiser to produce an advertisement placement on an affiliate web page, the produced advertisement placement being relevant to user activity on the host site.

  • Pub Date: 2006/27/12
  • Number: 08001105
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for handling payment errors with respect to delivery services

Systems and methods which provide processing of payment errors with respect to delivery services in accordance with user preferences are disclosed herein. According to embodiments, a delivery service user provides information with respect to how payment errors with respect to delivery services provided to the user are to be handled to facilitate electronic and/or automated processing of such payment errors. A user may authorize payment shortages on the user's behalf, may request notification for an ad hoc determination as to how the shortage is to be handled, or may elect to have postal items returned in the case of payment shortage. Various levels of payment error handling services may be provided with respect to users. Detailed information, such as statistics with respect to users' payment errors, the numbers and types of payment errors, user's preferences in handling payment errors, etcetera, may be provided.

  • Pub Date: 2006/27/12
  • Number: 08612361
  • Owner: Stamps.com Inc.
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for effecting auction item payments through a network portal

A merchant/seller portal enables sellers of auction items on Internet auction sites to obtain cash payments from buyers identified only by their buyer pseudonyms. The portal includes an open network interface, a seller database in which data associated with a seller are stored, a buyer manager for verifying auction purchase data received from a merchant terminal, an auction site manager for verifying auction transaction data with an auction site server, and an auction payment manager for communicating data messages with an auction payment server to transfer funds for a verified auction transaction.

  • Pub Date: 2006/27/12
  • Number: 08577744
  • Owner: Datascape, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for application programming interfaces for keyword extraction and contextual advertisement generation

A computer-implemented system and method for keyword extraction and contextual advertisement generation are disclosed. The system in an example embodiment includes a keyword extraction service to receive from a consumer application a request for activation of a keyword extraction service via an application programming interface, the request including an identity of a content source, the request further including an identification of a particular extraction process to be used by the keyword extraction service on the identified content source; determine if the keyword extraction service has already processed the identified content source and retained extracted keywords in a data store; extract keywords from the identified content source using the particular extraction process identified in the request; and make the extracted keywords accessible to the consumer application.

  • Pub Date: 2006/27/12
  • Number: 07831586
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Processing multiple requests by a statically identified user server prior to user server termination

The simultaneous processing of requests under multiple user identifiers is facilitated. The requests are processed by user servers, in which a user server has an association with a particular user. A user server has a static identity associated therewith and is capable of processing a plurality of requests prior to terminating. The requests are dispatched to the appropriate user servers via a dispatcher server coupled to the user servers.

  • Pub Date: 2006/27/12
  • Number: 08250134
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method for automated management of a telecommunication service

Method for automatically managing a telecommunication service for telecommunication service user includes detecting a telecommunication device associated with the telecommunication service user on a network, determining an activation state of the telecommunication service based on data regarding the detected telecommunication device, determining an account/device state based on data regarding the detected telecommunication device and executing a management process between the telecommunication device and the telecommunication service to alter either the device state or the user account status based on the data regarding the detected device. The executing step includes automatically invoking an action that minimizes the necessary user interaction to initialize, update or access the service. Such service can be VoIP, instant messaging, and combination of these services or others.

  • Pub Date: 2006/27/12
  • Number: 08073123
  • Owner: Vonage Network LLC
  • Location: Holmdel, US
  • Details: Visit USPTO

Visit USPTO Page


Terminating device and a method of operating a terminating device configured to communicate availability status directly between terminating devices

A system and a method are disclosed for a terminating device for a communications network which comprises an application program configured to utilize an availability status of a user; a communications interface configured to receive and/or transmit data and a presence engine. The presence engine is configured to provide the communications interface with data representative of an availability status of a user, and cause the communications interface to transmit the data directly to another terminating device. Alternatively, or additionally, the presence engine is configured to receive data representative of an availability status of the user directly from another terminating device, and make available data representative of the received availability status of a user to the application program.

  • Pub Date: 2006/22/12
  • Number: 07694313
  • Owner: Palm, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, apparatus and computer program product for providing memory footprint reduction

An apparatus for providing memory footprint reduction for classes of an application programming interface includes a comparing element and a set selection element. The comparing element may be configured to receive a reference class file and one or more modified class files for each of a plurality of classes and to compare a size of each of the one or more modified class files and the reference class file. The set selection element may be in communication with the comparing element. The set selection element may be configured to select one of the one or more modified class files or the reference class file based at least in part on the size of each of the one or more modified class files and the reference class file as a selected file for each corresponding one of the classes and to form a class set comprising the selected file for each corresponding one of the classes.

  • Pub Date: 2006/22/12
  • Number: 09378002
  • Owner: Core Wireless Licensing S.a.r.l.
  • Location: Luxembourg, LU
  • Details: Visit USPTO

Visit USPTO Page


System and method of automatically maintaining and recycling software components

In one aspect of the disclosure, a computer program product, system and method for maintaining and recycling software components is disclosed. A first set of usage data for one or more software components is recorded. At least one of the plurality of software components is automatically removed if the first set of usage data for the at least one software component meets usage criteria specified in an expiration policy. Access is then provided to the removed software component through a remote server. A second set of usage data is now recorded for the removed software component. The removed software component is automatically re-instated if the second set of usage data meets usage criteria specified in a re-instatement policy.

  • Pub Date: 2006/22/12
  • Number: 07590599
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Syndicating ultrasound echo data in a healthcare environment

Disclosed herein are systems and methods for syndication and management of structured and unstructured data to assist institutional healthcare delivery, healthcare providers' practices, healthcare providers' group practices, collaborative academic research and decision making in healthcare, including through the utilization of medical devices and healthcare pools.

  • Pub Date: 2006/22/12
  • Number: 08768731
  • Owner: Newsilike Media Group, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Quick pixel rendering processing

A three-dimensional (3D) graphics pipeline which processes pixels of sub-screens in the last stage (pixel rendering) in parallel and independently. The sub-screen tasks are stored in a list in a shared memory. The shared memory is accessed by a plurality of processing threads designated for pixel rendering. The processing threads seize and lock sub-screens tasks in an orderly manner and process the tasks to create the bit map for display on a screen. The tasks are created by dividing a display area having the vertex information superimposed thereon into M×N sub-screen tasks. Based on system profiling, M and N may be varied.

  • Pub Date: 2006/22/12
  • Number: 08207972
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning my status information to others in my social network

A device, system, and method are directed towards sending a status of a user in a social network to a recipient. In one embodiment, a status of the user is received over a channel. The channel may include an application protocol. The recipient is selected based on a membership in the social network, a preference of the recipient, or a media format of the status. Another channel is selected based on information about a mode of communication between the recipient and the user and/or another member related to the user in the social network. The status may be modified based on social network information, preferences of a recipient, receiving device information, channel information, or the like. The status is forwarded to the recipient over the other channel. Forwarding may comprise unicasting, multicasting, and/or delaying sending the status until the other channel is available.

  • Pub Date: 2006/22/12
  • Number: 08224359
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Protocol neutral channel-based application communication

A system is presented that enables applications in a distributed system to communicate through a channel-based communication system. The applications use adaptors which communicate through a communication mechanism, resulting in application independence from the communication mechanism. In one embodiment, the communication mechanism consists of transmission media, logical channels, and brokers. The adaptors communicate with each other over the transmission media. Groups of adaptors involved in a particular type of communication from a communication channel. Channel profiles, which include channel properties and a list of adaptor members, are stored in brokers which can be queried by adaptors. Adaptors can support channel-specific data processing operations specified in the channel profile. Adaptors can join a channel, leave a channel, and communicate with other adaptors over the channel.

  • Pub Date: 2006/22/12
  • Number: 07933291
  • Owner: Honda Motor Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Presence engine and a method of operating a presence engine for encoding or decoding availability status into a signal representative of an audio signal

A system and a method are disclosed for a presence engine and a method of operating a presence engine for encoding or decoding availability status into a signal representative of an audio signal. The presence engine is configured to manage availability status of a user. The presence engine comprises an input configured to receive a signal representative of an audio signal and an output configured to send a signal representative of an audio signal. The presence engine also comprises a processor configured to encode availability status of a user into a signal representative of an audio signal and/or configured to decode availability status of a user from a signal representative of an audio signal.

  • Pub Date: 2006/22/12
  • Number: 07715859
  • Owner: Palm, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for storing content on a storage system comprising a plurality of zones

Some embodiments are directed to a technique for storing and/or locating content units stored on an object addressable storage (OAS) system, wherein each content unit is identified by an object identifier. The OAS system may comprise a plurality of zones, each of which stores content units. A mapping process may be defined that maps object identifiers for content units to zones on the OAS system. Thus, the storage location for a content unit on the OAS system may be the zone on the OAS system to which the object identifier for the content unit maps.

  • Pub Date: 2006/22/12
  • Number: 07818536
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for selecting a storage zone for a content unit

Some embodiments are directed to a technique for storing and/or locating content units stored on an object addressable storage (OAS) system, wherein each content unit is identified by an object identifier. The OAS system may comprise a plurality of zones, each of which stores content units. A mapping process may be defined that maps object identifiers for content units to zones on the OAS system. Thus, the storage location for a content unit on the OAS system may be the zone on the OAS system to which the object identifier for the content unit maps.

  • Pub Date: 2006/22/12
  • Number: 08046561
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for increasing the storage capacity of a zone of a storage system

Some embodiments are directed to a technique for storing and/or locating content units stored on an object addressable storage (OAS) system, wherein each content unit is identified by an object identifier. The OAS system may comprise a plurality of zones, each of which stores content units. A mapping process may be defined that maps object identifiers for content units to zones on the OAS system. Thus, the storage location for a content unit on the OAS system may be the zone on the OAS system to which the object identifier for the content unit maps.

  • Pub Date: 2006/22/12
  • Number: 07913051
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for distributing information to multiple nodes

Some embodiments are directed to a technique for storing and/or locating content units stored on an object addressable storage (OAS) system, wherein each content unit is identified by an object identifier. The OAS system may comprise a plurality of zones, each of which stores content units. A mapping process may be defined that maps object identifiers for content units to zones on the OAS system. Thus, the storage location for a content unit on the OAS system may be the zone on the OAS system to which the object identifier for the content unit maps.

  • Pub Date: 2006/22/12
  • Number: 07734889
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for dial string to contact matching in a wireless communication device

Methods, devices, computer program products and systems for contact matching that is based on changing the dial string to include or delete codes. The described aspects provide for contact matching and subsequent display of contact information to occur in most instances in- which a connection occurs and for no matching and no subsequent display of contact information to occur in most instances in which a connection does not occur. The described aspects, systems and apparatus overcome problems related to an exact match scheme, which fails to provide contact information in many instances in which a call connection occurs, and a last, seven, or any other number, digit match scheme, which may provide contact information in instances in which a call connection cannot he made or is made to an unintended device.

  • Pub Date: 2006/22/12
  • Number: 07616969
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method of and system for watermarking application modules

A method of creating and using a software application module includes coding, by a developer, a software application module for extending a functionality of a main software application. The software application module is adapted to interface with the main software application using an application programming interface (API). The method further includes compiling the software application module to produce an executable software application module, determining if the developer is authorized to use the API, and embedding a watermark in the executable software application module if it is determined that the developer is authorized to use the API. The method still further includes executing the main software application, reading the watermark from a executable software application module, verifying if the watermark is correct, and executing the software application module if the watermark is verified as correct.

  • Pub Date: 2006/22/12
  • Number: 08024571
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing an information technology system

A network management system may comprise a file system daemon and a device proxy. The file system daemon may be configured to represent a property of a physical device of the plurality of physical devices and a resource as objects in a virtual file system, receive an instruction associated with the property of the physical device and another instruction associated with the resource from a single interface, identify the physical devices of the plurality of physical devices associated with each instruction, and determine the commands associated with each instruction. The device proxy may be configured to implement the commands.

  • Pub Date: 2006/22/12
  • Number: 08762507
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic pricing models for digital content

Dynamic pricing models which facilitate efficient distribution of digital content online. Particular implementations of the invention dynamically base pricing for digital content on relatively current, aggregated information regarding Internet user behavior and preferences, such as search query and/or page hit logs. Some implementations of the present invention are directed to pricing digital content based on the inherent properties of digital content and the mechanics of how electronic files are typically distributed on the Internet.

  • Pub Date: 2006/22/12
  • Number: 09076148
  • Owner: YAHOO! INC.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Data processing apparatus and a method of operating data processing apparatus for generating representations of availability status for application programs

A system and a method are disclosed for a data processing apparatus () is described which comprises a plurality of application programs () configured to utilize an availability status of a user; and a presence engine (). The presence engine () is configured to receive data representative of the availability status of the user and generate one or more representations of the received availability status suitable for one or more of the plurality of application programs (). The one or more representations of the received availability status are made available to the corresponding one or more of the plurality of application programs ().

  • Pub Date: 2006/22/12
  • Number: 07685608
  • Owner: Palm, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Data assurance workflow derivation and execution

A method for providing data assurance includes receiving selected input data to perform data assurance thereon, and receiving selected parameters for the data assurance. Data assurance modules are provided that translate the input data and the parameters and that derive a workflow for the data assurance based on the translated input data and the parameters. The workflow is executed to provide the data assurance on the input data.

  • Pub Date: 2006/22/12
  • Number: 07571069
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of laser texturing and crystallization of material surfaces

The surface of a material is textured and crystallized in a single step by exposing the surface to pulses from an ultrafast laser. The laser treatment causes pillars to form on the treated surface. These pillars provide for greater light absorption. The crystallization of the material provides for higher electric conductivity and changes in optical properties of the material. The method may be performed in a gaseous environment, so that laser assisted chemical etching will aid in the texturing of the surface. This method may be used on various material surfaces, such as semiconductors, metals, ceramics, polymers, and glasses.

  • Pub Date: 2006/21/12
  • Number: 08753990
  • Owner: University of Virginia Patent Foundation
  • Location: Charlottesville, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for multi-layered network communications

A multi-layered network for transporting data comprises a first network layer that provides a first session topology, and a second network layer that provides a second session topology. The second network layer uses the first network layer to transport data. In one embodiment of the invention, the data sent by the second layer is real-time audio data, such as voice. Each session topology may be either peer-to-peer or client/server. The first and second layers may have different topologies and/or different session hosts. A deterministic algorithm is provided whereby a new session host is selected when the current host leaves the session.

  • Pub Date: 2006/21/12
  • Number: 2076806
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for efficient replication of and access to application specific environments and data

A peer-to-peer system and method for efficient replication of and access to application specific environments and their data that includes automatically accessing application specific metadata to determine the location of application specific data and then replicating or providing access to the application metadata and data to a set of peers. A system and method for efficient replication of and access to application specific environments and data that includes automatically accessing a source application's metadata to determine the location of the source application's data and then automatically transferring and transforming the application metadata and data to a target application's metadata and data.

  • Pub Date: 2006/21/12
  • Number: 08738750
  • Details: Visit USPTO

Visit USPTO Page


Solid-state memory-based generation and handling of security authentication tokens

An architecture is presented that facilitates secure token generation and transmission capabilities in a mobile device. The system comprises at least one software application that includes a secure token assigned to a specific user and a memory module that communicates with an external processor. A security processor, non-volatile memory component and volatile memory component are integrated to form the memory module that communicates with the external processor. The memory module creates a secure execution environment for the execution of application agents associated with the software application and the secure token. The security processor of the system communicates with the software application and external processor to manage generation, authentication, confidentiality, and transmission of the secure token. And, the non-volatile memory allows the introduction of new tokens and the removal of old tokens.

  • Pub Date: 2006/21/12
  • Number: 08261091
  • Owner: Spansion LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Snapback user interface for accessing different document pages directly without going through intermediate pages

A user interface and methods for accessing document presentations are described herein. In one aspect of the invention, an exemplary method of the invention allows a user to directly snapback to a previous accessed document presentation without having to select from a menu of items or go through the intermediate pages. In this method, when a first document presentation is accessed, a first location of the first document presentation is recorded, automatically or manually. Subsequently, when a sequence of additional document presentations originated from the first document presentation is accessed, in response to a first input, without having to select from a menu of items, the first document presentation is directly retrieved from a recorded first location and displayed in a window. In one particular embodiment, a second document presentation is accessed and a second location of the second document presentation is recorded, where the recordation of the second location resets or supercedes the recordation of the first location. Other methods and apparatuses are also described.

  • Pub Date: 2006/21/12
  • Number: 07823054
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Rules driven pan ID metadata routing system and network

Content objects are associated with metadata via content identifiers. In response to a user's query for metadata for a piece of content, the content identifier is derived from the content object and used to determine metadata responses to the query. Rules are applied to govern the metadata responses returned in response to the query. Traffic monitoring is performed to track usage of metadata.

  • Pub Date: 2006/21/12
  • Number: 08924412
  • Owner: Digimarc Corporation
  • Location: Beaverton, US
  • Details: Visit USPTO

Visit USPTO Page


Point-of-sale promotions

A method and system to publish a promotion at a point-of-sale are provided. For example, a preliminary selection associated with a purchase from a user may be received. A promotion may be published to the user at a point-of-sale associated with the purchase after the user makes the preliminary selection and before the user finalizes the purchase. The promotion may be based on at least one attribute, where the at least one attribute is selected from a group including a user attribute and an attribute associated with the preliminary selection.

  • Pub Date: 2006/21/12
  • Number: 07980466
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Network accessible trusted code

In one embodiment, a computer system performs a method for accessing a trusted assembly from a virtualized location. A computer system detects receipt of a request to access an assembly. The address of the assembly is expressed in the request as a virtualized location. The computer system resolves the virtualized location to a physical location where the assembly is physically stored. The resolving includes accessing an information store that maintains the current physical location corresponding to the requested assembly's virtualized location. The computer system determines whether the requested assembly qualifies as a trusted assembly by verifying that the assembly sufficiently complies with information encoded within the assembly. Lastly, upon determining that the requested assembly is trusted, the computer system accesses the requested assembly from the physical location.

  • Pub Date: 2006/21/12
  • Number: 08006281
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-source bridge content distribution system and method

A multi-source bridge content distribution system links multiple content owners with access network operators or content distribution providers leasing space on access networks so that multi-media content can be provided from multiple content owners to consumers through a multi-source bridge or data center. Content files and associated content owner preference settings are provided from a plurality of content sources or providers to the multi-source data center. Files stored at the data center or locally at an access network are provided to subscribers through the local access network Content files are provided if the content owner preference settings are a sufficient match with service provider access network preference settings set up by the service provider using the access network to provide content to subscribers.

  • Pub Date: 2006/21/12
  • Number: 08191098
  • Owner: Verimatrix, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Modal advertising for wireless devices

Methods and computer-readable media are provided for the delivery of digital content to mobile devices. An audio content, a video content or an audio-video content is associated with a web page and the web page is published to a server location suitable for viewing. Once the web page is selected, the content is sent to the wireless device through streaming or by initiating a download. After the content is available to the device, an application programming interface executes the content for the user to listen, view or both.

  • Pub Date: 2006/21/12
  • Number: 08301278
  • Owner: Sprint Communications Company L.P.
  • Location: Overland Park, US
  • Details: Visit USPTO

Visit USPTO Page


Method of constructing a reconfigurable photonic band gap device

A method for constructing a reconfigurable photonic band gap device having a substrate and a crystal membrane with a lattice structure having its ends attached to a substrate so that a midportion of the lattice membrane is spaced upwardly from the substrate and forms a chamber therebetween. A bridge is disposed in the chamber between and separated from both the lattice membrane midportion and the substrate. At least one post is attached to the bridge and aligned with at least one hole in the lattice so that movement of the bridge relative to the lattice varies the degree of insertion of the post relative to its associated hole to vary the photonic band gap behavior of the device.

  • Pub Date: 2006/21/12
  • Number: 1988680
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for establishing peer-to-peer communications

A method and apparatus that establishes peer-to-peer communications is disclosed. The method may include determining a group to which a first device belongs, determining the identity of other devices in the group, sending an initial communication to the other devices to indicate that the first device will be joining the group, informing the other devices of applications that are available at the first device, and informing the applications about each equivalent application that is available in other devices in the group.

  • Pub Date: 2006/21/12
  • Number: 08027342
  • Owner: Motorola Mobility, Inc.
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Memory hierarchy reconfiguration for energy and performance in general-purpose processor architectures

A cache and TLB layout and design leverage repeater insertion to provide dynamic low-cost configurability trading off size and speed on a per application phase basis. A configuration management algorithm dynamically detects phase changes and reacts to an application's hit and miss intolerance in order to improve memory hierarchy performance while taking energy consumption into consideration.

  • Pub Date: 2006/21/12
  • Number: RE041958
  • Details: Visit USPTO

Visit USPTO Page


Managed execution environment for software application interfacing

Some embodiments are directed to controlling interactions between a host software program and a computer system by providing a managed execution environment running within the host software program. In one embodiment, a computer system integrates a managed execution environment within a host software program. The computer system uses the managed execution environment to interact with one or more features of the host software program. The managed execution environment includes interface controls configured to interface between the computer system and the host software program. The compute system alters one or more of the various software program features based on code that is identified in downloaded content.

  • Pub Date: 2006/21/12
  • Number: 08584147
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Local digital asset storage management technique

A technique is described for managing the local storage of digital assets, such as audio, (moving or still) pictures, text, executable code and combinations thereof, in the storage device of a user appliance, such as a personal video recorder, set top box, mobile phone or storage server. A digital asset is received that is intended for local storage in the storage device and that has been pushed down from a source. A rank order is assigned to each digital asset stored or to be stored in a storage device that has a finite capacity storage space for storing digital assets. The assigned rank orders of one or more of the digital assets are repeatedly examined and a digital asset having a rank order that is lowest among the examined rank orders may be deleted. Each rank order is assigned based on predefined default ranking rules and user instructions pertaining to one or more of the digital assets that are capable of causing a deviation from the default ranking rules, if any have been provided by the user. A signal may be provided containing executable instructions that can be executed at programmable electronic circuits for performing the above steps. Such a signal may be stored on a storage medium. A system for performing the above steps may include a receiver for receiving the digital assets and a processor for assigning ranking orders and for repeatedly examining the ranking orders and selectively deleting digital assets with low ranking orders.

  • Pub Date: 2006/21/12
  • Number: 07680993
  • Owner: Tandberg Television, Inc.
  • Location: Duluth, US
  • Details: Visit USPTO

Visit USPTO Page


Information operations support system, method, and computer program product

A system, method and computer program product are provided for creation of a network training environment that simulates a large network as a training target and using simulation and virtual network technologies together with actual network resources to teach computer network exploitation and computer network attack techniques in training exercises for persons responsible for safeguarding networks and for probing and attacking others' networks. The system, method, and computer program product further support integration of real hosts for more realistic exercises.

  • Pub Date: 2006/21/12
  • Number: 08554536
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Image forming apparatus with increased transfer efficiency

In an image forming apparatus, toner primarily transferred to an intermediate transfer belt is secondarily transferred at a first nip area formed by a secondary transfer roller and a transfuse roller, onto the transfuse roller, at pressure of 5.3 N/cmto 20 N/cmand at a driving speed ratio of the intermediate transfer belt and the transfuse roller of 1.02 to 1.04, and the toner sufficiently heated and melted in the process of conveyance from the first nip area to a second nip area formed by the transfuse roller and a pressure roller is thirdly transferred and fixed to a recording medium P at the second nip area, at pressure of 13.3 N/cmto 33.3 N/cm.

  • Pub Date: 2006/21/12
  • Number: 2067930
  • Owner: Sharp Kabushiki Kaisha
  • Location: Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Content metadata directory services

The content metadata directory system connects consumers of identified content to managed metadata databases and other digital resources. The system manages links between identifiers in content objects and metadata sources. It supports a variety of different type of content identifiers and allows for overlap among different content identification schemes. One method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers and provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source.

  • Pub Date: 2006/21/12
  • Number: 09275157
  • Owner: Digimarc Corporation
  • Location: Beaverton, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of selective collection and selective presentation of content

Disclosed are apparatus and methods operable to distribute targeted content. Additionally, disclosed are corresponding apparatus and methods operable to selectively choose and cache selected ones from among the distributed targeted content, and to further choose ones from among the cached content to present on a device. In some aspects, selective caching of content may be based upon a match between predetermined content attribute information and predetermined profile information. Further, in some aspects, an indicator is operable to trigger the selective inclusion of one or more of the cached content in a presentation of other content, which may be based on a match between a desired content attribute associated with the indicator and the respective predetermined content attribute information of the cached content.

  • Pub Date: 2006/21/12
  • Number: 2067936
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Writing coverage information to a framebuffer in a computer graphics system

A computer-implemented graphics system has a mode of operation in which primitive coverage information is generated by a rasterizer for real sample locations and virtual sample locations for use in anti-aliasing. An individual pixel includes a single real sample location and at least one virtual sample location. If the coverage information cannot be changed by a pixel shader, then the rasterizer can write the coverage information to a framebuffer. If, however, the coverage information can be changed by the shader, then the rasterizer sends the coverage information to the shader.

  • Pub Date: 2006/20/12
  • Number: 08547395
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Shader that conditionally updates a framebuffer in a computer graphics system

A computer-implemented graphics system that includes a rasterizer and a shader has a mode of operation in which primitive coverage information is generated for real sample locations and virtual sample locations for use in anti-aliasing. An individual pixel includes a single real sample location and at least one virtual sample location. In some instances, a primitive may cover only virtual sample locations and does not cover a real sample location. These instances can be identified in the coverage information sent from the rasterizer to the shader, so that the shader can determine whether or not it can write color information, depth information and/or stencil information for the real sample location to a framebuffer.

  • Pub Date: 2006/20/12
  • Number: 07876332
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Selecting real sample locations for ownership of virtual sample locations in a computer graphics system

A computer-implemented graphics system has a mode of operation in which primitive coverage information is generated for real sample locations and virtual sample locations for use in anti-aliasing. An individual pixel includes a single real sample location and at least one virtual sample location. A block of real sample locations can be selected to delineate and encompass a region containing a number of virtual sample locations. Pixel attribute values (e.g., z-depth or stencil values) associated with the block of selected real sample locations can be used to associate each virtual sample location within the region with one of the selected real sample locations. The virtual sample location assumes the pixel attribute value of the real sample location with which it is associated.

  • Pub Date: 2006/20/12
  • Number: 07817165
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Seafood spoilage indicator

An enzyme based nondestructive sensor for the qualitative detection of spoilage in seafood is provided wherein the sensor does not alter the physical composition of the seafood specimen. The sensor comprises a sampling matrix, at least three or more enzymes in contact with the sampling matrix, and at least one indicator compound in contact with the sampling matrix. The enzymes are capable of interacting with four target chemicals comprising putrescine, cadaverine, histamine and tyramine, which are located on the surface of the seafood specimen. The indicator compound is capable of changing the color of the sampling matrix thereby indicating a qualitative visually detectable color change. A method for the nondestructive detection of the quality of a seafood specimen at any given time and for determining the remaining usable shelf life of the seafood specimen is disclosed.

  • Pub Date: 2006/20/12
  • Number: 2023609
  • Owner: Agentase, LLC
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Nucleic acid and amino acid sequences relating to for diagnostics and therapeutics

The invention provides isolated polypeptide and nucleic acid sequences derived from that are useful in diagnosis and therapy of pathological conditions; antibodies against the polypeptides; and methods for the production of the polypeptides. The invention also provides methods for the detection, prevention and treatment of pathological conditions resulting from bacterial infection.

  • Pub Date: 2006/20/12
  • Number: 2042880
  • Owner: Sanofi Pasteur Limited/Sanofi Pasteur Limitée
  • Location: Toronto, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Method of determining uncertainty associated with acoustic distortion-based noise reduction

A method and apparatus are provided for determining uncertainty in noise reduction based on a parametric model of speech distortion. The method is first used to reduce noise in a noisy signal. In particular, noise is reduced from a representation of a portion of a noisy signal to produce a representation of a cleaned signal by utilizing an acoustic environment model. The uncertainty associated with the noise reduction process is then computed. In one embodiment, the uncertainty of the noise reduction process is used, in conjunction with the noise-reduced signal, to decode a pattern state.

  • Pub Date: 2006/20/12
  • Number: 07289955
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Execution of a BPEL process by simulating partners

Mechanisms allow a user to test a BPEL process by simulating partner Web services. To simulate the partner Web services, a development environment is extended to include an intermediate component that intercepts messages intended for a partner Web service and displays those messages in a testing user interface. In the testing user interface, a user can create and send messages in direct response to the messages invoked while executing the BPEL process. The development environment may also include an alternate deployment descriptor, as part of a BPEL engine. The alternate deployment descriptor identifies where a message should be routed. For example, the alternate deployment descriptor lists the address of the intermediate component, rather than the actual partner Web service address, so that messages can be redirected to the testing user interface.

  • Pub Date: 2006/20/12
  • Number: 08689186
  • Owner: Oracle America, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Backup system and method

Backup of a production instance of an application in a production machine environment is performed by creating a snapshot image that captures the state of the production machine, and then backing up the application from a backup machine created using the snapshot image. The backup of the application can be effected by shutting down the backup machine and backing up its storage, or by using backup software to act on the backup version of the application.

  • Pub Date: 2006/20/12
  • Number: 07689859
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for booting using an external disk through a virtual SCSI connection

An apparatus, system, and method are disclosed for booting a Logical Partition using an external storage device. The method creates a virtual SCSI device assigned to a first logical partition (“LPAR”) of a first computer using a virtual I/O server by mapping a LUN of a storage volume to a SCSI ID. The storage volume is located external to the first computer and the first LPAR is configured to share one or more physical processors and one or more physical I/O devices of the first computer with a plurality of LPARs. The method receives a boot request to boot the first LPAR. The boot request identifies the storage volume as a boot device using the SCSI ID of the virtual SCSI device. The method retrieves boot data from the storage volume using a SCSI driver of the first LPAR and boots the first LPAR using the boot data.

  • Pub Date: 2006/20/12
  • Number: 2042034
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Using an automated speech application environment to automatically provide text exchange services

The present solution includes an automated response method. The method can receive user interactions entered through a real-time text exchange interface. These user interactions with the speech application can be dynamically and automatically converted as necessary into a format consumable by a voice server. A text input API of a voice server can be used to allow the voice server to directly accept text input. Further, automated interactions can be received from the voice server, which are dynamically and automatically converted into a format accepted by the text exchange interface. The text exchange interface can be an off-the-shelf unmodified interface. The speech application can be a VoiceXML based application that lacks an inherent text exchange capability.

  • Pub Date: 2006/19/12
  • Number: 08027839
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for scanning portions of data

A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data.

  • Pub Date: 2006/19/12
  • Number: 08307428
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning a vehicle interface module

The present invention provides systems and methods for provisioning a vehicle interface module comprising receiving a VIM from a VIM manufacturer and entering appropriate VIM data into a dealer inventory, activating a SIM card for the VIM and installing the VIM in a predetermined vehicle, selecting a wireless activated VIM from the dealer inventory and connecting the VIM to an OBD-II port of the vehicle, connecting a configuration PC to the VIM and downloading a modem configuration, selecting and downloading a vehicle-specific configuration file, accessing a telematics services provider's web portal, entering appropriate vehicle data, and associating the vehicle with the VIM, installing the VIM in the predetermined vehicle, and conducting an installation verification test.

  • Pub Date: 2006/19/12
  • Number: 07818098
  • Owner: Inilex, Inc.
  • Location: Chandler, US
  • Details: Visit USPTO

Visit USPTO Page


Switching between modalities in a speech application environment extended for interactive text exchanges

The present solution includes a method for dynamically switching modalities in a dialogue session involving a voice server. In the method, a dialogue session can be established between a user and a speech application. During the dialogue session, the user can interact using an original modality, which is either a speech modality, a text exchange modality, or a multi mode modality that includes a text exchange modality. The speech application can interact using a speech modality. A modality switch trigger can be detected that changes the original modality to a different modality. The modality transition to the second modality can be transparent to the speech application. The speech application can be a standard VoiceXML based speech application that lacks an inherent text exchange capability.

  • Pub Date: 2006/19/12
  • Number: 07921214
  • Details: Visit USPTO

Visit USPTO Page


Queuing of invocations for mobile web services

Methods and apparatuses for communications between web service applications and web services are described. A first interface is coupled between the application and a messaging system. A second interface is coupled between the messaging system and the web service. The first interface is configured to receive a web service request from the application, to format the web service request into a Simple Object Access Protocol (SOAP) request message, to include the SOAP request message in a first electronic message, and to transmit the first electronic message to the messaging system. The messaging system is configured to receive the first electronic message at a first node, to transmit the first electronic message across a communications network to a second node, and to couple the first electronic message from the second node to the second interface. The second interface is configured to receive the first electronic message from the messaging system, to extract the SOAP request message from the first electronic message, and to transmit the SOAP request message to the web service. Furthermore, a web service response is returned from the web service through the second interface, messaging system, and first interface, to the web service application.

  • Pub Date: 2006/19/12
  • Number: 08200845
  • Owner: iAnywhere Solutions, Inc.
  • Location: Dublin, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system and program product for adapting to protocol changes

A method, system and program product for overriding existing functionality provided in an application programming interface (API) for a local protocol implementation is provided. The method includes providing an API for a local protocol implementation having a raw interface function that can be invoked by a client application to override existing functionality provided in the API. The method further includes defining for the raw interface function an array of pre-formed payload elements to be included for creating a customized protocol request message for requesting a protocol service from a server application using a remote protocol implementation different than the local protocol implementation, populating data for each element in the array defined, and invoking the raw interface function, which takes as input the array defined and inserts them, in order, behind a protocol message header of the protocol request message and sends the customized protocol request message to the server application.

  • Pub Date: 2006/19/12
  • Number: 07907619
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method for coordinating the sharing of contact information between a directory terminal and a portable communication device, as well as providing enhanced user interface context features

A method for coordinating the sharing of contacts between a directory terminal () and a portable communication device () is implemented in one embodiment when the directory terminal receives from the portable device a request to conduct a directory sharing session and a communication device identifier. The directory terminal retrieves screen interface information associated with the identifier and renders a user interface on a display screen () of the directory terminal based on the retrieved information. The directory terminal receives a first set of contact records from the portable communication device, wherein each contact record includes a contact name and at least one contact entry. The directory terminal searches a second set of contact records to find contact records containing contact names included in contact records of the first set. Contact entries for common contact records are conveyed to the portable communication device for automatic association with the first set.

  • Pub Date: 2006/19/12
  • Number: 08417225
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for accelerated elastic registration of multiple scans of internal properties of a body

Techniques for accelerated elastic registration include receiving reference scan data and floating scan data, and a first transformation for mapping coordinates of scan elements from the first scan to coordinates of scan elements in the second scan. A subset of contiguous scan elements is determined. At least one of several enhancements is implemented. In one enhancement cubic spline interpolation is nested by dimensions within a subset. In another enhancement, a local joint histogram of mutual information based on the reference scan data and the floating scan data for the subset is determined and subtracted from an overall joint histogram to determine a remainder joint histogram. Each subset is then transformed, used to compute an updated local histogram, and added to the remainder joint histogram to produce an updated joint histogram. In another enhancement, a measure of similarity other than non-normalized mutual information is derived from the updated joint histogram.

  • Pub Date: 2006/19/12
  • Number: 08538108
  • Owner: University of Maryland, Baltimore
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Interactive multimedia apparatus

An interactive multimedia apparatus () usable in combination with a software suite of authoring programs () installed in a computing means of a mobile data processing apparatus () of the type having a display means () and one or more input means () is disclosed. The interactive multimedia apparatus () provides a bundle of tools which together enable a multimedia composition to be generated in real time on the mobile data processing apparatus (). The present invention utilizes individual channels () to ensure users can interact directly with individual files () and set various composition authoring parameters () both before and during a mixing cycle to dynamically create a multimedia composition.

  • Pub Date: 2006/19/12
  • Number: 09183887
  • Owner: THURDIS DEVELOPMENTS LIMITED
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Inferring switching conditions for switching between modalities in a speech application environment extended for interactive text exchanges

The disclosed solution includes a method for dynamically switching modalities based upon inferred conditions in a dialogue session involving a speech application. The method establishes a dialogue session between a user and the speech application. During the dialogue session, the user interacts using an original modality and a second modality. The speech application interacts using a speech modality only. A set of conditions indicative of interaction problems using the original modality can be inferred. Responsive to the inferring step, the original modality can be changed to the second modality. A modality transition to the second modality can be transparent the speech application and can occur without interrupting the dialogue session. The original modality and the second modality can be different modalities; one including a text exchange modality and another including a speech modality.

  • Pub Date: 2006/19/12
  • Number: 08000969
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Dialect translator for a speech application environment extended for interactive text exchanges

The present solution includes a real-time automated communication method. In the method, a real-time communication session can be established between a text exchange client and a speech application. A translation table can be identified that includes multiple entries, each entry including a text exchange item and a corresponding conversational translation item. A text exchange message can be received that was entered into a text exchange client. Content in the text exchange message that matches a text exchange item in the translation table can be substituted with a corresponding conversational item. The translated text exchange message can be sent as input to a voice server. Output from the voice server can be used by the speech application, which performs an automatic programmatic action based upon the output.

  • Pub Date: 2006/19/12
  • Number: 08204182
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Data synchronization mechanism for change-request-management repository interoperation

Computer method and apparatus for managing software configuration repositories are disclosed. In a plurality of repositories each repository holds a respective set of change-request objects. One of the repositories in the plurality is a primary repository, and the other repositories are working repositories. In the primary repository, there is a respective proxy object for each change-request object of interest in a working repository. Each proxy object has a corresponding associated change-request object in the primary repository. For a given proxy object, changes made to the respective change-request object of interest in the working repository are mapped to the associated change-request object in the primary repository and vice versa.

  • Pub Date: 2006/19/12
  • Number: 07836429
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Data schemata in programming language contracts

Systems and methods that integrate data type conversion(s) into a programming language, and describe external formats within a syntax thereof. A mapping component defines a declarative mapping from an external data format to one or more of its internal data types (e.g., expressing external data types in terms of source languages.) Moreover, a rule establishing component can define value-based rules, such as invariants to the external data format, wherein the schema declaration further defines data fields that make up the schema. Accordingly, by expressing rules in form of predicate logic (instead of imperative program logic) the subject innovation increase a likelihood that compilers can reason about the data.

  • Pub Date: 2006/19/12
  • Number: 07934207
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Conducting nanotubes or nanostructures based composites, method of making them and applications

An electromagnetic interference (EMI) shielding material includes a matrix of a dielectric or partially conducting polymer, such as foamed polystyrene, with carbon nanotubes or other nanostructures dispersed therein in sufficient concentration to make the material electrically conducting. The composite is formed by dispersing the nanotube material in a solvent in which the dielectric or partially conducting polymer is soluble and mixing the resulting suspension with the dielectric or partially conducting polymer. A foaming agent can be added to produce a lightweight foamed material. An organometallic compound can be added to enhance the conductivity further by decomposition into a metal phase.

  • Pub Date: 2006/19/12
  • Number: 08424200
  • Owner: University of Virginia Patent Foundation
  • Location: Charlottesville, US
  • Details: Visit USPTO

Visit USPTO Page


Application service invocation based on filter criteria

An Internet Protocol Multimedia Subsystem (IMS) device includes a memory configured to store a subscriber profile, where the subscriber profile includes at least one criterion relating to an event that occurs after a session request has been forwarded to a terminating party. The IMS device further includes a processor configured to invoke at least one application service for a session based on the at least one criterion in the subscriber profile.

  • Pub Date: 2006/19/12
  • Number: 08234388
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Application server blade for embedded storage appliance

A server blade includes a printed circuit board (PCB), including a connector for connecting the blade to a backplane comprising a local bus, and a removal mechanism for use by a person to disconnect the connector from the backplane for removal of the blade from a chassis while the chassis is powered up. The server blade also includes an I/O link and a server, each affixed on the PCB. The server transmits packets on the I/O link to a storage controller enclosed in the chassis. The packets include commands to transfer data to at least one storage device controlled by the storage controller. A portion of the storage controller, affixed on the PCB, receives the packets from the server on the I/O link, and forwards the commands on the backplane local bus to another portion of the storage controller affixed on a separate PCB enclosed in the chassis.

  • Pub Date: 2006/19/12
  • Number: 1992844
  • Owner: Dot Hill Systems Corporation
  • Location: Carlsbad, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing multi-band operation in a mobile computing device

Various embodiments for providing multi-band operation in a mobile computing device are described. In one or more embodiments, a mobile computing device may be arranged to support quad-band GSM communication in the GSM-850, GSM-900, GSM-1800, and GSM-1900 frequency bands. The mobile computing device may be arranged to determine a starting frequency band based on the home country and home network. By using the determined starting frequency band associated with the home country and home network of the user, fewer and/or shorter delays may be experienced when searching for and acquiring an available frequency. Once a network search is completed, the mobile computing device may be arranged to determine whether a network can be found in current frequency band pair for normal service, to disconnect from the acquired network if normal service is not supported, and to intelligently search for an available frequency in a different frequency band. Other embodiments are described and claimed.

  • Pub Date: 2006/19/12
  • Number: 07835712
  • Owner: Palm, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for providing enhanced mobile messaging services

Various embodiments for providing enhanced mobile messaging services are described. In one or more embodiments, a mobile computing device may send and receive messages of different types. The wireless computing device may comprise a threading engine to determine a sender of a received message and/or a recipient of a sent message. The threading engine may be arranged to correlate received messages of different message types with a particular sender and sent messages of different types with a particular recipient. The wireless device may display a messaging thread comprising correlated messages of different message types in a messaging user interface supported by a messaging application. The different message types correlated within the message thread are not limited to a message type associated with the messaging application. Other embodiments are described and claimed.

  • Pub Date: 2006/19/12
  • Number: 08233885
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for performing calibration of a mobile computing device

Various embodiments for performing calibration of a mobile computing device are described. In one or more embodiments, a device under test and a calibration test bench may be coupled by at least one of a wireless connection and a wired connection. The device under test may be arranged to receive one or more test command instructions from the calibration test bench and, in response, send an acknowledgment to the calibration test bench. In some embodiments, the device under test and the calibration test bench may be arranged to communicate according to a wireless device calibration protocol. Other embodiments are described and claimed.

  • Pub Date: 2006/19/12
  • Number: 08000656
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for controlling dedicated data transmit mode in a mobile computing device

Various embodiments for controlling dedicated data transmit mode (DDTM) in a mobile computing device are described. In one or more embodiments, the mobile computing device may support cellular voice communication and wireless data communication. The mobile computing device may comprise a DDTM control module coupled to a DDTM application. The DDTM application may prevent mobile terminated cellular voice communication from interrupting ongoing data communication when enabled. The DDTM control module may be configured to enable and disable the DDTM application. Other embodiments are described and claimed.

  • Pub Date: 2006/19/12
  • Number: 08335499
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing data replication

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 07651593
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for monitoring application data in a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 2039474
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for controlling one or more multipoint control units as one multipoint control unit

A system for controlling multiple multipoint control units (MCUs) with a single apparatus is disclosed. The system utilizes a Virtual MCU (VMCU) to communicate with a plurality of MCUs. A user initiates a reserve conference command with the VMCU. If sufficient resources are available, the reservation is made and connection numbers are assigned. When the time for the conference arises, an MCU is assigned to the conference. The participants are then connected to the conference. By using a single VMCU to schedule and coordinate multiple MCUs, the system is able to efficiently schedule a large number of conferences. This greater efficiency in scheduling may allow users to schedule conferences without the advance notice that is usually required.

  • Pub Date: 2006/18/12
  • Number: 08843550
  • Owner: Polycom Israel Ltd.
  • Location: Petach-Tikva, IL
  • Details: Visit USPTO

Visit USPTO Page


Supporting applets on a high end platform

To execute legacy smart card applications in a next generation smart card environment, a mechanism converts the applications into a format executable by the next generation smart card platforms. For instance, in a Java-based environment, a normalizer tool translates a CAP file into a Java Class file. Additional mechanisms recreate, on next generation smart cards, a specialized environment that allows the legacy applications to execute without impacting legacy and non-legacy application performance. For example, mechanisms create new instances of previously shared objects so that legacy applications can continue to expect exclusive access to those objects. Moreover, mechanisms manage the communication between a legacy application and non-legacy applications by controlling how and when calls are sent to the legacy application.

  • Pub Date: 2006/18/12
  • Number: 08032872
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Simultaneous static analysis on disparate resource types

A system and method is provided for offering simultaneous or concurrent static analysis on a software product or software project where the software product or project comprises disparate resource types, such as the Java® technology or C/C++programming language. A key part of the invention is a framework allowing analysis “providers” to be integrated into a common framework. The rules for each type of analysis can be integrated into a common user interface where the user can act on any of them in the same way. The system has an interface for interfacing with the project set, numerous analysis components for each platform or technology being utilized by the project set. The system has a single user interface (UT) for offering to the user unified configuration settings, or rules, for configuring each analysis component so that the desired analysis of the project set can be accomplished by the system. Upon pressing an “Analyze” button, analysis will commence on the entire project set, where each file will be examined in a simultaneous or concurrent fashion. It further comprises a report generator component for producing a single unified results report such that the concurrent or simultaneous analysis of disparate resources concludes with the report generator producing a unified set of results for all of the analyses for each of the platforms or technologies.

  • Pub Date: 2006/18/12
  • Number: 08166451
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Selecting instrumentation points for an application

Instrumentation points are selected for an application by running the application with comprehensive instrumentation of its components in a development mode. The application can be run by a human operator and/or load simulator which provides requests to the application. The instrumented components are monitored as the application runs. A subset of the components is selected based on criteria such as an order in which the instrumented components are invoked, whether resource utilization, such as consumption of processor cycles, exceeds a threshold, or a frequency with which components are called or call other components, and only that subset is instrumented in a production mode of the application. In one approach, the subset includes components which are invoked when traffic to/from the application matches a pattern provided by an interaction model. As a result, relevant instrumentation points can be identified.

  • Pub Date: 2006/18/12
  • Number: 09009680
  • Owner: CA, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Rolling cache configuration for a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 07661028
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Pathname translation in a data replication system

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 2047459
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Network redirector systems and methods for performing data replication

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 07962709
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-protocol access to files and directories

An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components and one or more set-based access components. A protocol component is employed by the agent component to mitigate data access conflicts between the single-item access components and the set-based access components.

  • Pub Date: 2006/18/12
  • Number: 2071719
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for location-based wireless connection and pairing

A method for wireless communication between a first device and a peripheral device comprises providing a storage device adapted to store communication information for the peripheral device and being readable by the first device, the storage device being spatially separated from the peripheral device. The method also comprises positioning the device so that the first device can read communication information for the peripheral device before communicating with the peripheral device. An apparatus comprises a storage device including data for wireless communication between a first device and a peripheral device within a location, the apparatus being positioned in or near the location and adapted for storing communication information for the peripheral device. The communication information can be read by the first device, allowing the first device to communicate with the peripheral device.

  • Pub Date: 2006/18/12
  • Number: 08571598
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Generic web service frontend

A publisher uses a toolbox to graphically define web forms, by selecting and configuring components such as buttons, text boxes, menus, etc. Underlying code for the web forms (such as Extensible Markup Language, or XML) is automatically generated. The publisher defines transforms (such as Extensible Stylesheet Markup Language Transforms, or XSLTs) that process the exchange of data between the front end and the backend web service. The transforms and the code underlying the web forms is automatically combined into a frontend to the web service. The web based frontend is published on a user site, such that users can access the backend web service through the frontend.

  • Pub Date: 2006/18/12
  • Number: 07831919
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Destination systems and methods for performing data replication

Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state.

  • Pub Date: 2006/18/12
  • Number: 2039467
  • Owner: CommVault Systems, Inc.
  • Location: Oceanport, US
  • Details: Visit USPTO

Visit USPTO Page


Data communications

The present invention provides methods of, computer programs for and apparatus for control and/or observation of a device with communication capabilities by a controller device with hypertext or hypermedia communication capabilities. More particularly, but not exclusively, the present invention relates to methods of, computer programs for and apparatus for control and observation of a consumer electronics device with communications capability from a mobile controller device with hypertext or hypermedia communications capability over a proximity bearer.

  • Pub Date: 2006/18/12
  • Number: 2026120
  • Owner: STMicroelectronic Srl.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Audio receiver design for a mobile computing device

Various embodiments of an audio receiver design for a mobile computing device are described. The mobile computing device may comprise an audio receiver structured and arranged to port to the rear of the mobile computing device. In some embodiments, the mobile computing device may be implemented as a dual-mode Global System for Mobile Communications/Universal Mobile Telephone System (GSM/UMTS) quad-band device. The mobile computing device also may comprise a Global Positioning System (GPS) antenna for providing positioning determination capabilities and location-based services. In various implementations, the audio receiver may be ported to an in-vehicle system, such as an onboard entertainment system, navigation system, and/or communications system. Other embodiments are described and claimed.

  • Pub Date: 2006/18/12
  • Number: 08255013
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Sub-micron surface plasmon resonance sensor systems

A sensor for detecting the presence of a target analyte, ligand or molecule in a test fluid, comprising a light transmissive substrate on which an array of surface plasmon resonant (SPR) elements is mounted is described. A multi-channel sensor for detecting the presence of several targets with a single micro-chip sensor is described. A multi-channel sensor including collections of SPR elements which are commonly functionalized to one of several targets is also described. The detectors sense changes in the resonant response of the SPR elements indicative of binding with the targets.

  • Pub Date: 2006/15/12
  • Number: 2074875
  • Owner: Indiana University Research & Technology Corporation
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for determining and notifying users of undesirable network content

A method and system for determining and notifying users of undesirable network content are disclosed. According to one embodiment, a method may include detecting an adverse content event corresponding to a given network information source, where the adverse content event occurs dependent upon activity of a given user with respect to the given network information source. The method may also include reporting the adverse content event with respect to the given network information source, detecting a reference to the given network information source on behalf of a particular user, and in response to detecting the reference, retrieving an indication corresponding to the given network information source, where the indication is determined dependent upon adverse content events reported with respect to the given network information source. The method may further include notifying the particular user of possible undesirable content with respect to the given network information source dependent upon the indication.

  • Pub Date: 2006/15/12
  • Number: 07797421
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Media protection notification for serial interface mass storage devices

One embodiment of the present invention sets forth a technique for reducing the latency associated with media protection notification for serial interface mass storage devices, such as serial AT attachment (SATA) hard disk drives. A new link layer primitive, referred to as hold-emergency (HOLDE), incorporates the flow-control behavior of the existing HOLD command, with the additional new action of notifying the hard disk drive to take emergency steps to prepare for impact. The HOLDE link layer primitive operates in conjunction with the existing hold-acknowledge (HOLDA) primitive and is semantically similar to the existing HOLD primitive. The HOLDE mechanism is preferably implemented directly in hardware in the SATA link layer state machines within the host and the hard disk drive.

  • Pub Date: 2006/15/12
  • Number: 2086121
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Measuring quality of software modularization

Quality of modularization of source code is tested using different perspectives such as a structural modularity perspective, an architectural modularity perspective, a size perspective, and a similarity of purpose perspective. A history of changes in modularization may be kept such that the degree to which given source code is well-modularized can be determined over time. The changes made to the code by individual programmers may be kept, such that the degree to which their coding enhanced or harmed modularization may be tracked.

  • Pub Date: 2006/15/12
  • Number: 08146058
  • Owner: Infosys Limited
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Management of network login identities

Apparatuses, methods, and systems directed to facilitate the management and/or security of network login and authentication systems. Some embodiments of the invention allow users to maintain a plurality of user accounts with a given domain, and switch among multiple login sessions. In other particular embodiments, the systems disclosed below can be used to identify and prevent phishing attacks. In some embodiments, the present invention involves using a personal identification number or string as an additional security measure. In some other embodiments, the present invention involves using an application identifier while establishing a login session with the network server.

  • Pub Date: 2006/15/12
  • Number: 08510813
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Estimating the spend capacity of consumer households

The spend capacity of a consumer typically increases as the number of consumers in the household increases, since the consumer can draw on the spending power of other consumers in the household. The size of wallet of the household is thus a better indicator of the consumer's spend capacity than an individual size of wallet. All consumers in a given household can be aggregated based on, for example, their address of record. Duplicate tradelines within each household are removed from consideration in a size of wallet estimate. A spend capacity is then estimated for each tradeline using calculations derived from a consumer behavior model. The spend capacities for all tradelines in the household are combined to determine a household size of wallet. Each consumer in the household is then tagged with the household size of wallet, rather than their individual size of wallet.

  • Pub Date: 2006/15/12
  • Number: 08204774
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Configuring preferred user zone lists for private access points for wireless networking

Information is received identifying a geographic location of an access point in a radio access network. Access information is assigned and communicated to the access point, and the access information and the geographic location information is communicated to an access terminal. The access terminal identifies the access point as a preferred access point, including its geographic location. The access terminal receives information identifying its own geographic location, and when the access terminal is near the access point, the access point is used to access the network. The access point receives information identifying its geographic location and communicates the geographic location information to a configuration server. The access point receives access information from the configuration server and provides access terminals access to the network using the access information.

  • Pub Date: 2006/15/12
  • Number: 08078165
  • Owner: Airvana, Corp.
  • Location: Chelmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Pre-scanner for inspecting network traffic for computer viruses

In one embodiment, an add-on pre-scanner card is removably pluggable into a local bus of a computer. The add-on pre-scanner card may be coupled to a computer network to receive network traffic. The add-on pre-scanner card may be configured to extract payloads from received packets and scan the payloads for computer viruses. The add-on pre-scanner card may pass scanned payloads and other data to the computer by way of a shared memory interface. The pre-scanner card may identify each payload as infected with a virus, virus-free, or unknown to allow the computer to distinguish payloads that do not need further scanning from those that do. The computer may further scan for viruses payloads that the pre-scanner card cannot ascertain as either virus free or virus infected.

  • Pub Date: 2006/14/12
  • Number: 07992206
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and system for time-stamping data packets from a network

A method for timestamping data packets from a network involves receiving a first data packet from the network, obtaining, from a clock, a timestamp indicating an arrival time of the first data packet, where a network interface controller (NIC) includes the clock, providing the timestamp and the first data packet to a client operatively connected to the NIC, computing a network property using the timestamp, selecting a network protocol based on the network property, and transmitting a second data packet via the NIC using the network protocol.

  • Pub Date: 2006/14/12
  • Number: 08102852
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for acquiring high resolution spectral data or high definition images in inhomogeneous environments

A method and apparatus for treating a sample for acquiring high-definition magnetic resonance images (MRI images) or high resolution nuclear magnetic resonance (NMR) spectra even in the presence of magnetic field distortions within one or multiple scans. The spatial nature and temporal dependence of the field inhomogeneities are determined a priori using any of several literature procedures. A static or oscillating magnetic field gradient is applied on the sample so as to endow spins at different positions within the sample with different resonance frequencies. A phase- and amplitude-modulated radiofrequency (RF) pulse is applied in unison with the magnetic field gradient so as to endow spins at different positions within the sample with a homogeneous excitation/inversion profile. The nature of the spatially-selective RF irradiation is tailored in such a way that, when added on top of the effects of the inhomogeneities, the spins' evolution phases and their signal amplitudes at the time of the acquisition become independent of the inhomogeneities. The spin signals thus created are captured and decoded, so as to obtain the spins' response as if the inhomogeneity was not present. The collected data is processed to a suitable rearrangement and Fourier analysis procedure to retrieve a final undistorted image or spectrum. The magnetic field gradient can be oscillated to impose this kind of inhomogeneity corrections on multiple spatial dimensions sequentially, or simultaneously.

  • Pub Date: 2006/14/12
  • Number: 07944206
  • Owner: Yeda Research and Development Co. Ltd.
  • Location: Rehovot, IL
  • Details: Visit USPTO

Visit USPTO Page


Initiating a file download by a first electrical device through a second electrical device

A method comprises a second electrical device receiving a request via a network from a first electrical device to cause a file to be downloaded. The method further comprise the second electrical device causing the file to be downloaded from a server via the network to the second electrical device.

  • Pub Date: 2006/14/12
  • Number: 08521806
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


File-system based data store for a workgroup server

A system and method for storing workgroup objects on a file-system based data store in a workgroup server is disclosed. The present invention implements a file-system based workgroup system in which a workgroup object is stored in one or more files. The present invention further includes a workgroup object list comprising object identifiers, each object identifier uniquely mapping to a workgroup object and each object identifier including a property of the workgroup object based on which the workgroup object list is sorted.

  • Pub Date: 2006/14/12
  • Number: 08171061
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Viewing system for the manipulation of an object

Viewing device used in the field of stereoscopy to allow a user to manipulate in his close environment a real or virtual object situated a greater or lesser distance from the user. The user can then view the manipulation spaces as well as the real and virtual spaces in the viewing device.

  • Pub Date: 2006/13/12
  • Number: 08767054
  • Owner: KOLPI
  • Location: , FR
  • Details: Visit USPTO

Visit USPTO Page


Server based technique for optimizing call setup latency for geographically dense groups

A server based method for optimizing call setup latency including updating client location information using at least one application server; identifying and updating parameters including location update information uniquely identifying a sector from which the at least one client is receiving communication service; determining at least one geographically dense call group; choosing at least one designated responder to respond to the at least one call group; selecting a plurality of designated responders as targets for m largest clusters; computing hash outputs of the targets; and performing a logical OR operation on lower order n bits of the hash outputs corresponding to the targets.

  • Pub Date: 2006/13/12
  • Number: 07903623
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Optimizing call setup latency for geographically dense groups

A system and method for optimizing call setup latency for geographically dense groups including updating client location information using at least one application server while the client moves from one sector to another to provide a location update; identifying and updating parameters including location update information uniquely identifying a sector from which a client is receiving communication service; and determining at least one geographically dense call group; and choosing at least one designated responder to the at least call group. A client per cluster is selected as a designated responder for that cluster and when the server needs to set up a geographically dense group call, a random number is included corresponding to the designated responder for that group in a call setup message.

  • Pub Date: 2006/13/12
  • Number: 08068823
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Navigation of hierarchical data sets

Briefly, in accordance with one or more embodiments, a hierarchical data set may be displayed in a database view in a content window of a program or graphical user interface. A filter panel may display one or more categories of information about the hierarchical data set including one or more filterable items that may be selected by a user. In response to a user selection, filtered contents of the hierarchical data set may be displayed in the database view according to the selection to allow a user to navigate the hierarchical dataset via the database view. In one or more embodiments, the hierarchical data set may comprise a file system.

  • Pub Date: 2006/13/12
  • Number: 08996542
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Lock-free shared audio buffer

An exemplary audio system includes an audio engine, one or more shared buffers where each shared buffer is associated with a client application and one or more lock-free mechanisms to help ensure that a write position of a shared buffer stays equal to or ahead of a read position for that shared buffer and to ensure that a client application's failure to maintain a write position equal to or ahead of a read position does not prevent audio engine access to the shared buffer. Other exemplary technologies are also disclosed.

  • Pub Date: 2006/13/12
  • Number: 08166194
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluating programmer efficiency in maintaining software systems

Quality of modularization of source code is tested using different perspectives such as a structural modularity perspective, an architectural modularity perspective, a size perspective, and a similarity of purpose perspective. A history of changes in modularization may be kept such that the degree to which given source code is well-modularized can be determined over time. The changes made to the code by individual programmers may be kept, such that the degree to which their coding enhanced or harmed modularization may be tracked.

  • Pub Date: 2006/13/12
  • Number: 08713513
  • Owner: Infosys Limited
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Distributed computing system architecture

A computing system architecture is based upon a peer-to-peer, asynchronous model. The architecture specifies a set of infrastructure facilities that comprise an inter-prise operating system. The inter-prise operating system provides all the facilities that make application coding as easy in the peer-to-peer asynchronous model as it is in a hierarchical, synchronous model. Services, which reside in containers, are linked asynchronously by an inter-prise bus and use data from a virtual data store.

  • Pub Date: 2006/13/12
  • Number: 1984795
  • Owner: Charles Schwab & Co., Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Bacterial-derived BLIS for treatment of acne

This invention relates to a treatment of acne. Specifically, the invention is directed to the use of bacteriocin-like inhibitory substances (BLIS), isolated from as bactericide or bacteriostat for acne-causing bacteria, namely

  • Pub Date: 2006/13/12
  • Number: 08415289
  • Owner: The Trustees of the University of Pennsylvania
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Systems, methods, and computer-readable media for providing information regarding communication systems

Methods, systems, and computer-readable media for accessing information regarding a communication system from a plurality of information sources and providing a consolidated view of the information are provided. A first request to access information regarding the communication system is received. In response to receiving the first request, the information regarding the communication system is retrieved from a plurality of information systems, and a portion of the information retrieved from a first information system of the plurality of information systems is displayed. A second request is received to access a portion of the information retrieved from a second information system of the plurality of information systems including promotional information associated with the communication system. In response to receiving the second request, the portion of the information retrieved from the second information system of the plurality of information systems is displayed.

  • Pub Date: 2006/12/12
  • Number: 07836092
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for caller identification customization and remote management of communication devices

Methods, devices, systems and computer program products are described for implementing on a communication device customized caller ID and remote functional management of a communication device via shared secret exchange between calling and called parties. Customized caller ID provides for a calling party to identify themself regardless of the device they are using to place to call. In addition, other remote functional management, such as call priority tagging, provides for the calling party to prioritize the call or otherwise customize a call ID message to the called party. By exchanging shared secrets amongst the calling and called parties, the customized caller ID method and remote functional management are secure, thereby eliminating the likelihood of unauthorized tampering by unknown parties. Shared secret exchange also provides for authorized callers to remotely access and manage the communication device, such as, for example, to remotely lock down or place the communication device in an off state.

  • Pub Date: 2006/12/12
  • Number: 09148431
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Storage and support for large amounts of constant data in a graphics library

One embodiment of the invention is a method of accessing a bindable uniform variable bound to a buffer object that includes the steps of creating a linked program object comprising one or more shader programs, where each shader program includes instructions written in a high-level shader language, and where the linked program object includes a reference to a bindable uniform variable and indicates which shader programs use the bindable uniform variable. The method also includes determining a memory size to support the bindable uniform variable, allocating a buffer object having the memory size, binding the buffer object to the bindable uniform variable, populating the buffer object with values for the bindable uniform variable, and accessing the values of the bindable uniform with one or more of the shader programs in the linked program object.

  • Pub Date: 2006/12/12
  • Number: 07852345
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Reusable online survey engine

A computer system, method, and computer-readable medium for conducting an online survey including one or more questions are provided. A survey database contains the survey questions and data identifying the type of input field that should be provided for responding to each question. When a request is received for a network resource referencing the online survey, the contents of the survey database are utilized to generate the online survey. The survey questions are maintained in the survey database separately from the application code for displaying the survey questions. Only the questions in the survey database need to be modified to provide a new survey. The application code for generating the survey is generic to all surveys and does not need to be modified.

  • Pub Date: 2006/12/12
  • Number: 07599956
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Parameter buffer objects for shader parameters in a graphics library

One embodiment of the invention is a method for accessing and updating data in a buffer object during the execution of a shader program. The method includes loading a plurality of data portions in the buffer object, initiating a first execution of a shader program that accesses a first portion of data in the buffer object, receiving a request to update the first portion of data in the buffer object; updating a version of the first portion of data in the buffer object to reflect the update, initiating a second execution of a shader program that accesses the updated version of the first portion of data in the buffer object, wherein the second execution of the shader program occurs without waiting for the execution of the first shader program to complete.

  • Pub Date: 2006/12/12
  • Number: 07839410
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Optimistic access procedure at dormant target handset in a CDMA2000 1X network with F-QPCH enabled

A system and method for reducing communication latency including monitoring a communication channel for a plurality of indicators wherein a first indicator represents a desired communication operation; basing a communication operation upon a second indicator that indicates that the communication operation has an optimistic probability of success; and initiating an operation optimistically when at least the second indicator confirms that the operation optimistically initiated was a correct operation based upon the second indicator confirming the desired communication operation represented by the first indicator.

  • Pub Date: 2006/12/12
  • Number: 08103295
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Mobility middleware architecture for multiple radio access technology apparatus

A multiple radio access technology (RAT) apparatus with mobility middleware provides a user with access to various RAT networks, such as a frequency division duplex (FDD) network and a wireless local area network (WLAN). In one embodiment, the apparatus is a dual mode FDD/WLAN converged wireless communication handset which includes a terminal equipment (TE) module having mobility middleware, an applications and protocols processor and a terminal interface (TI). The dual mode FDD/WLAN converged wireless communication handset further includes a user services identity module (USIM), a mobile termination (MT) module and a protocol stack which interface with the mobility middleware via a plurality of links. In another embodiment, the multi-RAT apparatus is terminal equipment which includes a mobility middleware core module, a mobility middleware communication module, a driver and an insertably removable wireless communication device for providing a multiple radio transport medium to applications running in the terminal equipment.

  • Pub Date: 2006/12/12
  • Number: 08190191
  • Owner: InterDigital Technology Corporation
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Loading integer-based data into a graphics processing system

One embodiment of the present invention sets forth a technique for improving the flexibility and programmability of a graphics pipeline by enabling full access to integer texture maps within a graphics processing unit (GPU). A new mechanism for loading and unloading integer texture images is disclosed that enables the shader units within the GPU to have full access to integer values stored within an integer image buffer in a GPU local memory. New integer formats are added to the graphics API that indicate that data should be loaded and processed without the prior art conversion to a floating-point representation, thereby enabling the use of these new integer data types.

  • Pub Date: 2006/12/12
  • Number: 07986325
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Load determination in wireless networks

Systems and methods for improving latency in a communication system are disclosed. The channel load of an access channel can be determined in one embodiment. A backoff interval can be determined based on the channel load determined. A random backoff time can be determined and the transmission of an initial access probe can be delayed for the random backoff time, wherein the backoff interval defines a range from which the random backoff time is selected.

  • Pub Date: 2006/12/12
  • Number: 08565103
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Indexed access to texture buffer objects using a graphics library

A method for generating a texture buffer object configured for storing and manipulating texture data for graphics processing operations includes the steps of creating a buffer object configured to store the texture data, binding the buffer object to a texture buffer object, binding the texture buffer object to one of a plurality of texture targets included within a texture image unit, and binding a shader program to a processing unit within a graphics rendering pipeline. One advantage of the disclosed method is that, once a texture buffer object is bound as the target of a texture image unit, shader programs may read and/or write to the buffer object referenced by the texture buffer object, without having to rebind that texture buffer object.

  • Pub Date: 2006/12/12
  • Number: 08189009
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Feedback and record of transformed vertices in a graphics library

One embodiment of the invention is a method for storing transformed vertex attributes that includes the steps of allocating memory space for a transform feedback buffer, selecting one or more transformed vertex attributes to store in the transform feedback buffer independently of any shader programs executing on any processing units in the graphics rendering pipeline, configuring the transform feedback buffer to store the one or more transformed vertex attributes, and initiating a processing mode wherein vertex data is processed in the graphics rendering pipeline to produce the transformed vertices, the attributes of which are then written to the transform feedback buffer. One advantage is that the transform feedback buffer can be used to store and access transformed vertices, without having to convert the vertex data to a pixel format, store the pixels in a frame buffer, and then convert the pixels back to a vertex format.

  • Pub Date: 2006/12/12
  • Number: 07928989
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Estimation based approach to determine the retransmission timeout value for access probe retransmissions

Systems and methods for reducing latency in a group communication system including transmitting an access probe; establishing predetermined criteria relating to communication parameters; and setting a retransmission timeout value at a communication device based upon the predetermined criteria, wherein the retransmission timeout value is an amount of time the communication device waits for an acknowledgment following the transmission of the access probe before it initiates retransmission of the access probe.

  • Pub Date: 2006/12/12
  • Number: 07881738
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed rendering of texture data

A method and apparatus for distributing the workload of rendering an image where texture mapping is involved among multiple graphics processing units (GPUs) are provided. The method generally entails dividing a texture map among multiple GPUs, performing texture mapping in each GPU to render image data in each GPU's frame buffer, combining the image data from each frame buffer, and scanning out the combined image to a display.

  • Pub Date: 2006/12/12
  • Number: 07969444
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for client-driven server-side installation

A server for automatically installing a required application responsive to a client device is described. The server comprises an interface agent arranged to receive a first signal from a client wireless device where the first signal comprises an identifier. A retrieval application is arranged to obtain an executable application corresponding to the identifier and an installer application is arranged to install the executable application responsive to the retrieval application obtaining the executable application. The interface agent is arranged to cause execution of the installed executable application.

  • Pub Date: 2006/12/12
  • Number: 08645948
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for coordinating and controlling debuggers in a simulation environment

A simulation environment, in one embodiment, includes a debugger server, one or more debuggers and one or more debugger adapters. Each debugger adapter couples a corresponding debugger to the debugger server. The debugger server coordinates the run mode of the debugger adapters. Each debugger adapter controls the run mode of its corresponding debugger.

  • Pub Date: 2006/11/12
  • Number: 08423959
  • Owner: Synopsys, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system

By modeling real-world application objects with complex structures, behaviors, and operations described by a schema which is enforced by the hardware/software interface system, various embodiments of the present invention provide rich sub-typing functionality by extending Items (and Item types) using “Extensions” which provide additional data structures (Properties, Relationships, etc.) to already existing Items type structures. Extensions are strongly typed instances that cannot exist independently and must be attached to an Item or a Nested Element. Extensions are also intended to address “multi-typing” issues by enabling the overlap of type instances (e.g., a Document may be a “legal document” as well a “secure document”).

  • Pub Date: 2006/11/12
  • Number: 07917534
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for on-demand document provisioning using ad hoc networking

A method of providing data content obtained from one or more network-connected nodes to a mobile computing device is provided. The method includes determining whether a previously-established network connection between the mobile computing device and a network-connected node has been interrupted after the mobile computing device receives a first set of data content and an identifier corresponding to a second set of data content from the network-connected node via the previously-established network connection. The method also includes establishing a wireless connection between the mobile computing device and another computing device if the previously-established network connection has been interrupted and the second set of data content is stored by the other computing device. The method further includes conveying the second set of data content to the mobile computing device from the other computing device via the wireless connection if the previously-established network connection has been interrupted and the second set of data content is stored at the other computing device.

  • Pub Date: 2006/11/12
  • Number: 07860491
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communicating between an application and a database

A method for communicating between an application and a database by using a lightweight stored procedure data-binding framework for applications written in object oriented programming languages such as JAVA, significantly reduces the coding effort required to communicate with a relational database. Once the developer specifies the needed tabular data, the inventive framework generates all needed data objects and stored procedures to accomplish the interaction with that database data. The automatically generated code is then used by the application via a run-time component. This means the developer need only make simple calls in a few lines of code for database interaction. The encapsulated data model deals only with persistence and retrieval issues and is therefore de-coupled from the business model.

  • Pub Date: 2006/11/12
  • Number: 08321467
  • Owner: JP Morgan Chase Bank
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Reporting on authentication of RFID tags for indicating legitimacy of their associated items

RFID readers, computers, and methods are provided for reporting on the authentication of one or more RFID tags associated with a proffered item, while requiring special permissions be cleared before reporting. In some embodiments, a question is input about whether a Declared Password (DP) is regarded as proper for an Item Identifier (II), both of which have been input from the tags. An answer is generated for the question from the reference database, and transmitted to the user. The answer does not reveal an Actual Code that is indeed regarded as proper, unless the user first demonstrates they already know it. Beyond the authentication of the tag, the answer can further indicate the legitimacy of the proffered item, for a supply chain, at a Customs Office, etc.

  • Pub Date: 2006/11/12
  • Number: 2045694
  • Owner: Impinj, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Optimized 3D lighting computations using a logarithmic number system

Embodiments of the present invention set forth a technique for optimizing the performance and efficiency of complex, software-based computations, such as lighting computations. Data entering a graphics application programming interface (API) in a conventional arithmetic representation, such as floating-point or fixed-point, is converted to an internal logarithmic representation for greater computational efficiency. Lighting computations are then performed using logarithmic space arithmetic routines that, on average, execute more efficiently than similar routines performed in a native floating-point format. The lighting computation results, represented as logarithmic space numbers, are converted back to floating-point numbers before being transmitted to a graphics processing unit (GPU) for further processing. Because of efficiencies of logarithmic space arithmetic, performance improvements may be realized relative to prior art approaches to performing software-based floating-point operations.

  • Pub Date: 2006/11/12
  • Number: 09304739
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for providing data handling information for use by a publish/subscribe client

A method for providing data handling information for use by a client of a pub/sub service to handle data published by the pub/sub service includes receiving a subscription request to a data tuple that includes source data from a client of the pub/sub service. When the request is received, a first subscription is provided for the client to the data tuple and a second subscription, distinct from the first subscription, is automatically provided for the client to a data handling tuple that is associated with the data tuple and that includes data handling information defining how the source data of the data tuple is to be handled by the client. A first notification message including the source data is generated and a second notification message, distinct from the first notification message, is generated that includes the data handling information.

  • Pub Date: 2006/11/12
  • Number: 09330190
  • Owner: Swift Creek Systems, LLC
  • Location: Portsmouth, US
  • Details: Visit USPTO

Visit USPTO Page


Distributing notifications to multiple recipients via a broadcast list

Processing a notification intended for delivery to multiple recipients associated with a broadcast list. Software executes within an alerts service environment to receive a notification addressed to a broadcast alias, determine a list of recipients associated with the broadcast alias to receive the notification, and broadcast the received notification to each recipient in the determined list.

  • Pub Date: 2006/11/12
  • Number: 09460421
  • Owner: MICROSOFT TECHNOLOGY LICENSING, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for offloading packet classification

A computing system offloads packet classification from a central processing unit to a graphics processing unit. In one implementation input data packets to be classified are represented as a first texture, classification rules are represented as a second texture, and a shading operation is performed to classify packets.

  • Pub Date: 2006/11/12
  • Number: 07934255
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


User mode file system serialization and reliability

An operating system is provided. The system includes an agent component to monitor computer activities between one or more single-item access components (SIAC) and one or more set-based access components (SBAC). An interface component is employed by the agent component to process kernel mode requests from a user mode application when communicating with a storage platform. Re-try components can be provided to facilitate cooperation between the SIAC and the SBAC.

  • Pub Date: 2006/08/12
  • Number: 08156507
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using a curser to convey information

Methods and systems are provided for the controlled cursor's behavior. According to one example method, any desired data may be linked to a cursor and a desired cursor behavior could be defined to convey the linked data using the cursor. When a change in the linked data is detected, the example method includes using the desired cursor behavior to convey the changed data independent of a location where the cursor is placed on a screen.

  • Pub Date: 2006/08/12
  • Number: 08006183
  • Owner: Trading Technologies International Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Software program and method for providing promotions on a phone prior to call connection

The present invention includes a method and software application for providing a promotion to a user on a phone. The software application resides on a user's phone and “listens” for phone numbers dialed by a user. In response to the user dialing a phone number, the software determines whether a promotion or an offer for a promotion should be provided to the user. In response to determining to play or offer to play a promotion to the user, the software application on the phone effectively “intercepts” the call and plays to the user either a promotion or an offer to hear about a promotion prior to placing an outbound voice call. The software application may retrieve the promotion from local memory or may connect with a remote server to download an applicable promotion.

  • Pub Date: 2006/08/12
  • Number: 08160552
  • Owner: Bevocal LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Software program and method for offering promotions on a phone

The present invention includes a method and software application for providing a promotion to a user on a phone. The software application resides on a user's phone and “listens” for phone numbers dialed by a user. In response to the user dialing a phone number, the software determines whether a promotion or an offer for a promotion should be provided to the user. In response to determining to play or offer to play a promotion to the user, the software application on the phone effectively “intercepts” the call and plays to the user either a promotion or an offer to hear about a promotion prior to placing an outbound voice call. The software application may retrieve the promotion from local memory or may connect with a remote server to download an applicable promotion.

  • Pub Date: 2006/08/12
  • Number: 08280360
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Provision of contact center services to players of games

A mechanism is provided in a networked multiplayer game for use by playable characters. When operated by a player's character, this mechanism causes the game to send a request for contact to an external contact center. The contact request is queued and allocated to an agent, optionally with the assistance of information provided by the game. When a contact center agent answers the contact request, a communications channel is opened from the agent directly into the game where the game system directs the communication to the local environment of the player's character enabling the player to communicate with the agent of a contact center without leaving the game environment. The agent or contact center may additionally have a representation in the game so that the player can interact with the agent or contact center. The agent representation may be a character in the game controlled by an agent who is logged into the game, or by the contact center manipulating a game client or API, or by the game engine itself. A representation of the contact center may be a telephone graphic, portal, door, sign, lever, button or any other manipulable game object, and optionally a multimedia representation of the contact queuing system. Payments can be made to or from the player using in-game currency which is credited or debited to an account held by the contact center.

  • Pub Date: 2006/08/12
  • Number: 08298086
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Network-accessible database of remote services

The systems, methods, means, and computer program products disclosed herein provide a framework and tools for creating composite services from the array of services available as distributed, loosely structured, ad hoc, remote programming interfaces on the Internet. The framework includes metaservices for coordinating the execution of multiple services in a composite service, and also provides core services such as database management, security, financial transactions, media conversion, and so forth, to provide greater design latitude in the creation of new composite services from existing Internet content and services. The framework may be deployed to create new services and programming interfaces, or to deploy independent web applications constructed from available services.

  • Pub Date: 2006/08/12
  • Number: 08316005
  • Owner: Newslike Media Group, Inc
  • Location: Lincoln, US
  • Details: Visit USPTO

Visit USPTO Page


Information processing apparatus and print control method attributes in print jobs

An apparatus and method for controlling printing including setting a print attribute to a specific page or a specific page range in a print job, permitting an application to produce print data, analyzing the print data and searching for a page break code in a case where the application is permitted to produce the print data and the print attribute in the print job is set, and inserting, into the print data, a print attribute command to specify the print attribute, wherein the print attribute command is inserted according to the result of the search for the page break code.

  • Pub Date: 2006/08/12
  • Number: 07952730
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Techniques to reduce radio frequency noise

Various embodiments to reduce radio frequency noise are described. An apparatus may comprise a mobile computing device having a radio frequency noise reduction module to disable a radio frequency noise source in response to a receive active signal from a radio receiver. Other embodiments are described and claimed.

  • Pub Date: 2006/07/12
  • Number: 07983646
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for retrieving multimedia information using a paper-based interface

The present invention provides techniques for generating a printable representation of multimedia information that can be printed on a paper medium to provide a paper-based interface for the multimedia information. According to the teachings of the present invention, the paper document generated by printing the printable representation on a paper medium also provides an interface for accessing or retrieving multimedia information in electronic form. The paper document may thus be used as an indexing and retrieval tool for retrieving multimedia information.

  • Pub Date: 2006/07/12
  • Number: 07979786
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Semiconductor integrated circuit device

A semiconductor integrated circuit device of the present invention includes a drive circuit for driving a circuit block. This drive circuit is made up of a double gate transistor with gates having different gate oxide film thicknesses. When the circuit block is in its standby state, the gate of the double gate transistor having a thinner gate oxide film is turned off and that having a thicker gate oxide film is turned on. This arrangement allows a reduction in the leakage currents of both the circuit block and the drive circuit while allowing the drive circuit to deliver or cut off power to the circuit block.

  • Pub Date: 2006/07/12
  • Number: 2045645
  • Owner: Renesas Technology Corp.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method to render a root-less scene graph with a user controlled order of rendering

A scene graph is provided which represents data and a set of processes thus providing an enhanced approach to the previously known scene graph concept. With this approach the scene graph becomes a rendering description of the data rather than a world description. Previously known scene graphs represent a structure of objects and their attributes. The scene graph has a notation of the traversing order, which together with the types of nodes, the nodes position, node functionality and node state determine the rendering order. Thus, any effects supported by the underlying rendering pipeline can be expressed directly in the scene graph by the user. An API is provided for the scene graph, controlling the actual rendering order and optimization to the user. The scene graph is extensible allowing the user to experiment and express new rendering algorithms in the scene graph semantic.

  • Pub Date: 2006/07/12
  • Number: 08400444
  • Owner: Agency 9AB
  • Location: Lulea, Danderyd, SE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for transmitting data over a network

A method for transmitting data that includes receiving a first request to open a first virtual channel, the first virtual channel associated with a TCP connection, and negotiating a first payload encoding scheme between a client and a server to use on the first virtual channel. The method further includes receiving a first frame from the client, the frame including a first channel-id associated with the first virtual channel and a first payload that includes a first datum encoded using the first payload encoding scheme. In addition, the method includes decoding the first payload to obtain a decoded first datum and processing the decoded first datum to obtain a second datum. The method additionally includes generating a second frame that includes the first channel-id and a second payload that includes the second datum encoded using the first payload encoding scheme, and sending the second frame to the client.

  • Pub Date: 2006/07/12
  • Number: 2047211
  • Owner: Sun Microsystems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for sequential compilation and execution of rules

Systems and methods for matching objects against a set of rules are described. The present invention is a novel rule execution algorithm that generally operates with greater efficiency than known algorithms. The algorithm uses a test analyzer to determine the relationships that exist between pairs of tests within a ruleset. Each rule is then translated into loops and tests, and merged into a unified series of loops and tests using the output of the test analyzer. The algorithm then generates pattern matching code corresponding to the unified series of loops and tests for evaluation by a virtual machine, and auxiliary code that provides object manipulations and rule actions at the service of the pattern matching code. In its runtime, the algorithm loads objects into the pattern matching code through an access interface. The pattern matching code is then executed by the virtual machine against the loaded objects.

  • Pub Date: 2006/07/12
  • Number: 07809666
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamically exchanging computer user's context

Techniques for providing information about a current state modeled with multiple attributes is described. The providing of information can include receiving from a first source an indication of an ability to supply values for one of the state attributes of the modeled current state, and supplying to a client a value for the one attribute received from the first source. After the supplying of the value, the providing can include receiving from a second source a value supplying ability for the one attribute and supplying of a value for the one attribute based on values received for the one attribute from the first and second sources. After the supplying of that value, the providing can include receiving from the first source an indication of a value supplying inability for the one attribute and supplying a value for the one attribute received from the second source.

  • Pub Date: 2006/07/12
  • Number: 2051840
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling a message quarantine

Controlling a message quarantine is disclosed. A message scanning method is described in which early exit from parsing and scanning can occur by matching threat rules only to selected message elements and stopping rule matching as soon as a match on one message element exceeds a threat threshold.

  • Pub Date: 2006/07/12
  • Number: 2069598
  • Owner: IronPort Systems, Inc.
  • Location: San Bruno, US
  • Details: Visit USPTO

Visit USPTO Page


Cloth application programmer interface

A method of executing a physics simulation is performed in a system comprising a computational platform, a main application stored in the computational platform, a secondary application stored in the computational platform, and a cloth application programming interface (API) implemented in the computational platform. The method defines a cloth simulation call in the cloth API, and by operation of the main application, invokes a software routine using the cloth simulation call. Additionally, by operation of the secondary application, a state of the physics simulation is updated in response to the software routine.

  • Pub Date: 2006/07/12
  • Number: 08327388
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic detection of abnormal data access activities

Methods and systems are provided for evaluating atypical user data access activities within the scope of an automatically generated file security policy in organizations with multiple diverse access control models and multiple diverse file server protocols. The system monitors access to storage elements within the network. The recorded data traffic is analyzed to assess simultaneous data access groupings and user groupings, which reflect the actual organizational structure. The learned structure is then transformed into a dynamic file security policy, which is constantly adapted to organizational changes over time. The system provides a decision assistance interface for tracking abnormal user behavior.

  • Pub Date: 2006/07/12
  • Number: 07555482
  • Owner: Varonis Systems, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Diagnostic method and products useful therein

A method for simultaneous detection and identification of and , in a single real time PCR assay using species-specific primers and Taqman MGB probes. Also, a kit for the diagnosis of bacterial bioterrorism agents. In addition, an infection-free control plasmid to verify the result of the real time PCR analysis method.

  • Pub Date: 2006/06/12
  • Number: 07960106
  • Owner: The Finnish Defence Forces
  • Location: Helsinki, FI
  • Details: Visit USPTO

Visit USPTO Page


Application message conversion using a feed adapter

An indication of a configuration policy of a plurality of configuration policies is received at a feed adapter. The configuration policy of the plurality of configuration policies is selected based, at least in part, on the received indication of the configuration policy. The configuration policy of the plurality of configuration policies specifies a conversion rule from an input message format to an output message format using at least one conversion function of a plurality of conversion functions. The conversion rule specifies types of arguments that the at least one conversion function receives and returns. An application message having the input message format is received in the feed adapter. The feed adapter converts the application message having the input message format to an application message having the output message format according to the conversion rule specified by the configuration policy of the plurality of configuration policies.

  • Pub Date: 2006/06/12
  • Number: 08695015
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing administrative healthcare claims data and other data sources

Techniques suitable for identifying potential subjects for a clinical trial and other applications are disclosed. One or more exclusion or inclusion criteria are defined for the clinical trial. One or more specialized searching tables are pre-generated using administrative healthcare claims data and the one or more exclusion or inclusion criteria. The specialized searching tables are searched. Through the searching step, subjects are identified within the administrative healthcare claims data who match the one or more exclusion or inclusion criteria. Through the searching step, a geographical area is identified corresponding to the subjects who match the one or more exclusion or inclusion criteria. A customized report is generated using the identified subjects and geographical area.

  • Pub Date: 2006/06/12
  • Number: 07917525
  • Owner: Ingenix, Inc.
  • Location: Eden Prairie, US
  • Details: Visit USPTO

Visit USPTO Page


Active learning framework for automatic field extraction from network traffic

An active learning framework is provided to extract information from particular fields from a variety of protocols. Extraction is performed in an unknown protocol, in which the user presents the system with a small number of labeled instances. The system then automatically generates an abundance of features and negative examples. A boosting approach is then used for feature selection and classifier combination. The system then displays its results for the user to correct and/or add new examples. The process can be iterated until the user is satisfied with the performance of the extraction capabilities provided by the classifiers generated by the system.

  • Pub Date: 2006/06/12
  • Number: 2052303
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Use of local position fix when remote position fix is unavailable

A mobile computing device has a transceiver circuit, a location determination circuit, and a processing circuit. The transceiver circuit is configured to receive a remote position fix from a remote computer via a wireless network. The location determination circuit is configured to receive satellite data and to calculate a local position fix. The processing circuit is configured to operate an application, to receive a request for a position fix from the application, to determine whether the remote position fix is available, and to provide the local position fix to the application based on whether the remote position fix is available.

  • Pub Date: 2006/05/12
  • Number: 07991408
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Type bridges

Methods, systems, and computer program products for converting an object of one type to an object of another type that allow for the runtime operation of the conversion process to be altered or customized. The conversion may occur within an extensible serialization engine that serializes, deserializes, and transforms objects of various types. The runtime operation of the serialization engine is altered by one or more extension routines that implement the desired customizations or extensions, without requiring replacement of other existing routines. Based on type information, identified for an initial object, the object is converted to an intermediate representation which permits runtime modification, including modification of object names, object types, and object data. The intermediate representation of the initial object is modified in accordance with extension routines that alter the runtime operation of the serialization engine, and the intermediate representation is converted to a final object and type.

  • Pub Date: 2006/05/12
  • Number: 2042112
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for enhancing the functionality of file systems

Enhancements to the functionality of a file system are provided. A file system can provide an additional level of error correction, in addition to the error correction provided by a data storage device. An extension to the metadata area in a file system can store index information about data files that the file system can use to reduce the time it takes to access the files. A file system can use extended metadata to store conditional access information for data files stored in the file system. A data storage device can also examine and characterize the data being stored in order to categorize a user's files automatically. Modules can be loaded into a file system to provide new functionality to the file system. The modules can load additional modules to extend their functionality.

  • Pub Date: 2006/05/12
  • Number: 07853822
  • Owner: Hitachi Global Storage Technologies Netherlands, B.V.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing levels of access and action control via an SSL VPN appliance

The present invention relates to systems and methods to identify a level of access for a resource being accessed via a secure socket layer virtual private network (SSL VPN) connection to a network, and to control the action on the resource based on the identified level of access. The appliance described herein provides intelligent secure access and action control to resources based on a sense and respond mechanism. When a user requests access to a resource via the SSL VPN connection of the appliance, the appliance obtains information about the client to determine the user access scenario—the location, device, connection and identify of the user or client. Based on the collected information, the appliance responds to the detected user scenario by identifying a level of access to the resource for the user/client, such as rights to view, print, edit or save a document, Based on the identified level of access, the appliance controls the actions performs on the resource by various techniques described herein so that the user can only perform the allowed action n accordance with the level of access. As such, the present invention allows organization to control and provide the appropriate level of access to valuable, confidential or business critical information accessed remotely or via a pubic network while protecting such information by controlling the types of actions performed or allowed to be performed remotely on the information.

  • Pub Date: 2006/05/12
  • Number: 08151323
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Proofing of word collocation errors based on a comparison with collocations in a corpus

Collocation errors can be automatically proofed using local and network-based corpora, including the Web. For example, according to one illustrative method, one or more collocations from a text sample are compared with a corpus such as the content of the Web. The collocations are identified for whether they are disfavored in the corpus. Indications are provided via an output device of whether the collocations are disfavored in the corpus. Additional steps may then be taken such as searching for and providing potentially proper word collocations via a user output.

  • Pub Date: 2006/05/12
  • Number: 07774193
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Power saving in multi-processor device

A mobile computing device comprises a first microprocessor having a sleep mode and a wake mode and a second microprocessor configured for wireless communication. A communication port is configured to communicate data from the second processor to the first processor, wherein the second processor is configured to provide a wake signal to the first microprocessor and the first microprocessor is configured to open the communication port in response to the wake signal and to receive data from the second microprocessor through the communication port.

  • Pub Date: 2006/05/12
  • Number: 07898994
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Method for recommending upgrade components for a computer system

Method and computer program product for recommending cost effective upgrades for a computer system. At least one performance parameter is determined for an existing computer system. Up to date performance specifications for available upgrade components are obtained. A variety of potential systems are modeled utilizing at least one upgrade component, and at least one component from the existing system to create upgrade scenarios. At least one performance parameter is predicted for each upgrade scenario. The performance parameters for the upgrade scenarios are compared to the performance parameters of the existing computer system. The cost-effectiveness is determined for each upgrade scenario, and upgrade recommendations are made when the cost-effectiveness meets or exceeds a target value.

  • Pub Date: 2006/05/12
  • Number: 07702497
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing texture samples with programmable filter weights

A texture unit of a graphics processing unit provides the ability to switch among different filter modes depending upon shader program instructions that are received by the texture unit. One filter mode has the capability to extract filter weights that have been specified in a received shader program instruction rather than calculating the weights within the texture unit itself.

  • Pub Date: 2006/05/12
  • Number: 2041438
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for multimedia messaging service using Parlay X web service

Provided is a method and apparatus for providing a multimedia message service based on a Parlay X Web service to easily check the status of a multimedia message which is requested to be transmitted in a multimedia messaging application server. The apparatus activates a delivery status informing function for each application server upon receipt of a delivery status information activation request, receives a process result for the multimedia message requested by the application server from an MMS server, and transmits the delivery status information for the requested multimedia message to the application server, for which the status informing function is activated, through a status informing message in real-time.

  • Pub Date: 2006/05/12
  • Number: 08094589
  • Owner: Electronics and Telecommunications Research Institute
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Arrangement and a method relating to performance management by distributed processing

The present invention relates to an arrangement for performance management in a communication network comprising a managing system and a number of managed systems. The arrangement comprises collecting means for collecting traffic measurement data and primary processing means for primary processing of measurement data. Said primary processing means are adapted to be distributed and comprise first primary processing means provided in the managing system and a number of second primary processing means provided in a number of managed systems. The arrangement also comprises processing control means for controlling at least allocation of primary processing of measurement data to a first or to a second primary processing means.

  • Pub Date: 2006/05/12
  • Number: 08001241
  • Owner: Telefonaktiebolaget L M Ericsson (publ)
  • Location: Stockholm, SE
  • Details: Visit USPTO

Visit USPTO Page


Aromatic ketones and uses thereof

Aromatic ketones having an extended fluoro-alkyl or fluoro-alkoxy moiety are disclosed. In particular aspects, the compounds comprise substituted 9-acridone, 9-xanthone, 4(1H)-quinolone, 4(1H) pyridone, 1,4-naphthoquinone, 9,10-anthraquinone derivatives. These preparations possess potent pharmacological activity for inhibiting malaria and mosquito-borne () diseases. The haloalkyl/alkoxy aromatic compounds possess significant pharmacological activity, with ICvalues in the nanomolar and sub-nanomolar range, and reduced toxicity against host derived cells and tissues. Methods of using the fluoro-alkyl/alkoxy aromatic compounds in the treatment of malaria and other human and animal diseases are also disclosed. Agricultural uses of the fluoro-alkyl/alkoxy aromatic compounds, such as in control of fungal diseases and in the production of important commercial crops (apples, etc.), are also presented.

  • Pub Date: 2006/05/12
  • Number: 07829578
  • Owner: U.S. Department of Veterans Affairs
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Organizing an extensible table for storing cryptographic objects

Embodiments of the present invention provide a method and apparatus, including a client and security token, for managing cryptographic objects, such as public key cryptography standard (PKCS)#11 objects, in a computer system. A storage table for the cryptographic objects is established including rows for the cryptographic objects and columns corresponding to available attributes capable of being associated with the cryptographic objects. Actual attributes of the cryptographic objects are stored in ones of the plurality of columns corresponding to respective ones of the available attributes. The storage table is extensible such that additional columns are added corresponding to new attributes capable of being associated with the cryptographic objects.

  • Pub Date: 2006/04/12
  • Number: 08693690
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Multimedia systems, methods and applications

Systems and methods according to exemplary embodiments of the present invention provide a user interface including an electronic program guide and scrollable visual directories.

  • Pub Date: 2006/04/12
  • Number: 08850478
  • Owner: Hillcrest Laboratories, Inc.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-level read caching for multiplexed transactional logging

A transactional logging service is provided to user-mode and kernel-mode log clients by utilizing a marshalling area to buffer a set of log records that a log client assembles into a log stream. Disk I/O (input/output) functionality is then separately brokered using a kernel-mode address space for a single dedicated physical log, or virtual logs multiplexed to a single log, which is written to stable storage that contains log records from across all of the log streams. Physical log writes are handled by a shared log flush queue and physical log reads are provided by a file system cache that underlies the service. A multi-level cache hierarchy is utilized when a log client needs to access a log record. A series of caches are queried in order of increasing latency until the targeted log record is located. The target log record is only read from disk in the event that it missed at each cache in the hierarchy.

  • Pub Date: 2006/04/12
  • Number: 08074027
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for use of data object popularity measurements for improved quality of service perception in wireless broadcast systems

Systems, methods, device and apparatus are provided that allocate broadcast delivery capacity based oil popularity measurements associated with broadcasted data objects. By allocating broadcast delivery capacity based on popularity measurements, Quality of Service (QoS) perception can be improved by decreasing the number of reception failures, decreasing the data object access delay and/or decreasing the consumption of wireless device resources, such as battery power and processing capabilities.

  • Pub Date: 2006/04/12
  • Number: 08694016
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and aqueous dispersions

An aqueous dispersion including (A) at least one base polymer selected from the group consisting of an ethylene-based co-polymer and a propylene-based co-polymer; (B) at least one polymeric stabilizing agent; and at least one filler; wherein the polymeric stabilizing agent is different from the at least one base polymer and is compatible with the at least one base polymer and the at least one filler, and wherein the dispersion has filler in the range of greater than 0 to about 600 parts per hundred parts of a combined amount of the at least one base polymer and the polymeric stabilizing agent is disclosed.

  • Pub Date: 2006/04/12
  • Number: 2050897
  • Owner: Dow Global Technologies, Inc.
  • Location: Midland, US
  • Details: Visit USPTO

Visit USPTO Page


Cellulose articles containing an additive composition

In one embodiment, the present invention provides a method of forming a cellulose article having a specific volume of less than 3 cc/gm. The method includes the step of incorporating cellulose fibers with a compound, wherein the compound includes an aqueous dispersion. The aqueous dispersion may have at least one polymer selected from the group consisting of an ethylene-based thermoplastic polymer, a propylene-based thermoplastic polymer, and mixtures thereof; at least one polymeric stabilizing agent; and water. In certain embodiments, a combined amount of the at least one polymer and the at least one stabilizing agent comprises about 25 to about 74 volume percent of the aqueous dispersion.

  • Pub Date: 2006/04/12
  • Number: 08029646
  • Owner: Dow Global Technologies LLC
  • Location: Midland, US
  • Details: Visit USPTO

Visit USPTO Page


Call control server

In a communication system that includes a communication terminal that originates and receives a call through a call control server, the call control server receives destination information from the communication terminal as a call request. The call control server checks an address of the communication terminal and determines based on the destination information whether transmission to a destination terminal is permitted for the communication terminal. Only when the transmission is permitted, the call control server originates a call to an address corresponding to the destination information to connect the communication terminal to the destination terminal.

  • Pub Date: 2006/04/12
  • Number: 09473622
  • Owner: RICOH COMPANY, LIMITED
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for analyzing software interface usage

Methods and apparatus for analyzing the interface usage and requirements within software applications. In one embodiment, the interfaces comprise application programming interfaces (APIs) used with Java-based software, and the apparatus comprises a computer program that analyzes file paths (or classpaths) containing one or more files comprising Java bytecode. The names of the classes are extracted and placed into a class dictionary. The different classes listed in the dictionaries are broken down into their individual methods. Each method is then dissembled and analyzed for method or field invocations on other classes found in the dictionary. Methods called are added to a “used class” report. The used class report preferably contains the name of the class, method and the instruction information.

  • Pub Date: 2006/02/12
  • Number: 08370818
  • Owner: Time Warner Cable Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for analysing communications streams

Systems and methods for analyzing communications of a contact center are provided. A representative system incorporates a first computer application operative to reconstruct progress of a communication through the contact center such that information corresponding to the progress of the communication is presented to a user.

  • Pub Date: 2006/01/12
  • Number: 07899180
  • Owner: Verint Systems Inc.
  • Location: Melville, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-display system and method supporting differing accesibility feature selection

A multi-display system and method supporting differing accessibility feature selection provides a suitable display for a user with limited visual acuity, while providing a second display having a different accessibility feature set to a second user. An application or operating system checks selected accessibility features and display settings corresponding to each graphical display device and generates multiple graphical outputs in conformity with program output and the corresponding accessibility features and display settings for each device. One graphical display may be a personal computer display and the other a projector, so that an accessible desktop can be presented to the presenter, while the presentation can be shown with a desired set of attributes. The operating system may support the above-described operation by generating the multiple display outputs from the accessibility settings and a single program output. Alternatively, an application can generate two display outputs in conformity with accessibility selections.

  • Pub Date: 2006/01/12
  • Number: 08839105
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for prioritizing network services

A method, system and computer program product of prioritizing network services is provided. Such prioritization may comprise a better level of service, more timely system response and/or preferential treatment of traffic. In an embodiment, prioritization is controlled by defining modes and levels of prioritization typically based on criteria, such as the value of a transaction, the standing of a user, or the type of transaction. Prioritization can also be established, for example, for a length of time or for a given transaction. The modes of prioritization may comprise remapping TCP ports to which a communication is directed, remapping uniform resource locators and/or Internet Protocol addresses to which a communication is directed and/or tagging communications with quality of service information. The levels of prioritization define the type(s) of priority service offered to a user, such as timeliness of system response and preference of traffic treatment, and may be arbitrarily defined.

  • Pub Date: 2006/01/12
  • Number: 08914543
  • Owner: Catchfire Systems, Inc.
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for aggregating and displaying an event stream

Embodiments of the present invention provide an aggregated event stream that indicates activities to a user across a range of online services. Embodiments may include a web site, a client application, or mobile device. In particular, a display is provided to a user that indicates various events in a “stacked” format. Each block of the stacked format represents one or more events originating from the user's own activities or activities of the user's contacts in their social network. Activities may originate from accounts on other online services that the user linked to their account or profile. The stacked format is updated in substantially real time to provide the user a sense of the activities of their social network around them.

  • Pub Date: 2006/01/12
  • Number: 2086251
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Media management and tracking

A system is described for enabling a user to listen to songs on a network-enabled device, including an embedded receiver for receiving at least one song list, and for receiving music streamed over a wireless network, list navigation software, for navigating the at least one song list and selecting a desired song therefrom, using a keypad communicatively coupled with the network-enabled device, an embedded transmitter for transmitting a song selection to a tracking server, and an embedded audio player, for playing the music streamed to the network-enabled device over the wireless network, a tracking server, including a data store including at least one song list, a receiver for receiving a song selection from said network-enabled device, the song selection comprising an ID for a selected song, and a transmitter for transmitting the at least one song list to the network-enabled device, and for transmitting the received song selection to a media server, and a media server, including a data store including audio files for the songs listed in the song list, an audio streamer, a receiver for receiving an instruction from said tracking server to transmit the selected song to the network-enabled device, and a transmitter for streaming the selected song to the network-enabled device. A method and a computer-readable storage medium are also described.

  • Pub Date: 2006/01/12
  • Number: 08918195
  • Owner: Catch Media, Inc.
  • Location: Douglasville, US
  • Details: Visit USPTO

Visit USPTO Page


Leveraging back-off grammars for authoring context-free grammars

A system and method of refining context-free grammars (CFGs). The method includes deriving back-off grammar (BOG) rules from an initially developed CFG and utilizing the initial CFG and the derived BOG rules to recognize user utterances. Based on a response of the initial CFG and the derived BOG rules to the user utterances, at least a portion of the derived BOG rules are utilized to modify the initial CFG and thereby produce a refined CFG. The above method can carried out iterativey, with each new iteration utilizing a refined CFG from preceding iterations.

  • Pub Date: 2006/01/12
  • Number: 08108205
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Contextual alert bubbles for alert management

Embodiments of the present invention address deficiencies of the art in respect to alert bubbles for alert management and provide a novel and non-obvious method, system and computer program product for contextual alerts for alert management. In an embodiment of the invention, an alert management data processing system can be provided. The system can include an alert bubble configured to display alert text for an associated alert, and contextual information disposed in the alert bubble interface along with the alert text. In particular, the contextual information can provide context for the associated alert.

  • Pub Date: 2006/01/12
  • Number: 08762841
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Bi-directional widget for recording user feedback

Embodiments of the present invention provide a simple, bi-directional control that allows the user to express one of two opposing opinion on a particular item and make a comment. For example, the user may be provided a bi-direction widget that indicates whether a user loves or hates a particular subject.

  • Pub Date: 2006/01/12
  • Number: 09400791
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automated deployment and configuration of applications in an autonomically controlled distributed computing system

A distributed computing system conforms to a multi-level, hierarchical organizational model. One or more control nodes provide for the efficient and automated allocation and management of computing functions and resources within the distributed computing system in accordance with the organization model. The control node includes an automation subsystem having one or more rules engines that provide autonomic control of the application nodes in accordance with a set of one or more rules. A pluggable, application-specific application governor is selected and installed within the control node to provide an application-independent interface through which the rules engines interact to control the deployment, execution and monitoring of the applications within the distributed computing system. The application governor uses a set of application image objects to configure an application on an application node. Each of the application image objects share a common interface and are therefore interchangeable.

  • Pub Date: 2006/01/12
  • Number: 08595331
  • Owner: CA, Inc.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, system, and method for decentralized data conversion

An apparatus, system, and method are disclosed for decentralized data conversion. The present invention includes providing a server configured to be accessible over the Internet and receiving a payment from a user through a payment gateway module, the gateway module operated by the server. Additionally, the invention includes receiving a data source over the Internet into the server, transforming data in the data source to create converted data adapted to a target, the transformation directed by one or more integration objects configured to perform conversion steps, the integration objects in a hierarchical structure defining an order of execution, the transformation controlled by the server, and returning the transformed data over the Internet from the server. The present invention allows customers who would otherwise be unable to access powerful data conversion tools to convert data at a reasonable cost.

  • Pub Date: 2006/01/12
  • Number: 2056771
  • Details: Visit USPTO

Visit USPTO Page


Treatment of cancer and other diseases

The present invention relates to a novel compound (e.g., 24-ethyl-cholestane-3β,5α,6α-triol), its production, its use, and to methods of treating neoplasms and other tumors as well as other diseases including hypercholesterolemia, autoimmune diseases, viral diseases (e.g., hepatitis B, hepatitis C, or HIV), and diabetes.

  • Pub Date: 2006/30/11
  • Number: 08293726
  • Owner: Vianova Labs, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


System for overriding interpreted byte-code with native code

In a method of executing a program on an interpreted bytecode language, a plurality of interpreted bytecode modules (each having an associated name) is loaded. A pointer is directed from each method entry to a different interpreted bytecode module. A native code module library is loaded and includes a native code module (also having an associated name) that implements a function corresponding to an interpreted bytecode module. When the name of an interpreted bytecode module corresponds to the name of a native code module, the pointer directed to the interpreted bytecode module is redirected to the corresponding native code module. Each interpreted bytecode module and native code module pointed to by the each method entry in the method table is executed according to an application-controlled order of execution.

  • Pub Date: 2006/30/11
  • Number: 08683453
  • Owner: Motorola Mobility LLC
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing images in a social network

Embodiments of the present invention provide for a shared photo space that is synchronized among members of a social network or group. In some embodiments, users of a social group automatically pull photos directly from all registered hard drives of clients and online services and mirror them around the group, thus making the collection available to the social network of users.

  • Pub Date: 2006/30/11
  • Number: 09021045
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Search results weighted by real-time sharing activity

Embodiments of the present invention provide a mechanism for weighting search results based on active and passive sharing activity among users in the context of a social network. In particular, information being shared among users is monitored. When a search is requested by a user, information recently shared among a user's social network is consulted and is used to weight the search results in the relevance calculation. For example, sharing activity that occurred recently or ongoing is used to weight the search results.

  • Pub Date: 2006/30/11
  • Number: 08671114
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Playlist generation of content gathered from multiple sources

Embodiments of the present invention provide a mechanism for automatically creating a playlist for a user. In particular, data indicating music played by other users in the user's social network is collected. Music is then selected from this data and gathered from a music service in which the user subscribes, such as iTunes, Yahoo Music, etc. The service then builds the playlist with the gathered music.

  • Pub Date: 2006/30/11
  • Number: 09405827
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Personal site privacy policy

A request, from a requester, is received to view user information on a user's personal site associated with a user. A relationship is determined between the requester and the user. User information is provided to the requester based on the requester's relationship to the user.

  • Pub Date: 2006/30/11
  • Number: 08646095
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Minimal difference query and view matching

The subject disclosure pertains to efficient computation of the difference between queries by exploiting commonality between them. A minimal difference query (MDQ) is generated that roughly corresponds to removal of as many joins as possible while still accurately representing the query difference. The minimal difference can be employed to further substantially the scope of view matching where a query is not wholly subsumed by a view. Additionally, the minimal difference query can be employed as an analytical tool in various contexts.

  • Pub Date: 2006/30/11
  • Number: 07558780
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for determining a reputation score for a user of a social network

Embodiments of the present invention provide methods and systems for assigning a “karma” to users of a social network. In some embodiments, the karma is a score that is based on various reputations and feedback on a user. For example, reputation or feedback scores given to user in general are collected. In addition, karma is based on scores collected by analyzing feedback provided between two users. Thus, a reputation score for one from the point of view of the others may be calculated. Embodiments of the present invention provide an open interface (API) that allows users to submit their reputation scores.

  • Pub Date: 2006/30/11
  • Number: 08386564
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for processing a geometry shader program developed in a high-level shading language

Methods and systems for processing a geometry shader program developed in a high-level shading language are disclosed. Specifically, in one embodiment, after having received the geometry shader program configured to be executed by a first processing unit in a programmable execution environment, the high-level shading language instructions of the geometry shader program is converted into low-level programming language instructions. The low-level programming language instructions are then linked with the low-level programming language instructions of a domain-specific shader program, which is configured to be executed by a second processing unit also residing in the programmable execution environment. The linked instructions of the geometry shader program are directed to the first processing unit, and the linked instructions of the domain-specific shader program are directed to the second processing unit.

  • Pub Date: 2006/30/11
  • Number: 07958498
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method of controlling resolution of digital data broadcasting receiver, apparatus therefor, and digital data broadcasting receiver using the same

Provided are a method of controlling a resolution desired by a user in a graphics device of a digital data broadcasting receiver, an apparatus therefor, and a digital data broadcasting receiver using the same. The method includes providing a list of resolutions available on a graphic plane to a user; changing a resolution of the graphic plane according to a resolution selected by the user from the resolution list; and displaying an application on the graphic plane, the resolution of which has been changed.

  • Pub Date: 2006/30/11
  • Number: 08174618
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-si, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for preloading suggested content onto digital video recorder based on social recommendations

Systems and methods provide users with suggested content that is preloaded on a media player. The suggested content is selected based on playback data from individuals and groups in a social network or playback data from anonymous users, or explicit suggestions from peers of the user in the social network, such as friends or family. The user may set aside space on their media player, such as a DVR or PC hard drive. A service then populates this space with suggested content. In addition, systems and methods allow users to track and create recommendations of content and to automatically schedule recording of showings of this content. The user may automatically record everything suggested, or require the user make selections. Systems and methods also provide for automatic selections, based on content type, time of day, or a random pattern.

  • Pub Date: 2006/30/11
  • Number: 08060827
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for maintaining disk location via homeness

A method and system manages ownership information about disks in a storage network without the need for an emulated, partner mode system. The method and system provides for ownership information, including a current owner and a home owner for resources, such as disks, to be stored on each disk in a storage system, as well as to be stored in memory on each storage system node in the network. A further aspect of the invention is a disk homeness application program interface (API), which provides commands that can be utilized by an administrator at a host computer to set, modify and display ownership information about each disk in the cluster. Upon a takeover, any node in the network can takeover one or more disks by reading the ownership information stored on the disks or in the tables.

  • Pub Date: 2006/30/11
  • Number: 07711683
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for improved resource giveback

A method and system performs a sendhome procedure for giving back resources to a node that had been restored after a takeover of that node's resources is provided. Critical operations that may be running are completed prior to the sendhome process. An ownership module consults information in an ownership table about each resource, e.g. a data container. A data container, such as a root aggregate of the waiting node is identified and sent back first, after which the node is booted. When the node has been successfully booted, the remaining aggregates are sent back one at a time until the full compliment of aggregates has been returned. A veto of the sendhome procedure can be invoked by a subsystem that is performing a critical operation prior to the sendhome of the root aggregate and each individual other aggregate.

  • Pub Date: 2006/30/11
  • Number: 2018498
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for establishing a new account for a user with an online service

Embodiments of the present invention provide methods and systems for allowing users to efficiently create new accounts in an online service. The new account creation scheme allows users to begin using aspects of the online service before creating an account. The user is provided a temporary account and, in the event they choose to finalize joining the service, the user is permitted to save settings from their temporary account. For example, in some embodiments, the user is permitted to perform various functions, such as, browsing the online service, navigating external links, and viewing various pages of other users and groups. The user may also be allowed to collect information on other members that they are interesting and may be offered a temporary homepage where the user can view the activities of these other members. The temporary home page allows the potential new user to immediately begin using the services of the social network service without having to specifically request a new account. This information and links may be transitioned over if the user wishes to establish a permanent account. While using the temporary account, however, the user must transition to a permanent account before accessing other features of the online service.

  • Pub Date: 2006/30/11
  • Number: 08059797
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for embedding an aggregated event stream into a third party web page

Embodiments of the present invention provide a way of embedding a display of activities relevant to a social network in a third party website. In particular, embodiments of the present invention provide for an embedded aggregated event stream. In particular, a display is provided to a user that indicates various events in a “stacked” format. Each block of the stacked format represents one or more events originating from the user's own activities or activities of the user's contacts in their social network. Activities may originate from accounts on other online services that the user linked to their account or profile. The stacked format is updated in substantially real time to provide the user a sense of the activities of their social network around them.

  • Pub Date: 2006/30/11
  • Number: 2086250
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for child-parent mechanism emulation via a general interface

A method for emulating a system call includes making the system call by a first process in a first operating system (OS) for interacting with a second process, wherein the first OS is emulated in a second OS, spawning an agent process, wherein the agent process is a child process of the first process, implementing a functionality of the system call using a general mechanism in the second OS between the agent process and the second process, passing a result associated with the system call from the second process to the agent process using the general mechanism, and relaying the result from the agent process to the first process using a system call in the second OS, wherein the result is stored by the first process.

  • Pub Date: 2006/30/11
  • Number: 2073017
  • Owner: Oracle America, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for monitoring host to tool communications

An aspect of the present invention includes a method and device for listening to communications between processes and tools, recording report and report trigger definitions, matching reports from tools with the recorded definitions, and translating messages into a context-insensitive format. Other aspects of the present invention include dynamically enhancing tool status reports, migrating processes form tool control hosts to distributed processors, and screening requests for tool status information from hosts and distributed processors. More detailed descriptions of aspects of the present invention are described in the claims, specification and drawings.

  • Pub Date: 2006/30/11
  • Number: 1982084
  • Owner: MKS Instruments, Inc.
  • Location: Andover, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for memory address generation using dynamic stream descriptors

Memory addresses for a data stream are generated by a stream parameter generator that calculates a set of stream parameters for each of a number of memory access patterns and a regional address generator that calculates a sequence of addresses of a memory access pattern from a corresponding set of stream parameters. The stream parameters, which may include START_ADDRESS, STRIDE, SKIP and SPAN values for example, are updated in accordance with an update( ) function. The update( ) function, which may be defined by a user, defines how stream parameters change from one memory access pattern to the next. In one application, the update( ) function describes how the position, shape and/or size of a region of interest in an image changes or is expected to change.

  • Pub Date: 2006/30/11
  • Number: 2046363
  • Owner: Motorola, Inc.
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Messaging protocol for interactive delivery system

Efficient messaging techniques that facilitate interactive program guide (IPG) delivery and allow a terminal to specifically designate requested items of information from a server. The IPG can be provided via a number of IPG pages, with each page including a number of defined regions. In one method, selection for a particular region of a particular page is received at a terminal and a determination is made whether the selected region is currently received. If the answer is no, a request for the selected region is generated and sent to a server. The request can conform to a particular message format that includes a number of fields, e.g., a region ID field that identifies the selected region, a subtype field that identifies a particular type, a time slot field that identifies a specific time slot, and a page offset field that identifies a specific page from among many.

  • Pub Date: 2006/30/11
  • Number: 07707608
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Mastering music played among a plurality of users

Embodiments of the present invention allow a user to master the music played among a social network. Users of the social network subscribe to the master's session and synchronize their media player under control of the master. The master then distributes various selections of music and controls their playback. The master may also add other data, such as voice over or images, to accompany the playback.

  • Pub Date: 2006/30/11
  • Number: 08943210
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Internet service login using preexisting services

Embodiments of the present invention provide a system and method for logging a client into an internet service using a preexisting service. In order to login, the user may select a link that triggers the service to send login information to the user via a preexisting service, such as instant messaging or email. In some embodiments, the user is sent a link via their preexisting service. The user then logs into the service by selecting the link.

  • Pub Date: 2006/30/11
  • Number: 07904601
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Integer-based functionality in a graphics shading language

One embodiment of the present invention sets forth a technique for improving the flexibility and programmability of a graphics pipeline by adding application programming interface (API) extensions to the OpenGL Shading Language (GLSL) that provide native support for integer data types and operations. The integer API extensions span from the API to the hardware execution units within a graphics processing unit (GPU), thereby providing native integer support throughout the graphics pipeline.

  • Pub Date: 2006/30/11
  • Number: 08044951
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


File sharing based on social network

Embodiments of the present invention provide for sharing files within a social network. Members of the social network are provided a set of virtual folders that indicates groups and other members that are authorized for file sharing. The folders are automatically maintained for the social network. In addition, various folders may be designated for different levels of access. For example, public folders may be accessible to anyone, while private folders could be restricted to one or members of the social network. The file sharing folders would be provided as part of the social network online service, and thus, are maintained without user configuration.

  • Pub Date: 2006/30/11
  • Number: 08140506
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Explicit casualty control in a client/server system

Embodiments of the present invention provide a protocol for ensuring data integrity of requests made by clients of a social network service. In particular, when a client gets a confirmation from an update request, the confirmation is accompanied by a token that provides information about the update. When the client next makes a read request it passes the token along with the read request. The node at the social network service receiving the request then waits until it makes sure that it has received any notifications that precede the state represented by the token before it processes the request and replies to the client. The token might be, among other things, a physical timestamp, a counter reflecting transactions committed on a database server, or a vector timestamp. In addition, the same technique can be used to ensure ordering between read requests.

  • Pub Date: 2006/30/11
  • Number: 08190746
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Embedded file system recovery techniques

Various Embedded File System recovery techniques are described. A mobile computing device may comprise a radio, a processor coupled to the radio, and a memory coupled to the processor. The memory may be arranged to store a file system manager module (FSMM) that when executed by the processor manages an Embedded File System (EFS). The FSMM may create a factory image of the EFS on a periodic basis, or in response to a specific event such as a power down event. The FSMM may detect an error condition for the EFS, and replace the EFS with the factory image when an error is detected. Other embodiments are described and claimed.

  • Pub Date: 2006/30/11
  • Number: 07941403
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Device, system and/or method for providing schema-independent access to object in documents

A computer system supports the access of documents formatted according to different schemas. A model includes a relationship for different schemas. The relationship specifies a particular data and, corresponding to the particular data and one of the different schemas, a reference to one or more ontological-elements(s). An ontological-element defines a semantic relationship between the particular data (as subject) and objects with regard to a semantic relationship in documents. An executable program can include instructions or queries to access the particular data in a one or more documents. To access the particular data in the document, the executable program can access the model to obtain the reference to the ontological-elements corresponding to the particular data and the various schema for the various documents can refer to ontological-elements corresponding to the particular semantic relationships among the data, the ontological-elements further specifying one or more objects corresponding to the particular data; and can access objects in the particular documents as specified by ontological-elements.

  • Pub Date: 2006/30/11
  • Number: 07469252
  • Owner: Fortinet, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Declarative data binding and data type propagation in a remote workflow schedule authoring system

Methods, systems, apparatus, and computer-readable media are provided herein for declarative data binding and data type propagation in a remote workflow schedule authoring system. According to one method, a user interface is provided for binding a parameter in a workflow action rule to a data value provided by a data source. The user interface may include a control for specifying a data source and a data field to which the parameter should be bound. The parameter is bound to the data source and data field selected using the user interface. If the data type of the selected data source is identical to the data type of the parameter, an internal lookup may be performed to retrieve the data value. Otherwise, the data type of the parameter may be propagated to the data source during lookup of the data value.

  • Pub Date: 2006/30/11
  • Number: 08146017
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Context-based routing of requests in a service-oriented architecture

Context-based routing of requests in a service-oriented architecture (SOA) is achieved by using context information received from service providers to make routing decisions. Service providers publish information about their context on a publish-and-subscribe channel. A router (e.g., a JBI normalized message router) subscribes to the channel to receive the context information, and may store the context information in a context repository. A consumer issues a service request specifying a context, and the router uses the context information received from the service providers to select the service provider that best satisfies the context. The request is then routed to the selected service provider.

  • Pub Date: 2006/30/11
  • Number: 08516116
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Community tagging of a multimedia stream and linking to related content

Embodiments of the present invention allow users to tag a multimedia program or stream with data or pointers to external information related to content of the multimedia program. Users in a social network may tag various aspects of the content, such as a particular actor, a type of car, jewelry, a location, a phrase, etc. This tagging information may then be linked to various websites that provide further information about the tagged content and may be keyed to video offset times.

  • Pub Date: 2006/30/11
  • Number: 08832277
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic playlist generation in correlation with local events

Embodiments of the present invention provide methods and systems for content providers, such as musicians, to register upcoming events, such as concert events, upload songs, etc. Users of a social network service may then browse venues and content providers. Upon selecting one of the providers, the social network service retrieves the songs registered by the content providers into a playlist for the user. In some embodiments, users may search an area to find and create a playlists of multiple content providers. The user could thus create a playlist by venue, by day, etc. In addition, each of these created playlists can be shared with others on the social network service. The social network service may also auto-generate playlists based on genre, date, artist, etc. A stream of the songs may then be delivered to the user according to the playlist they choose and the various music services that they subscribe.

  • Pub Date: 2006/30/11
  • Number: 08463893
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic generation of content recommendations weighted by social network context

Embodiments of the present invention provide users with suggested content that is weighted based on the social network context of the suggestion. In particular, the suggested content is selected based on incorporating the preferences of users having a relationship with the user. For example, content recommendations from a family member or known friend of the user may be highly weighted over other recommendations.

  • Pub Date: 2006/30/11
  • Number: 08091032
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automated screen saver with shared media

Embodiments of the present invention provide users in a social network with a screen saver constructed by media shared by their contacts and groups in a social network. The present invention provides a shared photo album that displays images from a user's own photo collection, and that of their social network automatically. For a user, the social network service queries its database to retrieve a list of photo sources. The sources of images may be online photo sharing services, other computers with photos on their local hard drives, and public peer-to-peer storage services. The images may be displayed to the user and optionally may be accompanied with information, such as the owner of the photo or descriptive phrases or comments about the photo. The social network service may be configured to continuously or periodically request photos to update the screen saver.

  • Pub Date: 2006/30/11
  • Number: 08812582
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Automated identification of high/low value content based on social feedback

Embodiments of the present invention provide an automated scheme for identifying high/low value content. Playback data from users in a social network may be periodically submitted by users of the social network. The playback data indicates segments of content, such as audio or video that the user has skipped over or tagged as low value. The playback data may also indicate segments of content that the user has repeated or tagged as high value. The playback data is then analyzed in aggregate and various clips are identified. In addition, the playback data may be compiled and organized among the users for future use. The playback data may be used to indicate segments of high/low interest to peers in the social network or to arbitrary users.

  • Pub Date: 2006/30/11
  • Number: 08176191
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Authenticating linked accounts

Embodiments of authenticating linked accounts are presented herein. In an implementation, an authentication service provides functionality to form links between a plurality of user accounts. A client may then authenticate by providing credentials for one account in a group of linked accounts, and is permitted access to each account in the group of linked accounts based upon the linking. Thus, a single sign-in of a client to one account may permit the client to obtain services for service providers corresponding to multiple linked accounts, without an individual sign-in to each account.

  • Pub Date: 2006/30/11
  • Number: 08327428
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Application service invocation

An Internet Protocol Multimedia Subsystem (IMS) includes a Serving-Call Session Control Function (S-CSCF). The S-CSCF includes a Service Capability Interaction Manager (SCIM) configured to invoke one or more application services in response to a message being received by the S-CSCF.

  • Pub Date: 2006/30/11
  • Number: 07792275
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Advanced content authentication and authorization

An interactive multimedia presentation playable by a presentation system includes a media content component and an interactive content component. The interactive content component includes one or more applications, which provide instructions for organizing, formatting, and synchronizing the presentation of interactive objects to a user. Prior to playing the interactive multimedia presentation, an entity responsible for authoring or publishing one or more of the applications is digitally identified and authenticated, or it is determined that the applications are unsigned. Prior to and/or during play of the interactive multimedia presentation, authorization for performing certain actions (such as executing certain application instructions, especially those that access functionality of the presentation system, computer-readable media, or external networks) is granted via a permission-based model. User input and application requests may be considered in determining whether an application is granted permission to perform certain actions.

  • Pub Date: 2006/30/11
  • Number: 08473739
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for pointing a laser beam

Apparatus and method for directing a laser beam at an object. Some embodiments include generating direction-control information, based on the direction-control information, directing laser energy into a first fiber at a first end of a first fiber bundle during a first time period, forming an output beam of the laser energy from the second end of the first fiber bundle, and steering the output beam of the laser energy from the first fiber in a first selected direction of a plurality of directions during the first time period, and optionally modulating an intensity of the laser energy according to a predetermined pattern. The direction-control information is based on sensing electromagnetic radiation from a scene. Some embodiments use a remote camera wire-connected to the image processor to obtain scene information, while other embodiments use a second fiber bundle to convey image information from an external remote lens to a local camera.

  • Pub Date: 2006/29/11
  • Number: 2061023
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for aircraft infrared countermeasures to missiles

Apparatus and method for directing a laser beam at an object. Some embodiments include generating direction-control information, based on the direction-control information, directing laser energy into a first fiber at a first end of a first fiber bundle during a first time period, forming an output beam of the laser energy from the second end of the first fiber bundle, and steering the output beam of the laser energy from the first fiber in a first selected direction of a plurality of directions during the first time period, and optionally modulating an intensity of the laser energy according to a predetermined pattern. The direction-control information is based on sensing electromagnetic radiation from a scene. Some embodiments use a remote camera wire-connected to the image processor to obtain scene information, while other embodiments use a second fiber bundle to convey image information from an external remote lens to a local camera.

  • Pub Date: 2006/29/11
  • Number: 1985741
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for adjusting combiner weights using an adaptive algorithm in wireless communications system

Method and apparatus to compute the combiner coefficients for wireless communication systems using an adaptive algorithm. One embodiment trains the weights on a signal known a priori that is time multiplexed with other signals, such as a pilot signal in a High Data Rate, HDR, system, wherein the signal is transmitted at full power. The adaptive algorithm recursively computes the weights during the pilot interval and applies the weights generated to the traffic signals. In one embodiment, the algorithm is a recursive least squares algorithm employing a transversal filter and weight calculation unit.

  • Pub Date: 2006/29/11
  • Number: 07545852
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Programming in a multiprocessor environment

Programming in a multiprocessor environment includes accepting a program specification that defines a plurality of processing modules and one or more channels for sending data between ports of the modules, mapping each of the processing modules to run on a set of one or more processing engines of a network of interconnected processing engines, and for at least some of the channels, assigning one or more elements of one or more processing engines in the network to the channel for sending data between respective processing modules.

  • Pub Date: 2006/29/11
  • Number: 09009660
  • Owner: Tilera Corporation
  • Location: Westborough, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for the prediction of arrhythmias and prevention of sudden cardiac death

Methods and kits are provided for determining an increased likelihood of the occurrence of a cardiac arrhythmia, myocardial ischemia, congestive heart failure and other diseased conditions of the heart. The methods and kits comprise measuring serum NGF levels in a subject and detecting increases in NGF levels over baseline. The methods may further comprise initiating preventive therapy in response to a detected increase in serum NGF levels.

  • Pub Date: 2006/29/11
  • Number: 07822474
  • Owner: Cedars-Sinai Medical Center
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for pointing a laser beam

Apparatus and method for directing a laser beam at an object. Some embodiments include generating direction-control information, based on the direction-control information, directing laser energy into a first fiber at a first end of a first fiber bundle during a first time period, forming an output beam of the laser energy from the second end of the first fiber bundle, and steering the output beam of the laser energy from the first fiber in a first selected direction of a plurality of directions during the first time period, and optionally modulating an intensity of the laser energy according to a predetermined pattern. The direction-control information is based on sensing electromagnetic radiation from a scene. Some embodiments use a remote camera wire-connected to the image processor to obtain scene information, while other embodiments use a second fiber bundle to convey image information from an external remote lens to a local camera.

  • Pub Date: 2006/29/11
  • Number: 07760976
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Laser based identification of molecular characteristics

Enantiomers are characterized, identified, synthesized and/or modified with a shaped laser pulse. In another aspect of the present invention, binary shaping and circular polarization are employed with a laser pulse. A further aspect of the present invention provides a quarter-wave plate in combination with one or more pulse shapers.

  • Pub Date: 2006/29/11
  • Number: 08618470
  • Owner: Board of Trustees of Michigan State University
  • Location: East Lansing, US
  • Details: Visit USPTO

Visit USPTO Page


Device driver including a flash memory file system and method thereof and a flash memory device and method thereof

A device driver including a flash memory file system and method thereof and a flash memory device and method thereof are provided. The example device driver may include a flash memory file system configured to receive data scheduled to be written into the flash memory device, the flash memory file system selecting one of a first data storage area and a second data storage area within the flash memory device to write the received data to based upon an expected frequency of updating for the received data, the first data storage area configured to store data which is expected to be updated more often than the second data storage area. The example flash memory device may include a first data storage area configured to store first data, the first data having a first expected frequency for updating and a second data storage area configured to store second data, the second data having a second expected frequency of updating, the first expected frequency being higher than the second expected frequency.

  • Pub Date: 2006/29/11
  • Number: 07844772
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Gyeonggi-Do, KR
  • Details: Visit USPTO

Visit USPTO Page


Dendritic metal nanostructures for fuel cells and other applications

Embodiment of the present invention relate to dendrimers useful for application as catalysts, in particular as improved electrocatalysts for polymer electrolyte membrane fuel cells (PEM-FCs). Methods of preparing such catalysts are described. Examples include dendritic nanostructured metal catalysts, such as platinum and platinum-alloy catalysts.

  • Pub Date: 2006/29/11
  • Number: 08574789
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual multidimensional datasets for enterprise software systems

Techniques are described for specifying virtual datasets within an enterprise software system. A computer-implemented system, for example, includes an enterprise planning system and a computing device coupled to the enterprise planning system via a network connection. The computing device includes an object store that stores a dataset, an application programming interface (API) that defines an operation for specifying the virtual dataset from the dataset, and an object model that stores a virtual dataset to the object store in response to receiving the operation defined by the API. The computing device further includes a plurality of applications that utilize the virtual dataset for a further operation defined by the API without resolving the virtual dataset. Because virtual dataset may be utilized without first resolving them, the virtual datasets may require less storage space within a memory, may automatically remain synchronous with the underlying dataset, and may quickly layer to more readily perform complicated operations.

  • Pub Date: 2006/28/11
  • Number: 2084722
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing access to a computing environment

A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is identified, the identified virtual machine providing the requested computing environment. One of a plurality of execution machines is identified, the identified execution machine executing a hypervisor providing access to hardware resources required by the identified virtual machine. A connection is established between the client machine and the identified virtual machine.

  • Pub Date: 2006/28/11
  • Number: 08341270
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session

A method for providing access to a computing environment includes the step of receiving, by a broker machine, a request from a client machine for access to a computing environment, the request including an identification of a user of the client machine. One of a plurality of virtual machines is identified by a session management component, the identified virtual machine providing the requested computing environment. One of a plurality of execution machines is identified, the identified execution machine providing a terminal services session in which a hypervisor executes to provide access to hardware resources required by the identified virtual machine. The hypervisor launches the identified virtual machine. A connection is established between the client machine and the identified virtual machine, via the terminal services session.

  • Pub Date: 2006/28/11
  • Number: 08010679
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for patient temperature control employing titration of therapy using EEG signals

A system and method for temperature control of the human body includes an indwelling catheter with a tip-mounted heat transfer element. The catheter is fluidically coupled to a console that provides a heated or cooled heat transfer working fluid to exchange heat with the heat transfer element, thereby heating or cooling blood. The heated or cooled blood then heats or cools the patient's body or a selected portion thereof. Cooling is provided while monitoring an EEG signal of a patient, and employing the same to monitor a depth of hypothermia of the patient.

  • Pub Date: 2006/28/11
  • Number: 07850723
  • Owner: Innercool Therapies, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed physics based training system and methods

A distributed simulation system is composed of simulator stations linked over a network that each renders real-time video imagery for its user from scene data stored in its data storage. The simulation stations are each connected with a physics farm that manages the virtual objects in the shared virtual environment based on their physical attribute data using physics engines, including an engine at each simulation station. The physics engines of the physics farm are assigned virtual objects so as to reduce the effects of latency, to ensure fair fight requirements of the system, and, where the simulation is of a vehicle, to accurately model the ownship of the user at the station. A synchronizer system is also provided that allows for action of simulated entities relying on localized closed loop controls to cause the entities to meet specific goal points at specified system time points.

  • Pub Date: 2006/28/11
  • Number: 08645112
  • Owner: L-3 Communications Corporation
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Demand-assigned multiple access (DAMA) communication device and associated acquisition methods

The communications terminal and acquisition method is for use with Continuous Phase Modulation (CPM) and Phase Shift Keying (PSK) modulation-type signals, each modulation-type signal having a respective preamble phasing sequence. The communications terminal may include a wireless communications device to receive a modulated signal having one of the CPM and PSK modulation types, and having a symbol rate. A controller may be included to cooperate with the wireless communications device to perform a transform process, such as a Fourier Transform (FT) process, on the received modulated signal to detect the modulation type and the symbol rate of the received modulated signal based upon the preamble phasing sequence. Carrier phase and frequency of the received modulated signal may be estimated based upon bin amplitudes. Also, symbol timing may be estimated based upon a phase difference between tones associated with the preamble phasing sequence.

  • Pub Date: 2006/28/11
  • Number: 08144815
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Data backup system including a data protection component

A data backup system is provided for backing up data files from a data source and for securing those data files against accidental modification or deletion. The system comprises storage and a data protection component that includes an application programming interface defining a command set. The system can also comprise a backup application that is configured to use the commands of the command set. The data protection component allows applications that use the commands of the command set, such as the backup application, to access the storage of the system. The data protection component prevents operating systems and applications that do not use the commands of the command set from accessing the storage. The data protection function of the data protection component can optionally be disabled to allow open access to the storage.

  • Pub Date: 2006/28/11
  • Number: 07899662
  • Owner: Storage Appliance Corporation
  • Location: Richmond Hill, CA
  • Details: Visit USPTO

Visit USPTO Page


Control of apoptosis by controlling the propensity of ceramide channel formation

The present invention relates to a novel target to control the apoptotic process, and to the use of this target to identify compounds capable of affecting the apoptotic process, The invention also relates to the use of such identified compounds in the treatment of cancer, stroke, neurodegenerative diseases, viral diseases and other diseases and conditions involving apoptosis.

  • Pub Date: 2006/28/11
  • Number: 07897401
  • Owner: University of Maryland, College Park
  • Location: College Park, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for peer-to-peer internet communication

Cross IM group chat allows a host user to initiate a group conference between other users each registered on different chat systems (or not registered at all), as long as the host user is registered on each of the chat systems. Each user can participate in a semi-public chat that is viewable by the other participants of the chat, and private chats in which each participant can chat one on one with other participants in the group are also provided.

  • Pub Date: 2006/27/11
  • Number: 07639672
  • Details: Visit USPTO

Visit USPTO Page


Merging realtime data flows

A method, apparatus and system to receive at a first message source a first message in a first data flow from a first messaging layer, provide data wrapped in a first data message reconfigurable iterator from the first message source to a first table in the primary data flow and provide a first constrained view over the first table.

  • Pub Date: 2006/27/11
  • Number: 08719844
  • Owner: Morgan Stanley
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Enterprise planning and performance management system providing double dispatch retrieval of multidimensional data

An enterprise software system provides an innovative double dispatch data retrieval technique that facilitates determining type safety during compile-time. The system includes an object store for storing a multi-dimensional dataset object. The dataset object provides an interface having a first function for instantiating a non-type-specific indexer object and a second function that returns a type-specific value of the plurality of data element currently referenced by the indexer object. The system also includes an object model that stores the dataset object to the object store, invokes the first function to instantiate the indexer object within the object store, utilizes the indexer object to reference the data element of the dataset object, and invokes the second function to retrieve the type-specific value of the data element referenced by the indexer object. Because the dataset provides the second method by which a type-specific value is returned, compilers may quickly determine type-safety concerns.

  • Pub Date: 2006/27/11
  • Number: 07895150
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic generation of test cases from error data

Some embodiments of a method and apparatus for automatically generating test cases from error data have been presented. In one embodiment, the method includes providing a graphical user interface (GUI) to allow a user to submit a report of an error in a program. The report may be partially written in a natural language. Further, the method may include receiving the report from the user via the GUI and processing the report to generate a test case to reproduce the error.

  • Pub Date: 2006/27/11
  • Number: 07844861
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for adaptable multimedia download resulting in efficient airlink usage

Apparatus and methods provide for a way to intelligently maximizing capability for a media download service over a wireless network. An available bandwidth of the wireless network is estimated and compared against a threshold. If the available bandwidth is above a predetermined threshold, the service is operated in a high bandwidth mode. If the bandwidth is not above a predetermined threshold, the service is operated in a low bandwidth mode.

  • Pub Date: 2006/25/11
  • Number: 08903407
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for actuated position determination in a wireless communication device

Systems, methods, device, apparatus, and machine-readable medium are described that provide for actuation of position determination in a wireless device based on a user input to an input mechanism associated with a group communication, such as a push-to talk and/or half-duplex communication. By marrying actuation of position determination with a user's request for push-to-talk communication (i.e., a request for a talk spurt in a PTT communication), the user is not required to perform any additional position determining initiating action to start the position determining process. In addition, the actuation of position determination is coupled with the initiation of another function on the wireless device, specifically, a push-to-talk request, which benefits from having accurate and current position data available for all current call members and/or a group administrator or the like.

  • Pub Date: 2006/24/11
  • Number: 07692579
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic failover configuration with redundant abservers

Techniques used in an automatic failover configuration having a primary database system, a standby database system, and an observer for preventing divergence among the primary and standby database systems while increasing the availability of the primary database system. In the automatic failover configuration, the primary database system remains available even in the absence of both the standby and the observer as long as the standby and the observer become absent sequentially. The failover configuration further permits automatic failover only when the observer is present and the standby and the primary are synchronized and inhibits state changes during failover. The database systems and the observer have copies of failover configuration state and the techniques include techniques for propagating the most recent version of the state among the databases and the observer and techniques for using carefully-ordered writes to ensure that state changes are propagated in a fashion which prevents divergence.

  • Pub Date: 2006/24/11
  • Number: 07734596
  • Details: Visit USPTO

Visit USPTO Page


Automatic failover configuration with lightweight observer

Techniques used in an automatic failover configuration having a primary database system, a standby database system, and an observer for preventing divergence among the primary and standby database systems while increasing the availability of the primary database system. In the automatic failover configuration, the primary database system remains available even in the absence of both the standby and the observer as long as the standby and the observer become absent sequentially. The failover configuration further permits automatic failover only when the observer is present and the standby and the primary are synchronized and inhibits state changes during failover. The database systems and the observer have copies of failover configuration state and the techniques include techniques for propagating the most recent version of the state among the databases and the observer and techniques for using carefully-ordered writes to ensure that state changes are propagated in a fashion which prevents divergence.

  • Pub Date: 2006/24/11
  • Number: 08255369
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Provision of services over a common delivery platform such as a mobile telephony network

A system for providing services to subscribers of a network supports the provision of a plurality of different services to multiple subscribers. Multiple processing units are provided, each providing a respective execution environment for a respective set of software applications. A data structure is provided containing data identifying the sets of software applications or software application components of the sets of software applications, and different developers are provided with different access rights to the data in the data structure. Different software applications or software application components are associated with different access right levels. This provides a software development environment in which a common services repository is provided with different access rights implemented for accessing the repository.

  • Pub Date: 2006/22/11
  • Number: 08375360
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Programmable logic and constraints for a dynamically typed storage system

Embodiments define a set of rules such that a type designer can express as part of a type's definition whether the type has extended the logic and/or constraints of its ancestral types in such a way that applications written against that ancestral type will continue to function correctly. Nonconformity can also be indicated and an embodiment can enforce limitations on a set of operations that can be performed on such instances when treated as their ancestral types. Applications can use standard interfaces to discover from embodiments whether such limitations can be in force for a particular instance and provide a user experience that accounts for those limitations. Embodiments can also provide mechanisms to enable type designers to limit a degree of extensibility for both types and/or Items.

  • Pub Date: 2006/22/11
  • Number: 07801926
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method for determining the number of copies of a chromosome in the genome of a target individual using genetic data from genetically related individuals

A system and method for determining the genetic data for one or a small set of cells, or from fragmentary DNA, where a limited quantity of genetic data is available. Genetic data for the target individual is acquired and amplified using known methods, and poorly measured base pairs, missing alleles and missing regions are reconstructed using expected similarities between the target genome and the genome of genetically related subjects. In accordance with one embodiment of the invention, incomplete genetic data from an embryonic cell is reconstructed using the more complete genetic data from a larger sample of diploid cells from one or both parents, with or without genetic data from haploid cells from one or both parents, and/or genetic data taken from other related individuals. In accordance with another embodiment of the invention, incomplete genetic data from a fetus is acquired from fetal cells, or cell-free fetal DNA isolated from the mother's blood, and the incomplete genetic data is reconstructed using the more complete genetic data from a larger sample diploid cells from one or both parents, with or without genetic data from haploid cells from one or both parents, and/or genetic data taken from other related individuals. In one embodiment, the genetic data can be reconstructed for the purposes of making phenotypic predictions. In another embodiment, the genetic data can be used to detect for aneuploides and uniparental disomy.

  • Pub Date: 2006/22/11
  • Number: 08532930
  • Owner: Natera, Inc.
  • Location: San Carlos, US
  • Details: Visit USPTO

Visit USPTO Page


Method for detecting race conditions involving heap memory access

A method for detecting race conditions involving heap memory access including a plurality of threads being tracked. At runtime a plurality of APIs utilized to create and destroy thread synchronization objects are intercepted, and each synchronization object created via the APIs is tracked. A bit field is created that contains a unique bit for each synchronization object. Heap memory allocations and deallocations are intercepted and tracked. The heap memory access is intercepted, and at that time, the ID of the accessing thread is compared with the last thread ID associated with that memory block when it was last accessed. If the thread IDs do not match, then the current thread synchronization object bit field is compared with the last synchronization object bit field associated with thread memory block. Provided the bit fields are different, a race condition warning is reported that is displayable to the user having the call chains.

  • Pub Date: 2006/22/11
  • Number: 07992146
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Silicon-germanium hydrides and methods for making and using same

The present invention provides novel silicon-germanium hydride compounds, methods for their synthesis, methods for their deposition, and semiconductor structures made using the novel compounds.

  • Pub Date: 2006/21/11
  • Number: 08216537
  • Owner: Arizona Board of Regents
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


N-way synchronization of computer databases

A method and system for N-way synchronization of computer databases. Synchronization of computer databases is structured into three rounds, namely an agenda round, a query round and a report round. In the agenda round, a synchronization agent software module inquires of a common synchronization engine for updates to the agent's database and provides information as to the level of information in the agent's database. During a query round, a common synchronization engine may request information from databases with new information and distribute that database information to databases needing the new information during a report round. Multiple agents, each representing an associated database may participate a synchronization. In addition, various special purpose agents may also receive, provide and otherwise operate on synchronization information.

  • Pub Date: 2006/21/11
  • Number: 07792794
  • Owner: PalmSource Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for user interface customization

Embodiments of the present invention comprise systems and methods for user interface customization.

  • Pub Date: 2006/21/11
  • Number: 07978618
  • Owner: Sharp Laboratories of America, Inc.
  • Location: Camas, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for providing access to vehicle electronic systems

One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.

  • Pub Date: 2006/21/11
  • Number: 08041477
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for interfacing external systems with vehicle electronic systems

One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.

  • Pub Date: 2006/21/11
  • Number: 07809673
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for accessing vehicle electronic systems

One embodiment is directed to providing access between external systems and embedded vehicle electronic systems. That is, an interface module may receive information from a system external to the vehicle, determine an embedded system of the vehicle to which to provide the information, and provide the information to the embedded system. Similarly, the interface module may receive information a embedded electronic systems of a vehicle, determine a system external the vehicle to which to provide the information, and provide the information to the external system.

  • Pub Date: 2006/21/11
  • Number: 07894952
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


Automation of keyboard accessibility testing

A computer program product and method for testing software applications for keyboard accessibility call for generating a first test script from a first input stream; identifying key signals associated with keys of a test keyboard; associating the key signals to the first input-stream to generate a second test script; and running the second test script to test the keyboard accessibility.

  • Pub Date: 2006/21/11
  • Number: 07840948
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems for development and/or use of telephone user interface

Some embodiments provide a touch-sensitive device to receive a bias and to generate touch location information based on the bias, an element to secure a printed medium in contact with the touch sensitive device, the printed medium to depict a plurality of telephone interface controls, a memory to store a telephone interface layout associating one or more of the telephone interface controls with a respective touch location and a respective action, and a processor to receive touch location information from the touch-sensitive device, to determine a telephone interface control based on the touch location information and on the telephone interface layout, to determine an action based on the telephone interface control and on the telephone interface layout, and to perform the determined action.

  • Pub Date: 2006/20/11
  • Number: 08510666
  • Owner: Siemens Enterprise Communications GmbH & Co. KG
  • Location: Munich, DE
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for verifying invocations of interfaces

A verification system, method and computer program product are provided. In one embodiment, one of a plurality of call instruction formats is selected. In addition, it is verified whether an invocation of an interface was attempted by code utilizing the selected call instruction format. Further, the selection and the verification are repeated for each of the plurality of call instruction formats. In another embodiment, a return target address is identified. Still yet, it is determined whether return of contra to the return target address would result in invocation a one of a plurality of interfaces.

  • Pub Date: 2006/20/11
  • Number: 07987451
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Single virtual client for multiple client access and equivalency

A single virtual image of client information centrally located at an always-on network location for maintaining equivalency among multiple user devices. The image can be accessed by the user devices when coming online to upload and receive changes in the client information. A mid-tier system can be employed as the always-on central location with which the user client machines can communicate to maintain the same set of client information. Services in support thereof include an ownership service for dynamic selection of a designated client machine to take ownership for performing the actions on one client machine and arbitration of duplicate requests, a notification service for allowing data sources to publish cache update instructions to a central place, a roaming service for allowing clients machines to share state with each other, and an encryption service for secure storage and communications of client information.

  • Pub Date: 2006/20/11
  • Number: 07921189
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Information encoded in an expression

Embodiments provide a method, and a device A device includes a writing element operable to form a mark on a surface corresponding to a movement of the writing element over the surface. The device also includes a controller operable to digitally encode information in the mark.

  • Pub Date: 2006/20/11
  • Number: 07813597
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Decoding digital information included in a hand-formed expression

Embodiments include a method, a manual device, a handheld manual device, a handheld writing device, a system, and an apparatus. An embodiment provides a device. The device includes an imaging circuit operable to acquire digital information encoded in a hand-formed analog expression marked on a surface by a handheld writing device. The device also includes a translator circuit operable to decode the digital information. The device further includes a correlation circuit operable to generate a signal indicative of the decoded digital information.

  • Pub Date: 2006/20/11
  • Number: 07873243
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Contextual information encoded in a formed expression

Embodiments include a method, a manual device, a handheld manual device, a handheld writing device, a system, and an apparatus. An embodiment provides a manual device operable in a context. The manual device includes a writing element operable to form a mark on a surface in response to a movement of the writing element with respect to the surface. The manual device also includes a controller operable to encode information corresponding to the context of the manual device by regulating the formation of the mark.

  • Pub Date: 2006/20/11
  • Number: 07809215
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method for managing application context

An apparatus and method for managing application context is provided. A first one of a plurality of terminals, each including at least one application, collects and transmits context information of the application to a migration server so that it is stored and managed in the migration server. The migration server transmits the stored and managed context information to a second terminal corresponding to the first terminal in response to a request of the second terminal. The second terminal restores context based on the context information received from the migration server. This can reproduce the same application and desktop environments as those previously set to be suitable for each work situation, thereby increasing user convenience.

  • Pub Date: 2006/20/11
  • Number: 07664786
  • Owner: Electronics and Telecommunications Research Institute
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


System and method for replacing code

Computer-implemented methods, computer program products and data processing systems for transmitting a target code module to a server that is executing a computer program capable of using the target code module, and for obtaining the target code module at the server. The target code module is encapsulated in a base language code module, and the base language code module is transmitted to the server. The server receives the base language code module having the target code module encapsulated therein, and extracts the target code module from the base language code module.

  • Pub Date: 2006/17/11
  • Number: 08645938
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for asynchronous continuous-level-of-detail texture mapping for large-scale terrain rendering

A multi-resolution texture mapping system suitable for large scale terrain rendering using commodity graphics processing units (GPU). The GPU vertex and fragment shaders are used to implement the clip-mapping functionality. The terrain texture is represented by a combination of a mip-map and a multi-level clip-map having independent origins and off-set values. The independent clip-map levels may be independently updated. The offset values allow the origins to be associated with a reference point in a scene to be rendered. The desired clip-map level to be used to render a particular fragment may be determined using the base 2 logarithm of the maximum screen-space derivative of the source texture required by the terrain geometry to be drawn. If the desired clip-map level is non-integer and lies between two clip-map levels, appropriate texel data is created by interpolating between the bounding clip-map levels. This interpolation allows a multi-resolution texture mapping to be displayed.

  • Pub Date: 2006/17/11
  • Number: 07626591
  • Owner: D & S Consultants, Inc.
  • Location: Eatontown, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses for providing a hardware accelerated web engine

Methods and apparatuses for providing hardware acceleration of a web browser are disclosed. In one embodiment, a method of operating a web browser on a computer system includes analyzing a data stream having a plurality of fragments. The method further includes determining what fragments of the data stream should be rendered for storage into separate backing stores. The method further includes rendering the fragments into raster images intended for hardware acceleration. The method further includes storing the raster images in the backing stores located in a graphics processing unit.

  • Pub Date: 2006/17/11
  • Number: 08234392
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Maltweb multi-axis viewing interface and higher level scoping

A method, apparatus and computer program product for navigating in a multi-dimensional space containing an electronic publication formed from predefined portions of text-based data encoded using a markup language are disclosed. A selected predefined portion is displayed in a first display region. A point on a primary axis of the multi-dimensional space corresponding to the displayed pre-defined portion is also displayed. Also, a method, apparatus and computer program product for publishing an electronic publication formed from predefined portions of text-based data encoded using a markup language are also disclosed. Predefined portions are stored in terminal nodes. Higher level nodes are provided for organising the terminal nodes into an hierarchical structure embodied in said electronic publication. Each higher level node contains the identity of a parent node, a position indicator for the higher level node and an associated identifier.

  • Pub Date: 2006/17/11
  • Number: 08386484
  • Owner: TimeBase Pty Limited
  • Location: Sydney, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Hierarchy-aware role-based access control

A method, apparatus, and system are described herein, in which system resources and operations are assigned to roles in a role-based access control system, and the roles are assigned to a plurality of users. An RBAC system is used to resolve the client request to perform an operation on a resource, the RBAC system using a hierarchy of the plurality of resources to determine if a user is permitted to perform the operation on a parent of the resource in the hierarchy of resources. The RBAC system also determines if a user is permitted to perform the operation on the resource if a user group to which the user belongs to has the required access.

  • Pub Date: 2006/17/11
  • Number: 08402514
  • Owner: Network Appliance, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible controls for a content data repository

An extensible control interface is provided to simplify access to the content management repository. Developers can write extension interfaces associated with new data types, where the extension interfaces extend the extensible control and are annotated with the control extension annotation. These new interfaces can specify the repository name and declare various methods annotated with annotations. Parameters of the various methods can also be annotated to supply needed information. Using an annotation process tool (APT), the developer can generate the bean and implementation classes and the methods can subsequently be called upon to perform operations on types in the repository. For example, the extensible control can take care of interacting with the type manager to perform the needed actions within the repository in order to create the new object classes and nodes. Object classes can be created on the first call, while node instances upon each call of the create method.

  • Pub Date: 2006/17/11
  • Number: 07805459
  • Owner: BEA Systems, Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Differentiated management of wireless connectivity

In some embodiments, a wireless management service provides the capability to manage connectivity between a device and one or more wireless networks on a differentiated basis. For example, network profiles may be managed in a way that is influenced by the identity of the user, such that profiles which are customized for a specific user may be established. Connectivity may also be managed in a way that is influenced by a session type ongoing on a device, such that when certain events occur (e.g., a request by one user to connect to or disconnect from a wireless network is processed), wireless connectivity employed by other users sharing the device is appropriately managed.

  • Pub Date: 2006/17/11
  • Number: 08793304
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Composite material

The carbon fibrous structure comprises (a) carbon fibrous structures each of which comprises a three dimensional network of carbon fibers, each of the carbon fibers having an outside diameter of 15-100 nm, wherein the carbon fibrous structure further comprises a granular part, at which the carbon fibers are bound in a state that the carbon fibers are extended outwardly therefrom, and wherein the granular part is produced in a growth process of the carbon fibers, and (b) an material other than the carbon fibrous structures, wherein the amount of carbon fibrous structures added is more than 30% and not more than 100% by weight of the total weight of the composite.

  • Pub Date: 2006/17/11
  • Number: 07955699
  • Owner: Hodogaya Chemical Co., Ltd
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Architecture for operational support system

A network management system for management of a communications network is disclosed. The system comprises an inventory database storing a network inventory comprising information representative of network resources of the communications network. The system comprises means for receiving a change request specifying a modification to be made to the network, and an inventory update component adapted to modify the network inventory in response to the change request. The system also includes an implementation component adapted to access the inventory database, identify modifications made to the network inventory, and transmit configuration data to the network to implement the inventory modifications in the network.

  • Pub Date: 2006/17/11
  • Number: 09660868
  • Owner: Amdocs Development Limited
  • Location: Limassol, CY
  • Details: Visit USPTO

Visit USPTO Page


Architecture for operational support system

A network management system for management of a communications network is disclosed. The system comprises an inventory database storing a network inventory comprising information representative of network resources of the communications network. The system comprises means for receiving a change request specifying a modification to be made to the network, and an inventory update component adapted to modify the network inventory in response to the change request. The system also includes an implementation component adapted to access the inventory database, identify modifications made to the network inventory, and transmit configuration data to the network to implement the inventory modifications in the network.

  • Pub Date: 2006/17/11
  • Number: 09660868
  • Owner: Amdocs Development Limited
  • Location: Limassol, CY
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of distributing content and receiving selected content based on user personalization information

Apparatus and methods include the distribution of a plurality of content, at least one of which is tagged with descriptive metadata. Further, the apparatus and methods include selecting content from the plurality of content based on a match between a personalized content preference descriptor stored on the device and the tagged content. Thus, the selected content represents content likely to be applicable or relevant, and/or of interest, to the user associated with the personalized content preference descriptor.

  • Pub Date: 2006/17/11
  • Number: 08856331
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Unified mobile platform

The present invention teaches a variety of systems, platforms, applications, and methods, and relates to mobile platforms, embedded native applications, Java virtual machines, user interfaces, and the like. The present invention discloses a mobile platform which unifies the worlds of the Java virtual machine and native applications to provide a unified and consistent environment for multitasking both Java and native applications within a mobile device.

  • Pub Date: 2006/16/11
  • Number: 08490070
  • Owner: Myriad Group AG
  • Location: Dubendorf, CH
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for constructing relationship specifications from component interactions

Techniques for automatically creating at least one relationship specification are provided. For example, one computer-implemented technique includes observing at least one interaction between two or more components of at least one distributed computing system, consolidating the at least one interaction into at least one interaction pattern, and using the at least one interaction pattern to create at least one relationship specification, wherein the at least one relationship specification is useable for managing the at least one distributed computing system.

  • Pub Date: 2006/16/11
  • Number: 08037471
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for provisioning a mobile wireless communications device to display account or device-specific characteristics

A system of provisioning a mobile wireless communications device to display account or device specific characteristics includes a database for storing a plurality of display characteristics for different wireless carriers, electronic mail (email) service providers, device types, and source mailbox mail domains. A configuration module accesses the database and uploads the display characteristics of at least one of the wireless carrier, email service provider, device type, or source mailbox mail domain to the mobile wireless communications device upon provisioning of the mobile wireless communications device to access email from a remote location.

  • Pub Date: 2006/16/11
  • Number: 08494492
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Speckle interference laser tracking

An optical tracking system is disclosed that provides more precise tracking and better performance in an optical mouse. It involves provides a collimated laser, and imaging a reflection of the collimated laser, such that the reflection has a substantially linear phase gradient. The reflection of the laser includes a pattern of speckles due to optical interference effects. The speckles are imaged such that the substantially linear phase gradient restricts any variation in intensity of the imaging of the speckles during a translating motion of the reflection, thereby providing superior tracking performance.

  • Pub Date: 2006/16/11
  • Number: 08089465
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Reflexometry and hormone function

A method including measuring time periods in which a reflex point of a subject is struck and a reflex response is observed. A method including determining a resting metabolic rate of a subject by applying the Kail-Waters equation. An apparatus including a striking instrument capable of delivering a kinetic energy to a reflex point of a subject; and a measurement instrument capable of being coupled to a subject and measuring a reflex response. A machine-readable storage medium containing executable program instructions which when executed cause a digital processing system to perform a method including determining time periods in which a reflex point is struck and a reflex response is observed. A machine-readable storage medium containing executable program instructions which when executed cause a digital processing system to perform a method including determining a resting metabolic rate of a subject by applying the Kail-Waters equation.

  • Pub Date: 2006/16/11
  • Number: 07708699
  • Owner: DAAG International, Inc.
  • Location: Scottsdale, US
  • Details: Visit USPTO

Visit USPTO Page


Rail synthetic vision system

A synthetic image is produced which will be viewed by an operator of a train to provide the operator with important information indicative of the environment to be encountered by the train during subsequent movement of the train. This information includes information about upcoming track and highway crossings. The synthetic image may be utilized during all periods of operation of the train but will be particularly desirable during night and during periods of bad weather, such as rain, snow and fog, when normal vision is limited. The system utilizes accurate measurement of the location of the train, accurate knowledge of the path of the track and accurate knowledge of placement of track and highway crossings. Automated horn soundings, or monitoring of manual operator activations, significantly enhance safety at such track and highway crossings.

  • Pub Date: 2006/16/11
  • Number: 08150568
  • Details: Visit USPTO

Visit USPTO Page


Programmable 3D graphics pipeline for multimedia applications

A programmable graphics pipeline and method for processing multiple partitioned multimedia data, such as graphics data, image data, video data, or audio data. A preferred embodiment of the programmable graphics pipeline includes an instruction cache, a register file, and a vector functional unit that perform partitioned instructions. In addition, an enhanced rasterization unit is used to generate inverse-mapped source coordinates in addition to destination output coordinates for graphics and other media processing. An enhanced texture address unit generates corresponding memory addresses of source texture data for graphics processing and source media data for media processing. Data retrieved from memory are stored in an enhanced texture cache for use by the vector functional unit. A vector output unit includes a blending unit for graphics data and an output buffer for wide media data.

  • Pub Date: 2006/16/11
  • Number: 07777749
  • Owner: University of Washington
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for selectively copying data files to networked storage and devices for initiating the same

A data backup system comprises a USB flash drive that includes an emulation component and a flash memory. The emulation component is configured to represent the flash memory as if it were an auto-launch device. Accordingly, a data source, such as a personal computer, will interact with the flash memory as if it were the auto-launch device. As some operating systems are configured to recognize auto-launch devices upon connection and automatically execute applications stored thereon, merely connecting the USB flash drive to a data source running such an operating system will cause a backup application stored by the flash memory to automatically execute on the data source. Here, the backup application is configured to selectively back up data files from the data source to a networked storage such as a server of a commercial service provider.

  • Pub Date: 2006/16/11
  • Number: 07702830
  • Owner: Storage Appliance Corporation
  • Location: Richmond Hill, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatuses for organizing events

Techniques for organizing events via an electronic organizer are described herein. In one embodiment, an example of a process includes, but is not limited to, dynamically accessing a first event organization system over a network to retrieve a first event data representing one or more events scheduled by the first event organization system, and presenting the first event data in a second event organization system as if the first event data is scheduled by the second event organization system, wherein the first and second event organization systems are incompatible. Other methods and apparatuses are also described.

  • Pub Date: 2006/16/11
  • Number: 2095252
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Furoxan compounds, compositions and methods of use

The invention provides novel furoxan compounds, or pharmaceutically acceptable salts thereof, and novel compositions comprising at least one compound, and, optionally, at least one nitric oxide enhancing compound and/or at least one therapeutic agent. The compounds and compositions of the invention can also be bound to a matrix. The invention also provides methods for (a) treating cardiovascular diseases; (b) inhibiting platelet aggregation and platelet adhesion caused by the exposure of blood to a medical device; (c) treating pathological conditions resulting from abnormal cell proliferation; (d) treating transplantation rejections, (e) treating autoimmune, inflammatory, proliferative, hyperproliferative or vascular diseases; (f) reducing scar tissue or for inhibiting wound contraction; (g) treating diseases resulting from oxidative stress; (h) treating endothelial dysfunctions; and (j) treating diseases caused by endothelial dysfunctions.

  • Pub Date: 2006/16/11
  • Number: 07838023
  • Owner: NitroMed, Inc.
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Extending keyword searching to syntactically and semantically annotated data

Methods and systems for extending keyword searching techniques to syntactically and semantically annotated data are provided. Example embodiments provide a Syntactic Query Engine (“SQE”) that parses, indexes, and stores a data set as an enhanced document index with document terms as well as information pertaining to the grammatical roles of the terms and ontological and other semantic information. In one embodiment, the enhanced document index is a form of term-clause index, that indexes terms and syntactic and semantic annotations at the clause level. The enhanced document index permits the use of a traditional keyword search engine to process relationship queries as well as to process standard document level keyword searches.

  • Pub Date: 2006/16/11
  • Number: 08856096
  • Owner: VCVC III LLC
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic channel assignment and connectivity maintenance in wireless networks

Dynamic channel assignment and connectivity maintenance in wireless networks may involve switching channels while maintaining connectivity in wireless ad hoc networks. In a described implementation, a wireless network may be separated into two or more respective virtual wireless networks with respective wireless node subsets operating on respective channels. Connectivity may nevertheless be maintained when a wireless node on one channel is to send a communication to another wireless node on another wireless channel. In another described implementation, monitored network information may be shared among wireless nodes by broadcast.

  • Pub Date: 2006/16/11
  • Number: 07680089
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Constructing change plans from component interactions

Techniques for constructing change plans from one or more component interactions are provided. For example, one computer-implemented technique includes observing at least one interaction between two or more components of at least one distributed computing system, consolidating the at least one interaction into at least one interaction pattern, and using the at least one interaction pattern to construct at least one change plan, wherein the at least one change plan is useable for managing the at least one distributed computing system. In another computer-implemented technique, a partial order of two or more changes is determined from at least one component interaction in at least one distributed computing system, the partial order of two or more changes is automatically transformed into at least one ordered task, wherein the at least one ordered task is linked by at least one temporal ordering constraint, and the at least one ordered task is used to generate at least one change plan useable for managing the distributed computing system is generated, wherein the change plan is based on at least one requested change.

  • Pub Date: 2006/16/11
  • Number: 08229778
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Voice operated, matrix-connected, artificially intelligent address book system

An online address book system having sufficient hardware and software to operate an address book user interface and to perform intelligent interpretations of voice and text inputs from users. The system includes at least one server software module that includes software to perform a plurality of functions. These include the ability to receive voice input data and separate user voice queries, wherein the software can arrange the data so as to create a data base that includes at least three access dimensions, including contact access, contact-relationship access and contact-time frame access, and so as to create a connectivity matrix based on a plurality of contact pair relationships applying connective recognition logic. The system provides a voice operated user interface that permits access to address book stored data based on user input selected from the group consisting of contact, a contact-relationship pair, a contact-time frame pair, and combinations thereof.

  • Pub Date: 2006/15/11
  • Number: 07958151
  • Owner: Constad Transfer, LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for dynamically binding service component implementations for specific unit test cases

The present invention enables a component under test to bind to a single component, that is capable of simulating most depended upon services, including the details of their interface, whether or not they return explicit results or cause side effects, and regardless of the state of their implementation. This invention includes features that allow for dynamic reconfiguration to meet the needs of both manual and automated testing, including the ability to control normal and exceptional results, as well as features to support both unit and integration testing.

  • Pub Date: 2006/15/11
  • Number: 07996816
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Load balancing a data storage system

An apparatus and method for automatically load balancing one or more workload groups to a set of available physical resources of a data storage system, and generating a layout planning recommendation of the set of available physical resources that supports the one or more workload groups based on the load balancing.

  • Pub Date: 2006/15/11
  • Number: 07669029
  • Owner: Network Appliance, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Crush resistant latex topcoat composition for fiber cement substrates

A coated fiber cement article in the form of an unattached fiber cement board substrate having a first major surface at least a portion of which is covered with a crush resistant final topcoat composition comprising a multistage latex polymer, and a method for making a crush resistant coated fiber cement article by coating a fiber cement board substrate with such a composition and stacking the coated boards.

  • Pub Date: 2006/15/11
  • Number: 08202578
  • Owner: Valspar Sourcing, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Console integrated downloadable game service

A user interface screen is displayed on a gaming device that provides both a first selectable item that indicates the ability to download games to the gaming device and a second selectable item that indicates the ability to view games that are stored on at least one storage device in the gaming device. The user interface is associated with the gaming device instead of with an individual application.

  • Pub Date: 2006/15/11
  • Number: 08142282
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session

A method for making a hypermedium page interactive, the hypermedium page displayed by a network browser, includes the step of selecting a hyperlink on the hypermedium page displayed on a client machine, the hyperlink identifying a desired computing resource. A hyperlink configuration file is retrieved, the hyperlink configuration file corresponding to the hyperlink and identifying a server machine. A client agent is started on the client machine. The client agent creates, via a terminal services session, a communication link to a virtual machine executing on the server identified by the hyperlink configuration file, the virtual machine executed by a hypervisor executing in the terminal services session provided by an operating system executing on the server. The client agent receives data from the virtual machine and displays, on the client machine, the received data without intervention by the network browser.

  • Pub Date: 2006/14/11
  • Number: 08355407
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed testing for computing features

A new method is provided for using distributed computing for computing process testing. The method includes distributing a feature testing tool, computing feature builds, and data sets to client computing systems. The feature testing tool is run on the client computing systems during times when the client computing system is not otherwise in active use. The feature testing tool prompts the computing feature build to process the data sets, and collects results from the processing of the data set, including any erroneous results. The results from processing the data sets on the client computing systems are provided to a managing computing system. The managing computing system may try to reproduce the erroneous results on other client computing systems with alternate hardware-software configurations, to send erroneous results to an investigation queue to isolate their cause, and to report useful information on the erroneous results to developers working on the computing feature.

  • Pub Date: 2006/14/11
  • Number: 07823138
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration based hierarchical product selection and product e-commerce agent management

A method for hierarchical product selection and purchasing from a server. The method includes accessing a plurality of products from a plurality of component subareas, wherein the products are for an assembly of a computer system, and wherein each of the component subareas have corresponding compatibility constraints with respect to other component subareas. A hierarchical presentation of the products is generated, wherein the presentation proceeds from a parent product out of the plurality of products to a child product out of the plurality of products. The hierarchical presentation of the products are provided to a client computer system via a Web browser hosted on the client computer system, wherein the presentation is configured to show child component subareas that satisfy compatibility restraints with parent component subareas. An order for the at least one product is accepted and implemented with a corresponding e-commerce agent for the product.

  • Pub Date: 2006/14/11
  • Number: 08762214
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Computer system to generate financial analysis output

An electronic system, the system for selling fixed income instruments, the system including a second computer having an output device and at least one buyer's computer having an electrically coupled input device and a monitor, the buyer's computer and the second computer being respectively located, the computers being used in cooperation in a multiple computer system in electronically communicating data between the computers.

  • Pub Date: 2006/14/11
  • Number: 07908202
  • Owner: Graff/Ross Holdings, LLP
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Architecture of gateway between a home network and an external network

A Home Gateway (HGW) interconnects a Home Network (HN) and an External Network (EN), and is adapted to communicate with the HN and EN at a Network layer. HGW is provided with a Service Application Programming Interface Layer (SAPI Layer) capable of performing, at an Application layer, mediator functions for supporting communication and services between the HN and EN. Devices of the HN are able to communicate with devices of EN via the HGW, and to actualize services via the HGW.

  • Pub Date: 2006/14/11
  • Number: 08391299
  • Owner: ECI Telecom Ltd.
  • Location: Petach-Tikva, IL
  • Details: Visit USPTO

Visit USPTO Page


3D graphics API extension for a shared exponent image format

A three dimensional (3D) graphics application programming interface (API) extension provides support for specifying images in a shared exponent format. The shared exponent format is used to represent high dynamic range textures in a compact encoding to reduce the memory footprint needed to store the image data compared with other high dynamic range formats. Image data is encoded to and decoded from the shared exponent format using a pixel processing pipeline. Image data encoded into the shared exponent format can be decoded and used as texture data during rendering.

  • Pub Date: 2006/14/11
  • Number: 08432410
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Simplified search interface for querying a relational database

Methods and computer-readable media are provided for performing a search on a relational database. According to one method, a query class is provided that includes properties that specify how a query is to be performed and how results from the query are to be returned, and an execute method that is called to perform the actual query. A keyword query class derived from the query class is also provided that includes keyword query properties and an execute method for performing the keyword query. In order to perform a keyword query of an SQL database, an instance of the keyword query class is created, the properties set on the instance, and the execute method called. When the execute method is called, the specified properties are translated into an equivalent SQL statement and the search is performed on the identified relational database by a search service.

  • Pub Date: 2006/13/11
  • Number: 07548912
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Selective communication of targeted information

Described is a technology by which by which information (an electronic note from a producer) that is available for delivery to a client consumer is only selectively delivered. The selective delivery may be based on metadata associated with the information, client identity data and other criteria, including a location of a client device. The information to selectively deliver may be obtained from an external information source, or generated by a service, such as when the user is near a location of interest. The client may report location changes, such as a rate corresponding to a rate of location change of the client. An information service scale to any practical number of clients via client state servers and location (of interest) servers, with each client state server associated with a set of one or more clients, and each location server associated with a set of one or more regions.

  • Pub Date: 2006/13/11
  • Number: 07890576
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Secondary pools

Methods and apparatus for generating a secondary pool of data are disclosed. A primary pool of data is obtained or identified, where the primary pool of data includes a primary seed and one or more generations of data, wherein each of the generations of data in the primary pool of data includes one or more data blocks that have changed with reference to a safeset corresponding to a previous backup, the safeset corresponding to the previous backup including (e.g., referencing) the primary seed. A secondary pool of data is generated and at least a portion of the data in the primary pool of data is transferred to the secondary pool of data.

  • Pub Date: 2006/13/11
  • Number: 08069321
  • Owner: i365 Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Refreshing a page validation token

Methods and computer-readable media are provided for refreshing a page validation token. In response to a request for a form from a client, a server responds with the requested form, a page validation token, and a page token refresh program. The client executes the page token refresh program in response to a request to post the contents of the form to the server computer. The page token refresh program determines whether a preset period of time has elapsed since server computer generated the page validation token. If the period of time has not elapsed, the form is posted to the server with the page validation token and processed by the server computer. If the page timeout has elapsed, the page token refresh program refreshes the page validation token prior to posting the form by requesting an updated page validation token from the server.

  • Pub Date: 2006/13/11
  • Number: 08424073
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Log collection, structuring and processing

The present invention generally relates to log message processing such that events can be detected and alarms can be generated. For example, log messages are generated by a variety of network platforms (e.g., Windows servers, Linux servers, UNIX servers, databases, workstations, etc.). Often, relatively large numbers of logs are generated from these platforms in different formats. A log manager described herein collects such log data using various protocols (e.g., Syslog, SNMP, SMTP, etc.) to determine events. That is, the log manager may communicate with the network platforms using appropriate protocols to collect log messages therefrom. The log manager may then determine events (e.g., unauthorized access, logins, etc.) from the log data and transfer the events to an event manager. The event manager may analyze the events and determine whether alarms should be generated therefrom.

  • Pub Date: 2006/13/11
  • Number: 2054043
  • Owner: LogRhythm, Inc.
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Japanese virtual dictionary

Methods for converting a source character string to a target character string are described herein. In one aspect of the invention, an exemplary method includes receiving a first character string having the source character string, dividing the first character string into a plurality of sub-strings, converting the plurality of the sub-strings to second character strings through a dictionary, creating third character strings corresponding to the plurality of the sub-strings, analyzing the second and third character strings, constructing fourth character strings from the second and third character strings based on the analysis, creating a candidate list based on the fourth character strings, selecting the target character string from the candidate list and outputting the target character string. Other methods and apparatuses are also described.

  • Pub Date: 2006/13/11
  • Number: 07630880
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Communicating arbitrary data in a concurrent computing environment

A communication protocol is provided for processes to send and receive arbitrary data in a concurrent computing environment. The communication protocol enables a process to send or receive arbitrary data without a user or programmer specifying the attributes of the arbitrary data. The communication protocol automatically determines the attributes of the arbitrary data, for example, the type and/or size of the data and sends information on the attributes of the data to a process to which the data is to be sent. Based on the information on the attributes of the data, the receiving process can allocate appropriate memory space for the data to be received.

  • Pub Date: 2006/13/11
  • Number: 08745254
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for reducing power consumption and/or radio frequency interference in a mobile computing device

Various embodiments for reducing power consumption and radio frequency (RF) interference in a mobile computing device are described. In one or more embodiments, the mobile computing device may support cellular voice communication, wireless wide area network (WWAN) data communication, and wireless local area network (WLAN) data communication. The mobile computing device may be arranged to disable WWAN data communication whenever an available WLAN is detected to reduce RF interference and/or power consumption. Other embodiments are described and claimed.

  • Pub Date: 2006/13/11
  • Number: 09265003
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Self-configurable radio receiver system and method for use with signals without prior knowledge of signal defining characteristics

A method, radio receiver, and system to autonomously receive and decode a plurality of signals having a variety of signal types without a priori knowledge of the defining characteristics of the signals is disclosed. The radio receiver is capable of receiving a signal of an unknown signal type and, by estimating one or more defining characteristics of the signal, determine the type of signal. The estimated defining characteristic(s) is/are utilized to enable the receiver to determine other defining characteristics. This in turn, enables the receiver, through multiple iterations, to make a maximum-likelihood (ML) estimate for each of the defining characteristics. After the type of signal is determined by its defining characteristics, the receiver selects an appropriate decoder from a plurality of decoders to decode the signal.

  • Pub Date: 2006/10/11
  • Number: 08358723
  • Owner: The United States of America as Represented by the Administrator of the National Aeronautics and Space Administration
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Scalable, high performance and highly available distributed storage system for Internet content

A method for content storage on behalf of participating content providers begins by having a given content provider identify content for storage. The content provider then uploads the content to a given storage site selected from a set of storage sites. Following upload, the content is replicated from the given storage site to at least one other storage site in the set. Upon request from a given entity, a given storage site from which the given entity may retrieve the content is then identified. The content is then downloaded from the identified given storage site to the given entity. In an illustrative embodiment, the given entity is an edge server of a content delivery network (CDN).

  • Pub Date: 2006/10/11
  • Number: 07624169
  • Owner: Akamai Technologies, Inc.
  • Location: Cambridge, US
  • Details: Visit USPTO

Visit USPTO Page


Peer-to-peer aided live video sharing system

Video data from an upload client is received at a hosting node. A request from a download client is received at a bootstrapping node to receive the video data. The download client to receive the video data directly from the hosting node when the hosting node is below a threshold, wherein the threshold is based at least in part on the maximum number of download clients the hosting node can stream to simultaneously. The download client to receive the video data from peers in a peer-to-peer overlay when the hosting node above the threshold.

  • Pub Date: 2006/10/11
  • Number: 07733808
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Network integrated data compression system

A data compression system enables user-level applications to compress and decompress files to save storage space even for user-level applications that are not modified to use compressed files. User preferences associated with a user terminal are established for the compression of data, e.g. video data, wherein the user preferences comprise selective enablement of compression for at least one file type. An exemplary system determines the type of a digital data file, e.g. a digital video data file, being output from an application or input to an application, and performs transparent file-type-based compression or decompression of the digital data file, if enabled by the established user preferences. Files of the selected file types are stored with compressed formats and may even have different names, but are shown to user-level applications to have the same file names and file sizes as original uncompressed files. Therefore, the existing applications can perform operations without any disruptions. The transparent compression can be implemented within a variety of dedicated and/or distributed network configurations, as well as on a single workstation.

  • Pub Date: 2006/10/11
  • Number: 07394408
  • Owner: Zaxel Systems, Inc.
  • Location: Los Altos Hills, US
  • Details: Visit USPTO

Visit USPTO Page


Structural capacitors and components thereof

A structural capacitor includes at least one pair of electrodes comprising a positive electrode and a negative electrode, with a body of dielectric material disposed therebetween. The combination of the electrodes and dielectric has a stiffness which can be between 10 1000 GPa, and in some instances between 50 MPa-100 GPa. Failure strength of the combination can be between 1 MPa-10 GPa, and in specific instances between 10 MPa-1 GPa. The capacitor may include a plurality of electrode pairs. The dielectric may include a reinforcing material therein, and the capacitors may be configured in a variety of shapes so as to function as structural elements for articles of construction.

  • Pub Date: 2006/09/11
  • Number: 07864505
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Silicon nanoparticle photovoltaic devices

A photovoltaic device for converting light into electrical power includes a film () of silicon nanoparticles. The silicon nanoparticle film, which can be a multilayer film, has a photoluminescence response and couples light and or electricity into semiconductor layers. A particular example photovoltaic device of the invention include a solar cell that accepts and converts light of a predetermined wavelength range into electrical power. A film containing luminescent silicon nanoparticles is optically coupled to the solar cell. The film has a predetermined thickness. The film responds to incident radiation and produces light or electron response in the predetermined wavelength range that is optically coupled into the solar cell. In preferred embodiments, the film is additionally or alternatively electrically coupled to the solar cell, which produces charge response that is electrically coupled into the solar cell.

  • Pub Date: 2006/09/11
  • Number: 09263600
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Record media written with data structure for recognizing a user and method for recognizing a user

The present invention relates to a record media written with a data structure used in recognizing specific users in hardware such as a robot, etc., a method for recognizing a user by using a data structure written in the record media, and a user identification database access method for the user identification software component application programming interface (API) and an error handling method in the user identification software component API. Among the user identification elements, in particular, the present invention relates to a method for building a database of image data for the user's clothes, and a performance evaluation of a vision-based recognizer, which is means for recognizing the user's image information for the clothes.

  • Pub Date: 2006/09/11
  • Number: 07890522
  • Owner: LG Electronics Inc.
  • Location: Seoul, KR
  • Details: Visit USPTO

Visit USPTO Page


Display management for communication devices with multiple displays

Within a communication device having a plurality of displays, a method of controlling the displays can include, responsive to receiving an event from an application within a display manager, determining whether a single event or multiple events are pending (). If a single event is pending, the method can include instructing the application to write data corresponding to the received event to a primary display of the communication device (). The display manager can write data corresponding to the received event to a secondary display (). If multiple events are pending, the method can include preventing the application from writing data to the primary display (). The display manager can write data corresponding to the multiple events to the primary display and the secondary display without involvement of the application (). The display manager further can launch a specific application in response to an event ().

  • Pub Date: 2006/09/11
  • Number: 08108782
  • Owner: Motorola Mobility, Inc.
  • Location: Libertyville, US
  • Details: Visit USPTO

Visit USPTO Page


Video controlled virtual talk groups

In one particular embodiment, surveillance information is determined from a surveillance system. The surveillance information provides information on an event being monitored by the surveillance system. It is determined if a virtual talk group should be created for the event. If so, the virtual talk group is created such that a plurality of users in the virtual talk group can communicate with each other in the virtual talk group.

  • Pub Date: 2006/08/11
  • Number: 09041797
  • Owner: CISCO TECHNOLOGY, INC.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for synchronizing data

Systems and methods are disclosed for presenting a media stream to user next adjacent to text and other content via a graphical user interface. The graphical user interface allows allowing the user to select part of the content and associate it with a specified portion of the media stream. The a graphical user interface that displays and renders a media stream, such as a video stream, to a user in a first display area. Near the first display area is a second display area displaying content, such as text, to be associated with some portion of the media stream. The interface allows a user to select some of the content in the second display area with a pointing device. The selection also identifies a portion of the media stream based on what is being rendered as the selection is made and how the selection is made.

  • Pub Date: 2006/08/11
  • Number: 07900145
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method to efficiently use the disk space while unarchiving

A computer implemented method, data processing system, and computer program product for efficiently using disk space when unarchiving files in the same file system. An archive file is read to identify a total number of data files in the archive file. The number of headers in the archive file is determined based on the total number of data files. A location in a first disk space of a largest data file in the archive file is determined from an offset in a header corresponding to the largest data file. The largest data file is then copied from the first disk space to a second disk space. The first disk space occupied by the largest data file is then released by truncating the archive file. The obtaining, copying, and releasing steps are repeated for each data file in the archive file until all of the data files are unarchived.

  • Pub Date: 2006/08/11
  • Number: 08275750
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Evaluation of incremental backup copies for presence of malicious codes in computer systems

In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.

  • Pub Date: 2006/08/11
  • Number: 07962956
  • Owner: Trend Micro Incorporated
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Various methods and apparatuses for moving thumbnails

Various methods, apparatuses, and systems are described for a moving thumbnail generator. The moving thumbnail generator generates one or more moving thumbnails that are visually and aurally representative of the content that takes place in an associated original video file. Each of the moving thumbnails has two or more moving frames derived from its associated original video file. Each moving thumbnail is stored with a relational link back to the original video file in order so that the moving thumbnail can be used as a linkage back to the original video file.

  • Pub Date: 2006/07/11
  • Number: 08078603
  • Owner: Blinkx UK Ltd
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Timing aspects of media content rendering

Timing for execution of certain user inputs and application instructions occurring during play of an interactive multimedia presentation is discussed. A current state is defined by a state of the presentation system at the time a current media sample is being played to a user. A predicted state is defined by a state of the presentation system one or more future play times. Examples of current and predicted states include media retrieval states and media presentation states. An instruction or user input that is based on the current state is identified, and the predicted state is used to determine an effect of the instruction or input. The effect may then be executed at a predetermined time, such as after the next playable media sample is played to the user.

  • Pub Date: 2006/07/11
  • Number: 07861150
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Shortcut IP communications between software entities in a single operating system

A method, computer program product, and data processing system for performing efficient communication between software entities residing in the same operating system using conventional network communications APIs are disclosed. According to a preferred embodiment, when a software entity (e.g., a process) attempts to communicate through a networking API, the operating system determines whether the other end of the communication refers to the same hardware node. If so, the operating system replaces the network protocol connection (socket connection) with a direct interprocess communication construct. The operating system provides additional code to simulate the appearance of an actual network (socket) connection at the API level while performing all actual I/O using the interprocess communication construct.

  • Pub Date: 2006/07/11
  • Number: 08056089
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Network service performance monitoring apparatus and methods

Network service performance monitoring apparatus and methods are disclosed. Performance information associated with a network service is collected from multiple service monitoring points. The service monitoring points include at least a service monitoring point in a first communication network and a service monitoring second communication network that is controlled independently of the first communication network. The first communication network could be a network in which a service provider system that provides the network service is located, and the second communication network could be a communication network through which the network service is accessible by a network service consumer. In this case, the collected performance information may be integrated to create an inter-network view of performance of the service. Historical performance information associated with a network service may be used to establish a performance baseline for the service.

  • Pub Date: 2006/07/11
  • Number: 07865584
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for managing configuration information in a distributed computer system

A configuration manager federated bean is provided for each host computer in the three-tiered management system. The configuration manager federated bean for a host computer is contacted by federated beans that manage each of the data services when a data service starts and stops using a data storage volume associated with the host computer. The configuration manager bean maintains persistent configuration information for each data service. In one embodiment, configuration manager beans can operate in a clustered environment where several beans store configuration information in a single storage area. Each of the beans implements an arbitration protocol so that only one bean writes to the storage area at any given time.

  • Pub Date: 2006/07/11
  • Number: 2022241
  • Owner: Sun Microsystems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Isolated and fixed micro and nano structures and methods thereof

Discrete micro and nanoscale particles are formed in predetermined shapes and sizes and predetermined size dispersions. The particles can also be attached to a film to form arrays of particles on a film. The particles are formed from molding techniques that can include high throughput and continuous particle molding.

  • Pub Date: 2006/07/11
  • Number: 09040090
  • Owner: The University of North Carolina at Chapel Hill
  • Location: Chapel Hill, US
  • Details: Visit USPTO

Visit USPTO Page


HIV protease inhibitors

Compounds useful for inhibiting HIV protease are disclosed. Methods of making the compounds, and their use as therapeutic agents, for example, in treating wild-type HIV and of multidrug-resistant strains of HIV, also are disclosed.

  • Pub Date: 2006/07/11
  • Number: 07897635
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Remote direct memory access (RDMA) completion

An apparatus in an example comprises an RDMA (Remote Direct Memory Access) network adapter located at an interface of a requester node coherency domain that sends an RDMA read request to a responder node coherency domain to flush into the responder node coherency domain data previously sent by the RDMA network adapter.

  • Pub Date: 2006/06/11
  • Number: 08244825
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


RDMA QP simplex switchless connection

A local RDMA (Remote Direct Memory Access) network adapter that comprises a simplex switchless connection with a counterpart QP on a remote RDMA network adapter in an example is selected for a Queue Pair (QP). An apparatus in an example comprises a requester RDMA (Remote Direct Memory Access) session fail-over coordinator on a coherency domain that adds a session fail-over header to a front of a data payload sent by an RDMA computer program from the coherency domain. Upon termination, of an RDMA adapter not coherent with the coherency domain and in a communication path of the data payload, before delivery to the RDMA computer program of a receive completion notification for the data payload, the session fail-over header is employable by a responder RDMA session fail-over coordinator to reconstruct the receive completion notification.

  • Pub Date: 2006/06/11
  • Number: 08233380
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring and collection of audio events

Various embodiments of the invention provide a facility for monitoring audio events on a computer, including without limitation voice conversations (which often are carried on a digital transport platform, such as VoIP and/or other technologies). In a set of embodiments, a system intercepts the audio streams that flow into and out of an application program on a monitored client computer, for instance by inserting an audio stream capture program between a monitored application and the function calls in the audio driver libraries used by the application program to handle the audio streams. In some cases, this intercept does not disrupt the normal operation of the application. Optionally, the audio stream capture program takes the input and output audio streams and passes them through audio mixer and audio compression programs to yield a condensed recording of the original conversation.

  • Pub Date: 2006/06/11
  • Number: 08463612
  • Owner: Raytheon Company
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer products for download status notification

Methods, systems, and computer products for download notification including identifying content for download, requesting a download of the content to a device and requesting a notification related to the status of the download.

  • Pub Date: 2006/06/11
  • Number: 08484335
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for trusted application centric QoS provisioning

A security agent extends the trust barrier, or trust point, from network gateway nodes to end user devices. A security agent operable to scrutinize network traffic executes on the user device and compares QoS marking attempts with the established QoS marking policy in effect. The security agent examines network traffic attributes deterministic of connection attempts by user processes. Attempts to apply inappropriate or disallowed QoS markings, as dictated by the QoS marking policy, are detected and disallowed. Therefore, only user connections consistent with the QoS marking policy are permitted into the network. Network admission control (NAC) mechanisms ensure that the security agent is the only access point from the user device to the secure network, and the security agent communicates the establishment of the trusted access point to the network gateway, thus ensuring that the network gateway may trust service level designations emanating from the user device executing the security agent.

  • Pub Date: 2006/06/11
  • Number: 07774498
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Influenza vaccines extemporaneously adsorbed to aluminium adjuvants

Antigen and adjuvant components of an adjuvanted influenza vaccine are not mixed during manufacture, but are provided as separate components for extemporaneous mixing at the time of use, for example as a kit comprising (i) an antigen component, comprising an influenza virus antigen; and (ii) an adjuvant component, comprising an aluminium salt.

  • Pub Date: 2006/06/11
  • Number: 07959931
  • Owner: Novartis AG
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Emergency recording during VoIP session

A method and apparatus are provided for recording a call between a client and an agent through an automatic contact distributor. The method includes the steps of the automatic contact distributor receiving a recording request from the agent, the automatic contact distributor activating a recording program, the recording program sniffing traffic within a packet telephone of the agent to detect packets exchanged between the agent and client and the recording program recording the detected packets between the agent and customer.

  • Pub Date: 2006/06/11
  • Number: 08351593
  • Owner: Aspect Software, Inc.
  • Location: Lombard, US
  • Details: Visit USPTO

Visit USPTO Page


Clipboard augmentation

Systems, methods, and data structures for augmenting data placed on the clipboard with additional data are disclosed. Such systems, methods, and data structures may transform the data to produce data in other formats using, for example, transform specifications or executable code.

  • Pub Date: 2006/06/11
  • Number: 08020112
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using computer graphics techniques to gather histogram data

A mechanism for gathering information from one or more detectors to aid in a determination of a current location of one or more entities is provided. Embodiments of the present invention perform these tasks by plotting data provided by the detectors onto a grid corresponding to a geographical area monitored by the detectors and then analyzing the plot for overlapping results using graphical techniques. Where measurements overlap, data associated with those measurements is provided to an analysis module to predict location and velocity of the entities. Aspects of the present invention provide an initial prediction of location and/or velocity of an entity in order to reduce convergence time of the analysis module.

  • Pub Date: 2006/03/11
  • Number: 07629981
  • Owner: Overwatch Systems Ltd.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Proactive rebooting in a set-top terminal and corresponding methods

A set-top terminal and related methods is provided that, in one embodiment, comprises a memory with proactive reboot logic and a processor configured with the proactive reboot logic to detect an indication of a critical condition associated with the set-top terminal, determine based on a current status of resources in the set-top terminal if a current time provides an opportunity for a reboot of the set-top terminal in a manner that reduces user intrusiveness, and effect a rebooting of the set-top terminal if the current time provides the opportunity, otherwise postponing the reboot.

  • Pub Date: 2006/03/11
  • Number: 07681028
  • Owner: Scientific-Atlanta, LLC
  • Location: Lawrenceville, US
  • Details: Visit USPTO

Visit USPTO Page


Network-based system for rerouting phone calls from phone networks to VoIP clients for roamers and subscribers who do not answer

A system, method, computer product and service are provided which, when a subscriber's VoIP client is online and the subscriber's non-VoIP wireless or fixed line number is called, will automatically route the call over IP to the subscriber's VoIP client. This routing may be performed by the subscriber's wireless or fixed line home operator and can be conditioned to depend on whether the non-VoIP number is roaming or not answering.

  • Pub Date: 2006/03/11
  • Number: 08478277
  • Owner: Roamware Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for fast closed-loop rate adaptation in a high rate packet data transmission

In a high data rate communication system capable of variable rate transmission, an open loop rate control can be adjusted with a closed loop rate control to maximize throughput. An access point generates interleaved multi-slot packets that allow an access terminal to transmit indicator messages to the access point in accordance with recently received data carried within slots of the multi-slot packets.

  • Pub Date: 2006/03/11
  • Number: 08498308
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for creating an offline service-oriented architecture based application from an online service-oriented architecture based application

Disclosed is a method and apparatus for automatically creating an offline enterprise application from an online enterprise application by importing the data from the online enterprise application to an offline system, including importing user interface (UI) metadata, enterprise services repository (ESR) data and application data from the online enterprise application and generating the UI and enterprise services from the imported UI metadata and ESR data respectively. The created offline enterprise application switches automatically between offline mode and online mode.

  • Pub Date: 2006/03/11
  • Number: 07908584
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Line rasterization techniques

A line rasterization technique in accordance with one embodiment includes conditioning a line by pulling in the ending vertex of the line or pushing out the starting vertex of the line. Thereafter, if the line exits a diamond test area of each pixel that it touches, the pixel may be lit.

  • Pub Date: 2006/03/11
  • Number: 08482567
  • Owner: Nvidia Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Inkjet cartridge with ink reservoir core and releasable housing

A print roll unit includes an elongate ink reservoir core defining a plurality of ink chambers which each extend along the core. The chambers are isolated to store respective inks. A roll of print media includes a tubular former in which the core can be received and a length of print media which is wound upon the former. A housing includes a pair of molded covers which can be fastened together in a releasable manner to house the roll of print media. The core includes an elongate part defining the ink chambers and a rubber sealing cap which can be engaged with an end of the molded part to seal the ink chambers.

  • Pub Date: 2006/03/11
  • Number: 1968539
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Electronic securities marketplace having integration with order management systems

An electronic trading marketplace (ETM) communicates with interfacing modules interfacing directly with order management systems (OMS's) at trading institutions. The interfacing modules automatically transmit orders from the OMS databases to the ETM and update the OMS databases in response to orders executed at the ETM. Traders can communicate with the ETM to anonymously negotiate trades of securities.

  • Pub Date: 2006/03/11
  • Number: 2084685
  • Owner: Liquidnet Holdings, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically controlling operation of a BRAS device based on encapsulation information

A technique controls operation of a BRAS device. The technique involves extracting encapsulation information from a communications exchange between a CPE device and an external server device (e.g., a DHCP server). The communications exchange passes through the BRAS device and a DSLAM device. The technique further involves storing the encapsulation information in local memory of the BRAS device, and controlling a flow of a downstream communication passing through the BRAS device and the DSLAM device toward the CPE device based on the encapsulation information stored in the local memory of the BRAS device. Accordingly, the BRAS device is well suited for performing ATM overhead accounting as well as shaping and policing downstream traffic.

  • Pub Date: 2006/03/11
  • Number: 07821941
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Tools for health and wellness

A tool for providing health and/or wellness services is described herein. Not necessarily clean or unclean data about a plurality of self-selected or non-selected or unselected subjects is received. The data can be aggregated and mined at least in part by employing a statistical algorithm, a data-mining algorithm and/or a machine-learning algorithm. The data can be further employed to provide health and/or wellness services to participants.

  • Pub Date: 2006/02/11
  • Number: 07647285
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing hard and soft lock state information in a distributed storage system environment

A system and method manages lock state information in a storage system. A meta-data volume node includes a lock state database which is a comprehensive source for lock state information about data containers in the system. A plurality of data volume nodes include local lock caches, which contain information about locks. Lock state messaging between the meta-data volume node and the data volume nodes is used to assign locks and to update local lock caches. The meta-data volume node is configured to determine whether input/output requests should be allowed or denied and to instruct the data volume nodes of this input/output operation result. Lock information is also sent to the data volume nodes for storage in local lock state caches to the extent the data volume nodes have the network capacity locally.

  • Pub Date: 2006/02/11
  • Number: 07730258
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Reverse name mappings in restricted namespace environments

A silo-specific view of the file system is provided to processes running in the silo. Processes can access a file only by uttering the silo-relative name. To determine if access to a file identified by a file ID should be permitted, a list of physical names of the file identified by the file ID is constructed. If a silo-relative name that translates to a name in the list can be uttered, the file is opened and the file ID for the opened file is retrieved. If the file IDs match, the silo-relative name is used to open the file. If a process running within a silo requests a list of names for a file that has been opened using a file ID, results returned are filtered so that only names visible in the silo are returned, thus restricting the process' access to files to those files within its hierarchical namespace.

  • Pub Date: 2006/02/11
  • Number: 07769779
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method for displaying and formatting messages in web applications using JavaServer Faces

Methods, machine-accessible media, and systems for displaying and formatting messages in web applications using JavaServer Faces (JSF). A JSF FacesMessage is intercepted before the FacesMessage is sent to a JSP page for display. The FacesMessage may be intercepted by a phase listener monitoring the JSF phases to obtain information from the message. The method may also be extended to handle application-specific messages. A managed bean receives the message information and creates a JSP page segment that provides formatting to the information. The newly created JSP page segment is then displayed in the JSP page instead of the FacesMessage. Preferably, the formatting within the JSP page segment includes additional content selected from a message icon, a message identification code, an additional message segment, and combinations thereof. Furthermore, the JSP page segment may optionally provide advanced features, such as clickable image links for additional information or help.

  • Pub Date: 2006/02/11
  • Number: 07895607
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed hypermedia method and system for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document

A system allowing a user of a browser program on a computer connected to an open distributed hypermedia system to access and execute an embedded program object. The program object is embedded into a hypermedia document much like data objects. The user may select the program object from the screen. Once selected the program object executes on the user's (client) computer or may execute on a remote server or additional remote computers in a distributed processing arrangement. After launching the program object, the user is able to interact with the object as the invention provides for ongoing interprocess communication between the application object (program) and the browser program. One application of the embedded program object allows a user to view large and complex multi-dimensional objects from within the browser's window. The user can manipulate a control panel to change the viewpoint used to view the image. The invention allows a program to execute on a remote server or other computers to calculate the viewing transformations and send frame data to the client computer thus providing the user of the client computer with interactive features and allowing the user to have access to greater computing power than may be available at the user's client computer.

  • Pub Date: 2006/02/11
  • Number: 08082293
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Separating control and data operations to support secured data transfers

For a data transfer, security is negotiated via a control channel operating in accordance with a first protocol. The data is transmitted responsive to the security negotiation on a data channel operating in accordance with a second protocol. For example, a described implementation involves using a security control protocol and a separate secure data transfer protocol that operate cooperatively, but independently, to provide flexible application layer security with highly efficient data transfers.

  • Pub Date: 2006/01/11
  • Number: 08687804
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Securing distributed application information delivery

In an example implementation, a data structure comports with a secure application instruction protocol. The data structure includes a first application-level request and a second application-level request. The first application-level request has application-specific instructions from a requestor and a requestor signature over the application-specific instructions from the requestor. The second application-level request has application-specific instructions from an intermediary and an intermediary signature over at least the application-specific instructions from the intermediary.

  • Pub Date: 2006/01/11
  • Number: 08555335
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Searching and route mapping based on a social network, location, and time

A device, system, and method are directed towards providing location information from a social network. A GPS coordinate and a search criterion are received from a client device associated with a member of a social network. The social network is searched for another member associated with a location name based on the GPS coordinate and the search criterion. The location name may be a sponsored advertisement. The location name is provided to the client device. A communication may be enabled between the member and the other member. Moreover, a start and end location may also be received. The GPS coordinate and/or search criterion may be associated with either the start or end location. The searched location name is used to determine a location of interest. A route is determined between the start and end location and through the location of interest. The route is provided to the client device.

  • Pub Date: 2006/01/11
  • Number: 08108501
  • Owner: YAHOO! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Mutation in the rat adenomatous polyposis coli gene within the human mutation hotspot region

A rat with a disrupted Apc (adenomatous polyposis coli) gene is provided. The mutation can include an A to T transversion changing a lysine to a stop codon at codon 1137. Methods of generating the knockout rat are provided. Also provided is the offspring or progeny of that rat. In addition, methods of using these rats are provided, including methods for screening a carcinogen or a promoter of carcinogenesis, and methods for screening preventive and inhibitory agents of carcinogenesis.

  • Pub Date: 2006/01/11
  • Number: 07897834
  • Owner: Wisconsin Alumni Research Foundation
  • Location: Madison, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for premises content distribution

Apparatus and methods for protected content access, browsing and transfer over a network. In one embodiment, the network comprises a premises (e.g., residential) LAN, and the apparatus comprises a server and renderer consumer premise equipment (CPE). The renderer CPE scans the network to search for a server CPE that implement a compatible security framework. The renderer authenticates itself with the server, and the server allows content browsing and selection access only to an authorized and authenticated renderer. A negotiation and exchange protocol comprises messages exchanged between the renderer and the server that include one or more of device identification, encryption key exchange, digital certificates and information regarding security package used by each CPE.

  • Pub Date: 2006/01/11
  • Number: 08732854
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Maintaining screen and form state in portlets

A portlet state maintenance system can include a portal page setup component configured to generate a logical form in a single portal page from a multiplicity of forms defined within portlet markup aggregated into the single portal page. A portal state save component further can be configured to save state values for selected portlets defined within the logical form. Finally, a portal state restore component can be configured to restore the saved state values in refreshed portlet markup for the selected portlets. Notably, a refresh timing component further can be configured to embed submit auto-initiation logic in the single portal page responsive to identifying a dynamic refresh requirement associated with the portlet markup in the single portal page. Finally, a portlet markup cache can be coupled to the portal state restore component.

  • Pub Date: 2006/01/11
  • Number: 2093121
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Determining mobile content for a social network based on location and time

A device, system, and method are directed towards updating location information for a social network. A request for the location information associated with a GPS coordinate is received from a client device associated with a member of the social network. In response to the request, a location name associated with another member of the social network is provided to the client device based on the GPS coordinate. Another location name may be received from the client device. The other location name may be associated with the GPS coordinate and with the member in the social network. Thus, the GPS coordinate and/or member may be associated with a plurality of location names. A location description may also be received and associated with the location name and with the member in the social network.

  • Pub Date: 2006/01/11
  • Number: 07917154
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Architecture for a system and method for work and revenue management

There is disclosed a system and method for processing requests over an architecture. The architecture may utilize logical partitioning to distribute work load across multiple logical servers in an efficient manager. The system may comprise a router, a directory, at least one logical server, and a wallet server. The router may receive a request from a consumer via the consumer's device and extract a value from the request that identifies the consumer. The router may access the directory, which may contain a map that matches consumers with logical servers, to determine which logical server to forward the request to. The router may then pass the request to the determined logical server. The logical server may process the request by utilizing both generic and network or market specific plug-in processing. If the logical server determines that it does not have the necessary resources or loans to complete a request, then it may communicate with the wallet server to obtain additional loans of wallets containing usage resource. The logical server may generate a reply to the router for audit and transaction assurance, to generate an optional acknowledgement to the system generating the external request.

  • Pub Date: 2006/01/11
  • Number: 08918506
  • Owner: Netcracker Technology Solutions Inc.
  • Location: Cincinnati, US
  • Details: Visit USPTO

Visit USPTO Page


Analysis and selection of optimal function implementations in massively parallel computer

An apparatus, program product and method optimize the operation of a parallel computer system by, in part, collecting performance data for a set of implementations of a function capable of being executed on the parallel computer system based upon the execution of the set of implementations under varying input parameters in a plurality of input dimensions. The collected performance data may be used to generate selection program code that is configured to call selected implementations of the function in response to a call to the function under varying input parameters. The collected performance data may be used to perform more detailed analysis to ascertain the comparative performance of the set of implementations of the function under the varying input parameters.

  • Pub Date: 2006/01/11
  • Number: 07954095
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for modification of access expiration conditions

Techniques for modification of access expiration conditions are presented. A principal supplies a password associated with establishing access to a target resource. In response to the password, characteristics of the password are examined and a custom expiration condition is generated for the password in response to the characteristics and policy. When the custom expiration condition is satisfied, the password and access to the target resource become invalid for use. Moreover, the principal may interactively change a complexity level of any proposed password for purposes of attempting to enhance the expiration condition or for purposes of attempting to degrade the expiration condition.

  • Pub Date: 2006/31/10
  • Number: 08607303
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Remote device management in a home automation data transfer system

An automation network includes automation network devices connected to the network and a system layer interface that interfaces with a transport layer and an application layer of the home automation network. The system layer interface includes command libraries configured to upgrade a remote network device. The automation network queries the network devices to determine if there are lost network devices or newly added network devices. The automation network may update a new remote device with scene information related to any lost network devices.

  • Pub Date: 2006/31/10
  • Number: 07694005
  • Owner: Intermatic Incorporated
  • Location: Spring Grove, US
  • Details: Visit USPTO

Visit USPTO Page


Printer and printing system

A printer calculates the amount of ink used only for printing as a number of discharged ink shots, and sends this shot count with the printer serial number and ink cartridge ID to a server . The server saves the shot count, printer serial number, ink cartridge ID, and an error correction code as status information. The server or server upstream from the server can reliably determine the number of ink shots used by the printer only for printing from this status information.

  • Pub Date: 2006/31/10
  • Number: 07950766
  • Owner: Seiko Epson Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Multiple-level graphics processing system and method

A multiple-level graphics processing system and method (e.g., of an operating system) for providing improved graphics output including, for example, smooth animation. One such multiple-level graphics processing system comprises two components, including a tick-on-demand or slow-tick high-level component, and a fast-tick (e.g., at the graphics hardware frame refresh rate) low-level component. In general, the high-level, less frequent component performs computationally intensive aspects of updating animation parameters and traversing scene data structures, in order to pass simplified data structures to the low-level component. The low-level component operates at a higher frequency, such as the frame refresh rate of the graphics subsystem, to process the data structures into constant output data for the graphics subsystem. The low-level processing includes interpolating any parameter intervals as necessary to obtain instantaneous values to render the scene for each frame of animation.

  • Pub Date: 2006/31/10
  • Number: 07705851
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for runtime environment emulation

A method for runtime environment emulation involves loading an application class of an object-oriented application, where the object-oriented application is executing in a runtime environment, and where the application class includes a method call that is unsupported by the runtime environment. The method further involves translating, during loading of the application class, the unsupported method call into one or more method calls that are supported by the runtime environment, to obtain a translated class, where the one or more supported method calls emulate the unsupported method call.

  • Pub Date: 2006/31/10
  • Number: 09183011
  • Owner: Oracle America Inc.
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing and monitoring virtual storage servers of a hosting storage server

A storage management application is provided to manage and monitor virtual storage servers in a hosting storage server. In addition, in order to facilitate virtual storage server management and monitoring, a virtual storage server administrator role is provided. The role is allowed to access details of the virtual storage server assigned to the role, but not the details of the hosting server and other virtual servers.

  • Pub Date: 2006/31/10
  • Number: 07970851
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Grid network management via automatic trend analysis of a service level agreement

A method for managing a GRID network. The method includes performing trend analysis of a job type repeatedly processed by the GRID network to anticipate a future load on the GRID network associated with the job type. The job type is associated with a service level agreement (SLA). At least one internal performance metric of the GRID network is measured to monitor current GRID network status. The future load that is anticipated is compared with the at least one performance metric to predict future satisfaction of the SLA.

  • Pub Date: 2006/31/10
  • Number: 07672923
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Email message creation

In a method of operating a wireless handheld device, upon receipt of a user request to compose an email, an email composition screen is displayed with a field indicating an email service to be used. Then, upon a user request launched from this email composition screen, a list of all available email services is displayed.

  • Pub Date: 2006/31/10
  • Number: 08762464
  • Owner: BlackBerry Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Bicyclists' water bottle with bottom drinking valve

Apparatus for dispensing water or other liquids to a bicyclist while riding. Invention provides a means for dispensing fluids from its bottom end so as to eliminate the need for inverting. Contents of the bottle are gravity-dispensed so as to eliminate repeated squeezing of bottle to discharge contents. Invention incorporates functional ergonomic elements including recesses for better handhold, concave sections and extended sections to provide a close conformity to a bicyclist's face to both preserve the aerodynamics of the bicyclist and for maintaining adequate clearance for breathing, while drinking from the invention. Invention is compatible with prior art carriage and retention systems.

  • Pub Date: 2006/31/10
  • Number: 08317058
  • Owner: The United States of America as represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Application updating in a home automation data transfer system

An automation network includes automation network devices connected to the network and a system level interface that interfaces with a transport layer and an application layer of the automation network. A method is disclosed that programs an automation network device in communication with an automation network, where the automation network includes an access point coupled with an external network. The method includes receiving application upgrade data at the access point, where the application upgrade data includes upgrade data associated with a target automation network device in communication with the automation network. Application upgrade data is transmitted through the home to the target automation network device. A next application upgrade data packet to be transmitted across the automation network is requested from the target automation network device. An application stored in the target automation network device is programmed, using an application upgrade data command transmitted to the target home automation network device.

  • Pub Date: 2006/31/10
  • Number: 2048233
  • Owner: Intermatic Incorporated
  • Location: Spring Grove, US
  • Details: Visit USPTO

Visit USPTO Page


User interface for a handheld device

A user interface and method for composing a message to be sent over a wireless network environment using a handheld device is disclosed. According to the method, upon receipt of a user request to compose a message, a screen is displayed with a recipient field for a recipient address, an associated label to indicate that the recipient field is for a recipient address, and a message body field for holding message content. The method further includes, upon each keystroke entry of text to the recipient field, looking up entries from an address book which match the text, and displaying a selection menu representing addresses from at least a portion of the entries.

  • Pub Date: 2006/30/10
  • Number: 08037142
  • Owner: Research In Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Remote feature activation authentication file system

A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file system operable to (a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and wherein the first and second sets of operations are different; (b) generate an authentication file containing the second set of authentication information; and (c) transmit the authentication file to the computational system.

  • Pub Date: 2006/30/10
  • Number: 07913301
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of treating cancer with doxazolidine and prodrugs thereof

The invention provides therapeutically effective compounds for the prevention and treatment of cancer and pharmaceutical compositions containing these compounds as well as methods of using and administering these compounds. The invention also includes methods of activating a prodrug of these therapeutically effective compounds by the administration of a peptide-directed targeting construct that delivers a prodrug-activating enzyme to a target activation site.

  • Pub Date: 2006/30/10
  • Number: 08404650
  • Owner: The Regents of the University of Colorado, a body corporate
  • Location: Denver, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic updating of firewall parameters

The dynamic updating of firewall parameters is described. One exemplary embodiment includes receiving a policy rule that includes a reference to a predefined container that specifies a permissible value range of at least one firewall parameter allowable under the policy rule, receiving a firewall parameter value, and populating the predefined container with the firewall parameter value if the firewall parameter value is within the permissible value range, thereby updating the policy rule.

  • Pub Date: 2006/30/10
  • Number: 08099774
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic database memory management policies

A database engine is provided with memory management policies to dynamically configure an area of memory called a buffer pool into which data pages are held during processing. The data pages are also buffered as an I/O (input/output) stream when read and written to a persistent storage medium, such as a hard disk, through use of a system file cache that is managed by the computer's operating system. The memory management policies implement capping the amount of memory used within the buffer pool to minimize the number of data pages that are double-buffered (i.e., held in both the buffer pool and system file cache). In addition, trimming data pages from the buffer pool, after the database engine completes all pending operations and requests, frees additional memory and further minimizes the number of processes associated with the database.

  • Pub Date: 2006/30/10
  • Number: 07840752
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Virtualization for diversified tamper resistance

A computer-implementable method includes providing an instruction set architecture that comprises features to generate diverse copies of a program, using the instruction set architecture to generate diverse copies of a program and providing a virtual machine for execution of one of the diverse copies of the program. Various exemplary methods, devices, systems, etc., use virtualization for diversifying code and/or virtual machines to thereby enhance software security.

  • Pub Date: 2006/27/10
  • Number: 08584109
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Upflow bioreactor having a septum and an auger and drive assembly

An upflow bioreactor includes a vessel having an inlet and an outlet configured for upflow operation. A septum is positioned within the vessel and defines a lower chamber and an upper chamber. The septum includes an aperture that provides fluid communication between the upper chamber and lower chamber. The bioreactor also includes an auger positioned in the aperture of the septum. The vessel includes an opening in the top for receiving the auger. The auger extends from a drive housing, which is position over the opening and provides a seal around the opening. The drive housing is adjustable relative to the vessel. The position of the auger in the aperture can be adjusted by adjusting the drive housing relative to the vessel. The auger adjustment mechanism allows the auger to be accurately positioned within the aperture. The drive housing can also include a fluid to provide an additional seal around the shaft of the auger.

  • Pub Date: 2006/27/10
  • Number: 07290669
  • Owner: Utah State University
  • Location: North Logan, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for dynamically identifying, selecting and extracting graphical and media objects in frames or scenes rendered by a software application

A technique is described herein for dynamically enhancing and measuring a software application without having to change and recompile the original application code. A system includes a staging environment that monitors the application and indexes items of graphical and/or audio information into a first database. A second database is then populated with business rules that are associated with the objects indexed. The system further includes a run-time environment that identifies items of graphics and/or audio information generated during run-time, and upon determining that an identified item is associated with a business rule, applies the business rule, measures the object and its related attributes and optionally report the data back to a third database. Also described herein are techniques for dynamically measuring attributes of objects rendered and/or referenced by software applications, for dynamically serving advertisements to a computer game, and for pre-processing software applications to identify spots desirable for advertisement placement.

  • Pub Date: 2006/27/10
  • Number: 08629885
  • Owner: Exent Technologies, Ltd.
  • Location: Petach-Tikva, IL
  • Details: Visit USPTO

Visit USPTO Page


Shock wave and power generation using on-chip nanoenergetic material

A method of generating power uses a nanoenergetic material. The nanoenergetic material comprising thermite is obtained and deposited on a substrate. An igniter is placed on the nanoenergetic material. When power is desired, the nanoenergetic material is ignited. A transducer receives thermal, sonic, magnetic, optic and/or mechanical energy from combustion of the nanoenergetic material and converts it into electrical energy. Preferably, the transducer is a thermoelectric, piezoelectric or magneto device. Preferably, multiple transducers are integrated in one power generators to maximize the power from nanoenergetic thermites.

  • Pub Date: 2006/27/10
  • Number: 08066831
  • Owner: The Curators of the University of Missouri
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Rapid heating with nanoenergetic materials

The present process for rapidly heating and cooling a target material without damaging the substrate upon which it has been deposited. More specifically, target material is coated onto a first substrate. A self-propagating nanoenergetic material is selected that combusts at temperatures sufficient to change the target material and creates a flame front that propagates sufficiently quickly that the first substrate is not substantially heated. The nanoenergetic material is deposited on the target material, such that the target material and the nanoenergetic material is sandwiched between the substrate and the target material. The nanoenergetic material is ignited and the flame front of the nanoenergetic material is allowed to propagate over the second substrate and change the target material.

  • Pub Date: 2006/27/10
  • Number: 07879721
  • Owner: The Curators of the University of Missouri
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to provide contact management with directory assistance

Methods and an apparatus for providing contact management with directory assistance. An example method obtains a directory assistance service record associated with a user, wherein the directory assistance service record includes at least a first data object associated with a directory listing and a second data object associated with the user; queries a first directory with the first data object to obtain listing information associated with the directory listing; and stores the obtained listing information in a second directory as one or more contact records associated with the second data object.

  • Pub Date: 2006/27/10
  • Number: 08483381
  • Owner: AT&T Intellectual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for estimating reverse link loading in a wireless communication system

Method and apparatus for estimating reverse link loading in a wireless communication system. The reverse link interference is measured and reverse link receiver noise is measured. The reverse link interference is compared to the reverse link receiver noise, for example, by dividing the interference power by the receiver noise power. The reverse link receiver noise can be measured in an orthogonal frequency division multiple access (OFDMA) system by nulling transmission from access terminals within the cell and nearby during a null time and frequency interval. Power measure in the null time and frequency interval is receiver noise power. The reverse link interference can be measure by several means. For example, local null time and frequency intervals can be designated. The access terminals within the cell null their transmissions during the local time and frequency intervals. Access terminals outside the cell continue to transmit during the local time and frequency intervals. Power measured in the local time and frequency interval is interference power. As another example, interference power can be measured by subtracting pairs of pilot symbols that are contiguous to each other in time or frequency.

  • Pub Date: 2006/27/10
  • Number: 08929908
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Interacting with a computer-based management system

A method, and apparatus, and a software product for implementing a method for interacting with a computer-based management system including authoring and communicating composite data messages, each composite data message comprising both free-text and structured data, such that the structured data represents the intended meaning of the free-text in a form understandable by the computer-based management system. In one version, authoring includes converting free-text to structured data. One version includes communicating the composite message.

  • Pub Date: 2006/27/10
  • Number: 07669138
  • Owner: Liaise, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible network services system

Automatically finding and using network services. An extensible framework is defined which allows any network service, new or old, to be defined. A base schema is defined that defines existing network services, and extension schemes may also be defined which are specific to new network services. A vendor can define the schemas in XML, as well as using software plug-ins and configuration data. The information is stored on a network provider's server. Clients can browse the network providers server for available services. Any available services can be accepted. When this happens, a form is provided to the client; the client fills out the form; and returns it. The information on the form is associated with the XML schemas and used to select and automatically configure the network service.

  • Pub Date: 2006/27/10
  • Number: 07805502
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic validation of test results using componentized software object reflection

A method, apparatus and computer program product for providing automatic validation of test results using componentized software object reflection, is presented. An application is run and at least one resultant data structure is generated from the running of the application. The at least one resultant data structure is converted in to at least one componentized software object. Results are obtained from the at least one componentized software object and the results from the at least one componentized software object are verified.

  • Pub Date: 2006/27/10
  • Number: 07996817
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Arc tool user interface

A combination of arc tool user interface features and operations are provided for efficiently defining an arc tool region of interest in a machine vision inspection system. Multiple distinct types of parameter control features are provide in an arc tool GUI. The distinct types of parameter control features may be distinguished by their relative locations, or by distinct symbols, or the like. One or more of the types of control features may include at least two modes of operation. In one such mode of operation restricted to one type of control feature, a user may change the nominal radius of curvature of the arc tool using a single cursor motion. In another such mode of operation shared by multiple types of control features, a user may rotate the region of interest of the arc tool using a single cursor motion.

  • Pub Date: 2006/27/10
  • Number: 07769222
  • Owner: Mitutoyo Corporation
  • Location: Kawasaki-shi, JP
  • Details: Visit USPTO

Visit USPTO Page


Using commercial share of wallet to make lending decisions

Commercial size of spending wallet (“CSoSW”) is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet (“CSoW”) is the portion of the spending wallet that is captured by a particular financial company. A modeling approach utilizes various data sources to provide outputs that describe a company's spend capacity. Banks and lenders can use CSoW/CSoSW to determine who to lend to and who to deny credit to, as well as for pricing loans and other products in a dynamic way. Banks and lenders can also determine which customers should be retained, as well as identify loans which are likely to default.

  • Pub Date: 2006/26/10
  • Number: 08630929
  • Owner: American Express Travel Related Services Company, Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for designing a free form reflector using genetic algorithm

A system for designing a free form reflector includes a user input interface (), a free form reflector design unit (), and a free form reflector output unit (). The user input interface is configured for receiving various data associated with a desired free form reflector, via an input device. The free form reflector design unit is installed in a computer and configured for generating an optimum free form surface according to the input data by performing a non-uniform rational basis splines (NURBS) algorithm, a merit evaluation function, and a differential evolution (DE) algorithm. The free form reflector output module is configured for generating a free form reflector according to the optimum free form surface and outputting the free form reflector, in the form of a computer-aided design (CAD) drawing, to a display and/or a printer. A related method is also disclosed.

  • Pub Date: 2006/26/10
  • Number: 2084712
  • Owner: Hon Hai Precision Industry Co., Ltd.
  • Location: Tu-Cheng, Taipei Hsien, TW
  • Details: Visit USPTO

Visit USPTO Page


Providing policy-based operating system services in an operating system on a computing system

Methods, apparatus, and products are disclosed for providing policy-based operating system services in an operating system on a computing system. The computing system includes at least one compute node. The compute node includes an operating system that includes a kernel and a plurality of operating system services of a service type. Providing policy-based operating system services in an operating system on a computing system includes establishing, on the compute node, a kernel policy specifying one of the operating system services of the service type for use in the operating system, and accessing, by the kernel, the specified operating system service. The computing system may also be implemented as a distributed computing system that includes one or more operating system service nodes. One or more of the operating system services may be distributed among the operating system service nodes.

  • Pub Date: 2006/26/10
  • Number: 08713582
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing policy-based operating system services in a hypervisor on a computing system

Methods, apparatus, and products are disclosed for providing policy-based operating system services in a hypervisor on a computing system. The computing system includes at least one compute node. The compute node includes an operating system and a hypervisor. The operating system includes a kernel. The hypervisor comprising a kernel proxy and a plurality of operating system services of a service type. Providing policy-based operating system services in a hypervisor on a computing system includes establishing, on the compute node, a kernel policy specifying one of the operating system services of the service type for use by the kernel proxy, and accessing, by the kernel proxy, the specified operating system service. The computing system may also be implemented as a distributed computing system that includes one or more operating system service nodes. One or more of the operating system services may be distributed among the operating system service nodes.

  • Pub Date: 2006/26/10
  • Number: 08032899
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing policy-based application services to an application running on a computing system

Methods, apparatus, products are disclosed for providing policy-based application services to an application running on a computing system. The computing system includes at least one compute node. The compute node includes an application and a plurality of application services of a service type. Providing policy-based application services to an application running on a computing system includes establishing, on the compute node, a service policy specifying one of the application services of the service type for use by the application, establishing a performance ruleset, the performance ruleset specifying rules for analyzing the performance of the computing system, measuring performance of the computing system, and adjusting the service policy in dependence upon the performance ruleset and the measured performance. Providing policy-based application services to an application running on a computing system may also include accessing, by the application, the specified application service.

  • Pub Date: 2006/26/10
  • Number: 08656448
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Non-persistent and persistent information setting method and system for inter-process communication

System, method, architecture, network device, and computer programs and computer program products for inter-process communications. Message structure, procedure for generating the message structure, applications of the message structure and messaging method for obtaining status, statistics, and other information and for performing an information or parameter set operation across one or more process boundaries, and to other device and system architectures and methods for utilizing the messages and messaging methodology.

  • Pub Date: 2006/26/10
  • Number: 08250587
  • Owner: Trapeze Networks, Inc.
  • Location: Pleasanton, US
  • Details: Visit USPTO

Visit USPTO Page


Flag management in processors enabled for speculative execution of micro-operation traces

Managing speculative execution via groups of one or more actions corresponding to atomic traces enables efficient processing of flag-related actions, as atomic traces advantageously enable single checkpoints of flag values at atomic trace boundaries. Checkpointing flags during atomic trace renaming in a processor system uses a flag checkpoint table to store a plurality of flag checkpoints, each corresponding to an atomic trace. The table is selectively accessed to provide flag information to restore speculative flags when an atomic trace is aborted. A corresponding flag checkpoint is stored when an atomic trace is renamed. An action that updates flags updates all entries in the table corresponding to younger atomic traces. If the atomic trace is aborted, then the corresponding flag checkpoint is used for restoration of flag state.

  • Pub Date: 2006/26/10
  • Number: 07587585
  • Owner: Sun Microsystems, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed hypermedia method and system for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document

A system allowing a user of a browser program on a computer connected to an open distributed hypermedia system to access and execute an embedded program object. The program object is embedded into a hypermedia document much like data objects. The user may select the program object from the screen. Once selected the program object executes on the user's (client) computer or may execute on a remote server or additional remote computers in a distributed processing arrangement. After launching the program object, the user is able to interact with the object as the invention provides for ongoing interprocess communication between the application object (program) and the browser program. One application of the embedded program object allows a user to view large and complex multi-dimensional objects from within the browser's window. The user can manipulate a control panel to change the viewpoint used to view the image. The invention allows a program to execute on a remote server or other computers to calculate the viewing transformations and send frame data to the client computer thus providing the user of the client computer with interactive features and allowing the user to have access to greater computing power than may be available at the user's client computer.

  • Pub Date: 2006/26/10
  • Number: 08086662
  • Owner: The Regents of the University of California
  • Location: Oakford, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for accessing a database of serializable objects using field values corresponding to fields of an object marked with the same index value

A converter may be used to convert a serializable object to other file formats. A serializable objects database can be used to store these serializable objects. The serializable object database may be accessed by passing a field value, corresponding to a selected field of the serializable object, to the database. The selected field of the serializable object is marked with an index value. The database is queried using the field value to determine whether any record stored in the database includes the field value in a matching field indicated by the index value. If the query determines that the serializable objects database includes at least one record with the field value in the matching field indicated by the index value, then a plurality of field values are returned to populate a plurality of fields of the serializable object.

  • Pub Date: 2006/25/10
  • Number: 2040150
  • Owner: Zeugma Systems Inc.
  • Location: Richmond, CA
  • Details: Visit USPTO

Visit USPTO Page


Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment

A method for providing access to a computing environment includes the step of receiving a request from a client system for an enumeration of available computing environments. Collected data regarding available computing environments are accessed. Accessed data are transmitted to a client system, the accessed data indicating to the client system each computing environment available to a user of the client system. A request is received from the client system to access one of the computing environments. A connection is established between the client system and a virtual machine hosting the requested computing environment via a terminal services session, the virtual machine executed by a hypervisor executing in the terminal services session provided by an operating system executing on one of a plurality of execution machines.

  • Pub Date: 2006/25/10
  • Number: 08051180
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed database

A technique for storing a plurality of data records in a database. Client processes link to the database to access the data records of the database. Each client process has a specified scope. The scope defines to which of the data records within the database each of the client processes has access.

  • Pub Date: 2006/25/10
  • Number: 07761485
  • Owner: Zeugma Systems Inc.
  • Location: Richmond, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing graphics processing unit shader programs using snippets

Shader programs that execute on graphics processing units (GPUs), such as vertex and pixel shaders may be generated by defining individual shader snippets. Each snippet may represent and/or specifies a particular shader operation. In one embodiment, each snippet may indicate a particular vertex shader operation, a particular pixel (or fragment) shader operation, or both. Various combinations of these snippets may then be combined to create more complex shader programs. A shader snippet framework may be configured to receive information specifying individual snippets, as well as the combinations of snippets representing various shader programs. The framework may define such shader programs using only the identifiers for the various snippets and thus a shader program, as described herein, may not include any actual code, but instead may refer to an ordered list of snippets. At runtime, the snippets are then instantiated and executed to execute the shader program.

  • Pub Date: 2006/24/10
  • Number: 07750913
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Static update controller enablement in a mesh network

In embodiments of the present invention improved capabilities are described for using a primary controller in a mesh network to instruct a static update controller to enable node information server functionality to form a static update controller information server. Capabilities are described for using the static update controller information server to enable other controllers in the mesh network to command other nodes in the mesh network on behalf of the static update controller information server, to distribute an installation process to a plurality of controllers in a mesh network, and the like. The present invention further describes improved capabilities for associating a static update controller with an inclusion controller within a mesh network, associating the inclusion controller with a node slave within the mesh network, transmitting a first data between the static update controller and the inclusion controller, wherein the first data relates at least in part to the node slave, and transmitting a second data between the inclusion controller and the node slave, wherein the second data relates at least in part to the first data transmitted.

  • Pub Date: 2006/24/10
  • Number: 08194569
  • Owner: Sigma Designs, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for determining protein binding specificity using peptide libraries

A method for determining protein binding specificity using a screen of a peptide library is provided. The method can be used to determine binding specificity for human NAD-dependent deacetylase SIRT1, and to identify the most efficiently deacetylated peptide sequences. The method can be also used to screen a combinatorial H4 histone N-terminal tail peptide library to examine the binding preferences of a α-phos (S1) H4 antibody toward all known possible H4 histone modification states.

  • Pub Date: 2006/24/10
  • Number: 08119572
  • Owner: Wisconsin Alumni Research Foundation
  • Location: Madison, US
  • Details: Visit USPTO

Visit USPTO Page


Fuel-cell based power generating system having power conditioning apparatus

A power conditioner includes power converters for supplying power to a load, a set of selection switches corresponding to the power converters for selectively connecting the fuel-cell stack to the power converters, and another set of selection switches corresponding to the power converters for selectively connecting the battery to the power converters. The power conveners output combined power that substantially optimally meets a present demand of the load.

  • Pub Date: 2006/24/10
  • Number: 07808129
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Fast zoom-adaptable anti-aliasing of lines using a graphics processing unit

A method, system, and computer-readable storage medium are disclosed for performing anti-aliasing operations on lines using a graphics processing unit (GPU). Input comprising a plurality of vertices may be received at a GPU. The plurality of vertices may represent one or more line segments. One or more anti-aliased line segments may be generated based on the input. In generating the one or more anti-aliased line segments, the intensity of a first edge and a second edge of each line segment may be modified based on application of an anti-aliasing function. A maximum intensity of a central portion may be maintained for at least one of the line segments, wherein the central portion is between the two edges and is greater than one pixel in thickness.

  • Pub Date: 2006/24/10
  • Number: 07605825
  • Owner: Adobe Systems, Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for securing customer data in a multi-tenant environment

Network security is enhanced in a multi-tenant database network environment using a query plan detection module to continually poll the database system to locate and raise an alert for suspect query plans. Security also can be enhanced using a firewall system sitting between the application servers and the client systems that records user and organization information for each client request received, compares this with information included in a response from an application server, and verifies that the response is being sent to the appropriate user. Security also can be enhanced using a client-side firewall system with logic executing on the client system that verifies whether a response from an application server is being sent to the appropriate user system by comparing user and organization id information stored at the client with similar information in the response.

  • Pub Date: 2006/23/10
  • Number: 08069153
  • Owner: salesforce.com, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Optical film and method for producing the same

An optical film according to the present invention comprises a transparent base, and an anti-reflection layer that is disposed on one main face of the transparent base. The anti-reflection layer includes a hard coating layer, and a low refractive index layer that is disposed on the hard coating layer in this order from the side of the transparent base. The hard coating layer is formed using a resin containing an ionizing radiation setting resin. The hard coating layer contains a conductive metal oxide in an amount of at least 5 wt % and at most 30 wt % with respect to the total weight of the hard coating layer. The hard coating layer is formed using a coating solution containing water in an amount of at least 0.05 wt % and at most 5.0 wt %.

  • Pub Date: 2006/23/10
  • Number: 07871717
  • Owner: Hitachi Maxell, Ltd.
  • Location: Ibaraki-shi, Osaka, JP
  • Details: Visit USPTO

Visit USPTO Page


Methods for performing microfluidic sampling

Methods for performing microfluidic sampling are provided. The method includes providing a substrate including an arrangement of first, second and third electrodes, wherein the second electrode is interposed between the first and third electrodes. The method additionally includes causing a fluid input to continuously flow to the first electrode and biasing the first, second and third electrodes to a first voltage to cause a portion of the fluid input to spread across the second and third electrodes. The method further includes biasing the second electrode to a second voltage different from the first voltage to form a droplet on the third electrode, the droplet being separate from the fluid input.

  • Pub Date: 2006/23/10
  • Number: 07759132
  • Owner: Duke University
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for the electronic provision of services for machines via a data communication link

With this invention, expert knowledge from machine manufacturers is applied quickly at any time to a machine via the Internet, by providing a main computer (host) for the production and provision of machine-related data and/or services and a machine-side working computer (client), which is connected to the main computer via a data communication link and by means of which (client) machine state data can be acquired in real time and transmitted to the main computer, and by means of which machine-related data and/or services generated by the main computer as a function of such machine state data can be received by means of an analysis and evaluation unit.

  • Pub Date: 2006/23/10
  • Number: 07567853
  • Owner: Siemens Aktiengesellschaft
  • Location: Munich, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for improving the transcription accuracy of speech recognition software

A virtual vocabulary database is provided for use with a with a particular user database as part of a speech recognition system. Vocabulary elements within the virtual database are imported from the user database and are tagged to include numerical data corresponding to the historical use of the vocabulary element within the user database. For each speech input, potential vocabulary element matches from the speech recognition system are provided to the virtual database software which creates virtual sub-vocabularies from the criteria according to predefined criteria templates. The software then applies vocabulary element weighting adjustments according to the virtual sub-vocabulary weightings and applies the adjustment to the default weighting provided by the speech recognition system. The modified weightings are returned with the associated vocabulary elements to the speech engine for selection of an appropriate match to the input speech.

  • Pub Date: 2006/23/10
  • Number: 07805299
  • Details: Visit USPTO

Visit USPTO Page


Instantiating an interface or abstract class in application code

Mechanisms for instantiating an interface or abstract class in application code are provided. An object-oriented programming language is extended such that interfaces and abstract classes can be instantiated in application code without a concrete class specified. Metadata is defined which maps each interface or abstract class instantiation in the application code to a concrete class to be used either by the compiler at build time, or the virtual machine at runtime. Once the appropriate concrete class is determined from the metadata, the class is instantiated with a conventional class loader. The metadata may be provided, for example, as a separate file, such as a markup language file, defined with a virtual machine switch, as annotations in the application code, or the like.

  • Pub Date: 2006/23/10
  • Number: 08214811
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for manipulating droplets

Apparatuses for mixing droplets, such as a binary mixing apparatus, are provided. The binary mixing apparatus includes an array of electrodes and a conducting element positioned in relation to at least one of the electrodes to enable a droplet placed in electrical communication with the at least one electrode to electrically communicate with the conducting element. The binary mixing apparatus additionally includes an electrode selector for sequentially biasing one or more selected electrodes of the array to move a droplet disposed on the array into contact with another droplet. The apparatus further includes a first droplet supply area communicating with the array and a second droplet supply area communicating with the array.

  • Pub Date: 2006/23/10
  • Number: 08147668
  • Owner: Duke University
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Varying heating in dawsonite zones in hydrocarbon containing formations

A method for treating an oil shale formation comprising dawsonite includes assessing a dawsonite composition of one or more zones in the formation. Heat from one or more heaters is provided to the formation such that different amounts of heat are provided to zones with different dawsonite compositions. The provided heat is allowed to transfer from the heaters to the formation. Fluids are produced from the formation.

  • Pub Date: 2006/20/10
  • Number: 07556096
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Temperature limited heater with a conduit substantially electrically isolated from the formation

A system for heating a hydrocarbon containing formation is described. A conduit may be located in an opening in the formation. The conduit includes ferromagnetic material. An electrical conductor is positioned inside the conduit, and is electrically coupled to the conduit at or near an end portion of the conduit so that the electrical conductor and the conduit are electrically coupled in series. Electrical current flows in the electrical conductor in a substantially opposite direction to electrical current flow in the conduit during application of electrical current to the system. The flow of electrons is substantially confined to the inside of the conduit by the electromagnetic field generated from electrical current flow in the electrical conductor so that the outside surface of the conduit is at or near substantially zero potential at 25° C. The conduit may generate heat and heat the formation during application of electrical current.

  • Pub Date: 2006/20/10
  • Number: 07559367
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for producing hydrocarbons from tar sands formations

A system for treating a tar sands formation is disclosed. A plurality of heaters are located in the formation. The heaters include at least partially horizontal heating sections at least partially in a hydrocarbon layer of the formation. The heating sections are at least partially arranged in a pattern in the hydrocarbon layer. The heaters are configured to provide heat to the hydrocarbon layer. The provided heat creates a plurality of drainage paths for mobilized fluids. At least two of the drainage paths converge. A production well is located to collect and produce mobilized fluids from at least one of the converged drainage paths in the hydrocarbon layer.

  • Pub Date: 2006/20/10
  • Number: 2024902
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program product for deferring interface monitoring based on whether a library associated with the interface is loaded

An interface monitoring system, method and computer program product are provided. In use, an interface is identified. In addition, monitoring of the interface is deferred based on whether a library associated with the interface is loaded.

  • Pub Date: 2006/20/10
  • Number: 08739188
  • Owner: McAfee, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamically loadable storage device I/O policy modules

Systems, methods, apparatus and software can implement a multipathing driver using dynamically loadable device policy modules that provide device specific functionality for providing at least one of input/output (I/O) operation scheduling, path selection, and I/O operation error analysis. Because the device policy modules include device specific functionality, various different devices from different manufacturers can be more efficiently and robustly supported.

  • Pub Date: 2006/20/10
  • Number: 07694063
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Subsurface heaters with low sulfidation rates

A system for heating a hydrocarbon containing formation includes a heater having an elongated ferromagnetic metal heater section. The heater is located in an opening in a formation. The heater section is configured to heat the hydrocarbon containing formation. The exposed ferromagnetic metal has a sulfidation rate that goes down with increasing temperature of the heater, when the heater is in a selected temperature range.

  • Pub Date: 2006/20/10
  • Number: 08606091
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Solution mining systems and methods for treating hydrocarbon containing formations

A method for treating an oil shale formation comprising nahcolite is disclosed. The method includes providing a first fluid to a portion of the formation through at least two injection wells. A second fluid is produced from the portion through at least one injection well until at least two injection wells are interconnected such that fluid can flow between the two injection wells. The second fluid includes at least some nahcolite dissolved in the first fluid. The first fluid is injected through one of the interconnected injection wells. The second fluid is produced from at least one of the interconnected injection wells. Heat is provided from one or more heaters to the formation to heat the formation. Hydrocarbon fluids are produced from the formation.

  • Pub Date: 2006/20/10
  • Number: 07559368
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Solution mining dawsonite from hydrocarbon containing formations with a chelating agent

A method for treating an oil shale formation comprising dawsonite includes providing heat from one or more heaters to the formation to heat the formation. Hydrocarbon fluids are produced from the formation. At least some dawsonite in the formation is decomposed with the provided heat. A chelating agent is provided to the formation to dissolve at least some dawsonite decomposition products. The dissolved dawsonite decomposition products are produced from the formation.

  • Pub Date: 2006/20/10
  • Number: 07556095
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Queuing of instant messaging requests

A method and system for routing or directing calls in a call center, service center, or help desk environment includes a versatile queuing mechanism that supports instant messaging or electronic communications or mail in support of received calls taken by the help desk. The queuing mechanism provides predefined categories of different areas of expertise, automatic distribution to different skills levels of escalating expertise based on each request, multiple experts for each category monitoring the queues for new requests, and, as the requests come in, the experts can manually pull the new requests or be given the requests automatically. For each request, there is automated control of the number of instant messages any one expert is allowed to handle. The expert resolution can be used as feedback in the entire support process for evaluation.

  • Pub Date: 2006/20/10
  • Number: 07895330
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of producing alkylated hydrocarbons from an in situ heat treatment process liquid

A method for producing alkylated hydrocarbons is disclosed. Formation fluid is produced from a subsurface in situ heat treatment process. The formation fluid is separated to produce a liquid stream and a first gas stream. The first gas stream includes olefins. The liquid stream is fractionated to produce at least a second gas stream including hydrocarbons having a carbon number of at least 3. The first gas stream and the second gas stream are introduced into an alkylation unit to produce alkylated hydrocarbons. At least a portion of the olefins in the first gas stream enhance alkylation.

  • Pub Date: 2006/20/10
  • Number: 07581589
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of hydrotreating a liquid stream to remove clogging compounds

A method includes producing formation fluid from a subsurface in situ heat treatment process. The formation fluid is separated to produce a liquid stream and a gas stream. At least a portion of the liquid stream is provided to a hydrotreating unit. At least a portion of selected in situ heat treatment clogging compositions in the liquid stream are removed to produce a hydrotreated liquid stream by hydrotreating at least a portion of the liquid stream at conditions sufficient to remove the selected in situ heat treatment clogging compositions.

  • Pub Date: 2006/20/10
  • Number: 07591310
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of cracking a crude product to produce additional crude products

A method for producing a crude product is disclosed. Formation fluid is produced from a subsurface in situ heat treatment process. The formation fluid is separated to produce a liquid stream and a first gas stream. The first gas stream includes olefins. The liquid stream is fractionated to produce one or more crude products. At least one of the crude products has a boiling range distribution from 38° C. and 343° C. as determined by ASTM Method D5307. The crude product having the boiling range distribution from 38° C. and 343° C. is catalytically cracked to produce one or more additional crude products. At least one of the additional crude products is a second gas stream. The second gas stream has a boiling point of at most 38° C. at 0.101 MPa.

  • Pub Date: 2006/20/10
  • Number: 07584789
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for substantiation of healthcare expenses

Methods and systems are disclosed for processing a request to fund a purchase from a provider with a medical expense account. The request identifies expenses incurred with the purchase is received at a substantiation system and used to identify the provider. A determination is made whether the provider is included in a presubstantiation list, which identifies a set of providers determined to provide only goods and/or services eligible for funding by medical expense accounts. In response to a determination that the provider is included in the presubstantiation list, the expenses are automatically substantiated and substantiation information is generated and transmitted to a third-party administrator.

  • Pub Date: 2006/20/10
  • Number: 08799007
  • Owner: Metavante Corporation
  • Location: Jacksonville, US
  • Details: Visit USPTO

Visit USPTO Page


Method of fabricating a printhead integrated circuit with a nozzle chamber in a wafer substrate

A method of fabricating a printhead integrated circuit includes the step of forming a first layer of a polymeric material on a substrate that incorporates drive circuitry. A heater element is formed on the first layer of polymeric material to be connected to the drive circuitry. A second layer of a polymeric material is formed on the heater element and the first layer such that the heater element is embedded in polymeric material. The polymeric layers are etched to define a plurality of radially extending bridging portions which terminate in a nozzle rim and a plurality of actuators which each extend between a respective pair of adjacent bridging portions and each terminate in a free end proximal to the rim. The substrate is etched so that the substrate and the actuators define a nozzle chamber in fluid communication with an ink ejection port defined by the nozzle rim.

  • Pub Date: 2006/20/10
  • Number: 1972153
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Method for manufacturing a micro-electromechanical nozzle arrangement on a substrate with an integrated drive circutry layer

A method for manufacturing a micro-electromechanical printer nozzle arrangement on a substrate having a layer of integrated drive circuitry includes etching a nozzle region through the layer of integrated drive circuitry up to the substrate. Electrical contact regions are etched about the nozzle region. Metal and polytetrafluoroethylene (PTFE) layers are deposited and etched on the layer of integrated drive circuitry so that the metal layer defines heater elements in electrical contact with the drive circuitry and embedded in PTFE structures disposed about the nozzle region. A nozzle chamber is etched in the substrate such that the nozzle chamber is in fluid communication with the nozzle region. The substrate is back-etched to define an ink channel in fluid communication with the nozzle chamber.

  • Pub Date: 2006/20/10
  • Number: 07284326
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for verifying storage access requests in a computer storage system with multiple storage elements

Method and apparatus are disclosed for verifying access to logical volume stored on at least one of the plurality of storage elements. The access can involve verification that the appropriate logical volume is being accessed and may also or instead include checking of authorization of a user to access that logical volume or logical entity. A database may be maintained to track users or host computers that are permitted to access the logical volume.

  • Pub Date: 2006/20/10
  • Number: 2071729
  • Owner: BMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Message digest instruction

A method, system and computer program product for digesting data in storage of a computing environment. The digesting computes a condensed representation of a message or data stored in the computer storage. A COMPUTE INTERMEDIATE MESSAGE DIGEST (KIMD) and a COMPUTE LAST MESSAGE DIGEST (KLMD) instruction are disclosed which specify a unit of storage to be digested by a secure hashing algorithm.

  • Pub Date: 2006/20/10
  • Number: 2075614
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Isolating data within a computer system using private shadow mappings

Virtualization software establishes multiple execution environments within a virtual machine, wherein software modules executing in one environment cannot access private memory of another environment. A separate set of shadow memory address mappings is maintained for each execution environment. For example, a separate shadow page table may be maintained for each execution environment. The virtualization software ensures that the shadow address mappings for one execution environment do not map to the physical memory pages that contain the private code or data of another execution environment. When execution switches from one execution environment to another, the virtualization software activates the shadow address mappings for the new execution environment. A similar approach, using separate mappings, may also be used to prevent software modules in one execution environment from accessing the private disk space or other secondary storage of another execution environment.

  • Pub Date: 2006/20/10
  • Number: 09274974
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Information storage and retrieval system for storing and retrieving the visual form of information from an application in a database

The visual form of data from a computer program is received and stored in a database. The visual form of the data may be received, for example, in response to a print operation by the computer program or by some other operation such as a cut and paste sequence of operations or by sending the data to another application. The visual form of the data may be stored as a vector image that permits scalability. The visual form of the data may be stored with other identifying information or tags in the database to facilitate searching of the database. The data in the database may be encoded in a manner that ensures data integrity and that permits detection of when data has been compromised. In one embodiment, a service layer application is provided to control access to the database by performing encoding and decoding of the data in the database. The service layer may have an application programming interface that permits many applications to have access to the database. Another application may be provided for accessing the visual form of the data from the database and for providing this data to another computer program. Such an application permits a user to create compound documents from data in the database using the other computer program.

  • Pub Date: 2006/20/10
  • Number: 07587413
  • Owner: Waters Technologies Corporation
  • Location: Milford, US
  • Details: Visit USPTO

Visit USPTO Page


Formal language and translator for parallel processing of data

The present invention, in an example embodiment, provides a special-purpose formal language and translator for the parallel processing of large databases in a distributed system. The special-purpose language has features of both a declarative programming language and a procedural programming language and supports the co-grouping of tables, each with an arbitrary alignment function, and the specification of procedural operations to be performed on the resulting co-groups. The language's translator translates a program in the language into optimized structured calls to an application programming interface for implementations of functionality related to the parallel processing of tasks over a distributed system. In an example embodiment, the application programming interface includes interfaces for MapReduce functionality, whose implementations are supplemented by the embodiment.

  • Pub Date: 2006/20/10
  • Number: 07921416
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure “output” domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.

  • Pub Date: 2006/20/10
  • Number: 08520850
  • Owner: Time Warner Cable Enterprises LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Developer carrying member and developing assembly

A developer carrying member is provided which, even in continuous copying over a long term and also even under different environmental conditions, do not cause any charge-up of toner, and prevent the toner from melt-adherent to the developer carrying member surface and developer layer thickness control member surface to maintain the state of uniform coating of a developer having a toner and to make the toner uniformly and quickly triboelectrically charged, so as to obtain high-grade images free of any image density decrease, image density non-uniformity, sleeve ghosts, fog and vertical streaks during running service. Provided are a developer carrying member having a substrate and a resin coat layer on the surface of the substrate, which resin coat layer contains at least a binder resin and a carbon black, where the graphite (002) plane obtained from X-ray diffraction of the carbon black has a lattice spacing of from 0.3370 nm or more to 0.3450 nm or less; and a developing assembly having such a developer carrying member.

  • Pub Date: 2006/20/10
  • Number: 08298658
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Computerized procedures system

An online data driven computerized procedures system that guides an operator through a complex process facility's operating procedures. The system monitors plant data, processes the data and then, based upon this processing, presents the status of the current procedure step and/or substep to the operator. The system supports multiple users and a single procedure definition supports several interface formats that can be tailored to the individual user. Layered security controls access privileges and revisions are version controlled. The procedures run on a server that is platform independent of the user workstations that the server interfaces with and the user interface supports diverse procedural views.

  • Pub Date: 2006/20/10
  • Number: 07813817
  • Owner: Westinghouse Electric Co LLC
  • Location: Cranberry Township, US
  • Details: Visit USPTO

Visit USPTO Page


Cogeneration systems and processes for treating hydrocarbon containing formations

A system for treating a hydrocarbon containing formation includes a steam and electricity cogeneration facility. At least one injection well is located in a first portion of the formation. The injection well provides steam from the steam and electricity cogeneration facility to the first portion of the formation. At least one production well is located in the first portion of the formation. The production well in the first portion produces first hydrocarbons. At least one electrical heater is located in a second portion of the formation. At least one of the electrical heaters is powered by electricity from the steam and electricity cogeneration facility. At least one production well is located in the second portion of the formation. The production well in the second portion produces second hydrocarbons. The steam and electricity cogeneration facility uses the first hydrocarbons and/or the second hydrocarbons to generate electricity.

  • Pub Date: 2006/20/10
  • Number: 2046485
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Pressure tolerant fiber optic hydrophone

An interferometric hydrophone is disclosed that comprises a first mandrel defining an interior that is open to surrounding fluid. A sensing optical fiber is wound upon the first mandrel. A second mandrel is positioned in surrounding relationship with respect to the first mandrel. The first and second mandrels define a first chamber therebetween. A case encloses the first and second mandrels and first chamber. The cylindrical case and the second cylindrical mandrel define a second chamber therebetween, which is sealed and filled with gas or vacuum.

  • Pub Date: 2006/19/10
  • Number: 07295493
  • Owner: The United States of America represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Method to reduce or eliminate audio interference from computer components

The present invention provides a system and method that mitigates audio interference before and/or during an audio session, and in particular, when a high quality audio session is desired. The system includes an audio component that determines whether an audio session is to commence and a control component that interfaces with the audio component and reduces activity associated with a subset of a plurality of computer components that may interfere with the audio session. The system may also include at least one power management system to facilitate reducing power consumption and activity of the computer component(s). The method involves determining that an audio session is desired and switching one or more computer components to a minimal interference mode prior to commencing the audio session. The method may also involve calling at least on API to facilitate the switching of the computer component(s).

  • Pub Date: 2006/19/10
  • Number: 07843893
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method for extracting content, content extraction server based on RSS and apparatus for managing the same and system for providing standby screen of mobile communication terminal using the same

In accordance with the embodiment of the present invention, an information updated from various contents having the RSS scheme applied thereto at a desired time via an more convenient method, and various systems and methods based on the RSS are supported.

  • Pub Date: 2006/19/10
  • Number: 08131276
  • Owner: Insprit Co., Ltd.
  • Location: , KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for synchronized policy control in a web services environment

Policy controls for Web service resource objects in a hierarchical resource space are loosely coupled so that policy changes are applied and enforced across the objects. This technique ensures that different policies are not applied unintentionally to the same resource (for example, one at the Web services entry level, and the other at the resource level). By synchronizing the object in the manner described, neither the entity that deploys the application nor the security administrator need to be aware of the differences between the various types of requests that occur within a Web services environment. In a representative embodiment, resource objects are linked within a hierarchical resource space to provide synchronized policy control, where the policy is an audit policy, a quality-of-service (QoS) policy, a service level agreement (SLA) policy, a governance policy, a compliance policy, a patch management/vulnerability management policy, a user management policy, or a rights management policy.

  • Pub Date: 2006/19/10
  • Number: 08291466
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Lead free detonator and composition

A lead-free primer energetic composition including Cyanuric Triazide (60%), Tetracene (5%), Barium Nitrate (20%) and Antimony Trisulfide (15%) is produced. The lead-free primer energetic composition is used to construct a primary detonator including a transfer charge of Cyanuric Triazide, which produces a further initiation train that may subsequently detonate a secondary explosive, i.e., HDX, RDX, or a pyrotechnic device.

  • Pub Date: 2006/19/10
  • Number: 07981225
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced sensitivity pressure tolerant fiber optic hydrophone

An interferometric hydrophone operable for use in surrounding fluid, includes an outer mandrel having an interior open to the surrounding fluid. A sensing optical fiber is wound on the exterior of the outer mandrel. An inner mandrel is positioned in the interior of the outer mandrel. A chamber defined between the inner mandrel and outer mandrel is in communication with the surrounding fluid. The inner mandrel has a sealed gas filled interior. Compression and expansion of the inner mandrel results in compression and expansion of the outer mandrel.

  • Pub Date: 2006/19/10
  • Number: 1994137
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Capacitive chemical sensor

A microfabricated capacitive chemical sensor can be used as an autonomous chemical sensor or as an analyte-sensitive chemical preconcentrator in a larger microanalytical system. The capacitive chemical sensor detects changes in sensing film dielectric properties, such as the dielectric constant, conductivity, or dimensionality. These changes result from the interaction of a target analyte with the sensing film. This capability provides a low-power, self-heating chemical sensor suitable for remote and unattended sensing applications. The capacitive chemical sensor also enables a smart, analyte-sensitive chemical preconcentrator. After sorption of the sample by the sensing film, the film can be rapidly heated to release the sample for further analysis. Therefore, the capacitive chemical sensor can optimize the sample collection time prior to release to enable the rapid and accurate analysis of analytes by a microanalytical system.

  • Pub Date: 2006/19/10
  • Number: 08736000
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


System, method and computer program for facet analysis

Automated facet analysis of input information selected from a domain of information in accordance with a source data structure is described. Facet analysis may proceed by discovering at least one of facets, facet attributes, and facet attribute hierarchies of the input information using pattern augmentation and statistical analyses to identify patterns of facet attribute relationships in the input information.

  • Pub Date: 2006/18/10
  • Number: 07606781
  • Owner: Primal Fusion Inc.
  • Location: Waterloo, CA
  • Details: Visit USPTO

Visit USPTO Page


System and method for representing digital media

A computerized system for representing a digital media using both a bit stream and an associated metadata includes a codec configured to encode the digital media to the bit stream. The codec is further configured to generate a metadata representation stream of the bit stream that encapsulates information embedded in the bit stream and at least one type of media-related information. The system also includes a manager configured to assure synchronization between the bit stream and the metadata representation stream during streaming of the bit stream and the metadata representation stream.

  • Pub Date: 2006/18/10
  • Number: 07692562
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Single gesture map navigation graphical user interface for a thin client

An application on a thin client displays a map. A graphical user interface permits the application to receive single gesture inputs of a stylus. If the single gesture input comprises a drag of the stylus a minimum distance, the map is panned such that the map is shifted to a new center view. The displayed map may contain one or more map objects. If the input comprises a single tap on a specific map object, the map object under the tap may be selected and highlighted. Further, a ToolTip for the map object may be displayed. A further tap of the ToolTip may result in the navigation to a link or URL associated with the map object selected. One or more zoom buttons may also be displayed. If a zoom button is tapped by the user, the map may be displayed in a different level of detail.

  • Pub Date: 2006/18/10
  • Number: 07439969
  • Owner: Autodesk, Inc.
  • Location: San Rafael, US
  • Details: Visit USPTO

Visit USPTO Page


Method, system, and computer program product for efficiently serializing navigational state in a portal

The inventive stream-based serialization method is efficient because it minimizes the overall processing time needed to generate a URL and also effective because it makes sure that the serialization result is as short as possible to meet the requirements regarding URL length and markup size.

  • Pub Date: 2006/18/10
  • Number: 08301783
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent video summaries in information access

In a method for displaying video data within result presentations in information access or search systems, compressed thumbnails are computed for videos in a result page and applied to the result page. An end user is enabled to select a video in the result page and activate streaming of a video summary within the context of the associated result page.

  • Pub Date: 2006/18/10
  • Number: 08296797
  • Owner: Microsoft International Holdings B.V.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Digital rights management engine systems and methods

Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

  • Pub Date: 2006/18/10
  • Number: 09626667
  • Owner: Intertrust Technologies Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Digital rights management engine systems and methods

Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. In some embodiments, the licenses contain control programs that are executable by the digital rights management engine.

  • Pub Date: 2006/18/10
  • Number: 09626667
  • Owner: Intertrust Technologies Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Skew exception detection

Techniques are presented for skew exception detection within a parallel processing environment. A potential exception is detected when a highest load of a processor within the parallel processing environment exceeds an average load within the parallel processing environment by a given threshold. The potential exception can become a legitimate exception when it exists for a qualified period or time or when it exists and no qualified period of time is noted. In an embodiment, checks for the potential exception occur and are wholly contained within a given configurable interval.

  • Pub Date: 2006/17/10
  • Number: 08099732
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Dicarboxylic acid derivatives and their use

The present application relates to novel dicarboxylic acid derivatives, process for their preparation, their use for the treatment and/or prophylaxis of diseases, and their use for producing medicaments for the treatment and/or prophylaxis of diseases, especially for the treatment and/or prevention of cardiovascular disorders.

  • Pub Date: 2006/17/10
  • Number: 08609727
  • Owner: Bayer Intellectual Property GmbH
  • Location: Monheim, DE
  • Details: Visit USPTO

Visit USPTO Page


Network interface device that fast-path processes solicited session layer read commands

A network interface device connected to a host provides hardware and processing mechanisms for accelerating data transfers between the host and a network. Some data transfers are processed using a dedicated fast-path whereby the protocol stack of the host performs no network layer or transport layer processing. Other data transfers are, however, handled in a slow-path by the host protocol stack. In one embodiment, the host protocol stack has an ISCSI layer, but a response to a solicited ISCSI read request command is nevertheless processed by the network interface device in fast-path. In another embodiment, an initial portion of a response to a solicited command is handled using the dedicated fast-path and then after an error condition occurs a subsequent portion of the response is handled using the slow-path. The interface device uses a command status message to communicate status to the host.

  • Pub Date: 2006/16/10
  • Number: 07664883
  • Owner: Alacritech, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and device for managing applications of a mobile terminal

A method and system for managing a set of applications stored on a mobile terminal, comprising an access to said set of applications enabling at least one specific function to be accessed by at least one application using an application manager.

  • Pub Date: 2006/16/10
  • Number: 08781529
  • Owner: NXP B.V.
  • Location: Eindhoven, NL
  • Details: Visit USPTO

Visit USPTO Page


Media content at the end of a communication

A method includes playing a video clip upon the end of a communication between two users. Another method includes playing an audio clip upon the end of a communication between two users. The audio clip may have been downloaded to a device of at least one of the users or it may be selected by a first user for playing on the device of a second user.

  • Pub Date: 2006/16/10
  • Number: 08626830
  • Owner: Vringo Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Inferring data types from compiler call site

Disclosed herein are methods and compilers for compiling code. The methods and compilers disclosed can compile a callable compilable unit of code free of declarations and assertions that identify attributes of arguments expressed therein. The attributes of the arguments in the callable compilable unit of code are inferred by the compilers and methods disclosed herein from information provided by a call site that calls a compiler to compile the callable compilable unit of code.

  • Pub Date: 2006/16/10
  • Number: 08843906
  • Owner: The MathWorks, Inc.
  • Location: Natick, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for time-dependent storage management with a portable application programming interface

Techniques for time-dependent storage management with a portable application programming interface are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for time-dependent storage management. The method may comprise interfacing with a host and a storage system having one or more storage devices. The method may also comprise intercepting all write commands that the host issues to the storage system. The method may additionally comprise performing a copy-on-write operation for each intercepted write command, wherein copy-on-write data and metadata associated with each intercepted write command are recorded, the metadata including at least a timestamp associated with each intercepted write command.

  • Pub Date: 2006/13/10
  • Number: 07849273
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of remotely managing and loading artifacts

A system and method for remotely loading artifacts is disclosed. The system and method involves monitoring application installation events on a computing device. In response to detecting an application installation event, the application installation event is intercepted. The application associated with the application installation event is searched for artifacts, and any artifacts found within the application are stored in a centralized location. The artifacts are further indexed according to a target namespace. In one embodiment, the system and method further involved receiving a query from a client to locate an artifact, locating the artifact from previously extracted artifacts and returning the artifact as URL address.

  • Pub Date: 2006/13/10
  • Number: 07761559
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using psychological significance pattern information for matching with target information

A computer-implemented system for creating a classification significance pattern for end users, and enabling end users to use their classification significance pattern to conduct custom searches for target information, such as information about products, services, and jobs, as well as enabling third parties, such as vendors and potential employers, to target their advertisements to groups of users meeting a certain classification. A classification significance pattern is created by having a user take a psychological test, for example, that includes a personality test, a design taste test, a recreation/travel test, a life satisfaction test, an interactive game module, or a career/job test, and having the system automatically score such test and classifying the user based on a defined abstract classification.

  • Pub Date: 2006/13/10
  • Number: 08010400
  • Owner: Protigen, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Surface RF emitter passive ranging accuracy confirmation algorithm

Kalman gain is used to calculate range accuracy for a passive angle-of-arrival determining systems, most notably for short-baseline interferometry, in which Kalman gain after arriving at a minimum proceeds to within a predetermined fraction or percent of zero gain, at which time the range estimate accuracy is known.

  • Pub Date: 2006/13/10
  • Number: 2091151
  • Owner: BAE Systems Information and Electronic Systems Integration Inc.
  • Location: Nashua, US
  • Details: Visit USPTO

Visit USPTO Page


Processing structured data

The present invention provides a fast and efficient way of processing structured data by utilizing an intermediate file to store the structural information. The structured data may be processed into a Binary mask Format (BMF) file which may serve as a starting point for post-processing. A tree structure built on top of the BMF file may be constructed very quickly, and also takes up less space than a DOM tree. Additionally, BMF records may reside entirely in the memory and contain structural information, allowing SAX-like sequential data access.

  • Pub Date: 2006/13/10
  • Number: 07761459
  • Owner: XimpleWare, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Internet based data, voice and video alert notification communications system

A real-time integrated information sharing and telecommunications collaboration system is disclosed. The system includes at least one central server to create, store, display, edit, distribute, share, control and archive voice, data, video and images with a plurality of simultaneous wireless and wireline remote display devices. The system includes at least one central server monitors, controls and protects voice, data, video and image communications to, from and between display devices through encrypted token based security identifiers. The sharing of information and communication data packets between the display devices is contingent upon permissions assigned to individual human or machine end users. All data and communications, including the encrypted token based security identifiers may be stored simultaneously or individually within the central server, display device, or a third-party remote storage device whereby each or all may reside behind additional security systems and firewalls at a plurality of locations. All voice, data, video and images are seamlessly integrated through either one or in combination of communications paths to include, but not limited to, the Public Switched Telephone Network, World Wide Web, Internet, Wireless Wide Area Network (WWAN), Wide Area Network (WAN), Local Area Network (LAN), satellite, land mobile radio, WiFi, Worldwide Interoperability for Microwave Access (WiMAX), broadband over powerlines and other wireline and wireless networks.

  • Pub Date: 2006/13/10
  • Number: 08849908
  • Details: Visit USPTO

Visit USPTO Page


Fast border gateway protocol synchronization

A checkpointing approach enables BGP peers to reduce the number of UPDATE messages that are exchanged and processed after a router restarts. A router receives update messages to update routing information for the one or more other devices, wherein each of the update messages includes a checkpoint marker and a route. The router stores the route in a checkpoint repository and stores the checkpoint markers in association with information identifying the other routers from which the checkpoint markers were received. In response to a restart event, the router sends each of the stored checkpoint markers to respective other devices and receives from the respective other devices only route updates that occurred later in time than the checkpoint markers.

  • Pub Date: 2006/13/10
  • Number: 08254396
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Extensible markup language (XML) path (XPATH) debugging framework

Embodiments of the present invention address deficiencies of the art in respect to XPATH expression debugging and provide a novel and non-obvious method, system and apparatus for an XPATH expression debugging framework. In an embodiment of the invention, an XPATH expression debugging method can include receiving an XPATH input expression, parsing the XPATH input expression to produce a group of sub-expressions, and ordering the sub-expressions in a model for the XPATH input expression. Thereafter, in response to a selection of one of the sub-expressions in the model, a result set can be produced for the sub-expression.

  • Pub Date: 2006/13/10
  • Number: 08321845
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced capture, management and distribution of live presentations

Techniques are provided for converting live presentations into electronic media and managing captured media assets for distribution. An exemplary system includes capture devices that capture media assets of live presentations comprising a session, including image data of sequentially presented visual aids accompanying the live presentations and audio data. Each capture device has an interface for real-time image data marking of the image data for identification of individual images and session marking of the image data for demarcation of individual presentations of the session. A centralized device processes the captured media assets and automatically divides the captured media assets into discrete files associated with the individual presentations based on the session markings. An administrative tool manages the processed media assets to produce modified presentations and enables modification of the visual aid images identified by the image data markings. A production device formats the modified presentations for distribution on distribution media.

  • Pub Date: 2006/13/10
  • Number: 07689898
  • Owner: Astute Technology, LLC
  • Location: Reston, US
  • Details: Visit USPTO

Visit USPTO Page


Upflow bioreactor with septum and pressure release mechanism

An upflow bioreactor includes a vessel having an inlet and an outlet configured for upflow operation. A septum is positioned within the vessel and defines a lower chamber and an upper chamber. The septum includes an aperture that provides fluid communication between the upper chamber and lower chamber. The bioreactor also includes means for releasing pressure buildup in the lower chamber. In one configuration, the septum includes a releasable portion having an open position and a closed position. The releasable portion is configured to move to the open position in response to pressure buildup in the lower chamber. In the open position fluid communication between the lower chamber and the upper chamber is increased. Alternatively the lower chamber can include a pressure release line that is selectively actuated by pressure buildup. The pressure release mechanism can prevent the bioreactor from plugging and/or prevent catastrophic damage to the bioreactor caused by high pressures.

  • Pub Date: 2006/12/10
  • Number: 07699976
  • Owner: Utah State University
  • Location: North Logan, US
  • Details: Visit USPTO

Visit USPTO Page


Multimedia middleware apparatus using metadata, method for controlling multimedia middleware, and storage medium thereof

A multimedia middleware apparatus using metadata, a control method and a storage medium are provided which can receive metadata in multimedia middleware provided in a terminal, easily add/delete/change a service, and effectively maintain and manage middleware components. When an open multimedia terminal processes multimedia contents, a multimedia middleware service structure for expressing information of a name, configuration, version and application programming interface (API) update is configured in the form of metadata. Lists of standard and non-standard services of multimedia middleware are then generated and managed.

  • Pub Date: 2006/12/10
  • Number: 08775620
  • Owner: Information and Communications University, Research and Industrial Cooperation Group
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for modeling runtime behavior

A method (and system) of modeling runtime behavior for a software application includes limiting a portion of a run to be analyzed using criteria that define an analysis scenario, structuring events of the analysis scenario as a flow of logical content through a plurality of transformations, applying labels to elements of the flow, and generating a behavior signature for the analysis scenario based on the labels.

  • Pub Date: 2006/12/10
  • Number: 08904339
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Message intercept methods, such as for customer self-support on a mobile device

A method for intercepting messages includes determining that a mobile device user has initiated a message for transmission across a wireless network to an electronic address that corresponds to a predetermined address (such as a customer support address). The message may be a text message, an email message, an instant message, an SMS message, and/or an MMS message. The method also includes preventing transmission of the initiated message and performing at least one action at the mobile device. Examples of the at least one action include invoking a bot to interact with the mobile device user and displaying a list of potential solutions to the subscriber's problem. Systems, computer-readable media, and various other features and embodiments are disclosed.

  • Pub Date: 2006/12/10
  • Number: 08682298
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Determining engine cylinder contribution from indexed engine data

An engine diagnostic system is provided that enables a service technician to evaluate engine cylinder contribution to output power. The service technician couples one or more signal leads to the vehicle's battery, alternator, or accessory receptacle (e.g., cigarette lighter receptacle) to provide an alternator output signal to a signal analyzer. The signal analyzer processes the alternator output signal to generate an engine signature, which represents engine cylinder contribution to engine output power.

  • Pub Date: 2006/12/10
  • Number: 07286927
  • Owner: Snap-On Incorporated
  • Location: Pleasant Prairie, US
  • Details: Visit USPTO

Visit USPTO Page


Transient data facility for database applications

In one embodiment, a method for providing a transient data facility for database applications includes creating a definition of transient data that corresponds to a unit of work to be performed by an application, and mapping the definition of transient data to a temporary storage table. The method further includes storing the transient data in the temporary storage table while the application performs the unit of work spanning one or more user sessions, and deleting the transient data after the application completes the unit of work.

  • Pub Date: 2006/11/10
  • Number: 07925632
  • Owner: Oracle Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Tag system

A monitoring device is configured to be attached to an agent to be monitored. The device includes sensor circuitry that detects or measures conditions relating to the environment, the agent or the agent's behavior. A microcontroller processes the conditions to produce event data, and a wireless transmitter transmits the event data to a remote host system. The conditions can include temperature, acceleration, the presence of another tag, or other conditions relating to the agent. The event data may relate to movement of the agent, an encounter with another tag, or other behavior of the agent, and may be stored to an internal memory. The monitoring device may also include a transmitter that transmits a signal, or tag identifier, that identifies the device. The event data may be reported as information relating to the behavior of the agent.

  • Pub Date: 2006/11/10
  • Number: 2038868
  • Owner: Snif Labs, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Overlay measurement methods with firat based probe microscope

A method, system and unit for determining alignment in a layered device such as a semiconductor device includes providing a first layer having detectable surface and subsurface material properties and positioning a patterned photoresist layer over the first layer, patterned photoresist layer having detectable surface and subsurface material properties. The layers are imaged with a FIRAT probe to detect the material properties, and the detectable material properties are compared for mapping an alignment of the compared detectable material properties. The first layer may be a substrate or have a previously processed layer formed thereon. A surface topography may be included over the substrate and an etchable layer formed over the substrate or first layer. The FIRAT probe may be a single tip probe or a dual tip probe.

  • Pub Date: 2006/11/10
  • Number: 1991523
  • Owner: Georgia Tech Research Corporation
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


File sharing administration

A file sharing service facilitates file sharing between a client and a host over a network. An extensible architecture provides an interface by which the file sharing service can be expanded to include additional functionality. This additional functionality may include resource management, security management, management of user experience, and the like. For example, users or administrators of the host or another computing device on the network may wish to oversee the file sharing service as a whole and/or individual file sharing transactions. The extensible file sharing described herein allows users, administrators, or other third party developers to expand or enhance a file sharing service or application to provide virtually any desired functionality.

  • Pub Date: 2006/11/10
  • Number: 08438266
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic acquisition of a hand formed expression and a context of the expression

Embodiments include an apparatus, device, method, and computer program product. In an embodiment, a device includes a handheld writing device that includes a writing element, and a writing detector module operable to generate information indicative of a handwriting movement of the writing element. The device also includes a context detector module operable to generate information indicative of a content portion of a document proximate to the handwriting movement of the writing element.

  • Pub Date: 2006/11/10
  • Number: 08290313
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Devices, systems and methods for scenario based services and intelligent user feedback

Devices, systems and methods are provided to communicate using mobile or wireless devices having a plurality of interactive applications, wherein each application is useable interactively with other applications. Thus, a user is enabled to utilize multiple applications interactively on a single mobile device, with each application providing intelligent feedback to an application server as to the use habits of the user with regard to that application. Further, the applications server provides a level of intelligence back to each mobile device creating an ongoing intelligent feedback loop.

  • Pub Date: 2006/11/10
  • Number: 08155696
  • Owner: AT&T Mobility II LLC
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Determining inserted catheter end location and orientation

Catheterization device and method of using are provided for uniquely illuminating the distal end of the device in order to visualize the end-point location and orientation and to track the movement of the catheterization device within passageways in the body. Use of the present invention by tracking in real time with an imaging device sensitive to visible to near infrared light. The invention allows the insertion and tracking of substantially any catheterization type device, for substantially any procedure requiring vascular access, such as in the placement of a PICC line, for heart catheterization or angioplasty, or for urinary track catheterization, or other bodily access procedure. The invention permits a technician to determine placement, orientation and movement of the device noninvasive equipment, without subjecting the patient to the hazards associated with ionizing radiation, radio frequency energy or significant thermal energy.

  • Pub Date: 2006/11/10
  • Number: 07917193
  • Owner: The United States of America as represented by the Secretary of the Air Force
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Controls and indicators with on-screen cognitive aids

The invention relates to an applet for a mobile computing device, comprising an element to detect user input and perform appropriate associated actions, and to provide a cognitive aid for users of the mobile computing device. The invention also relates to a method for controlling operation of a mobile computing device, comprising detecting user input and performing appropriate associated actions and providing a cognitive aid for users of the mobile computing device. The invention further relates to a cognitive aid for a mobile computing device having a display screen, the cognitive aid being displayed on the display screen and including an on-screen and/or an audio tip, and being associated with an input vehicle of the mobile computing device. The cognitive aid provides relevant information to the user regarding the input vehicle. The invention still further relates to a method for assisting users of a mobile computing device having a display screen. The method comprises providing a vehicle for user input to the mobile computing device and providing a cognitive aid on the display screen, the cognitive aid being associated with the user input vehicle. The cognitive aid provides relevant information to the user regarding the user input vehicle.

  • Pub Date: 2006/11/10
  • Number: 08739035
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Circuit autorouter with object oriented constraints

In one embodiment of the invention, an object oriented autorouter is disclosed for routing nets in a circuit. The object oriented autorouter includes a routing data model (RDM); at least one routing engine, such as a single connection router (SCR), a topographical (TOPO) transformation engine, and a detail geometric (DETAIL) engine, and a command and control module (CCM) coupled together. The RDM reads and write data with a design database as well as reading one or more object oriented design constraints. Each of the routing engines have at least one action to operate on the design database to improve compliance of the circuit to a constraint. The CCM controls the overall routing process of the nets in the circuit and includes at least one director to invoke at least one of the routing engines to achieve compliance with one or more constraints.

  • Pub Date: 2006/11/10
  • Number: 07761836
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for interfacing a wireless local network and a wired voice telecommunications system

An apparatus for interfacing a wireless local area network with a wide area, cellular or public switched telephone network including the function of a wireless LAN base station or access point, and a gateway. The interface may contain one or more different types of gateways, including a PSTN voice gateway, an analog modem gateway, and others. The apparatus may also include a well designed to receive the handset or mobile computer device to recharge the battery as well as to automatically transfer data when the phone or device is secured in the well.

  • Pub Date: 2006/11/10
  • Number: 07693101
  • Owner: Symbol Technologies, Inc.
  • Location: Holtsville, US
  • Details: Visit USPTO

Visit USPTO Page


Volumetric passive sonobuoy array of polyvinylidene fluoride (PVDF) wires

A sonar system for detecting underwater acoustic signals includes a plurality of hydrophone units capable of converting acoustic impulses to electrical signals, the hydrophone units being substantially vertically oriented when deployed in a body of water, and the hydrophone units occupying at least some of the positions of an M×N horizontal array. Two-dimensional Chebyshev mathematical weighting is applied to the electrical signals from the individual hydrophone units such that each individual signal from each hydrophone unit is assigned a respective weighting number and a numerical value is assigned to each individual signal corresponding to the strength of the electrical signal as adjusted by the respective weighting number.

  • Pub Date: 2006/10/10
  • Number: 07675819
  • Owner: The Johns Hopkins University
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Unified assembly instruction set for graphics processing

Systems and methods for providing a unified instruction set allow shader programs of different types to use a common instruction set. The unified instruction set provides easy access for new graphics hardware features and faster compile times for shader programs. Programmers may use the unified instruction set to write fragment, vertex, or geometry programs. Functions that use the unified instruction set can be included in shader, vertex, or geometry programs without modification. Existing shader programs may be compiled to produce shader microcode based on the unified instruction set. The shader microcode may then be executed by processing units designed to support the unified instruction set.

  • Pub Date: 2006/10/10
  • Number: 08154554
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer program product for multi-mode network interface operation

An offload system, method, and computer program product are provided. Based on an identified data structure, it is determined whether a hardware network interface is operating in a first mode or a second mode. The hardware network interface is coupled between a network and a processor. If it is determined that the hardware network interface is operating in the first mode, the packets are processed utilizing the processor. If it is determined that the hardware network interface is operating in the second mode, the packets are processed utilizing the hardware network interface.

  • Pub Date: 2006/10/10
  • Number: 08073002
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for dynamic audio buffer management

An audio data processing circuit comprises a memory and a processing circuit. The processing circuit is configured to store audio data in the memory in at least one buffer, each buffer having a size. The processor is configured to detect a type of application providing the audio data and, based on the type of application detected, to change at least one of the size and number of buffers in which the processing circuit stores audio data.

  • Pub Date: 2006/10/10
  • Number: 09135951
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Personalization content sharing system and method

A method includes enabling a user to define his/her buddies from among members of a community and enabling the user to select media content to be played on devices of his/her buddies. Another method includes providing media content chosen by a first user to be played by a media player on a device of a second user in response to an identification of the first user.

  • Pub Date: 2006/10/10
  • Number: 07761816
  • Owner: Vringo, Inc.
  • Location: Beit Shemesh, IL
  • Details: Visit USPTO

Visit USPTO Page


Offload system, method, and computer program product for processing network communications associated with a plurality of ports

An offload system, method, and computer program product are provided for handling transport layer processing of a connection between a local host and a remote host via at least one network. A network interface associated with the local host is utilized for such purpose. A plurality of ports allow communication between the local host and the at least one network. The communications corresponding with the connection are monitored and the connection is associated with at least one port. At least one of the ports receiving the communications corresponding with the connection are identified.

  • Pub Date: 2006/10/10
  • Number: 08059680
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Micro-patterned SiO/TiOfilms through photo and chemical reactions

A method for making a patterned SiOfilms over TiO(Si0/Ti0) under ambient atmospheric conditions, including room temperature, through photo and chemical reactions. The method is simple, convenient and can be performed in a short period of time, typically less than two hours. The patterned TiOfilm is fabricated through photo-irradiation of a photosensitive organic-titanium film using a mask. Silica particles are generated from silicate solution by adjusting pH values to 10 to 8 with hydrochloric acid. The pre-deposited TiOfilm has a strong attraction for the SiOparticles, leading to the instant formation of SiOfilm over the TiOfilm. The silica films are also amino-silylated with 3-aminopropyltriethoxysilane toward applications such as patternable, location-specific silica-based separation and purification.

  • Pub Date: 2006/10/10
  • Number: 07622239
  • Owner: University of South Florida
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Mapping web services description language documents to XQuery functions

Using a WSDL document to exchange an interface definition for back-end business logic includes automatically mapping various elements of the WSDL document to corresponding XQuery elements to generate an XQuery interface definition “skeleton”. From such an XQuery interface skeleton, an XQuery statement can be generated by filling in the body of the function that implements the logic. The XQuery statement serves as an interface definition for an interface to the function. Furthermore, at runtime a Web Service request that is based on the WSDL document can be translated into an XQuery call into an XQuery function that implements the logic defined in the WSDL document. From there, results are obtained from the XQuery function, translated into the appropriate return format defined in the WSDL, and returned.

  • Pub Date: 2006/10/10
  • Number: 07945893
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Tetrazole derivatives and their use for the treatment of cardiovascular diseases

The present application relates to novel tetrazole derivatives, processes for their preparation, their use for the treatment and/or prophylaxis of diseases, and their use for producing medicaments for the treatment and/or prophylaxis of diseases, especially for the treatment and/or prevention of cardiovascular disorders.

  • Pub Date: 2006/09/10
  • Number: 08183271
  • Owner: Bayer Intellectual Property GmbH
  • Location: Monheim, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for creating a non-repudiable chat log

A system for creating a non-reputable chat log. An initial quote is performed of a value of a register in response to a secure chat session being initiated. The value of the register is extended to record a message measurement within the register for the secure chat session in response to a message being measured. A final quote is performed of the value of the register in response to the secure chat session being terminated.

  • Pub Date: 2006/09/10
  • Number: 07962749
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Difluorophenol derivatives and their use

The present application relates to novel difluorophenol derivatives, processes for their preparation, their use for the treatment and/or prophylaxis of diseases, and their use for producing medicaments for the treatment and/or prophylaxis of diseases, especially for the treatment and/or prevention of cardiovascular disorders.

  • Pub Date: 2006/09/10
  • Number: 08173704
  • Owner: Bayer Pharma Aktiengesellschaft
  • Location: Berlin, DE
  • Details: Visit USPTO

Visit USPTO Page


Cyclopropylacetic acid derivatives and use thereof

The present application relates to novel cyclopropylacetic acid derivatives, to processes for their preparation, to their use for the treatment and/or prophylaxis of diseases and to their use for preparing medicaments for the treatment and/or prophylaxis of diseases, in particular for the treatment and/or prevention of cardiovascular disorders.

  • Pub Date: 2006/09/10
  • Number: 08168821
  • Owner: Bayer Pharma Aktiengesellschaft
  • Location: Berlin, DE
  • Details: Visit USPTO

Visit USPTO Page


Quasi-particle interferometry for logical gates

A quantum computer can only function stably if it can execute gates with extreme accuracy. “Topological protection” is a road to such accuracies. Quasi-particle interferometry is a tool for constructing topologically protected gates. Assuming the corrections of the Moore-Read Model for ν=5/2's FQHE (Nucl. Phys. B 360, 362 (1991)) we show how to manipulate the collective state of two e/4-charge anti-dots in order to switch said collective state from one carrying trivial SU(2) charge, |1>, to one carrying a fermionic SU(2) charge |∈>. This is a NOT gate on the {|1>, |∈>} qubit and is effected by braiding of an electrically charged quasi particle a which carries an additional SU(2)-charge. Read-out is accomplished by σ-particle interferometry.

  • Pub Date: 2006/06/10
  • Number: 07394092
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for adapting an automated cigarette making apparatus

Cigarettes are manufactured using modified automated cigarette making apparatus. Those cigarettes possess smokable rods having paper wrapping materials having additive materials applied thereto as patterns. The additive materials, which can have the forms of liquid or paste formulations, can be applied to the paper web using application apparatus possessing rollers. One of those rollers can have a series of pockets in its roll face to receive additive formulation from a reservoir and to define the pattern of the formulation on the paper. A radiant dryer can be used to dry the additive material that has been applied to the paper web. The radiant dryer can be located on one component of a two component assembly that is used to manufacture cigarettes. Spectrometric techniques can be used to ensure proper registration of the additive material on the cigarette rods so manufactured, and to ensure proper quality of those cigarettes.

  • Pub Date: 2006/06/10
  • Number: 07409956
  • Owner: R.J. Reynolds Tobacco Company
  • Location: Winston-Salem, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for maintaining condensable constituents of a gas in a vapor phase during sample transport

A system for fluid transport at elevated temperatures having a conduit having a fluid inlet end and a fluid outlet end and at least one heating element disposed within the conduit providing direct heating of a fluid flowing through the conduit. The system is particularly suited for preventing condensable constituents of a high temperature fluid from condensing out of the fluid prior to analysis of the fluid. In addition, operation of the system so as to prevent the condensable constituents from condensing out of the fluid surprisingly does not alter the composition of the fluid.

  • Pub Date: 2006/06/10
  • Number: 2072817
  • Owner: Gas Technology Institute
  • Location: Des Plaines, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical locking in B-tree indexes

Portions of a B-tree index in a database are locked for concurrency control. In one example, hierarchical lock modes are provided that permit locking a key, a gap between the key and the next key, and a combination of the key and the gap. In another example, key range locking may be applied to the B-tree index using locks on separator keys of index nodes. In another example, key range locking may be applied to the B-tree index using locks on key prefixes.

  • Pub Date: 2006/06/10
  • Number: 07577658
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Groupware portlets for integrating a portal with groupware systems

A set of groupware portlets can be deployed on an enterprise portal in order to add groupware functionality thereon. The groupware portlets can provide an abstract user interface to groupware functionality provided by several collaboration servers and can also allow users to navigate to specific groupware functionality provided by a collaboration server. The portlets can connect to the various collaboration servers by implementing a personal messaging application programming interface. The interface can include a schema for defining groupware functionality and a set of providers for instantiating the connections to the various collaboration servers. The providers can be implementations of the schema that allow the groupware portlets to interact with the collaboration server. New schemas can be defined to extend existing schemas to enable more specific functionality provided by each collaboration server. The new schemas can be supported by the providers due to Java class inheritance.

  • Pub Date: 2006/06/10
  • Number: 08463852
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Conversion of data for two or three dimensional geometric entities

A method for transmission of data for two or three dimensional geometrical entities uses a computer system, for modeling and/or manipulation of geometrical entities. The computer system comprises at least one program for modeling and/or manipulation and at least one display program, the at least one modeling and/or manipulation program transmits the data associated with the geometrical entities for display to the at least one display program, by calling up display functions located within the at least one display program. An exporting program for data associated with geometrical entities is substituted in at least one of the at least one display programs, the exporting program having the same display functions as the at least one display program.

  • Pub Date: 2006/06/10
  • Number: 2084728
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic conversion of text-based code having function overloading and dynamic types into a graphical program for compiled execution

Automatic conversion of textual program code to graphical program code is performed. The method automatically translates the given functionality of a textual program code into executable graphical program code, corresponding to the same functionality. The method includes a parsing routine that generates a syntax tree and code generation routines, which create graphical program code from the syntax tree.

  • Pub Date: 2006/06/10
  • Number: 07954059
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic conversion of a textual language into a graphical program representation

Automatic conversion of textual program code to graphical program code is performed. The method automatically translates the given functionality of a textual program code into executable graphical program code, corresponding to the same functionality. The method includes a parsing routine that generates a syntax tree and code generation routines, which create graphical program code from the syntax tree.

  • Pub Date: 2006/06/10
  • Number: 07975233
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Automated management of brand rules for providing content

Automated assistance is provided for managing rules and/or guidelines regarding the usage of branded content for a project, e.g., an advertising campaign, event, signage, decoration, and the like. One or more queries regarding the project are presented to the user. Based on the user's responses to the queries, branded content that is approved for the project's intended use(s) is automatically identified and made available to the user. The determination of which digitized content (media objects) to provide to the user is based at least in part on brand rules and/or guidelines that can be relatively static or dynamically updated by the current user.

  • Pub Date: 2006/06/10
  • Number: 07949625
  • Owner: Corbis Corporation
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Secure computing environment

Detailed herein are approaches to enabling a secure computing environment. In one approach, a computer system runs an operating system and a virtual machine management console. An input device is used to provide input to the operating system. The operating system is configured such that input received from the input device is directed to the virtual machine management console. The virtual machine management console, in turn, is configured to pass some or all of the input to a virtual machine.

  • Pub Date: 2006/05/10
  • Number: 08239608
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Network security appliance

A network security appliance that provides security to devices in industrial environments by transparently bridging traffic to the endpoint device. The security appliance securely communicates with a management server for receiving configuration data for operation of security modules in the appliance by encrypted communications. The security appliance utilizes the network address of the industrial device when communicating with a management server and is addressed by the management server using the address of one of the protected devices associated with the appliance. Learned device characteristics are provided by the appliance to the management server which tailors software and security rules to specific network vulnerabilities of the device and control protocol. The security appliance sends periodic heartbeat messages to the management server using the network address of the device. The heartbeat message can also report anomalous events which may required additional software being provided from the management server to the node.

  • Pub Date: 2006/05/10
  • Number: 08042147
  • Owner: Bryes Security
  • Location: Lantzville BC, CA
  • Details: Visit USPTO

Visit USPTO Page


Supporting multiple security mechanisms in a database driver

A method for connecting a client to a database server are provided. The method provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.

  • Pub Date: 2006/04/10
  • Number: 07761468
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Software/hardware partitioning program and method

A software/hardware (SW/HW) partitioning and evaluating program allows a computer to perform a procedure of compiling a source code in which a mark is added to a portion to be executed by hardware, a procedure of generating an executable program for a simulator of CPU on a system-on-chip (SoC), a procedure of storing in memory an execution result of the executable program, and a procedure of evaluating an SW/HW partition based on the execution result.

  • Pub Date: 2006/04/10
  • Number: 07908592
  • Owner: Fujitsu Semiconductor Limited
  • Location: Yokohama, JP
  • Details: Visit USPTO

Visit USPTO Page


Semiconductor integrated circuit device and power consumption control device

To perform execution scheduling of function blocks so as to control the total required power of the function blocks within a supplyable power budget value, and thereby realize stable operations at low power consumption. Function block identifiers are allotted to all the function blocks, and to a RAM area that a power consumption control device can read and write, a list to store identifiers and task priority, power mode value showing power states, and power mode time showing the holding time of power states can be linked. A single or plural link lists for controlling the schedules of tasks operating on the function blocks, a link list for controlling the function block in execution currently in high power mode, a link list for controlling the function block in stop currently in stop mode, and a link list for controlling the function block in execution currently in low power mode are allotted, and thereby the power source and the operation clock are controlled by the power consumption control device.

  • Pub Date: 2006/04/10
  • Number: 07646197
  • Owner: Renesas Technology Corp.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Load time in-lining of subroutines

A computer implemented method, apparatus, and computer usable program code for processing a class file. The class file is loaded onto a target device. A determination is made whether verification is enabled. Static constraints are checked in response to determining the verification is enabled. A determination is made whether subroutines are present in a set of methods within the class file. The subroutines are in-lined in response to determining that subroutines are present in the set of methods.

  • Pub Date: 2006/04/10
  • Number: 08082542
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Peer-to-peer communication in ad hoc wireless network

For a peer-to-peer call in an ad hoc wireless network, a wireless device performs discovery of a target wireless device, performs authentication of the target wireless device and generates a session key (e.g., using a pre-shared key or a certificate provisioned on the wireless device), forms an ad hoc wireless network with the target wireless device, and communicates peer-to-peer with the target wireless device via the ad hoc wireless network. The wireless device may perform discovery with a list of identifiers for wireless devices designated to communicate with this wireless device. The wireless device may derive a service set identifier (SSID) used to identify the ad hoc wireless network based on its user-specific identifier (e.g., its phone number) and/or a user-specific identifier for the target wireless device. The wireless device may also performs IP address discovery using the user-specific identifier for the target wireless device.

  • Pub Date: 2006/03/10
  • Number: 08576846
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing interactive program guide (IPG) and video-on-demand (VOD) user interfaces

An apparatus for providing multiple session-based services at a terminal, an exemplary apparatus includes a memory configured to support a plurality of software layers including a service layer communicating with terminal resources via a root layer disposed therebetween; and a processor, for executing instructions associated with a plurality of service layer applications, a root layer application and a control mechanism; each of the service layer applications communicating with terminal resources to provide thereby a respective user interface; wherein the control mechanism selectively causing at least one of the service layer applications to enter an active state, the user interface associated with a service layer application being adapted in response to the service layer application entering the active state.

  • Pub Date: 2006/03/10
  • Number: 08191104
  • Owner: Cox Communications, Inc.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Electrically actuated switch

An electrically actuated switch comprises a first electrode, a second electrode, and an active region disposed therebetween. The active region comprises at least one primary active region comprising at least one material that can be doped or undoped to change its electrical conductivity, and a secondary active region comprising at least one material for providing a source/sink of ionic species that act as dopants for the primary active region(s). Methods of operating the switch are also provided.

  • Pub Date: 2006/03/10
  • Number: 08766224
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Database application federation

A database federation mechanism permits one or more applications external to the database to be registered. Applications so registered may be automatically invoked in response to database queries—where such invocation utilizes data from specific database entries.

  • Pub Date: 2006/03/10
  • Number: 09122719
  • Owner: BMC SOFTWARE, INC.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for obtaining and executing instructions from a private network

Systems and methods for website and application monitoring and testing inside from a private network are presented. An agent module resident on an agent device inside the secured network periodically sends an HTTP message to a controller server and receives an HTTP response. The agent module parses out a set of instructions from the content of the HTTP response and executes the instructions. The agent module collects and compiles responsive information resulting from the instructions being executed and sends the compiled information to the controller server for storage and reporting.

  • Pub Date: 2006/02/10
  • Number: 08005890
  • Owner: NeuStar, Inc.
  • Location: Sterling, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for delayed acknowledgment of client requests in electronic mail system

An electronic mail (email) communication system includes a mobile office platform. A direct access proxy accesses an electronic mailbox of the user and pushes email from the electronic mailbox of the user to a wireless communications device. A web client engine is operative with the mobile office platform and includes a port agent module that communicates with the wireless communications device over a port agent connection. It is operative to receive a message from a wireless communications device as a request corresponding to a job to be completed. A worker module receives the message from the port agent module and completes the job. The web client engine attempts to process jobs within a specified delay time, and if successful, transmits an acknowledgment (ACK) to indicate the job has been completed without saving the message to a jobstore database. If the job has not been completed within a specified delay time, the message can be saved to the database.

  • Pub Date: 2006/02/10
  • Number: 07987235
  • Owner: Research in Motion Limited
  • Location: Waterloo, Ontario, CA
  • Details: Visit USPTO

Visit USPTO Page


Synthetic full copies of data and dynamic bulk-to-brick transformation

Multi-dimensional surrogation systems and methods are provided that generate at least one up-to-date data surrogate using information of data and numerous data changes received from at least one data source, including a production system. Embodiments described further perform bulk-to-brick transformation of the up-to-date data surrogate. Brick-level data, or item data, is further indexed and stored in an application-aware manner. The stored item data is easily accessible by many data management applications for integrated item search and recovery functions, audit functions, monitoring and supervision functions, legal discovery functions, compliance functions, archival functions, backup functions, disaster recovery functions, and more. Bulk-to-brick transformation and access of the stored item data occur off of the production system, thus contributing no performance degradation to the production system.

  • Pub Date: 2006/02/10
  • Number: 08918366
  • Owner: Mimosa Systems, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO