Dynamic mode nano-scale imaging and position control using deflection signal direct sampling of higher mode-actuated microcantilevers
An apparatus is provided and includes a cantilever having a tip at a distal end thereof disposed with the tip positioned an initial distance from a sample and a circuit electrically coupled to a substrate on which the sample is layered and the cantilever to simultaneously apply direct and alternating currents to deflect the cantilever and to cause the tip to oscillate about a point at a second distance from the sample, which is shorter than the initial distance, between first positions, at which the tip contacts the sample, and second positions, at which the tip is displaced from the sample.
Management of access rights
A system for management of access rights to operating data and/or control data of buildings or building complexes can include a communications release service running on a first server. This release service releases a communication of a user, who is registered with an identity, with the buildings or building complexes filed for him or her in a list when his or her identity corresponds with an identity filed in the list. Also, after release of the communication has taken place by the communications release service, a building authorization service running on a second server releases specific access rights for the user to operating data and/or control data of the building or building complex on the basis of access rights filed in an authorization databank.
Behavioral fingerprint controlled theft detection and recovery
A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Cryptographic control for mobile storage means
A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
Mitigating forgery of electronic submissions
Cross Site Request Forgery (CSRF) and other types of fraudulent submission in an electronic environment can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication includes a state identifier (ID). The state ID is compared to corresponding a state ID submitted in a relatively secure format, such as in a secure token or cookie. If the state ID matches a state ID in the secure token received from the user, and the state ID is valid, the submission is processed. Otherwise an interstitial page, including the state ID and a secure token, is generated to prompt the user to confirm the submission. A subsequent confirmation submission will contain the proper state ID and the new cookie, and can be processed. If no confirmation is received from the user with a valid state ID, the submission is not processed.
Data protecting device
An event condition is checked, using a computer and data content of the computer is additionally protected in relation to a normal data protection according to the event condition. The event condition is detecting by the computer a remote command and/or detecting a state according to a policy.
Anti-phishing system based on end user data submission quarantine periods for new websites
Quarantine periods longer than anticipated working lifetimes for phishing websites are used to protect users from phishing attacks. A central server or the like receives data indicating user attempts to submit confidential information to websites from a plurality of user computers. The received data is aggregated, and used to track website activity concerning solicitation of confidential information. The central server acquires and maintains current statistical data concerning phishing website lifetimes. The aggregated data concerning attempts by users to submit confidential information to websites and the current statistics concerning phishing website lifetimes are used to determine appropriate quarantine periods for websites, which can be enforced when users try to transmit confidential information to these websites.
Tiered exposure model for event correlation
A method for real-time threat monitoring includes identifying two or more real time vulnerabilities, each associated with one or more objects of an enterprise, correlating the two or more real-time vulnerabilities to each other, applying an exposure tiering model to the correlated real-time vulnerability, thereby classifying the correlated real-time vulnerability into risk tiers, and initiating an alert based on the correlated real-time vulnerability and the exposure tiers into which the correlated real-time vulnerability is classified. According to other embodiments a method includes applying an exposure methodology to log data contained in one or more object logs thereby identifying one or more security events, applying an exposure tiering model to the one or more security events, thereby classifying the security events into exposure tiers, and initiating an alert based on the security events and the exposure tiers into which the security events are classified.
Mapping between users and machines in an enterprise security assessment sharing system
Mapping between object types in an enterprise security assessment sharing (“ESAS”) system enables attacks on an enterprise network and security incidents to be better detected and capabilities to respond to be improved. The ESAS system is distributed among endpoints incorporating different security products in the enterprise network that share a commonly-utilized communications channel. An endpoint publishes a security assessment when a potential security incident is detected. The security assessment identifies the object of interest, the type of security incident and its severity. A level of confidence in the detection is also provided which is expressed by an attribute called the “fidelity”. ESAS is configured with the capabilities to map between objects, including users and machines in the enterprise network, so that security assessments applicable to one object domain can be used to generate security assessments in another object domain.
Information processing apparatus cooperating with virus management function device, and anti-virus method
An information processing apparatus provided with a first information processing unit and a second information processing unit, wherein the first information processing unit infected by a virus is cleared and normal communication restored quickly without human operation. The virus infection is quickly detected by an external virus management function device through a first communication system, a communication suspension instruction is transferred through a different second communication system having a high security level to the first information processing unit, and communication by the first communication system is disconnected. Further, anti-virus solution information is transferred to the first processing unit through the second communication system, and virus removal in the first processing unit is carried out. Further, after removal, the disconnected communication is restarted.
The invention provides methods and systems for detecting exploits. A received file is examined to determine whether or not it corresponds to any of one or more predetermined models of normal file types. If the received file does not correspond to any of the one or more predetermined models of normal file types, it is flagged as a potential exploit.
Instant messaging malware protection
A system including a content server and a plurality of instant messaging clients is configured to enable each client device to scan for malware on incoming or outgoing instant messages. The content server may receive malware configuration information and distribute the malware configuration information to each client device. Each client device may employ the malware configuration information to perform a number of actions, including determining one or more malware scanners to use, selectively scanning incoming or outgoing instant messages, reporting instances of malware that are detected, or selectively restricting one or more instant messaging functions. The system may include a malware information repository that receives and reports of detected malware, analyzes the reports, and determines sources of malware.
Device for analyzing and diagnosing network traffic, a system for analyzing and diagnosing network traffic, and a system for tracing network traffic
A system detects the presence of illegal access attacks. The device for analyzing and diagnosing network traffic divides packets into k (k>0) types based on protocol type and port number, etc., a component observing the number of distinct values of one or more pre-specified fields in packet header for each packet type, for all packets that have transited the observation points in a network, an element observing the number of distinct values of one or more pre-specified fields in the packet payload for each packet type, for all packets that have transited the observation points in a network, and a diagnosis element determining whether the network is abnormal when the number of distinct values observed in fields of each packet type crosses a specified ratio-threshold within a predetermined interval. This enables detection of small-scale DoS attacks with little change in addresses number, improving illegal access detection accuracy.
System and method of monitoring and controlling application files
A system for identifying and notifying computers of malicious software programs over an Internet. The system includes a first client inventory module configured to scan a first computer so as to find an un-identified software program and to upload information associated with the un-identified software program; a first upload-download module in communication with the first client inventory module and configured to upload information associated with the un-identified software program over the Internet to a database factory for determination of whether said software program is a malicious software program and producing information identifying the determined malicious software program; a second upload-download module in communication with the database factory and configured to receive information relating to the determined malicious software programs from the database factory; and a second client inventory module in communication with the second upload-download module and configured to receive and store the information associated with the determined malicious software program to a second computer.
Techniques to explain authorization origins for protected resource objects in a resource object domain
Techniques to explain authorization origins for protected objects in an object domain are disclosed. In one embodiment, for example, an apparatus may comprise a processor circuit, a request processor component operative on the processor circuit to receive and process a request for an authorization origin of a resource object, the authorization origin comprising an access control with a permission arranged to control access to the resource object based on an identity, and a resource origin component operative on the processor circuit to identify the authorization origin of the resource object from a set of interrelated resource objects and associated access controls, retrieve authorization origin information for the authorization origin, and present the authorization origin information in a user interface view. Other embodiments are described and claimed.
Method for activating functions of a tachograph
A method for activating functions of at least one tachograph having a control unit and an interface. The control unit is activated by a program to perform a first group of functions. First, a connection of an external storage medium to the interface of the at least one tachograph is established. The storage medium has at least one instruction for activating a function, which can be read out by the control unit. An authentication between the external storage medium and the control unit also takes place. The function associated with the at least one instruction is activated in such a way that the function is associated with the first group of the control unit. Next, the connection between the external storage medium and the interface of the at least one tachograph is released.
Network security system
A method and system for preventing an unacceptable data packet directed at a computing device on a first network and sent from a client device. The method includes a step of providing a network security system remotely from the first network and the client device, the network security system having a public address and including a load balancer and at least one network security subsystem having a private address, the network security subsystem further including an intrusion detection module, the load balancer of the network security subsystem receiving the data packet destined for the computing device. The load balancer translates the destination address of the packet from the public address of the network security system to the private address of the network security subsystem and forwards the packet to the intrusion detection module of the network security subsystem. The intrusion detection module then determines whether the packet is an intrusion attempt. If the packet is not the intrusion attempt, the destination address for the packet is translated to the address of the computing device, the packet source address is translated to the public address of the network security system and the packet is forwarded to the computing device. Finally, if the packet is the intrusion attempt, a network intrusion prevention technique is performed.
Method and apparatus of managing entitlement management message for supporting mobility of DCAS host
A method of supporting a mobility of a Downloadable Conditional Access System (DCAS) host is provided. The method includes: by the second authentication proxy server: performing mutual authentication with a secure micro of the host to generate a session key; requesting an integrated personalization system to download a secure micro client to the host, wherein the secure micro client is encoded using the session key; and transmitting, to a DPS, mapping information between the second authentication proxy server and the secure micro of the host, wherein, in response to receiving the mapping information, the DPS instructs a CAS server to transmit an entitlement management message to the network of the second authentication proxy server without transmitting the entitlement management message to the network of the first authentication proxy server.
Providing services within a network of service providers sharing an authentication service and a set of business rules. A central server receives a first request from a first server to provide a first service to a user via a client without forcing the user to present credentials. In response to the received first request, the central server stores data identifying the first service on the client. The central server further receives a second request from a second server to provide a second service to the user via the client after the user presents the credentials to the second service. After receiving the second request and the presented credentials, the central server allows the user access to the second service. In response to allowing the user access to the second service, the central server further allows the user access to the first service as a result of the stored data.
Applications login using a mechanism relating sub-tokens to the quality of a master token
Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction.
Method for the unique authentication of a user by service providers
A method for unique authentication of a user including federating an identity of said user for said service provider and an identity of the user for an identity provider, the federating including the steps of generating a user alias for that service provider and sending said identity provider a masked alias deduced from said alias, the identity provider associating said masked alias for that service provider with the identity of the user for the identity provider and sending the user elements for calculation by the user of a signature of a message containing the non-masked alias calculating said signature and sending the service provider said message with said signature, and the service provider verifying said signature, authenticating the user, and associating said alias with the user's identity.
Multiple independent authentications for enhanced security
A system and associated method for providing enhanced site access security by use of multiple authentications from independent sources. A security enhanced user service system has components of a user authentication process, a service application, a multi-authentication module and an authentication database. A user attempting to use the service application accesses through a client system that is coupled to the security enhanced user service system. The user authentication process receives login information from the user, checks for validity, and sends to the multi-authentication module to further verify the login information. The multi-authentication module generates a grant or denial by use of predefined logical condition to satisfy for the grant response, data stored in the authentication database, another security enhanced user service system etc., pursuant to a specific configuration.
System, method and program for user authentication, and recording medium on which the program is recorded
A method, and system, and computer program product for authenticating a user. A first server of a plurality of servers receives an access request from the user to access a federated computing environment that comprises multiple servers. After receiving the access request, the first server: receives input authentication information from the user, obtains a server address of a second server having an authentication policy that matches an authentication policy of the first server, transmits the input authentication information to the second server via the server address of the second server, receives from the second server a notification that the second server has successfully authorized the user, and permits the user to access the federated computing environment.
Method and system for generating digital fingerprint
A method and system for authenticating the identity of a client device that is calling a remotely located server over a network. A client device inputs information pertaining to a hardware characteristic and a network address thereof into a cryptographic hash function stored on the client device. The hash function computes a unique registration ID hash code and presents it to the system server during a registration process. The system server then generates a digital certificate having a system-side key (i.e., public key). A client-side key (i.e., private key) is provided to the client device. For all future calls to the system server, the client device re-computes its registration ID hash code and then digitally signs it using its client-side key. The system server then uses its system-side key to examine the digitally signed registration ID hash code to authenticate the identity of the client device. Since the registration ID hash code is not stored on the client device, but rather re-computed each time the client device makes a call to the system server, a high degree of security is achieved.
System, devices and method for secure authentication
A system, devices and method for authenticating a user requesting access, through a computing device connected to a network, to an on-line resource hosted by a server in communication with the network. The system, devices and method employing an authentication server and a mobile communications device in communication over a wireless network. The authentication server forwarding an authentication to the mobile communications device. Optionally, the authentication server also returning security information related to the authentication in response to the request. The mobile communications device operative to receive and process the authentication, and forward the processed authentication to the computing device over a short-range communications link.
Access control device, access control method, program, storage medium, and integrated circuit
An access control device for use in a system for providing users with a content access service, the access control device obtaining a content including one or more pieces of personal information, storing a plurality of pieces of personal information in correspondence with a plurality of pieces of first user information each of which indicates one of (i) a user who is permitted by a person related to a corresponding piece of personal information to access a content including the corresponding piece of personal information, and (ii) a user who is not permitted by the person related to the corresponding piece of personal information to access the content, and determining whether or not to give permission to access the content obtained by the obtaining unit, in accordance with a piece of first user information stored in the storage unit in correspondence with the piece of personal information included in the content.
Wireless access device and method
The disclosure discloses a wireless access device (2), which includes: a wireless module (204) which establishes a wireless connection with a network, a solid state memory (203) partitioned into different storage volumes, a driver management module (202) and an enumeration management module (201). In the solid state memory, the fourth storage volume stores a bootstrap, the first storage volume stores an operating system and system management software, and the third storage volume stores encryption driver management software, device drive software and device management software. The driver management module (202) stores storage volume information. The enumeration management module (201) enumerates the fourth storage volume storing the bootstrap as a driver after the wireless access device is powered on, and is switched to a host mode or a peripheral device mode according to the received command indicating to switch to the host module transmitted by the bootstrap which is run on computer device and the storage volume information in the driver management module. The disclosure also discloses a wireless access method. The purpose of the disclosure is to provide the wireless access device which is easy to be maintained and convenient for carry, and the wireless access method, so as to improve user experience and security.
System and method for securing a credential via user and server verification
Systems and methods for securing a credential generated by or stored in an authentication token during an attempt to access a service, application, or resource are provided. A secure processor receives a credential from an authentication token and securely stores the credential. The secure processor then verifies the identity of the individual attempting to use the authentication token and cryptographically verifies the identity of the server being accessed. The credential is only released for transmission to the server if both the identity of the individual and the identity of the server are successfully verified. Alternatively, a secure connection is established between the secure processor and the server being accessed and a secure connection is established between the secure processor and a computing device. The establishment of the secure connections verifies the identity of the server. After the secure connections are established, the identity of the user is verified.
Apparatus and method for protecting system in virtualized environment
Provided is an apparatus and method for protecting a system in a virtualized environment. The apparatus includes a domain unit including a plurality of domains, each having one or more device drivers; a system resource unit forming hardware of the system; a direct memory access (DMA) driver; and a control unit including an access control module which controls the access of the domain unit to the system resource unit in the virtualized environment.
Management of context-aware policies
A method includes obtaining input to modify a policy of a set of context-aware document policies. A policy of the set is applicable to a requested action on a document so as to indicate allowability of the requested action based at least on satisfaction of a condition of the policy that relates to a content of the document. When a plurality of policies of the set are applicable to the requested action on the document, allowability of the requested action is determined by the allowability that is indicated by application of the applicable policy with a highest priority. The modified policy is compared with another policy of the set. If the comparison indicates the modified policy and the other policy are applicable to a single requested action on a single document, the set of policies is automatically ensured to remain self consistent.
Encrypted chunk-based rapid data encryption policy compliance
To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.
Multimedia mobile personalization system
A multimedia mobile personalization system provides a remote control that detects a user's electronic tag, e.g. an RFID tag. The remote control notifies a multimedia device of the user's identity. The multimedia devices tailors it operations to the user's preferences stored locally. Multimedia content such as broadcast or recorded television programs, music play lists, and the like could be sorted, displayed, or restricted, depending on the user identifier.
Seat end program cache updates for inflight entertainment system
An inflight entertainment system and method for use therein reduce the loading time required to preload programs identified in playlists onto seat end equipment. Loading time is reduced by retaining programs included in playlists on seat end equipment across flights and making incremental updates to such programs to account for changes in playlists, rather than updating them wholesale for each flight. Loading time is further reduced by adding programs to seat end equipment for the current flight, where possible, by copying such programs from other seat end equipment, rather than copying them from head end equipment.
Broadcast receiving device
A broadcast receiving device capable of easily setting area information. A control unit of a DVR transmits an acquisition request for area information to a TV. When the control unit receives a response to the acquisition request from the TV, the control unit extracts area information from the received response and performs a channel presetting using the extracted area information. A control unit of the TV has area information stored therein. When the control unit receives an acquisition request for area information from the DVR, the control unit transmits, as a response to the request, the stored area information to the DVR.
Method and apparatus for scheduling broadcast information
Methods and apparatus are disclosed for efficiently scheduling incoming information objects so that objects with the highest utility factors are scheduled for broadcast. The incoming information objects are preferably received from one or more information sources, and can be tagged with attributes that associate each object with one or more classes of information (e.g., sports, news, etc.), and/or can provide a gauge of the utility of the object. The tags can be used, for example, to select and broadcast objects from a variety of classes, and/or to identify the objects that provide the most utility at any given time.
Home entertainment system and method of its operation
An EPG database for a home entertainment system includes files that contain information about television programs retrievable by time and channel. The files are linked to each other so information about a future television program can be obtained by accessing a file about a current television program. A current television program displayed on the screen of a home entertainment system includes an announcement or advertisement of a future television program. The availability of an electronic program guide function (e.g., record, watch, details, display time, display channel, display by theme, and Internet connection) is signaled during, before, or after the announcement. A command is issued to invoke the EPG function. The information about the future television program is retrieved from the file about the current television program in the database. The EPG function is executed with the retrieved information. As a result, an EPG function can be performed with respect to a future television program without embedding information about the future television program in the television signal.
Portable terminal, displaying method, and storage medium
A portable terminal includes an obtaining unit configured to obtain program information via a network from a providing apparatus that provides the program information, the program information being used to display a program guide; a program-information storing unit configured to store the program information obtained; a displaying unit configured to display the program guide according to the obtained program information; and a display controlling unit configured to control display of the program guide so that the program guide is displayed according to the program information stored in the program-information storing unit. When an instruction for displaying a program guide is received, the obtaining unit newly obtains program information for updating the program information stored in the program information storing unit from the providing apparatus if the portable terminal is connected to the providing apparatus via the network.
Synchronizing video content with extrinsic data
Disclosed are various embodiments for associating and synchronizing extrinsic data with video content at particular points of time in the video content. A user interface is rendered that facilitates a selection from extrinsic data items that are associated with a video content feature that is currently being presented to a user. A user selection of one of the extrinsic data items is obtained through the user interface, and a time in the video content feature is determined corresponding to the user selection. The user selection of the one of the extrinsic data items and the time in the video content feature are reported to a server.
Crowd sourced, content aware smarter television systems
Method, system, and computer program product for performing an operation, the operation including broadcasting one or more media streams to one or more remote devices, the remote devices configured to provide feedback related to the one or more media streams, the remote devices configured to display a media stream on a television coupled to the remote device. The operation then aggregates, based on a predefined aggregation criterion, feedback received from the remote devices related to a first media stream. The operation then, upon determining that the aggregated feedback of the first media stream exceeds a predefined threshold for the predefined aggregation criterion, marks the first media stream based on the predefined aggregation criterion, the remote devices configured to, responsive to receiving the marked first media stream, perform a predefined operation to effect prioritized display of the first media stream on the television.
In-home monitoring method and system having a video camera connected to a set-top box
Provided is a method of receiving digital television programming content from a television service provider, receiving a first user input of a selected digital television programming content, receiving a message from a system, in response to receiving the message, causing a notification to be displayed on the television as an overlay over the displayed television programming content, receiving a first user command, determining a first control message to transmit to the system in response to receiving the first user command, transmitting the first control message. Also provided is a system including a video camera, an entry way security system, an HVAC system, a lighting system, an alarm system, or other system. User inputs may be received via a remote control to a set top box or from a computing device at a remote computer system through the internet and/or a mobile telephone network.
Systems and methods for distributing and redeeming credits on a broadcast system
Methods and systems enable receiving on mobile devices credits, tokens or coupons from mobile TV broadcast service providers. Credits may be delivered via direct unicast messages such as SMS or e-mail, or via broadcast provisioning messages. Subscription response messages may be used to deliver credits to mobile devises which transmit a request for service. Broadcast service providers may push credits to mobile devices by transmitting a solicited pull message or a credit grant push message. Credits may be sent to mobile devices within a credit response message or a long term decryption key message. Credits may be used a purchase transaction, with the broadcast service provider controlling redemption of credits by sending an a long term decryption key message via a unicast network or a short term decryption key message via the broadcast network to cause mobile devices to decrement their stored credits.
Method of providing an IPTV service
A method of providing an Internet protocol television service to a subscriber, and a network element to execute this method. At an acquisition tier, IPTV packets are generated from video stream data of one or more video channels and transmitted to a FCC server cluster at a client-facing tier. IPTV packets associated with one of the one or more video channels selected by the subscriber are delivered from the deliver server cluster to a receiver of the subscriber at a client tier wherein the IPTV packets associated with the one of the one or more video channels are reassembled at said receiver into a coherent video stream. Said generated IPTV packets are routed from a network (5) of a TV broadcaster to networks of one or more TV operators or from a network of a TV operator to networks of one or more TV operators by means of IPTV service routers installed at an intertwine tier arranged between the acquisition tier and the client-facing tier.
Hardware communications infrastructure supporting location transparency and dynamic partial reconfiguration
A communication system according to one aspect of the present invention, comprises one or more integrated circuits. The one or more integrated circuits comprise at least one of a local integrated circuit and a remote integrated circuit. At least one sending application hardware module located on the local integrated circuit has a sending logic that controls the sending of messages from the sending application hardware module. At least one receiving application hardware module is located on at least one of the local integrated circuit or remote integrated circuit. A sending application hardware module sends messages to a receiving application hardware module without its sending logic having been constructed with a priori knowledge of the address of or the path to said receiving application hardware module. A dispatch logic located on the local integrated circuit that routes at least one or more.
Web service API for unified contact store
An Application Programming Interface (API) provides functions for interacting with contact lists and contacts that are stored in a unified contact store by a primary contact service. For example, a client of a unified communications service may use the API to access contact information that is stored with a primary contact service (e.g. a messaging application/service). The contact information is maintained by the primary contact service. The API includes functions such as, but not limited to: adding a new IM contact to a group, adding a new IM group, removing an IM contact from a group, adding a distribution group to an IM list, getting an IM item list, and tagging an IM contact. The contacts may be obtained from the primary contact service and temporarily stored by the client (e.g. within a cache) of a different service.
Dynamic evocations for computer event management
According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to detect a plurality of computer events, determine an event severity for each event, select a set of the events having a highest severity of the plurality of events, determine an event category for each event in the set of events, display an event management console including an entry for each event of the set of events, each entry in the event management console including at least an event description and an event severity indicator that indicates event severity, and wherein the displayed event management console also includes one or more evocations for each event category of the set of events, each evocation providing a suggested course of action to address events of the event category.
Techniques for displaying impressions in documents delivered over a computer network
In one embodiment, an impression to be displayed in a placement of a web page is selected from candidate impressions that may be displayed in the placement. The candidate impression may be chosen based on behavioral data and a placement identifier particularly identifying the placement. The behavioral data may include categories of websites visited by an end-user on the client computer. The candidate impressions may be in learning modes, and the impression displayed in the placement may be selected based on its learning mode and revenue generation capability.
System and method for enabling interaction between a cloud application and a local application
A system and method for enabling interaction between one or more cloud applications and one or more local applications is provided. A web page of a cloud application is displayed on a web browser. The URL of the web page of the cloud application is extracted and analyzed. In other embodiments, the title or other metadata of the web page of the cloud application can be extracted and analyzed. An invoking application analyzes the URL, title, or other metadata to determine whether a local application is compatible with the cloud application. If it is determined that the local application is compatible, then the local application is activated to enable its interaction with the cloud application, and the functionalities of the local application may be used over the cloud application.
Object synchronization in shared object space
A shared object space in a computer system provides synchronized access to data objects accessible to a plurality of concurrently running applications in the computer system. The shared object space is allocated a portion of memory of the computer system and concurrently running applications are able to connect to the shared object space. The shared object space restricts simultaneous access to data objects by the concurrently running applications by associating locks with the data objects.
System and method for ordering tasks with complex interrelationships
One or more embodiments of the invention enable a system and method for ordering tasks with complex interrelationships. The present invention as described herein may be used to produce a linear ordering of tasks with complex interrelationships including dependencies and constraints. In one or more embodiments optional tasks may be permitted such that a given task may or may not be added to the execution queue depending on the scheduling of earlier tasks following evaluation of their dependencies—that is, the system of the invention supports the management of optional tasks in a task ordering operation where some or all of tasks have complex interdependencies.
Speculative thread execution and asynchronous conflict events
In an embodiment, asynchronous conflict events are received during a previous rollback period. Each of the asynchronous conflict events represent conflicts encountered by speculative execution of a first plurality of work units and may be received out-of-order. During a current rollback period, a first work unit is determined whose speculative execution raised one of the asynchronous conflict events, and the first work unit is older than all other of the first plurality of work units. A second plurality of work units are determined, whose ages are equal to or older than the first work unit, wherein each of the second plurality of work units are assigned to respective executing threads. Rollbacks of the second plurality of work units are performed. After the rollbacks of the second plurality of work units are performed, speculative executions of the second plurality of work units are initiated in age order, from oldest to youngest.
Job scheduling to balance energy consumption and schedule performance
A computer program product including computer usable program code embodied on a computer usable medium, the computer program product comprising: computer usable program code for identifying job performance data for a plurality of representative jobs; computer usable program code for running a simulation of backfill-based job scheduling of the plurality of jobs at various combinations of a run-time over-estimation value and a processor adjustment value, wherein the simulation generates data including energy consumption and job delay; computer usable program code for identifying one of the combinations of a run-time over-estimation value and a processor adjustment value that optimize the mathematical product of an energy consumption parameter and a job delay parameter using the simulation generated data for the plurality of jobs; and computer usable program code for scheduling jobs submitted to a processor using the identified combination of a run-time over-estimation value and a processor adjustment value.
Software update techniques based on ascertained identities
Software update techniques are described. In at least one implementation, updates are filtered based on criticality to operation of one or more items of software. A plurality of identities are published to a plurality of computing devices, each for a respective one of the updates that are filtered as being critical to the operation of the one or more items of software. The updates that are not filtered as being critical to the operation of the one or more items of software are made available via polling.
Automated diversity using return oriented programming
A method of automatically creating functionally and structurally diverse equivalent copies of software executables using return oriented programming for the purpose of passing through a filter and other purposes includes starting with a program and a target runtime environment, creating a return oriented instruction library having a plurality of code fragments which end in a ‘return’ instruction from the program and chaining fragments together to automatically form diverse equivalent copies of software executables using return oriented programming.
Display of data from parallel programming contexts
The display of a debugging interface for use with parallel computing. When a break state has been entered in a particular code context (such as a method) by a particular execution context (such as a thread), related execution contexts are found that were also executing in the particular code context. While in the break state, multiple expressions are then evaluated for each of the execution contexts. The results are then displayed with perhaps navigation controls that allow the results to be efficiently navigated.
Identifying structured data types as requiring designated initializers
A technique for enforcing the use of designated initializers in structured type initializations may include determining whether structured data type requires designated initialization, determining whether an initialization of a structured variable declared to use the structured data type employs an improper initializer that is inconsistent with said structured data type, and performing a diagnostic action if the initialization comprises an improper initializer.
Counting instruction execution and data accesses
A data processing system for processing instructions is shown. Instructions are received at a processor in the data processing system. If a selected indicator is associated with the instruction, counting of each event associated with the execution of the instruction is enabled.
Predictive run testing
A test object can be selectively included in a test run based on predicting the behavior of the test object. In one embodiment, the present invention includes predicting how likely the test object is to produce a failure in a test run and deciding whether to include the test object in the test run based on the predicted likelihood. This likelihood of producing a failure may be based on any number of circumstances. For example, these circumstances may include the history of prior failures and/or the length of time since the test object was last included in a test run.
System and method for effectively processing software changes
This invention discloses a software development system that includes a user input device, a compiler, a build microprocessor and a data storage. The data storage stores a built program built by the build microprocessor by packaging a plurality of heterogeneous program units comprises at least a binary program-unit processed by the compiler and at least a non-compiled program unit inputted by a user to the built microprocessor through the user input device. The program unit to be compiled into binary program unit and the non-compiled program unit stored in the data storage are programmed by at least two different programming languages.
Mining sequential patterns in weighted directed graphs
A method for finding sequential patterns of attributes in a directed graph includes constructing a directed graph comprising multiple nodes and edges between the nodes. Each of the nodes may be assigned one or more attributes. Similarly, each of the edges may be assigned a weight value which may indicate the probably the edge will be traversed during traversal of the directed graph. The method may further include finding sequences of attributes in the directed graph that have some minimum amount of frequency and/or time support. In performing this step, the frequency support of each individual instance of a sequence of attributes may be calculated by multiplying the weight values along the edge or edges of the instance. A corresponding apparatus and computer program product are also disclosed and claimed herein.
Method, apparatus, and article of manufacture for providing in situ, customizable information in designing electronic circuits with electrical awareness
Disclosed are a method, system, and computer program product for providing customizable information in designing electronic circuits with electrical awareness. The method or the system displays a portion of a physical design of an electronic circuit in a first display area. The method or the system receives or identifies a user's or a system's manipulation of the portion of the physical design of the electronic circuit. The method or the system then determines and displays an in situ response to the manipulation in the first display area. The method or the system may further display, in the first display area or in another display area, result(s) relating to the physical data of a component, electrical parasitic(s) associated with the physical data, electrical characteristic(s) associated with the physical data or the electrical characteristic(s), or other element(s) of the physical design that is impacted by the manipulation.
Optimizing designs of integrated circuits
Methods and systems for optimizing and/or designing integrated circuits. One exemplary method includes routing, as part of a process of designing an integrated circuit (IC), connections on a representation of the IC using a first set of wiring resources and marking wiring resources as used once the wiring resources within the first set have been used for routing and routing, using a second set of wiring resources in the representation, connections on the IC without checking whether wiring resources within the second set have been previously used to route connections, wherein wiring resources in the second set differ, on average, in physical size, from wiring resources in the first set. Other methods and systems for optimizing and/or designing ICs are also described, and machine-readable media containing executable program instructions which cause systems to perform one or more of these methods are also described.
Method of analytical placement with weighted-average wirelength model
A computer-implemented method to generate a placement for a plurality of instances for an integrated circuit (IC) by utilizing a novel weighted-average (WA) wirelength model, which outperforms a well-known log-sum-exp wirelength model, to approximate the total wirelength. The placement is determined by performing an optimization process on an objective function which includes a wirelength function approximated by the WA wirelength model. The method can be extended to generate a placement for a plurality of instances for a three-dimensional (3D) integrated circuit (IC) which considers the sizes of through-silicon vias (TSVs) and the physical positions for TSV insertion. With the physical positions of TSVs determined during placement, 3D routing can easily be accomplished with better routed wirelength, TSV counts, and total silicon area.
Semiconductor apparatus capable of error revision using pin extension technique and design method therefor
A semiconductor apparatus and a design method for the semiconductor apparatus allow debugging or repairs by using a spare cell. The semiconductor apparatus includes a plurality of metal layers. At least one repair block performs a predetermined function. A spare block is capable of substituting for a function of the repair block. And at least one of the plurality of metal layers is predetermined to be a repair layer for error revision. At least one pin of the repair block is connected to the repair layer through a first pin extension, and at least one pin of the spare block is capable of extending to the repair layer. When the repair block is to be repaired, the pin extension of the repair layer and the repair block is disconnected, and at least one pin of the spare block is connected to the repair layer through a second pin extension.
Methods for designing integrated circuits employing pre-determined timing-realizable clock-insertion delays and integrated circuit design tools
A method of designing an integrated circuit, an EDA tool, an apparatus and a computer-readable medium are disclosed herein. In one embodiment, the method includes: (1) generating a set of constraint equations representing clock-insertion delay values for the integrated circuit as variables, (2) determining bounds on each of the clock-insertion delay values based on the constraint equations and (3) generating a set of closing commands based on the bounds for driving a design of the integrated circuit to closure, wherein each step of the method is carried out by at least one EDA tool.
Method and apparatus of an integrated circuit
A computer-implemented method for interconnect redundancy of a circuit design comprises the steps of setting Manhattan distance being less than or equal to three pitches; placing a plurality of dummy micro bumps on at least one side of a die including a signal bump formed on the at least one side; determining an interconnecting candidate by selecting from the dummy micro bumps, which is distant from the signal bump by the Manhattan distance; and providing a routing path between the at least one interconnecting candidate and the signal bump.
Method of proving formal test bench fault detection coverage
Some aspects of the present disclosure provide for a system and method to discover which parts of a design a formal test suite can detect faults in, and thus how much of a design structure is covered by a property set. A mutatable RTL design is defined which allows for modification of a part of an RTL design from its intended behavior to a non-intended behavior, thus introducing unwanted effects. The mutatable RTL design can then be synthesized to produce a functional representation of the design. The property set can be re-run on the synthesized design to see whether the functional representation of the design is sensitive to the unwanted effect and thus whether formal verification can detect the modification.
M and A for importing hardware description language into a system level design environment
A method for importing a design in hardware description language (HDL) into a system level design tool includes setting a sampling time. The simulation model template is generated with the sampling time according to a selected simulation model type.
3D remote control system employing absolute and relative position detection
The present invention can include three-dimensional remote control systems that can detect an absolute location to which a remote control is pointing in first and second orthogonal axes and an absolute position of the remote control in a third orthogonal axis. Remote control systems of the present invention can employ absolute position detection with relative position detection. Absolute position detection can indicate an initial absolute position of the remote control and relative position detection can indicate changes in the position of the remote control. By combining absolute and relative position detection, remote control systems of the present invention can track remote controls more precisely than systems that only employ absolute position detection. The present invention also can include methods and apparatus for zooming in and out of an image shown on a display based on the absolute position of the remote control in the third axis.
Expandable user interface menu
Expandable user interface menu techniques are described, including displaying a menu having a menu item, receiving an input indicating selection of the menu item, and expanding the menu, based on one or more parameters associated with the menu item, to present a structure configured to receive another input associated with the menu item, the menu item remaining displayed while the menu is expanded.
Method and apparatus for providing a display interface utilizing a plurality of display states
A method and apparatus for displaying data. In one embodiment, the method displays a summary icon at an intersection of a row and a column in a first display state. The method similarly displays the summary icon and the data represented by the summary icon by expanding a display pane to accommodate the data in a second display state.
Application reporting in an application-selectable user interface
This document describes techniques for application reporting in an application-selectable user interface. These techniques permit a user to view reports for applications in a user interface through which these applications may be selected. By so doing, a user may quickly and easily determine which applications to select based on their respective reports and then select them or their content through the user interface.
Visualization profiles and templates for auto-configuration of industrial automation systems
A visualization system utilizing pre-configured visualization profiles and templates to reduce the level of effort and time required to commission an industrial automation visualization system. The preconfigured visualization profiles and templates include graphic displays, informational reports and data sampling and collection strategies appropriate for the specific sector of manufacturing or industry.
Separation and interlinkage of UI model and service layer model
A computer-implemented system may include reception, from a user interface client application, of a user interface request conforming to a user interface component model, translation of the user interface request from the user interface component model to a business object model, execution of interactions associated with the translated request with a backend service layer, the interactions conforming to the business object model, determination of business object node changes and business object property changes conforming to the business object model and corresponding to the interactions, translation of the business object node changes and the business object property changes to user interface data changes and user interface event property changes conforming to the user interface component model, and provision of the user interface data changes and user interface event property changes to the user interface client.
Webpages with conditional content
Methods and apparatus for generation and execution of configurable bookmarks
Techniques, including systems and methods for configuring a bookmark are disclosed. A bookmark is configured such that the bookmark has one or more variables and/or one or more commands associated therewith. A value is dynamically substituted for each variable of the bookmark. The value(s) of the bookmark are used in execution of the bookmark.
System and method for aggregating multi-protocol flows for network monitoring
A system and method for aggregating IP flows in a telecommunication network is disclosed. A multi-protocol flow representing packets captured from the telecommunications network during a selected time period is displayed on a user interface of a network monitoring system. The multi-protocol flow is highlighted on the user interface display if any session records within the multi-protocol flow do not meet operator-defined criteria. The user interface detects a user's selection of the multi-protocol flow and displays a plurality of protocol-specific flows that are within the multi-protocol flow. The user interface detects the user's selection of one of the protocol-specific flows and displays a plurality of session flows that are within the selected protocol-specific flow. Any session records that do not meet operator-defined criteria are highlighted on the user interface.
Method and apparatus for displaying logical information on storage and network devices
A method and apparatus for displaying logical information upon devices within a computer system. The method and apparatus include a logical volume information server coupled to a volume manager that provides the logical information that is created by the volume manager to at least one device. The at least one device comprise a logical volume information client that receives the logical information from the logical volume information server and displays that logical volume information upon the network or storage device. In this manner, an operator may quickly identify the logical information that corresponds to a physical device within a network or a storage appliance.
System and method for organizing recorded events using character tags
A computer system organizes text narratives and images about events using character tags, which are tags that are defined by users with respect to those persons that are depicted in the text narratives and images. Each character tag is associated with either a user profile or a pseudo-profile. A pseudo-profile for a person is created by a user when the user does not know if the person has a user profile in the computer system. An invitation e-mail that is sent to a prospective user may include content stored in the computer system, or a hyperlink to such content, that has been tagged with the character tag of the prospective user.
System and method for automatic generation of presentations based on agenda
In enterprises, presentations are designed and made to visiting clients on a routine basis and it is expected that such presentations be effective as much of business depends on right kind of information in right depth and volume made to right audience. The typically followed manual process depends on the capabilities of a person to create such presentations. It is required to obtain as little information as possible to generate presentations as much automatically as possible. The automatic generation of presentations is based on (a) agenda; (b) audience profile; and (c) templates. The system analyzes an agenda and audience profile to obtain adequate information to identify the most appropriate templates and uses the same to generate one or more draft presentation versions that best match the requirements of the agenda. Further, the invention also provides for an automatic generation of (a) slide annotations; (b) presentation theme; and (c) templates.
Computer-based method, software module and computer program product for processing information in transaction-tax related applications
A computer-based method is used for completing missing data needed in a transaction-tax-related application, where the method uses completing rules that define, depending on which missing data needs to be completed, what further data might be considered for deriving the missing data. A completing rule associated with the missing data is evaluated, and an auto-completion certainty parameter is determined as a result of the completing rule evaluation. Completed data is derived according to the certainty parameter.
Method and apparatus for channel encoding and decoding in a communication system using a low-density parity check code
A method is provided for channel encoding in a communication system using a Low-Density Parity Check (LDPC) code. The method includes grouping information bits into a plurality of groups; determining an order of the plurality of groups to be shortened, based on a ratio of a number of bits to be shortened to a number of bits to be punctured; determining a length of an information word to be obtained by shortening the plurality of groups; shortening the plurality of groups on a group basis in the determined order based on the determined length of the information word; and LDPC-encoding a shortened information word.
Apparatus and method for channel encoding and decoding based on low-density parity check code in multiple antenna communication system
Methods and apparatuses are provided for achieving maximum diversity gain through channel coding based on a Low-Density Parity-Check (LDPC) code in a multiple antenna communication system. A method includes determining a parity-check matrix; generating a codeword using the parity-check matrix; puncturing a part of an information word; dividing a parity into a plurality of partial parities based on a number of transmit antennas; transmitting an unpunctured part of the information word and a partial parity over a first antenna; and transmitting at least one other partial parity over at least one other transmit antenna.
Method and entity for probabilistic symmetrical encryption
The invention relates to a method of probabilistic symmetric encryption of a plaintext message element with the aid of a secret key that can be represented in the form of a matrix. It comprises an operation of encrypting the plaintext message element, with the aid of the matrix parametrized by a random vector, so as to obtain an encrypted message element coupled to the random vector. Furthermore, there is envisaged a step of encoding the plaintext message element as a code word with the aid of an error correcting code having a given correction capacity and a step of adding a noise vector. The error correcting code and the noise vector are adapted so that the Hamming weight of the noise vector is less than or equal to the correction capacity of the correcting code.
DTV transmitting system and method of processing broadcast data
A DTV transmitting system includes an encoder, a randomizer, a block processor, a group formatter, a deinterleaver, and a packet formatter. The encoder codes enhanced data for error correction, permutes the coded data, and further codes the permuted data for error detection. The randomizer randomizes the coded enhanced data, and the block processor codes the randomized data at an effective coding rate of 1/H. The group formatter forms a group of enhanced data having data regions, and inserts the coded enhanced data into at least one of the data regions. The deinterleaver deinterleaves the group of enhanced data, and the packet formatter formats the deinterleaved data into corresponding data bytes.
Determining a message residue
A technique of determining a message residue includes accessing a message and simultaneously determining a set of modular remainders with respect to a polynomial for different respective segments of the message. The technique also includes determining a modular remainder with respect to the polynomial for the message based on the set of modular remainders and a set of constants determined prior to accessing the message. The modular remainder with respect to the polynomial for the message is stored in a memory.
Systems and methods for enhanced bit correlation usage
The present invention is related to systems and methods for applying a data decode algorithm to different rotations or modifications of a decoder input as part of data processing.
Apparatus and method for mapping and demapping signals in a communication system using a low density parity check code
An apparatus and method for mapping and demapping signals in a system using a Low Density Parity Check (LDPC) code are provided. In the method, LDPC codeword bits are written column-wise and read row-wise, substreams are generated by demultiplexing the read bits using a demultiplexing scheme, and bits included in each of the substreams are mapped to symbols on a signal constellation. The demultiplexing scheme is determined corresponding to a modulation scheme used in the signal transmitter, a length of the LDPC codeword, and a number of the substreams.
Multi-targeting boolean satisfiability-based test pattern generation
Disclosed are representative examples of methods, apparatus, and systems for generating test patterns targeting multiple faults using Boolean Satisfiability (SAT)-based test pattern generation methods. A SAT instance is constructed based on the circuit design information and a set of faults being targeted. A SAT solving engine is applied to the SAT instance to search for a test pattern for detecting the set of faults. The SAT instance or the SAT solving engine may be modified so that the SAT solving engine will search for a test pattern for detecting a maximum number of faults in the set of faults.
Semiconductor memory apparatus including data compression test circuit
A semiconductor memory apparatus having stacked first and second chips includes a first chip test signal generation unit disposed in the first chip and configured to generate a first chip test signal in response to a first chip compression data determination signal in a test mode, a second chip test signal generation unit disposed in the second chip and configured to generate a second chip test signal in response to a second chip compression data determination signal in the test mode, and a final data determination unit configured to generate a final test signal in response to the first and second chip test signals in the test mode.
Apparatus and method for self-test in a multi-rank memory module
A memory module for operating with a system memory controller comprises a plurality of data ports, a plurality of memory devices organized in ranks, and a plurality of data handlers. Each respective data handler is coupled to a respective set of data ports of the plurality of data ports and to a respective set of memory devices of the plurality of memory devices. Each set of memory devices include at least one memory device from each rank. In a normal mode, each respective data handler is configured to provide write data received from the system memory controller via the respective data ports to the respective set of memory devices. In a test mode, each respective data handler is configured to provide test data generated in the respective data handler to the respective set of memory devices.
JTAG apparatus and method for implementing JTAG data transmission
A Joint Test Action Group (JTAG) apparatus and a method for implementing JTAG data transmission are disclosed. The JTAG apparatus includes an isolation circuit connected with a processor and pins of a JTAG programmable logic device, wherein the isolation circuit has a register/registers corresponding to the pins of the JTAG programmable logic device. Based on a high or low level signal written into the register/registers of the isolation circuit by the processor, the isolation circuit drives the pins of the JTAG programmable logic device, and transmits the JTAG data corresponding to the high or low level signal from the processor to the JTAG programmable logic device. The isolation circuit is used to implement protection of a JTAG interface or a serial port of a personal computer connected with the JTAG apparatus.
Centralized service outage communication
The centralized reporting of a service outage, where the service is offered over a network such as, for example, the Internet. Upon detecting a service outage, computing system automatically identifies characteristic(s) of the outage. Then, the computing system selects a way of reporting the outage that depends on the characteristic(s) of the outage. For instance, depending on the outage characteristic(s), the computing system might cause a particular communication channel or channels to be selected for reporting the outage. Alternatively or in addition, the content or structure of the report may differ depending on the characteristic(s) of the outage. The reporting mechanism may be centralized and service a number of other services, and even report regarding errors in the framework that supports the service.
Method and system for providing customer service information
A method and system for providing customer service information provide a central database containing software modules for tasks and services and configurations for the modules. Information is received specifying a procedure to be carried out. Software modules relating to tasks forming part of the procedure are invoked, and the information indicative of appropriate configurations for the specified procedure is passed to the software modules. The software modules access the configurations, and instantiate operational tasks applying the configurations. The operational tasks are consolidated into an operational procedure, and the operational procedure is provided to an operative.
Detecting device impairment through statistical monitoring
A tool for detecting potential impairment in an electronic device. The tool classifies the user input into various categories and determines some measurement, typically a rate of input per user or per time, for determining average use statistics of the electronic device. The tool then determines if a calculated measurement based on user inputs deviates from the average use statistics past some threshold level of deviation. In response to surpassing the threshold level of deviation, the tool identifies the electronic device as potentially impaired.
System and method for remote recovery with checkpoints and intention logs
Accurate recovery of a primary server at a recovery server is accomplished with reduced network overhead by maintaining at the recovery server checkpoints taken over time of the primary server and an intention log of logical transactions pending and complete by the primary server. The recovery server is brought to the operational state of the primary server as of failure at the primary server by recovering the most recent checkpoint and then executing the transactions indicated by the intention log as received but not complete as of the time that the checkpoint was taken.
Apparatus and method for reloading software images
An apparatus and method are disclosed for reloading software images. A copy module copies application metadata for an application image to an application metadata copy. The application metadata and application image are stored on a writable memory of a data processing device. The application metadata copy is stored remotely from the data processing device. A detection module detects an operational anomaly. An erasure module erases at least the application image on the writeable memory in response to detecting the operational anomaly. An identification module identifies the application image from the application metadata copy. A reload module reloads the application image to the writable memory using the application metadata copy.
SAS host controller cache tracking
A technique to track a host controller cache that includes receiving from a host controller a command indicating whether a cache of the host controller has data which is to be stored to a storage system. In the event that the host controller fails, perform an operation to transfer control from the host controller to another host controller based on whether the command indicates that the data of the cache was stored to the storage system.
Method and apparatus for redundancy in an ATM using hot swap hardware underlying a virtual machine
A method and apparatus for providing redundancy in an Automatic Teller Machine (ATM) is provided. The hardware platform of the ATM is configured to tolerate removal of a portion of the hardware as well as insertion of a portion of the hardware without removing power from the ATM. The insertion and replacement of hardware to a powered device is termed a “hot swap”. A hot swap may be necessitated by the failure or the upgrade of a hardware component. The hot swap is detected by a software program running on top of the hardware platform. The software program may reintegrate the replacement hardware including the location of “drivers” for the replacement software. In addition, application software may be run on top of a virtual environment such as a virtual machine and/or a virtual disk environment. Should a software component fail, the virtual environment will “crash” but the ATM hardware and operating system will remain intact. If the software is fatally flawed—e.g., due to a faulty “upgrade” the older version may be “rolled back” from a previously stored virtual environment.
System and method for providing total real-time redundancy for a plurality of client-server systems
An automated and scalable system for total real-time redundancy of a plurality of client-server systems, wherein, data is replicated through a network connection and operationally located on a virtual machine that substitutes for a failed client-server system, wherein the virtual machine is activated and installed on the cloud computing environment. Monitoring applications are installed on both the client-server systems and the cloud computing environment. System components are identified, a network connection is initiated, a heartbeat is established, data replication is automated, system failure is detected, failover is initiated, and subsequent client-server restoration is automated.
Methods and apparatus for power state based backup
Methods and apparatus that receive, at a wireless device, power through wire or inductive pad are described. The received power is monitored to back up data from the device to a server in a network through an OTA (over the air) wireless interface. The data is transmitted to the server to back up the data on the device. While backing up the data, whether the power has been removed from the device is determined. The backing up of the data in the device can be terminated automatically and without user request, in response to the determination that the power has been removed.
Power supply and data signal interface circuit with overvoltage protection
A data processing device with a power supply and data signal interface circuit has a switch for connecting an external line and an internal node. The power supply and data signal interface circuit also includes a controller for applying an enabling voltage to the switch enabling the switch to supply current between the external line and the internal node in the presence of power supply to the controller and in the absence of the overvoltage condition on the external line. The power supply and data signal interface circuit also includes a voltage reduction connection from the external line for applying a control voltage to the switch in the absence of power supply to the controller. The control voltage from the voltage reduction connection limits a voltage applied to the internal node through the switch in the presence of the overvoltage condition.
Secondary battery charging control apparatus
An information processing apparatus capable of installing a plurality of storage units includes a first supply unit configured to supply electric power to the plurality of storage units, a second supply unit configured to supply electric power to the plurality of storage units, when the first supply unit stops supplying electric power to the plurality of storage units, a charging unit configured to charge the second supply unit, a measurement unit configured to measure a time during which the second supply unit supplies electric power to the plurality of storage units, a detection unit configured to detect a number of the storage units installed on the information processing apparatus, a determination unit configured to determine a time during which the second supply unit should be charged, based on the time which has been measured by the measurement unit and the number of units which has been detected by the detection unit, and a control unit configured to perform control that the charging unit charges the second supply unit for a period of the time which has been determined by the determination unit.
Method and apparatus to reduce idle link power in a platform
A method and apparatus to reduce the idle link power in a platform. In one embodiment of the invention, the host and its coupled endpoint(s) in the platform each has a low power idle link state that allows disabling of the high speed link circuitry in both the host and its coupled endpoint(s). This allows the platform to reduce its idle power as both the host and its coupled endpoint(s) are able to turn off their high speed link circuitry in one embodiment of the invention.
Enhancing power efficiency in a wireless internet card
A wireless internet card to support enhancing power efficiency. The wireless internet comprises a front end comprising shared frequency resources. The wireless internet card also comprises a first wireless block and a second wireless block. While the first wireless block is in low-power mode, the second wireless block may get access to the shared radio frequency resources without waking-up the first wireless block thus enhancing the power efficiency. The second wireless block sends a request to the first wireless block to use shared radio frequency resources. A coexistence block coupled to the second wireless block and the first wireless block may wait for a time duration to elapse after the request is received and may allow the second wireless block to use the shared radio frequency resources if the time duration is elapsed.
Reduced terminal power consumption via use of active hold state
An access terminal (AT) in a cellular communication system is configured to operate in an active hold (AH) state, a transitional state between traffic and dormant states. The AT applies power to its transmit chain with a low duty cycle while in the AH state, conserving battery power. To improve robustness of the communications, the radio network may power control the AT to a higher level relative to the power control level of the AT in the traffic state. Transition from the traffic state to the AH state may be initiated after a brief period of inactivity on the reverse link. The AT may remain in the AH state while receiving forward link payload data. Transmission of a reverse link payload packet in the AH state may initiate transition to the traffic state. A prolonged period of inactivity may initiate a transition from the AH state to the dormant state.
Methods of and apparatus for controlling power drawn by an appliance through a USB port
Methods of and apparatus for controlling power drawn by an appliance through a USB port. The method includes limiting any electrical current drawn by an appliance to one of seven levels according to whether the data lines receive a bias from a power line, the data lines are in electrical communication with each other, and the power source includes a host computing device, or according to logic and voltage levels of the data lines when any of the pull-down resistor and the current and voltage sources are connected or not connected to the D+ data line. The apparatus includes a controller programmed to selectively connect a pull-down resistor, a current source, and a voltage source to a D+ data line and to limit any electrical current drawn from a power source to one of the seven levels according to voltage levels on the D+ data line and a D− data line.
Method, system and computer program product for scheduling demand events
Disclosed and described herein are embodiments of systems, methods and computer program for scheduling demand events over a time period based on differences between the estimated power availability and the estimated power consumption at various points during the time period. In one aspect, methods are described. One embodiment of a method comprises establishing a defined time period, estimating power availability over the time period, estimating power consumption over the time period, and scheduling, using a computing device, demand events over the time period based on differences between the estimated power availability and the estimated power consumption at various points during the time period.
Information processing apparatus, method, and program for switching between two graphics chips safely and easily in accordance with use purpose
An information processing apparatus that includes a first graphic processing module having a first level of graphic performance and a second graphic processing module having a second level of graphic performance, which is greater than the first level of graphic performance. The information processing apparatus also includes a controller that selects one of the first graphic processing module or the second graphic processing module by determining whether the information processing apparatus is capable of outputting data with the first level of graphic performance or the second level of graphic performance, and detects whether the information processing apparatus is provided with power via a battery or via an external power source.
Portable secure data files
A portable secure data file includes an encrypted data portion and a metadata portion. When a request associated with a current user of a device to access a portable secure data file is received, one or more records in the metadata portion are accessed to determine whether the current user is permitted to access the file data in the encrypted data portion. If a record indicates the user is permitted to access the file data, a content encryption key in that record is used to decrypt the encrypted data portion.
Data encryption device and control method thereof
In an encryption device, in a case where predetermined first data is input, the first data is converted into second data that is data decrypted from the first data and, in a case where the second data is input, the second data is converted into the first data, and the converted data is encrypted to be output to a storage unit.
Dual-interface key management
In one embodiment, a device includes a first interface, a second interface, a memory, and a processor coupled to the first and second interfaces and to the memory. The processor is configured to receive key-management information via the second interface, and to store the key-management information in a protected portion of the memory as stored key-management information. The processor is also configured to perform a challenge-response authentication interaction via the first interface. The challenge-response authentication interaction is based at least in part on the stored key-management information. The device is configured to prevent data in the protected portion of the memory from being modified in response to information received via the first interface.
Diagnostics for secure elements in a mobile device
A method of diagnosing a mobile device is provided. The method comprises obtaining an access key from a key store based on an identity of the mobile device and based on an identity associated with an issuer of a confidential information, wherein the access key is associated with a secure element of the mobile device storing the confidential information. The method also comprises wirelessly transmitting a message from a station associated with the issuer to the mobile device to initiate diagnostics of at least the secure element of the mobile device, the message comprising the access key, wherein the diagnostics are performed by diagnostic instructions stored on the mobile device. The method also comprises displaying the result of the diagnostics.
A new and improved operating system comprising a series of self-contained interconnected modules and service layers for connecting proprietary systems together and extracting and translating data therefrom enables existing software systems to operate and cooperate in an existing software ecosystem while allowing flexible connections with both existing and new applications.
Integrity protection in data processing systems
A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
Data leakage prevention system, method, and computer program product for preventing a predefined type of operation on predetermined data
A data leakage prevention system, method, and computer program product are provided for preventing a predefined type of operation on predetermined data. In use, an attempt to perform an operation on predetermined data that is protected using a data leakage prevention system is identified. Additionally, it is determined whether a type of the operation attempted includes a predefined type of operation. Furthermore, the operation on the predetermined data is conditionally prevented based on the determination to prevent circumvention of the protection of the data leakage prevention system.
Method for managing and controlling access to confidential information contained in portable electronic media
Method and system for protecting user identification information
A method and system for protecting identity information comprises determining identity information required by a resource utilized by a user, determining strength of the identity information used by the user to access the resource, and performing an action in view of the strength.
Use of certified secrets in communication
A method is described by which the possessor of a secret certified in a particular manner can prove to a party with which the possessor of a secret needs to interact that it does indeed possess a secret formed in the proper manner. In the context of trusted computing apparatus, this can be used to show that the secret has been provided by a legitimate manufacturer of such apparatus. A method and an architecture for revocation operable in this context is also described.
Federation among services for supporting virtual-network overlays
Computerized methods, systems, and computer-readable media for promoting cooperation between a first and second virtual network overlay (“overlay”) are provided. The first overlay is governed by a first authority domain and includes members assigned virtual IP addresses from a first address range. The second overlay is governed by a second authority domain, which is associated with a second federation mechanism, for negotiating on behalf of the second overlay. The second federation mechanism is capable of negotiating with, or soliciting delegation of authority from, a first federation mechanism that is associated with the first authority domain. When negotiations are successful or authority is delegated, the second federation mechanism establishes a communication link between the second overlay and the first overlay or joins a member of the second overlay to the first overlay. Joining involves allocating a guest IP address from the first address range to the member.
System and method for generating agreements
System and method for creation and use of an agreement object having content packages and a transportable agreement, including both the content of the agreement and data used to validate the signatories and an audit trail for the agreement.
Media player embodiments and secure playlist packaging
A system identifies a playlist comprising at least one reference to content. The system provides a digital signature to the playlist. The digital signature links the playlist to a creator of the playlist. The system authenticates an application rendering the content using the digital signature. The system receives a command to render the playlist using the application.
Method for personalizing an authentication token
An authentication token using a smart card that an organization would issue to its customer, the smart card having a processor for executing a software application that is responsive to a user input to generate a one-time password as an output. The smart card co-operates with an interface device for inputting the user input and displaying the one-time password. The authentication token may be used in combination with a remote authentication server for validation of the password and hence authentication of the user.
Secure key distribution with general purpose mobile device
One embodiment is directed to a method for managing cryptographic information. The method includes initiating cryptographic information loading application on a general purpose mobile device (GPMD) and establishing a connection between the GPMD and a server that includes cryptographic information. Authentication input is received from a user of the GPMD. Data identifying the GPMD and the authentication input is sent from the GPMD to the server for authentication of the GPMD and the user. The GPMD also sends data identifying an electronic device into which cryptographic information is to be loaded. In response, the GPMD receives cryptographic information for the electronic device at the GPMD from the server. The GPMD then sends the cryptographic information from the GPMD to the electronic device for loading therein.
Data transmission method using an acknowledgement code comprising hidden authentication bits
A method for transmitting data between a first and a second point comprises the steps of transmitting data, from the first to the second point, together with a signature comprising bits of a first authentication code, and transmitting an acknowledgement, from the second to the first point. The length of the first authentication code is greater than the length of the signature and the first authentication code comprises hidden authentication bits. The acknowledgement is produced by using hidden authentication bits of a second authentication code presumed to be identical to the first, produced at the second point.
Means of mitigating denial of service attacks on IP fragmentation in high performance IPSEC gateways
Embodiments of the invention reduce the probability of success of a DOS attack on a node receiving packets by decreasing the probability of random collisions of packets sent by a malicious user with those sent by honest users. The probability of random collisions may be reduced in one class of embodiments of the invention by supplementing the identification field of the IP header of each transmitted packet with at least one bit from another field of the header. The probability of random collisions may be reduced in another class of embodiments of the invention by ensuring that packets sent from a transmitting IPsec node to a receiving IPsec node are not fragmented.
Method for issuing a digital certificate by a certification authority, arrangement for performing the method, and computer system of a certification authority
In a method for issuing a digital certificate by a certification authority (B), a device (A) sends a request message to the certification authority (B) for issuing the certificate, the certification authority (B) receives the request message and sends a request for authenticating the device (A) to the device (A), the device (A) sends a response to the certification authority (B) in response to the received request, and the certification authority (B) checks the received response and generates the certificate and sends the certificate to the device (A), if the response was identified as correct.
Certifying a virtual entity in a virtual universe
An invention for certifying a virtual entity in a virtual universe is disclosed. A virtual business may opt to register with a security certificate administration center to obtain a security certificate. A user of another virtual entity is provided with an ability to initiate a verifying process to check whether a security certificate symbol or a graphic resembling a security certificate symbol represents a valid security certificate. Virtual universe client and server software may be modified to enable a secured connection between the user and the security certificate administration center for the verification.
Securing communications sent by a first user to a second user
A computer-implemented method of securing communications sent by a first user to a second user may include receiving, by a first user from a trusted third party, at least one public cryptographic value corresponding to the first user and at least one private cryptographic value corresponding to the first user, providing, by the first user to a second user, a plurality of values corresponding to an identification device identified by an identifier, deriving, by the first user, a shared key, using the at least one private cryptographic value of the first user, and at least one of the plurality of values corresponding to the identification device identified by the identifier and protecting communications sent by the first user to the second user with the shared key.
Secure service oriented architecture
A system, method and media for a service oriented architecture. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects and objects of the invention can be obtained from a review of the specification, the figures and the claims.
Remote access method
All operations available on an intranet are securely performed from an outside of the intranet without taking out a file on the intranet from the intranet. A file on the intranet is not taken out, but, instead of this, image information on a target computer 1 is transmitted to an operational computer 4 with the http protocol, the https protocol, or the SSL protocol, and keyboard information, pointing information, or the like are transmitted from an operational computer 4 to the target computer 1. Consequently, the target computer 1 is operated.
Preloading an application while an operating system loads
This disclosure describes techniques and/or apparatuses for reducing the total time used to boot up a computer and load applications onto the computer.
Programmable exception processing latency
A digital processor with programmable exception processing latency, may have a central processing unit (CPU) of a digital processor, an exception controller coupled with the CPU, and a control register coupled with the CPU, wherein the control register is operable to set the operation mode of the CPU in at least one of two modes, wherein in the first mode the CPU has a fixed exception processing latency time, and in a second mode the CPU has a variable exception processing latency time.
Checkpoint allocation in a speculative processor
The embodiments described in the instant application provide a system for generating checkpoints. In the described embodiments, while speculatively executing instructions with one or more checkpoints in use, upon detecting an occurrence of a predetermined operating condition or encountering a predetermined type of instruction, the system is configured to determine whether an additional checkpoint is to be generated by computing a factor based on one or more operating conditions of the processor. When the factor is greater than a predetermined value, the processor is configured to generate the additional checkpoint.
Managing migration of a prefetch stream from one processor core to another processor core
A method, system and computer-usable medium are disclosed for managing prefetch streams in a virtual machine environment. Compiled application code in a first core, which comprises a Special Purpose Register (SPR) and a plurality of first prefetch engines, initiates a prefetch stream request. If the prefetch stream request cannot be initiated due to unavailability of a first prefetch engine, then an indicator bit indicating a Prefetch Stream Dispatch Fault is set in the SPR, causing a Hypervisor to interrupt the execution of the prefetch stream request. The Hypervisor then calls its associated operating system (OS), which determines prefetch engine availability for a second core comprising a plurality of second prefetch engines. If a second prefetch engine is available, then the OS migrates the prefetch stream request from the first core to the second core, where it is initiated on an available second prefetch engine.
Method and apparatus for shuffling data
Method, apparatus, and program means for shuffling data. The method of one embodiment comprises receiving a first operand having a set of L data elements and a second operand having a set of L control elements. For each control element, data from a first operand data element designated by the individual control element is shuffled to an associated resultant data element position if its flush to zero field is not set and a zero is placed into the associated resultant data element position if its flush to zero field is not set.
System for data collection from processing elements in a SIMD processor
A processor has a plurality of PEs (processing elements) that operate in parallel based on operation commands and an information collection unit that collects the data of the plurality of PEs, wherein each of the plurality of PEs holds data and a condition flag, supplies the data and the condition flag to the information collection unit upon receiving an operation command, and upon receiving an update request for updating the condition flag, updates the condition flag in accordance with the update request that was received; and the information collection unit, upon receiving the data and the condition flags, selects one PE based on a predetermined order of priority from among the PEs for which the received condition flags are active and both supplies the data of the selected PE as collection result data and supplies an update request for updating the condition flag of the PE that was selected.
Mechanism for conflict detection using SIMD
A system and method are configured to detect conflicts when converting scalar processes to parallel processes (“SIMDifying”). Conflicts may be detected for an unordered single index, an ordered single index and/or ordered pairs of indices. Conflicts may be further detected for read-after-write dependencies. Conflict detection is configured to identify operations (i.e., iterations) in a sequence of iterations that may not be done in parallel.
Arithmetic processing unit and control method for evicting an entry from a TLB to another TLB
An arithmetic processing apparatus includes: a plurality of TLBs holding as entries a portion of a conversion table for conversion of virtual addresses into physical addresses that has been placed in a main memory unit; an entry registration determining unit that, while registering an entry output from the main memory unit in any one of a plurality of TLBs, determines whether an entry has already been registered in an area of a TLB as registration destination; and a relocation control unit that, when the entry registration determining unit determines that an entry has already been registered in the area of the TLB as registration destination, evicts the entry that has already been registered and registers evicted entry in other TLB.
Operating system virtual memory management for hardware transactional memory
Operating system virtual memory management for hardware transactional memory. A system includes an operating system deciding to unmap a first virtual page. As a result, the operating system removes the mapping of the first virtual page to the first physical page from the virtual memory page table. As a result, the operating system performs an action to discard transactional memory hardware state for at least the first physical page. Embodiments may further suspend hardware transactions in kernel mode. Embodiments may further perform soft page fault handling without aborting a hardware transaction, resuming the hardware transaction upon return to user mode, and even successfully committing the hardware transaction.
Modifying data storage in response to detection of a memory system imbalance
A method begins by a processing module determining an imbalance between inode memory utilization and data storage memory utilization. When the imbalance compares unfavorably to an imbalance threshold, the method continues with the processing module determining whether the inode memory utilization is out of balance with respect to the data storage memory utilization or whether the data storage memory utilization is out of balance with respect to the inode memory utilization. When the inode memory utilization is out of balance with respect to the data storage memory utilization, the method continues with the processing module transferring a set of data objects from a data object section to a data block section and transferring object mapping information of the set of data objects into block mapping information for the set of data objects.
Aligned data access
In one or more embodiments, an apparatus comprises an alignment module implemented in hardware to identify requested data that is not aligned on a natural alignment boundary of a memory and load at least two sets of neighboring data such that each said set includes at least a portion of the requested data. The alignment module is further configured to extract the requested data from the at least two sets of neighboring data and output the extracted data to a processor.
Selecting an auxiliary storage medium for writing data of real storage pages
An auxiliary storage medium is selected for writing data of a set of one or more pages being paged-out from real memory. The auxiliary storage medium is selected from among a plurality of auxiliary storage media, including differing types of storage media, based on characteristics of the plurality of storage media and/or the attributes of the data being written to the auxiliary storage media.
Memory sharing between embedded controller and central processing unit chipset
An embedded controller includes a microcontroller core and memory control circuitry. The memory control circuitry is configured to communicate with a Central Processing Unit (CPU) chipset over a first Serial Peripheral Interface (SPI), for which bus arbitration is not supported, at a first clock rate, to communicate with a memory over a second SPI at a second, fixed clock rate, to relay memory transactions between the CPU chipset and the memory over the first and second SPIs, to identify time intervals in which no memory transactions are relayed on the second SPI and to retrieve from the memory information for operating the microcontroller core during the identified time intervals.
System and method for controlling automated page-based tier management in storage systems
System and method for automated page-based management in storage systems. The system includes host computers, file servers and a storage system having automated page-based management means. The storage system interface receives instructions to change the condition for decision for migration regarding particular parts or the whole volume. The host computer can control execution of the migration performed by the storage system by specifying areas or volumes with the condition via the interface. Highly optimized, appropriate data placement and data relocation in computer system can be achieved when the application, host computer or management computer can recognize or predict the usage of the data or files. The storage system having automated page-based management may include compression/decompression and a control method for the compression and decompression process.
Method for using a CAPTCHA challenge to protect a removable mobile flash memory storage device
The embodiments described herein generally use a challenge to protect a removable mobile flash memory storage device, where the challenge may be in the form of a “Completely Automated Public Turing Test to Tell Computers and Humans Apart” (“CAPTCHA”). In one embodiment, a method is provided in which a removable mobile flash memory storage device receives a command from a host device, generates a CAPTCHA challenge, provides the CAPTCHA challenge to the host device, receives a response to the CAPTCHA challenge from the host device, determines if the response satisfies the CAPTCHA challenge, and performs the command only if the response satisfies the CAPTCHA challenge. In another embodiment, a removable mobile flash memory storage device is provided for performing these acts.
Method for optimizing cleaning of maps in flashcopy cascades containing incremental maps
A method for optimizing cleaning of maps in FlashCopy cascades includes determining whether a target disk of a map contains data unavailable to a downstream disk from an upstream disk in a FlashCopy cascade and detect whether the downstream disk has a copy of the data. Additionally, the method includes copying the data from the target disk to the downstream disk, if the target disk of the map contains data unavailable to the downstream disk from the upstream disk and the downstream disk does not have the copy of the data. Furthermore, the method includes copying the data from the target disk to the downstream disk, if the target disk of the map does not contain data unavailable to the downstream disk from the upstream disk or the downstream disk does have the copy of the data. Moreover, the method includes removing the map from the FlashCopy cascade.
Point-in-time copies in a cascade using maps and fdisks
A technique for handling a FlashCopy® process includes receiving a FlashCopy® instruction for a source disk, performing a FlashCopy® point in time copy of the source disk on to a target disk, creating a map specifying the FlashCopy® point in time copy from the source disk to the target disk, creating a primary fdisk for the source disk, if one does not already exist, and creating a primary fdisk for the target disk, if one does not already exist, or, if one does already exist, converting the existing primary fdisk for the target disk into a secondary fdisk, and creating a new primary fdisk for the target disk.
Storage system and method for snapshot space management
In accordance with certain aspects of the presently disclosed subject matter, there is provided a storage system and a method of storing data thereof. The method comprises: storing a plurality of snapshots of a certain source; assessing to at least one given snapshot an assessed value characterized by at least one of the following values and/or derivatives thereof: i. a first value characterizing the amount of unique physical data blocks associated, merely, with said given snapshot; ii. a second value characterizing the amount of unique physical blocks associated merely with a certain group of snapshots comprising said given snapshot; iii a combination of the first and the second value; and updating the assessed value responsive to a pre-defined event. The method can further comprise generating an alert when the updated assessed value and/or derivatives thereof match a pre-defined criterion; and/or providing an indication of amount of physical resources to be freed resulting from deleting at least the given snapshot, wherein said indication corresponds to the updated assessed value; and/or generating deletion recommendation in accordance with the updated assessed value; and/or automated deleting at least the given snapshot when the updated assessed value matches a threshold characterized by one or more pre-defined rigid conditions for deleting.
Systems and methods for performing storage operations in a computer network
Methods and systems are described for performing storage operations on electronic data in a network. In response to the initiation of a storage operation and according to a first set of selection logic, a media management component is selected to manage the storage operation. In response to the initiation of a storage operation and according to a second set of selection logic, a network storage device to associate with the storage operation. The selected media management component and the selected network storage device perform the storage operation on the electronic data.
Media device with intelligent cache utilization
A portable media device and a method for operating a portable media device are disclosed. According to one aspect, a battery-powered portable media device can manage use of a mass storage device to efficiently utilize battery power. By providing a cache memory and loading the cache memory so as to provide skip support, battery power for the portable media device can be conserved (i.e., efficiently consumed). According to another aspect, a portable media device can operate efficiently in a seek mode. The seek mode is an operational mode of the portable media device in which the portable media device automatically scans through media items to assist a user in selecting a desired one of the media items.
Systems and methods for optimizing data storage among a plurality of solid state memory subsystems
A solid state storage device includes an interface system configured to communicate with an external host system over an aggregated multi-channel interface to receive data for storage by the solid state storage device. The solid state storage device also includes a storage processing system configured to communicate with the interface system to receive the data, process the data against storage allocation information to parallelize the data among a plurality of solid state memory subsystems, and transfer the parallelized data. The interface system is configured to receive the parallelized data, apportion the parallelized data among the plurality of solid state memory subsystems, and transfer the parallelized data for storage in the plurality of solid state memory subsystems, where each of the plurality of solid state memory subsystems is configured to receive the associated portion of the parallelized data and store the associated portion on a solid state storage medium.
Method for improving accuracy of a time estimate from a memory device
A method for improving accuracy of a time estimate from a memory device is disclosed. In one embodiment, a memory device receives a time stamp and measures active time with respect to the received time stamp. The memory device determines accuracy of previously-measured active time and generates a time estimate using the measured active time, the accuracy of previously-measured active time, and the received time stamp. In another embodiment, measured active time is adjusted, with or without generating a time estimate. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.
Computing system with guest code support of transactional memory
A data structure of readily accessible units of memory is provided as computer useable media having computer readable program code logic providing information tables and a software emulation program to enable hardware to run new software that uses transactional memory and a bit associated with a transaction for executing transactional memory constructs. The data structure with Guest PTRAN bit is used in emulation of software written for a given computer on a different computer which executes a different set of instructions. The emulating instructions are used to provide transactional memory instructions on a computer which does not support those instructions natively.
Program converting apparatus, program converting method, and medium
According to one embodiment, a program converting device includes an access attribute determining unit, a non-sharing target classifying unit, and a converting unit. The access attribute determining unit calculates exclusive accesses from memory accesses by threads forming a source program and determines a memory access using a cache memory among the calculated exclusive accesses. The non-sharing target classifying unit determines an access data item that does not share a cache line with another access data item among the access data items that are accessed using the cache memories. The converting unit inserts a process that does not share the cache line into the source program based on the determination result of the non-sharing target classifying unit.
Read and write monitoring attributes in transactional memory (TM) systems
A method and apparatus for monitoring memory accesses in hardware to support transactional execution is herein described. Attributes are monitor accesses to data items without regard for detection at physical storage structure granularity, but rather ensuring monitoring at least at data items granularity. As an example, attributes are added to state bits of a cache to enable new cache coherency states. Upon a monitored memory access to a data item, which may be selectively determined, coherency states associated with the data item are updated to a monitored state. As a result, invalidating requests to the data item are detected through combination of the request type and the monitored coherency state of the data item.
Weighted history allocation predictor algorithm in a hybrid cache
A mechanism is provided for weighted history allocation prediction. For each member in a plurality of members in a lower level cache, an associated reference counter is initialized to an initial value based on an operation type that caused data to be allocated to a member location of the member. For each access to the member in the lower level cache, the associated reference counter is incremented. Responsive to a new allocation of data to the lower level cache and responsive to the new allocation of data requiring the victimization of another member in the lower level cache, a member of the lower level cache is identified that has a lowest reference count value in its associated reference counter. The member with the lowest reference count value in its associated reference counter is then evicted.
Transparent processing core and L2 cache connection
Embodiments of the present disclosure provide a system on a chip (SOC) comprising a processing core including a core bus agent, a bus interface unit (BIU), and a bridge module operatively coupling the processing core to the BIU, the bridge module configured to selectively route information from the core bus agent to a cache or to the BIU by bypassing the cache. Other embodiments are also described and claimed.
Storage apparatus and data management method
A suitable Tier ratio is determined according to the I/O performance and I/O characteristic of a virtual volume. A storage apparatus which is connected via a network to a host computer which requests data writing comprises storage devices of a plurality of types of varying performance; and a controller which manages storage areas provided by each of the storage devices of a plurality of types by means of storage tiers of a plurality of different types, and which assigns the storage areas in page units to virtual volumes from any of the storage tiers among the storage tiers of the plurality of types according to the data write request from the host computer, wherein the controller monitors performance information which includes I/O characteristic information for each of the virtual volumes and determines the storage tiers corresponding to the performance information thus monitored, and assigns the storage areas in page units to the virtual volumes from the determined storage tiers.
Multi-host concurrent writing to magnetic tape
According to one embodiment, a method for storing data on a magnetic tape comprises receiving data from two different hosts and simultaneously writing the data from the hosts to the magnetic tape using multiple transducers. In another approach, a method for storing data on a magnetic tape comprises receiving requests to establish a concurrent reservation from multiple hosts and allocating a unique stripe in a wrap to each of the hosts that sent the requests, wherein the wrap is a collection of data tracks to be written simultaneously in one direction of tape movement by multiple transducers of a tape head, and the wrap is logically divided into the stripes. Also, the method includes receiving data from the hosts and simultaneously writing the data from the hosts to the magnetic tape using the multiple transducers. Other systems and methods concerning storing data on magnetic tapes are described as well.
Associative list processing unit
An associative list processing unit and method comprising employing a plurality of prioritized cell blocks and permitting inserts to occur in a single clock cycle if all of the cell blocks are not full.
Method and system for processing access control lists using an exclusive-or sum-of-products evaluator
A method includes receiving input data comprising a plurality of bits and processing an access control list into an ESOP expression comprising a plurality of product terms. The method also includes storing a plurality of bits associated with the plurality of product terms in a TCAM comprising a plurality of rows and comparing the plurality of bits associated with the input data to the plurality of bits associated with the product terms stored in each row of the plurality of rows, such that each row of the TCAM outputs a plurality of signals, such that each of the plurality of signals indicate a match or no match for each bit stored in the selected row. The method includes receiving the plurality of signals from the plurality of rows by an ESOP evaluator and outputting an address associated with a selected row from the plurality of rows of the TCAM.
Reconfigurable load-reduced memory buffer
A memory module can include a data buffer having a data bus interface and a dynamic random access memory (DRAM) coupled to the data buffer. The memory module may also include a switch connected in parallel with the data buffer, wherein the switch can selectively bypass the data buffer. In one example, the memory module also includes a registered buffer having an address bus interface, where the switch may selectively bypass the data buffer based on a program signal obtained from an address bus via the address bus interface.
Cache memory management in a flash cache architecture
Provided is a method for managing cache memory to cache data units in at least one storage device. A cache controller is coupled to at least two flash bricks, each comprising a flash memory. Metadata indicates a mapping of the data units to the flash bricks caching the data units, wherein the metadata is used to determine the flash bricks on which the cache controller caches received data units. The metadata is updated to indicate the flash brick having the flash memory on which data units are cached.
Cache memory management in a flash cache architecture
Provided are a system, method, and computer program product for managing cache memory to cache data units in at least one storage device. A cache controller is coupled to at least two flash bricks, each comprising a flash memory. Metadata indicates a mapping of the data units to the flash bricks caching the data units, wherein the metadata is used to determine the flash bricks on which the cache controller caches received data units. The metadata is updated to indicate the flash brick having the flash memory on which data units are cached.
Page based management of flash storage
Methods and circuits for page based management of an array of Flash RAM nonvolatile memory devices provide paged base reading and writing and block erasure of a flash storage system. The memory management system includes a management processor, a page buffer, and a logical-to-physical translation table. The management processor is in communication with an array of nonvolatile memory devices within the flash storage system to provide control signals for the programming of selected pages, erasing selected blocks, and reading selected pages of the array of nonvolatile memory devices.
Memory device and memory interface
Memory devices and memory interfaces are disclosed. In an implementation a memory controller of a memory device is configured to receive a first part of an address for memory access, and to perform a memory access based on said first part and a part of a previously received address.
System and method for increasing DDR memory bandwidth in DDR SDRAM modules
A system and method for increasing DDR memory bandwidth in DDR SDRAM modules are provided. DDR memory has an inherent feature called the Variable Early Read command, where the read command is issued on CAS latency before the completion of the ongoing data burst and the effect of the CAS latency is minimized in terms of the effect on bandwidth. The system and method optimizes the remaining two access latencies (tRP and tRCD) for optimal bandwidth.
Memory controller, method of controlling unaligned memory access, and computing apparatus incorporating memory controller
A computing apparatus for accessing a multiple bank memory is provided. The computing apparatus includes a processor, a memory and a memory controller which is configured to store data in a data buffer by accessing the memory in an aligned word unit and output, in response to a request for an unaligned memory access by the processor, requested data by extracting the request data from the data buffer.
Virtual USB key for blade server
A method for sharing data contained on a peripheral device amongst a plurality of blade servers is disclosed. The method includes storing a copy of data from a peripheral device to a memory device. The memory device is partitioned into at least ‘n’ memory areas, each memory area storing one copy of the data. The method also includes assigning one of the at least ‘n’ memory areas to each of a plurality ‘n’ of servers. The method also includes establishing communication between the plurality of servers and the plurality of assigned memory areas via a switch controller. The switch controller is configured to access the plurality of assigned memory areas via a processor.
Hardware acceleration apparatus, method and computer-readable medium efficiently processing multi-core synchronization
Provided is a hardware acceleration apparatus, method and computer-readable medium efficiently processing multi-core synchronization. A processor core that fails to acquire a lock variable may be switched to a low power sleep mode and a waste of power may be reduced. Additionally, when a lock variable is returned, a wakeup signal may be transmitted to a processor core operated in the low power sleep mode, and the processor core may be activated.
Systems on chips having interrupt proxy functions and interrupt processing methods thereof
Provided is a system on chip (SoC) capable of rapidly processing interrupts generated in various modules without causing an error. The SoC includes a processor configured to process a task, a plurality of modules on the SoC and operationally coupled to the processor through a system bus, and an interrupt proxy processing unit operationally coupled to the processor and the plurality of modules and configured to solely process an interrupt-related task from a first module of the plurality of modules.
Method and system for reducing triggering latency in universal serial bus data acquisition
A method of controlling one or more devices in data communication with a common controller to perform one or more functions, each of the devices having a synchronous clock, a synchronized real time clock register and a memory, the method comprising: arming the devices such that the devices commence performing the functions synchronously, receive and store to their respective memory data acquired as a result of performing the functions and store to their respective memory time stamp information indicative of the time of acquisition of the acquired data; a trigger device in data communication with the common controller responding to a command to perform the functions by sending a first message to the host controller that includes data indicative of a time of receipt of the command; the host controller responding to the first message by sending the devices a second message including data indicative of the time of receipt by the further device of the command; and the devices responding to the second message by reading their respective memories and sending the acquired data stored therein to the host controller commencing from a location in each respective memory corresponding to the time of receipt or a next available location.
Electronic device and input-signal switching method
According to one embodiment, an electronic device receives inputs of video signals from a plurality of input systems. The electronic device includes a priority determination table, a video switching instruction module, a video switching module. In the priority determination table, video display priorities of the video signals from the input systems are determined in advance. The video switching instruction module instructs to switch among the video signals from the input systems on the basis of the priorities determined in the priority determination table. The video switching module switches among the video signals from the input systems according to a switching instruction from the video switching instruction module.
Combined wireless and wired access to memory unit
According to one embodiment, a communication device includes a first interface, a wireless communication unit, and a memory unit. The memory unit includes a first region used for first access from the first interface and a second region used for second access from the wireless communication unit. Writing to the second region by the first access and writing to the first region by the second access are inhibited.
Device identifier assignment
A command to change a device identifier is output to a first slave device and to a second slave device using a shared data line. The first slave includes a first device identifier, and the second slave device includes a second device identifier. A value for the first device identifier is replaced within a time period using the shared data line. During the same period of time, a value for the second device identifier is maintained.
Information processing apparatus, information processing method, and information processing program
In a wizard process used by a printer driver, a screen to be displayed is dynamically produced in accordance with device function information provided by the printer driver and a setting value input by a user. In this technique, it is not necessary to separately prepare wizard programs for respective printer drivers, which makes it possible to develop the wizard program in a highly efficient and easy manner.
Scalable synchronization of events among server and clients with varying lag-times
The invention relates generally to synchronizing functions on handheld devices and more particularly to precisely synchronizing a function among a large number of devices having multiple different platforms. The invention provides the ability to cause a large number of handheld devices to perform certain functions simultaneously, within seconds or fractions of a second of each other. In certain aspects, the invention provides an apparatus for synchronizing a function among devices, including one or more processors in communication with a memory and configured to, for each of the devices, send an event to the device, receive a timepacket, and send a return timepacket, thereby causing the device to receive the event and invoke the function after a delay.
Image processing device, device management system, and image processing method
An image processing device is connected to a device management apparatus via a network and includes device information in accordance with the Common Information Model CIM. In the image processing device, a first transform part transforms, when a query described in a general-purpose language to include a request of data handling of device information with respect to jobs is received, CIM objects, generated from the device information with respect to the jobs, into XML data items. A combining part combines the XML data items into XML data and generates the combined XML data. An extracting part extracts an XML data item associated with the request from the combined XML data. A second transform part transforms the XML data item into a CIM object. The data handling of the CIM object is performed and a result of the data handling is transmitted.
Techniques for managing a network delivery path of content via a key
Techniques for distributing content over a network via keys are provided. A key is associated with a particular destination or with a particular piece of content. A path management service derives and selectively communicates portions of a network path for moving the content to a destination on the basis of a value for a key. Any intermediate processing resource receives a next location within the path for forwarding the content from the path management service in response to presenting the key.
Selectively granting a floor during set-up of a communication session within a wireless communications system
An embodiment is directed to an application server configured to set-up a communication session within a wireless communications system. The application server receives, from a session originator, a request to initiate the communication session with a set of session targets, and then transmits one or more call announcement messages for announcing the communication session to the set of session targets. The application server determines information associated with a probability that the set of session targets will fail to accept the announced communication session, and/or delay information associated with when call responses will arrive from the set of session targets in response to the one or more call announcement messages. The application server selectively grants a floor of the communication session to the session originator based on the determined information.
Media transmission method and apparatus in a communication system
A media transmission method and apparatus of a first server using a session-based messaging service in a communication system. The first server sets Media Relay Capacity (MRC) information of a first User Equipment (UE), transmits the set MRC information to a second server, receives a response from the second server after transmitting the MRC information, and notifies the response to the first UE. The response is a response that the second server has received from a second UE after notifying the second UE of the setting of the MRC information.
Intelligent connection manager
Methods, devices, and storage media may provide for receiving a request from a subscriber device for a connection service pertaining to a machine-to-machine communication; determining whether the request is a valid request for the connection service; selecting a connection to a target device of the machine-to-machine communication in response to determining that the request is valid; executing a command included in the request to be directed to the target device; receiving a response from the target device; and transmitting the response to the subscriber device of the machine-to-machine communication.
Dynamically translating resource identifiers for request routing using popularity information
A system, method and computer-readable medium for request routing based on content popularity information are provided. A client computer transmits a request for content from a content provider. The content provider utilizes executable code, such as translation request code, for facilitating request routing utilizing popularity information. The translation request code, may direct a client computing device to request further translation request code and/or translation information. Thereafter, the client issues a DNS query with the translated information including popularity information. The content delivery network service provider can then either resolve the DNS query with an IP address of a cache component or transmit another alternative resource identifier that will resolve to the content delivery network service provider. The process can repeat until a DNS nameserver resolves a DNS query from the client computing device.
Dynamic host configuration and network access authentication
According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA Authentication Agent) and a DHCP (Dynamic Host Configuration Protocol) server, such as, e.g., for synchronization between the PANA SA state and the DHCP SA state, such as, e.g., maintaining synchronization when a connection is lost. In some embodiments, systems and methods for binding network bridge and network access authentication are also provided related to, inter alia, interactions between a PAA and a layer-2 switch, such as, e.g., for avoiding service thefts and the like (such as, e.g., MAC address and/or IP address spoofing) in the context of, e.g., the above. In some other embodiments, systems and methods for bootstrapping multicast security from network access authentication protocol are also provided related to, inter alia, key management for protected IP multicast streams, such as, e.g., to avoid IP multicast streams unnecessarily received and/or processed by unauthorized receivers connected to the same layer 2 segment as authorized receivers in the context of, e.g., the above.
Session layer for monitoring utility application traffic
Techniques are provided to facilitate monitoring of utility application traffic streams. At a network device that routes utility application traffic for utility devices, control information is received, where the control information is configured to cause the network device to monitor utility application traffic that passes through the network device. The network device monitors a header inserted into utility application traffic messages based on the control information.
Message-based communication system monitor
Message-based communication system monitor, comprising an inspector (16) capable of inspecting a message so as to determine whether it satisfies a specific pattern of a source, characterized in that it comprises an analyser (12) capable of inspecting a communication stream, so as to derive therefrom a structured representation of messages, in correspondence with a plurality of rules, and in that the inspector (16) is devised so as to: *apply a stored pattern to a structured representation of the inspected message, so as to establish a signature, and *compare the signature with reference data, so as to classify the inspected message in the case of correspondence.
Methods and apparatus for remote management and self management of servers
A system receives a management configuration set defining at least one event to be detected in the application server, and a respective associated action to be taken upon detection of the events. For each of the events to be detected in the application server, the system instantiates an event class to detect the event. For each of the actions to be taken upon detection of the event by the event class, the system instantiates a respective action class to perform that action on behalf of the event class that detects the event. The system operates the instantiated event classes to detect events and to send an event notification to each of the respective action class associated with that event.
Query optimization in a parallel computer system with multiple networks
A database query optimizer optimizes a query that uses multiple networks. The database query optimizer optimizes a query that uses multiple networks to satisfy the query by splitting the query execution to use multiple networks. Thus, the query optimizer rewrites or optimizes a query to execute on multiple nodes or networks to more efficiently execute the query and reduce network traffic on a network. The query optimizer uses plan cache statistics to determine whether to use multiple networks to optimize the query.
Methods and apparatuses for notifying an application function of resource restrictions relating to a communication session
The invention relates to a method of notifying an Application Function (AF) in a communications network of resource restrictions relating to a communication session. The network includes a Policy and Charging Rules Function (PCRF) for authorising and controlling flows of data in the session. In the method the AF sends an authorisation request to the PCRF for establishing the communication session. The authorisation request includes an indication that the AF is to be notified of resource restrictions for the data flows in the session. The PCRF notifies the AF of the resource restrictions.
Using identity/resource profile and directory enablers to support identity management
Embodiments of the present invention provide methods, system and machine-readable media for dynamically providing identity management or other services. According to one embodiment, dynamically providing services can comprise receiving a request related to an unknown principal. A service to which the principal is known can be selected. Once a service to which the principal is known has been located, an identity management result can be obtained from the selected service. The method can further comprise determining based on the identity management result whether the principal is authorized to access a requested resource. In response to determining the principal is authorized, the requested resource can be accessed.
Projector, projector system, and control method
A projector connected to a terminal device via a network includes: a confirming unit to confirm whether an IP address has been changed; a creating unit to create an executable file for executing image transfer software using a changed IP address, if the IP address is confirmed to have been changed; a delivering unit to deliver the executable file in response to a request from the terminal device; a receiving unit to receive, from the terminal device in which the image transfer software has been run by the executable file, a connection based on the changed IP address and receive a transfer of image information on an image being displayed in the terminal device; and a projecting unit to project the image being displayed in the terminal device using the image information.
Deriving unique local addresses from device names
In one embodiment, accessing a device name, which includes a hostname and a domain name, of a network device; applying a hash function to the domain name to obtain 40 bits as a Global ID of an Internet Protocol version 6 (IPv6) unique local address (ULA); and encoding the hostname to obtain 80 bits as a Subnet ID and an Interface ID of the IPv6 ULA.
Apparatus and method for transmitting sound information in web-based control system
Disclosed are an apparatus and method for transmitting information in a Web-based control system. The control target device of the present invention includes a Web server module, a sound information generation module and an independent communication module. The Web server module transmits a Web page required for device control to a control device through a first communication channel. The sound information generation module generates sound information related to an event, occurring according to variation in status of the control target device. The independent communication module transmits the generated sound information to the control device through a second communication channel that is separate from the first communication channel.
System, method and computer program product for serving an application from a custom subdomain
In accordance with embodiments, there are provided mechanisms and methods for serving an application from a custom subdomain. These mechanisms and methods for serving an application from a custom subdomain can enable improved data security, enhanced system performance, optimized resource utilization, etc.
Syndication feeds for peer computer devices and peer networks
Syndication feeds for peer computer devices. In one aspect, a request is received at a server for a syndicated feed from a peer on a peer-to-peer network. It is determined whether the peer is currently online or offline; if online, the requested feed is pulled from the peer and served to the requester, and if offline, the requested feed is retrieved from a cache of the server and served to the requester. In one embodiment, an online/offline indicator is inserted in a feed by the server to indicate to the user the online or offline status.
Managed peer-to-peer applications, systems and methods for distributed data access and storage
Applications, systems and methods for efficiently accessing and controlling data of devices among multiple computers over a network. Communication of data over one or more networks may be managed by means of one or more connection servers which may also manage any or all of authentication, authorization, security, encryption and point-to-multipoint communications functionalities. Alternatively, computers may be connected over a wide area network without a connection server, and with or without a VPN. In any case, file structure integrating means are configured to integrate a file structure of accessible files accessed at a second or first computer, into a file structure contained at the first or second computer, respectively.
Rating system for determining whether to accept or reject objection raised by user in social network
Embodiments of the invention provide means to the users of the system to provide ratings and corresponding feedback for enhancing the genuineness in the ratings. The system includes a memory coupled to a processor. The memory includes one or more instructions executable by the processor to enable the users of the system to rate each other based on at least one of sharing, exchanging, and selling one of activity, service or product. The system may provide a mechanism to encourage genuineness in ratings provided by the users. Furthermore, the instructions facilitate the rating receivers to provide feedbacks corresponding to the received ratings. The feedback includes accepting or objecting to a particular rating. Moreover, the memory includes instructions executable by the processor to enable the system to determine genuineness of an objection raised by a rating receiver.
Methods and systems for analysis of real-time user-generated text messages
The present invention generally relates to methods and systems for analysis of real-time user-generated text messages. The methods and systems allow analysis to be performed using term associations and geographical and temporal constraints.
Progressive messaging apparatus and method capable of supporting near real-time communication
An email client capable of supporting real-time communication of time-based media. The email client includes a session element configured to establish a session with a server when an email address addressing a recipient within a domain is defined. As soon as the email address is defined, a transmitting element of the email client is configured to progressively and simultaneously transmit time-based media as the time-based media is being created to the recipient via a route at least partially discovered by a lookup of the domain of the email address. By at least partially discovering the route to the recipient as soon as the email address of the recipient is defined, the transmitting element may progressively deliver the time-based media to the recipient.
Method and system for busy presence state detection in an instant messaging system
A method and system for busy presence state detection in an instant messenger system. The method may include detecting a computer system activity level, determining whether the activity level exceeds an activity threshold, and transitioning a presence state of an instant messenger to a busy state in response to determining that the activity level exceeds the activity threshold, where the presence state corresponds to a given user. The system may include a computer system and an instant messenger software module configured to execute on the computer system. The instant messenger software module may be further configured to detect a computer system activity level, determine whether the activity level exceeds an activity threshold, and transition a presence state of the instant messenger software module to a busy state in response to the determination that the activity level exceeds the activity threshold, where the presence state corresponds to a given user.
Joint communication sessions
Online communication sessions may be joined in an environment that includes receiving a first communication between a first user and a second user and enabling the rendering of the first communication at devices associated with the first and second users. A second communication between the first user and a third user is received and the rendering of the second communication at devices associated with the first and third users is enabled. After receiving the first and second communications, a trigger to join at least the communication sessions associated with the first, second, and third users is received from the first, second, or third user. Information structured and arranged to render, in a single window, text associated with the first and second communications at the devices associated with the first, second, and third users is generated.
Selection of real time collaboration tools
A computer-implemented method of selecting a real time collaboration application can include associating each of a plurality of real time collaboration applications with a plurality of performance statistics, receiving a request for a real time collaboration session from a personal productivity application, and identifying a data type to be shared through one of the plurality of real time collaboration applications. One of the plurality of real time collaboration applications can be selected according to the data type to be shared and the plurality of performance statistics. The selected real time collaboration application can be output.
Social group suggestions within a social network
In one example, a method includes receiving, by a first computing device and from a second computing device, an image comprising an object. A user may be associated with a social networking service and the second computing device. The method further includes selecting a social group associated with the user in the social networking service. The selection may be based at least in part on one or more characteristics associated with the object. The method also includes sending, by the first computing device to the second computing device, an indication of the social group selected by the first computing device.
Processing browser requests based on trap lists
Processing a browser request that specifies a destination network resource generally includes intercepting a browser request that specifies a selected destination network resource and redirecting the browser request to a network server that differs from the destination resource specified by the browser request. Processing a browser request also may include intercepting a browser request received from a client computer at a proxy server when the browser request specifies a selected destination network resource and performing instructions associated with and in addition to instructions performed to download the selected destination network resource.
Processing selected browser requests
Processing a browser request that specifies a destination network resource generally includes intercepting a browser request that specifies a selected destination network resource and redirecting the browser request to a network server that differs from the destination resource specified by the browser request. Processing a browser request also may include intercepting a browser request received from a client computer at a proxy server when the browser request specifies a selected destination network resource and performing instructions associated with and in addition to instructions performed to download the selected destination network resource.
Method and apparatus for web based storage on demand
The distributed virtual SAN infrastructure provides a plurality of host systems with a scalable dynamically expandable distributed virtual storage pool, which includes a virtual storage automatic construct protocol. The distributed virtual SAN infrastructure includes one or more IP SAN units, the management console, the distributing control management station and the network infrastructure, wherein the network infrastructure provides the communication links between all systems in this distributed virtual SAN.
Method of providing content to a mobile web browsing device
Content is automatically provided to a mobile web browsing device from a web server, by the following process: (a) receiving at a computer, remotely connected to the device, a log of data identifying content that has been viewed by the device; (b) automatically sending updated content stored on the web server to the device; (c) causing that updated content to be automatically stored in device memory. Because user activity is replicated back from the device to the remote computer, the content cached on a given device can be completely optimised for the user of that device and no-one else.
Selected alert delivery in a distributed processing system
Methods, apparatuses, and computer program products for selected alert delivery in a distributed processing system are provided. Embodiments include receiving a plurality of events from one or more event producing components of the distributed processing system; creating, by an incident analyzer, in dependence upon the events a truth space representing events that make one or more conditional event processing rules true, the truth space including a set of truth points, each truth point including a set of events and a set of event locations; creating, by the incident analyzer, in dependence upon the truth space one or more alerts including assigning one of the locations of the truth space to one or more of the alerts; and sending, by the incident analyzer, the alerts to at least one component of the distributed processing system.
System and method for hand-offs in cloud environments
A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers. The method includes determining based upon information in a policy module, to hand-off an execution of at least one identified application executing on a first cloud computing service provider platform to a second cloud computing service provider, determining whether the second cloud computing service provider satisfies one or more governance policies associated with the at least one identified application, and handing-off the execution of the at least one identified application to a second cloud computing provider platform based upon the second cloud computing provider being compliant with the one or more governance policies associated with the at least one identified application.
Distributed processing system, distributed operation method and computer program
In a distributed processing in which multiple operation transportation methods can be used, a method is proposed which efficiently selects an operation transportation method in accordance with conditions of the distributed system. In view of this, a first computer is provided which includes: a first operation transportation portion which conducts multiple transportation methods that transports, for example, processes to a computer to execute them; a second operation transportation portion; and a selection information storing portion storing information used for selection from the multiple transportation methods. Further, a second computer is provided which includes a first operation receiving portion that conducts operations in accordance with the multiple transportation methods. The first computer includes a transportation request portion which detects information from the selection information storing portion for selecting a transportation method that is operable for the second computer and which selects the first operation transportation portion based on the detection result, and the first operation transportation portion selected by the transportation request portion transports, for example, a process to the first operation receiving portion of the second computer.
Method for managing the allocation of data into a peer-to-peer network and peer implementing such method
A method and apparatus to manage allocation of data to peers in a peer-to-peer network, where the peers in the peer-to-peer network use distributed hash tables for addressing the peers, the peers associated with bit addresses, including dividing a virtual scene into a plurality of cells, each cell associated with a bit identifier, neighboring cells of the virtual scene associated with bit identifiers which differ from each other by one bit and allocating data in each cell of the virtual scene to peers whose bit address is closest to the bit identifier of the cells.
System, method and software product for ordering image products using images stored on a digital storage device from a plurality of order terminals
The present invention is directed to a system, method, and software product for ordering of digital photo services among a plurality order terminals each being associated with one of a plurality of business entities, using a digital image provided on a digital storage device associated with one of a plurality of digital storage device providers. The method includes maintaining information with respect to business relationships between the plurality of digital storage device providers and the plurality of business entities; providing a digital storage device at one of the order terminals; and providing an offering at the one order terminal based on a business relationship between the business entity associated with the one order terminal and the digital device provider associated with the digital storage device.
Arithmetic logic and shifting device for use in a processor
An arithmetic logic and shifting device is disclosed and includes an arithmetic logic unit that has a first input to receive a first operand from a first register port, a second input to receive a second operand from a second register port, and an output to selectively provide a memory address to a memory unit in a first mode of operation and to selectively provide an arithmetic output in a second mode of operation. Further, the arithmetic logic and shifting device includes a programmable shifter device that has a first input to receive data from the memory unit, a second input to receive the arithmetic output, a third input to receive an operation code of a computer execution instruction, and a shifted output to provide shifted data.
Remembered set overhead reduction by deferred garbage collections of stable regions
At least one region of a heap that includes memory allocations is analyzed, using age and occupancy criteria, across a number of local garbage collection cycles using a processor executing a region-based garbage collector. Based upon the analyzed age and occupancy criteria of the at least one region, at least one stable region in age and occupancy is identified among the at least one region of the heap across the number of local garbage collection cycles. Maintenance of a remembered set (RS) of external references into the at least one stable region is temporarily stopped for each identified stable region during at least one additional local garbage collection cycle.
Method and apparatus for searching metadata
Methods and apparatuses for searching metadata are described herein. In one embodiment, an example of a process for search metadata includes, but is not limited to, in response to a search query for metadata stored in one or more of metadata stores, the search query is partitioned into multiple search query segments. Thereafter, searches corresponding to the search query segments are performed, where each search is performed independently within the one or more metadata stores. Other methods and apparatuses are also described.
Preserving and handling native data in hybrid object trees
A hybrid object tree that interconnects individual data objects of different data types from a group of different input data sources is provided. The instantiated data objects of the hybrid object tree include an internal dynamic data area that encapsulates at least one reference to an original input data source. At least one attribute is identified that is unavailable at the referenced original input data source of a first instantiated data object of the hybrid object tree. The at least one attribute is added to the first instantiated data object of the hybrid object tree within the internal dynamic data area of the first instantiated data object.
Open overlay for social networks and online services
Embodiments of the present invention provide a platform for an open overlay for online services, such as social networking sites, that permit users to share and leverage information within a single context. In some embodiments, the single context is implemented as a web site that is accessible to a social network of users that are known to each other. Systems and methods are provided that share and forward information for the users' online services within the single context. Client applications are provided that serve as an open overlay for the user and permit the user to seamlessly utilize the services of multiple online services within a single context. In some embodiments, the users' existing account identities and security information are utilized alone or in combination, and thus, the users are not required to establish a separate or new account for accessing the open overlay service.
Determining accessibility of database objects with multiple parents
The technology performs database access control in a manner that decreases computational cost of the database access control with an object type definition of a database object that permit multiple parent objects. The system determines whether to grant a user access to a database object via a first set of access control paths that do not rely on whether the user has permission to access a minimum number of parent objects of the database object. Responsive to a determination not to grant the user access via the first set of access control paths, the system determines whether to grant the user access to the database object via a second set of access control paths that determine whether the user has permission to access the minimum number of parent objects of the database object.
Remote inventory manager
A documentation inventory manager which assigns a protection key to each piece of documentation that is received. More specifically, when providing information to a receiving company, a client provides their files to a common FTP server. As a support team of the receiving company accesses the files and stores some or all of the files to a local storage system, the files are modified to include an imbedded header record. In certain embodiments, the imbedded header record includes information regarding an original file name sent by the client, a key value that is assigned to that version of the downloaded file, permissions such as whether the file can be copied, and the inventory manager location. Each time a version of the file is downloaded to a different location within the receiving company, that file name, location, and new unique key is updated in the documentation inventory manager.
Generating query refinements
Methods, systems, and apparatus, including computer program products, for generating query refinements. In one implementation, a method includes dividing a search query into one or more n-grams; determining that each of the one or more n-grams represents a same concept, and in response to the determination: selecting one or more candidate refinement queries; determining one or more categories for the search query; determining one or more categories for each of the candidate refinement queries; determining a respective first score for each of the candidate refinement queries; and identifying as query refinements for the search query one or more of the candidate refinement queries based on the first scores.
System and method of removing duplicate leads
A duplicate lead removal system comprises a matching engine, a vendor duplicates database, and a conflict engine. The matching engine is configured to determine at least one vendor to receive a lead. The vendor duplicates database is configured to store duplicate lead information that is at least partly created by and received from vendors outside of the duplicate lead removal system. The conflict engine is configured to compare information that is at least derived from the lead with information stored in the vendor duplicates database in order to determine if the lead is a duplicate lead for the vendor such that the system can prevent transmission of duplicate leads to the vendor.
Processing a sequence of outer joins
To process a sequence of outer joins in a database system, the database system performs a first outer join of the sequence of outer joins. A result of the first outer join is stored in a result table stored across plural storage modules of the database system. At least a subset of records of the result table is redistributed across the storage modules according to a first join attribute of the result table, where any record of the result table that has a null value for the first join attribute is not redistributed. A second outer join of the sequence is performed using the redistributed result table and another table, where the second outer join is based on the first join attribute of the result table.
Method and apparatus for characterizing documents based on clusters of related words
One embodiment of the present invention provides a system characterizes a document with respect to clusters of conceptually related words. Upon receiving a document containing a set of words, the system selects “candidate clusters” of conceptually related words that are related to the set of words. These candidate clusters are selected using a model that explains how sets of words are generated from clusters of conceptually related words. Next, the system constructs a set of components to characterize the document, wherein the set of components includes components for candidate clusters. Each component in the set of components indicates a degree to which a corresponding candidate cluster is related to the set of words.
Content management system and method for managing and classifying data about entities and for providing content including the classified data
A content management system manages data about entities and provides content including data about the entities. The content management system receives data about entities from originators associated with the entities. The content management system classifies the data and stores the classified data. The content management system may authenticate the data by determining an authenticator of the classified data. The authenticator may be the most appropriate person to authenticate the data. The content management system may determine an authenticator by determining the entity most related to the classified data and determining an originator representing or designated to authenticate the information. As such, the content management system may determine the originator in the best position to authenticate the data. The content management system may also receive a request from subscribers for content and create the content in response to the request. The data included in the content may be based on one of: the request from the at least one subscriber, a preference of the at least one subscriber, the at least one subscribers' relationship with the classified data, and authentication of the classified data.
Method and system for providing distributed editing and storage of digital media over a network
An approach provides distributed editing and storage of digital media. Video information is retrieved during recording of the video information to a video file. The video information is edited during the recording of the video information. An index file for the media is generated during the recording of the media, wherein the index file include indices for decoding the media; and periodically updating the index file throughout the recording of the media. After completion of the recording of the media, another index file is generated corresponding to the media for inclusion into the media file.
Storing and retrieving objects on a computer network in a distributed database
Further preferred embodiments of the present invention include methods directed to (a) Active Data Structures, (b) Mobile Devices, (c) Ad-Hoc Device Collections, and (d) Concurrent Massively Parallel Supercomputers. Therein, a distributed, object-oriented database engine utilizing independent, intelligent processing nodes as a cooperative, massively parallel system with redundancy and fault tolerance. Instead of using traditional methods of parallelism as found in most distributed databases, the invention utilizes a messaging system and a series of message processing nodes to determine where attributes and data files associated with objects are stored. The architecture is loosely coupled, each node independently determining if it manages or routes storage and retrieval requests.
Matching tools for use in attribute-based performance systems
Systems and methods consistent with the invention relate to matching user attributes. In one exemplary implementation, the system and methods may store predetermined general attribute descriptors reflecting attributes of users generally, receive personal attribute descriptors selected from the predetermined general attribute descriptors as corresponding to attributes of a first user and a second user, receive a rating associated with each received personal attribute descriptor, compare at least one personal attribute descriptor associated with the first user with at least one personal attribute descriptor associated with the second user to determine a descriptor match, and calculate a match score based on the determined descriptor match and the received ratings. In addition, first and second display points may be displayed and may be separated by a one-dimensional display distance that is a function of the calculated match score.
Large scale machine learning systems and methods
A system for generating a model is provided. The system generates, or selects, candidate conditions and generates, or otherwise obtains, statistics regarding the candidate conditions. The system also forms rules based, at least in part, on the statistics and the candidate conditions and selectively adds the rules to the model.
Ranking and selecting entities based on calculated reputation or influence scores
Ranking and selecting entities based on calculated reputation or influence scores is provided. In some embodiments, a method includes determining whether a first entity is a subject or an object; determining whether a second entity is a subject or an object; and generating a graph, in which a subset of the graph is a subject graph of subject nodes that includes at least one or more subjects (e.g., subject entities) linked to one or more other subjects, and in which the graph includes one or more objects (e.g., object entities) each linked to one or more subjects in the subject graph. In some embodiments, the graph includes directed and undirected links. In some embodiments, the graph includes one or more objects linked to one or more objects.
Method for calculating semantic similarities between messages and conversations based on enhanced entity extraction
One embodiment of the present invention provides a system for estimating a similarity level between documents. During operation, the system receives a number of documents, extracts a number of semantic entities from the documents, calculates the similarity level between the documents based on the extracted semantic entities, and produces a result indicating similar documents based on the calculated similarity level.
Techniques for recommending alternative SQL execution plans
Techniques are provided for automatically recommending alternative execution plans for a SQL statement. Information pertaining to one or more execution plans for a SQL statement can be retrieved from a set of plan sources. The one or more execution plans can include the current execution plan for the statement and one or more historical execution plans. Based on the retrieved information, the performance of the one or more execution plans can be compared to each other. Based on the comparison, a recommendation can be provided to a user indicating that a particular execution plan (e.g., a historical execution plan) should be used in place of the current execution plan to execute the SQL statement.
Automatic derivation of synonym entity names
A synonym module analyzes a set of names for entities, such as names of streets and cities within a geographic database, and adds synonym names to the entities based on the analysis. More specifically, based on adjacencies of words within the names, the synonym module formulates a set of synonym rules specifying permissible ways of spelling a single word as multiple words (or vice-versa). The synonym module applies the synonym rules to the names, and if one of the rules matches a name, the synonym module adds an associated synonym name based on the name and on the rule matching the name. User queries for named entities in the database may then take into account not only the original names of the entities, but also any added synonym names.
SQL queries for simple network management protocol management information base tables
Optimizing SQL queries for Simple Network Management Protocol (SNMP) Management Information Base (MIB) tables. An SNMP client receives a source query defined in structured query language to access data stored in one or more MIB tables. The SNMP client parses the source query into one or more queries and sub-queries and applies sets of optimization rules and heuristics to the source query to generate a query execution plan for each set of optimization rules and heuristics applied to the source query. The SNMP client selects an optimal query execution plan from the generated query execution plans and rewrites the source query as a SNMP-based query using the optimization rules and heuristics specified in the optimal query execution plan. The SNMP-based query may then be used to retrieve the data requested by the source query without performing a full query scan of the MIB tables.
Accelerated searching of substrings
Accelerated sub-string searches on large data sets can be performed using filtering processes that can improve or optimize run time performance. A first filtering process can include partitioning a binary tree into sections to enable an exact search to replace a substring search for part of the binary tree and for part of the binary tree to be potentially excluded from substring searching. A second filtering process can include comparing count representations of entries in the binary tree and of a received input string to potentially further exclude entries from substring searching.
Qualifier set creation for work assignment engine
A contact center is described along with various methods and mechanisms for administering the same. The contact center proposed herein provides the ability to, among other things, define, in real-time, qualifier set combinations for work items. Thus, the contact center can create a dictionary of combinations of work item attributes that may be defined as work items are introduced to the system. The definition of the combinations allows for large qualifier sets without the large expenditure of resources to define all possible combinations of attributes for the contact center.
Query plan reformulation
Apparatus, systems, and methods may operate to receive an original query plan, to transform the original query plan into an equivalent executable compact query plan, and to store the compact query plan on a machine readable device. Further activities may include computing maximal source sub-queries associated with the compact query plan, and computing semi-join reductions of the maximal source sub-queries to provide an executable derivative query plan, which may also be stored on a machine readable device. Additional apparatus, systems, and methods are described.
Query expression evaluation using sample based projected selectivity
Methods, systems, and computer program products are provided for query expression evaluation for query optimization. Embodiments include receiving a query including a plurality of predicates; creating a truth table representing the possible solutions to the query; identifying a plurality of intersections of the truth table, the plurality of intersections including each predicate of the query; assigning a selectivity factor to each predicate; determining in dependence upon the selectivity factors for each predicate a selectivity rating for each of the intersections of the truth table; selecting one or more of the intersections in dependence upon the selectivity rating; and determining in dependence upon the selected intersections a percentage of rows in a database table returned by the query; and providing the percentage of rows in the database table to an access plan generator for query optimization.
Fast search in a music sharing environment
A method, apparatus and system of method and system of directory sharing and management in a group communication environment is disclosed. In one embodiment, a method of a fast-search server includes processing a character of a query of music data, referencing the character with a reverse index of a music database, determining that the character matches a data record of the music database using the reverse index and returning the data record of the music database prior to receiving all characters of the query of music data from a user. The reverse index may be created from a combination of letters appearing as a string in a data field of the music database. The method may include preforking the character of the query of music data along with other processes in the fast-search server to minimize concurrency issues and to minimize threading locks.
Method and apparatus for improved navigation among search results
A method and apparatus for navigating amongst search results. In one embodiment, the method receives a item to search within a document and stores a start location representing the position within the document at the time the item is received. The method searches the document for instances of the item and stores, as an index, at least one item location within the document for each instance of the item. A search result representing a match between the item and content in the document is displayed and, upon selecting to return to the start location at any time while displaying the search result, returning to the start location to display at least a portion of the document at the start location.
Providing intent sensitive search results
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing intent sensitive search results. In one aspect, a method includes receiving a current query for a current search session that is associated with a user identifier. One or more potential refinements for the current query are identified, each potential refinement being one or more terms and based on previous queries associated with the user identifier and previous queries associated with other user identifiers. One or more secondary queries are generated, each secondary query including the current query and one of the potential refinements, each secondary query matching a query-refinement pair in a trigger map that includes a plurality of query-refinement pairs. Secondary search results are identified for the secondary queries. Search results are provided including at least one of the secondary search results.
Multi-blob consistency for atomic data transactions
A multi-blob consistency component of a tiered middleware framework ensures data blobs are transacted in an atomic manner. The component determines a data blob of a data store to be modified based on an application request. The component then reads a master blob to locate a stored version number of the data blob to be modified and a version number of the master blob. A new data blob with a new version number that replaces the data blob to be modified is written to the data store. The component then reads the master blob again to re-obtain the version number of the master blob. Thus, when the obtained and re-obtained version numbers match, the component replaces the stored version number of the data blob with the new version number of the new data blob. Further, the component deletes the data blob to be modified using the stored version number.
A method of collaborative transcoding includes discovering capabilities of devices within a network; exchanging information about content stored within the network; anticipating a request for a content item in a target format; identifying a location of the content item by referencing the information about content stored within the network; and, if the content item is not in the target format, selecting a the device within the network to transcode the content into the target format. A system for collaborative transcoding includes a network, the network comprising a first networked device and at least one other networked device, the first networked device receiving a request for a content item in a target format; a shared content history; the shared content history comprising a list of content available on the network, the first networked device searching the shared content history to determine if another networked device can provide the content item; a capability list comprising a native format and transcoding capabilities of the networked devices, the first networked device searching the capability list to determine if any the networked device is configured to transcode the content item from a source format to a target format.
Management of time-variant data schemas in data warehouses
A system, method, and computer readable medium for preserving information in time variant data schemas are disclosed. The method includes determining if at least one modification request associated with a database schema has been received. In response to the modification request being received, a metadata table associated with the database schema is updated to include at least one entry associated with the modification request. The entry identifies an instance in time when an action associated with the modification request was performed.
Systems and methods for data loss prevention
A computer-implemented method for data loss prevention may include (1) identifying a network configured with a data loss prevention system, (2) identifying a file subject to a data loss prevention assessment within the network, (3) identifying a source of the file, the source of the file causing an entry of the file onto the network, (4) determining, based on the source of the file, that the file is subject to a data loss prevention policy, and (5) applying the data loss prevention policy to the file based on the determination that the file is subject to the data loss prevention policy. Various other methods, systems, and computer-readable media are also disclosed.
A method for providing a compressed index for a stream of binary data records comprises steps of indexing a field from each record in a bitmap index, compressing stored bits in each column of the bitmap index by replacing a group of successive bits with a code and outputting the code. There is provided at least one of a first code for replacing a sequence of a first filling, a literal and a second filling, and a second code for replacing a sequence of a first literal, a filling and a second literal. In this context, a filling is a sequence of bits with the same value and a literal is a sequence of bits with different values.
Speculative execution in a real-time data environment
Techniques are described for speculatively executing operations on data in a data stream in parallel in a manner that increases the efficiency of the stream-based application. In addition to executing operations in parallel, embodiments of the invention may determine whether certain results produced by the parallel operations are valid results and discard any results determined to be invalid.
Systems and methods for performing recovery of directory data
Systems and methods are disclosed for recovering data following a directory service malfunction, such as a forest-wide disaster in Microsoft® Active Directory. In certain examples, a single management console can be used for remotely recovering selected domain controllers in the forest without necessitating direct operator intervention. Multiple domain controllers can be concurrently restored from one or more backup files. Configurations of the system can advantageously eliminate manual intervention with each domain controller, thereby saving significant amounts of recovery time and effort. Also, certain systems and methods can be used to automatically and remotely quarantine corrupt domain controllers so that those individual domain controllers do not replicate with the newly restored environment, while allowing the domain controllers to remain online and in communication with the attached network. Certain disclosed methods further modify recovery procedures based at least in part on the type, and availability of, one or more DNS servers.
Systems and methods for managing application availability
A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.
System, method and computer program product for distributed execution of related reports
In accordance with embodiments, there are provided mechanisms and methods for distributed execution of related reports. These mechanisms and methods for distributed execution of related reports can enable embodiments to provide parallel execution of related reports. The ability of embodiments to provide parallel execution of related reports can result in higher performance in the execution of the related reports.
Distributed multimedia access system and method
A distributed media access system and method. The method includes making each of a plurality nodes in a P2P network designate at least one nearest neighbors as a first node candidate and perform at least one random walk to obtain a second node candidate according to the peer list; calculating user preferences of the request node and user preferences of the first and second node candidates according to the first and second node candidates and the preference parameters corresponding to the first and second node candidates so as to obtain a plurality of similarity values; selecting the more similar candidate as buddies of user of the node according to the calculated similarity values; and establishing a buddy list according to the buddies of user and storing the buddy list such that the P2P network can quickly find buddies of the node through the buddy list.
Bookmarked synchronization of files
A file synchronization system that includes a non-volatile memory for storing at least one bookmark respective to a file; a telecommunication mechanism for receiving a new bookmark value respective to this file; and a controller operative to update the respective bookmark according to the new bookmark value; and to control presentation of the file in accordance with the updated bookmark value. A plurality of bookmarks that associate to a single file are stored in the file synchronization system, each such bookmark respective to a different user.
Rapid cloning of virtual machines
A request is received to clone a source data object. A source block range of the source data object in a source logical storage unit is determined. An empty data object in the destination logical storage unit is created. A destination block range of the empty data object in the destination logical storage unit is determined. The source block range is mapped to the destination block range. The source data object is cloned based on the mapping.
Information processing system and method of controlling the same
In an information processing system 1 including first to third storage systems 50a to 50c, the first storage system 50a performs stubbing by managing entity data of a file in the second storage apparatus 10b, migration by replicating the data of the file to the second storage apparatus 10b, and recall by writing the entity data of the file from the second storage apparatus 10b back to the first storage apparatus 10a. Moreover, the second storage system 50b performs remote copy by replicating metadata of the migrated file from the first storage apparatus 10a to the third storage apparatus 10c at timing of the migration (synchronously), and replicating the entity data of the file to the third storage apparatus 10c at timing independent of the timing of the migration (asynchronously).
System and method for media file synchronization
Media files are drop box-synchronized to limit the amount of new functionality to which a user must grow accustomed in order to synchronize the content of a media player with a remote server within a cloud computing network. Thusly, users are not required to change the way they use their media player(s), but rather are required to use the familiar drag and drop functionality of their native media player. The present invention contemplates automatic versus interval file synchronization between host and nodal processing units via a server within native media player formats. This is achieved through the creation of a media file play list folder that acts as a drop box into which the user drops the desired play list to synchronize with the server. Certain methodology enhances and supports the synchronization process, which methodology incorporates the use of signature waveform metrics.
Seed data automation
According to one embodiment of the present invention, the automated loading seed data for testing in a product integration environment includes receiving input data associated with a test session. The input data may be received in a first format that includes at least one object. A processor may be used to automatically convert the input data into a second format that includes the metadata data string. The metadata data string may then be loaded into a database.
Methods and systems for loading data into a temporal data warehouse
A system disclosed includes a temporal data warehouse and a platform independent temporal data warehouse load application operable to run on the system. The load application uses timestamp data from incoming data in conjunction with a relational algebra of set operators to identify and sequence net changes between the incoming data and data previously stored within the data warehouse. The load application loads the identified and sequenced net changes into the data warehouse with relatively little intrusion into normal operation of the data warehouse. Optimizations, including but not limited to, distinct partitioning of the workload into parallel streams are selectable via metadata.
Systems and methods for information compression
Systems and methods for information compression. In a first method embodiment, a computer implemented method for compressing information includes finding a closest match entry of a dictionary to a data block, the dictionary stored in computer usable media. A logical exclusive OR combination of the closest match entry and the data block is performed to form a spatial difference vector identifying locations wherein the data block differs from the closest match entry. An information difference vector comprising differences between the data block and the closest match entry is formed. A compressed data block comprising the spatial difference vector, the information difference vector and a reference to the closest match entry is produced. The compressed data block is characterized as being smaller than the data block.
Content selection based on consumer interactions
In some embodiments, there is provided a technique for detecting a consumer's skipping habits at a given time and determining the consumer's current preferences based at least in part on those skipping habits. Skipping habits are determined by detecting which content is skipped (or not skipped) during presentation of content. Skipping habits, indicating trends in the consumer's consuming or skipping of content, that are detected during presentation of content may be used to determine a consumer's current preferences. Selection of content for presentation may be based on current preferences of the consumer. In this way, a consumer's interactions with the content, including the consumer's skipping habits, can be used to alter a selection of content to be presented to the consumer.
Estimation of individual causal effects
Methods and media for facilitating estimation of the causal effect for individuals based on predictor factors associated with the individuals. Estimated values of the causal effect may be used to distinguish between individuals and to recommend treatment based on the predicted treatment effect for the individuals.
System and method for detecting healthcare insurance fraud
A system and method for detecting healthcare insurance fraud is disclosed. The method includes creating a database containing source data related to at least one healthcare claim submitted for reimbursement, selecting data from the database to compare to a set of rules using an audit module, and comparing the selected data to the set of rules using the audit module. The method also includes using the audit module to automatically identify suspected fraudulent data when the selected data violates at least one rule of the set of rules and using the audit module to flag the fraudulent data. In addition, the method includes using the audit module to generate a report illustrating patterns of irregularities within the source data to visually identify the fraudulent data displayed within the source data by user-friendly graphs and charts, and generating at least one automated statement for display to identify the at least one rule of the set of rules that was violated by the selected data using a documentation module.
Systems and methods for facilitating communication between a point of sale device and a consumer device
Embodiments of the disclosure can include systems and methods for facilitating communication between a point of sale device and a consumer device. In one embodiment, a computer-implemented method for communicating with a consumer device at a point of sale (POS) can be provided. The method can include establishing, by a merchant POS device, communication with the consumer device at the point of sale; collecting, by the merchant POS device, transaction-related information from a payment application associated with the consumer device; determining, by the merchant POS device, that the collected transaction-related information does not include both payment-related information and value added services (VAS) information associated with one or more VAS; and collecting, by the merchant POS device based at least in part upon the determination, second transaction-related information from a second payment application associated with the consumer device.
Metadata generation based upon extraction of information from full text of books
A computer system and method generate new metadata associated with a book from existing data about the book, including the body text of the book. The existing data is analyzed to determine input data for a machine learning algorithm, including lexicographical data determined from the body text. The machine learning algorithm is applied by a processor and generates new metadata, and a correspondence between the new metadata and the book is recorded.
Systems and methods for generating machine learning-based classifiers for detecting specific categories of sensitive information
A computer-implemented method may include (1) identifying a plurality of specific categories of sensitive information to be protected by a DLP system, (2) obtaining a training data set for each specific category of sensitive information that includes a plurality of positive and a plurality of negative examples of the specific category of sensitive information, (3) using machine learning to train, based on an analysis of the training data sets, at least one machine learning-based classifier that is capable of detecting items of data that contain one or more of the plurality of specific categories of sensitive information, and then (4) deploying the machine learning-based classifier within the DLP system to enable the DLP system to detect and protect items of data that contain one or more of the plurality of specific categories of sensitive information in accordance with at least one DLP policy of the DLP system.
Method and system for interacting with a user in an experiential environment
A method and system for provides a user with an ability to capture a sample of an experiential environment and deliver that sample to an interactive service to trigger one or more predetermined events. In exemplary embodiments of the invention such triggered events include the delivery of information and services to the user, the execution of tasks and instructions by the service on the user's behalf, communication events; surveillance events and other control-oriented events that are responsive to the user's wishes. In other exemplary embodiments of the invention, the triggered events include transaction-oriented events, entertainment events, and events associated with enhancements to human ability or function.
Transportation problem solving device, transportation problem solving method, and program and recording medium therefor
A transportation problem solving device for solving a transportation problem to optimize the end-to-end physical distribution consisting of a regional transportation and an inter-depot transportation, comprising a transformation section for adding a regional representative node representing a plurality of collection and delivery spots belonging to a depot to a model of inter-depot transportation, and incorporating the regional transportation between each of the plurality of collection and delivery spots belonging to the depot and the depot into a part of the model of inter-depot transportation as the inter-depot transportation between the depot and the regional representative node, an inter-depot transportation computing section for solving the transportation problem, based on a transformation model in which the regional transportation is incorporated into the inter-depot transportation, and computing a transportation plan for each delivery order in an inter-depot transportation portion, when a plurality of transport requests are input, and an output section for outputting the transportation plan computed by the inter-depot transportation computing section.
Computer implemented job-management systems for adding employment seeking features to computer applications showing job data and receiving input. Systems may include a data storage system, instruction data including computer readable instructions, and a processor configured to execute the instruction data. In some examples, the instruction data may include an interface component for interfacing with from the computer application to capture input and job data and displaying a user interface. In some examples, the instruction data may include a storage component for storing data to the data storage system, the data including the input. Some examples may include a retrieval component for retrieving saved data from the data storage system and an interface component including computer executable instructions for entering the retrieved saved data into the form. In some examples the computer application may be configured to receive communication input and to send the communication input to an employer contact.
Project activity reporting
A project management and activity recording system defines project tasks, project positions, and assigns personnel to the project positions. As the assigned personnel perform project tasks from a remote location, they may periodically record their activities in the project software. The recorded activity information is used to update the project to keep records such as time, cost, expenses, and task completion current, even when offsite personnel or contractors are used. A reporting user interface may be selected based on the reporting device, and data entry may be performed by updating historical or default values.
Analyzing transactional data
A system and method for measuring or at least detecting the effect of at least implicit communication on transactions within a social group, optionally such as consumer purchases for example. The group may optionally comprise a social network, a pair, 3 or more individuals and so forth. By “implicit communication” it is meant communication for which there is no record, for example in a database. The aftereffects of such communication may optionally be determined, detected and/or measured through detection and/or measurement of influence, as described in greater detail below. For example, if a first consumer performs purchase of an item and a second consumer later purchases the same or similar item within a given time period, the two purchases may optionally be linked through influence which may in turn have optionally occurred through implicit communication. Optionally, the system and method may also measure or at least detect the effect of explicit communication, for which there is a record, for example in a database that describes the communication itself.
System and method for processing transactions
A method, computer program product, and computer system for receiving a first scan of an identifier from a first computing device is disclosed. The identifier is associated with a financial transaction. A second scan of the identifier is received from a second computing device. The financial transaction is processed based upon, at least in part, receiving the second scan of the identifier from the second computing device.
Method and system for utilizing authorization factor pools
One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant.
Automatic remote deposit image preparation apparatuses, methods and systems
The AUTOMATIC REMOTE DEPOSIT IMAGE PREPARATION APPARATUSES, METHODS AND SYSTEMS (hereinafter “MultiCrop”) transforms uploaded check images and check deposit information inputs via MultiCrop components image into deposit confirmation outputs. For example, in one embodiment, a user may employ a personal computer connected to a web camera, and/or a smartphone with a built-in camera to initiate the remote deposit by holding a check in front of the camera, and the MultiCrop may capture images of the check and send them to a financial institution for deposit processing.
Disclosed embodiments provide systems and methods of processing payment authorisation requests for payment transactions to be conducted via a data communications network. The method allows identification of an issuing bank from a plurality of issuing banks as one which is to be utilised in a given transaction and facilitate a user specifying, in real time in relation to the given transaction, a particular bank account that is to be used to deduct funds for that transaction.
Method and system for identifying a merchant payee associated with a cash transaction
Cash transaction entry data indicating a consumer has conducted a cash transaction with an unidentified merchant payee is obtained and geo-location data associated with the cash transaction data is used identify potential merchant payees of the cash transaction. If more than one potential merchant payee is identified, data representing the potential merchant payees is analyzed using historical financial transaction data associated with the consumer, and/or products or services and operations data associated with the potential merchant payees, and/or historical financial transaction data associated with a community of consumers, including consumers other than the consumer, to generate a potential merchant payee probability score for each of the potential merchant payees. The potential merchant payee probability score for each of the potential merchant payees is then used to generate a prioritized potential merchant payee list for the cash transaction that includes at least one of the potential merchant payees.
System and method for performing person-to-person funds transfers via wireless communications
A funds-transfer system includes a processor and a memory storing control logic for causing the processor to enable a buyer to transfer funds to a seller via a mobile telephone. The control logic includes program code for causing the processor to receive a payment request transmitted from a mobile telephone of the buyer. The payment request is for a transfer of funds from a financial account held by the buyer to a financial account held by the seller, and the payment request is transmitted from a payment application stored in the buyer's mobile telephone. The payment request identifies a purchase amount to be transferred, and information identifying the financial account held by the buyer. The control logic also includes program code for causing the processor to charge the purchase amount to the financial account held by the buyer and to transfer the purchase amount to a financial account held by the seller. Additionally, the control logic includes program code for causing the processor to provide a payment acknowledgment to the buyer's mobile telephone and to the seller.
System and method for providing latency protection for trading orders
A system for managing trading orders comprises a memory operable to store an order associated with a first price. The system further comprises a processor communicatively coupled to the memory and operable to identify a latency value. The processor is further operable to receive a counterorder and to identify a potential trade associated with the order and the counterorder, the potential trade based at least in part on the first price. If the latency value satisfies a configurable condition, the processor is further operable to initiate a configurable period of time. If the potential trade is not valid upon expiration of the configurable period, the processor is further operable to prevent the execution of the potential trade.
User interface for semi-fungible trading
A user interface and method are disclosed for providing trading between a plurality of semi-fungible and non-fungible goods. A plurality of book axes are displayed in a single interface, each book axis representing a market for a particular good. Orders for goods are displayed as marks on the axes to display the relative value of the orders. A value axis is provided that relates the value of the goods from each market to each other. Thus, a single interface provides the means to relate the values of different semi-fungible goods. The value axis may be displayed in units of price, or a custom value designated by a user or pre-defined by the interface. Quantity information is represented in the interface through the display of a dimension of an order icon. Precise information about each order is displayed either in a panel view or a pop-up window.
System and method for analyzing data associated with statistical arbitrage
Providing computer-based systems and methods for analyzing historical performance of financial securities and identifying trades in those securities based on the securities' current position as compared to this historical performance. These computer-based systems and computer-implemented methods include identifying stock pairs to include in a trading portfolio, based on a measure of the pair's relative performance, such as a modified Sharpe Ratio. The value of the stocks in each stock pair in the portfolio is assessed and deviations determined. This assessment can occur daily or at a longer or shorter time step. Stocks are bought or sold based on the current price of the stock as compared to historical performance. The present invention preferably employs a large number of stock pairs in the trading portfolio. This use of a large number of pairs results in a plurality of stocks being in more than one stock pair.
Retirement planning application
A method includes generating a first interactive graphical user interface (GUI) that identifies one or more guaranteed income options to fund essential retirement expenses and receiving a selection of a guaranteed income option. The method includes generating a second interactive GUI that identifies one or more investment options to fund lifestyle retirement expenses and receiving a selection of an investment option. The method includes generating a third interactive GUI that identifies one or more unexpected liability coverage options and receiving a selection of an unexpected liability coverage option. The method includes generating a fourth interactive GUI that identifies one or more legacy planning options and receiving a selection of a legacy planning option. The method includes generating a retirement plan that identifies the selected guaranteed income option, the selected investment option, the selected unexpected liability coverage option, and the selected legacy planning option.
Method for managing buyer transactions and settlements using communication network between computers, and method for relaying information following buyer consumption trends to the buyer
It is an object of the present invention to enable a buyer to collectively manage information related to a variety of commercial transactions performed by the buyer as well as to the settlements for these transactions. The calendar server 25 supplies a calendar screen to a buyer system 3 that is used by the buyer 1. This calendar screen has electronic invoices addressed to the buyer 1, which are issued by the supplier system 7, and electronic deposit/withdrawal detailed statement of the buyer's deposit account, which are issued by a banking system 13, pasted in the spaces for the relevant dates. When the buyer 1 selects an arbitrary invoice on this calendar screen and inputs his or her approval of this invoice, an account transfer telegraphic message for payment of this invoice is automatically sent to the banking system 13. The calendar server 25 manages the status of each invoice (“opened”, “payment request in progress”, “paid”), and notifies the supplier system 7 and banking system 13 of this invoice status. The calendar server 25 also supplements news such as advertisements which are sent by the supplier system 7 and banking system 13, and so forth, selects news following the buyer's consumption trends, and pastes this news in the spaces on the calendar screen which pertain to dates that slightly precede dates on which buyer consumption other forms without departing from the spirit of the present invention.
Method and system for using consumer financial data in product market analysis
A system and method for product market analysis using consumer financial data obtains financial data associated with a given consumer. At least part of the consumer financial data is then stored by the process for product market analysis using consumer financial data, or another party/application, typically in accounts/locations associated with the given consumer. An electronic media based marketing device is then provided by a product marketer, the electronic media based marketing device being capable of activation. When a consumer activates the electronic media based marketing device at least part of the consumer financial data associated with the consumer is transferred to the product marketer. As a result, the product marketer obtains significant amounts of information for market analysis purposes such as creating a potential consumer profile and determining a target market for the given product an/or service.
Performing separate accounting and billing for each customer of a shared customer device
Techniques are described that facilitate performing accounting and billing separately for each customer of a service provider account registered to an owner of a shared customer device. An access router performs separate data usage accounting for each of the customers in sub-accounts of the registered service provider account based on customer virtual local area network (CVLAN) and service VLAN (SVLAN) tags included in data packets. A network operator may, therefore, generate a bill for the shared customer device that includes separate data usage charges for each customer. To facilitate the techniques, the access router may determine a CVLAN and SVLAN associated with a customer. The CVLAN and SVLAN tags are included in a service request toward a service provider, and copied into a service request reply toward the shared customer device. The shared customer device then includes the tags in data packets to identify the customer to the access router.
Method and apparatus for leveraged tax efficient investment management
A method and apparatus for automatically managing investment portfolios to substantially track a selected index and to automatically harvest tax losses is disclosed. Preferably, the system comprises an accounting system for maintaining tax lot information for individual accounts, an optimization system for rebalancing each account to substantially model the index and for harvesting tax losses, and a trading system for executing trades. Each investor owns the securities in his account, and therefore, harvested losses can be used to offset capital gains. The period between successive optimization procedures is selected to avoid application of the internal revenue service wash sale rules.
Negative balance management
A system, apparatus, and method for managing account data for accounts having a negative balance. The invention embodiment includes a method, process or workflow for processing data for accounts associated with a debit, credit, pre-paid card or other form of financial instrument that have a negative balance. The data processing includes application of issuer criteria or filters to determine if certain of the accounts having a negative balance are not suitable for chargeback processing and instead may be processed in bulk, thereby reducing administrative and data processing overhead. For each account that is potentially eligible for chargeback processing, the invention embodiment accesses the account data and determines if the data supports initiation of a chargeback procedure for one or more transactions described by the account data. If the account contains one or more transactions that are eligible for chargeback processing, then a provisional credit in the amount of the one or more transactions may be applied to the account.
An action submitted via a network may be fulfilled despite the network, or a website accessible via the network, experiencing an error that prevents processing of the action when the action is received. In one example, the user that submitted the action may receive a confirmation page indicating that the action has been received. Transaction data may be retrieved based at least in part on the action and/or the user that submitted the action. Once the transaction data is stored in a queue, the transaction data may be processed either automatically or manually. Subsequently, the action may be fulfilled without the user needing to resubmit the action. Alternatively, the action may be optimistically fulfilled prior to the action being processed.
System and method for fulfillment services coordination
Various embodiments of the system and method for managing sales and fulfillment services described herein may include a fulfillment coordination service. The fulfillment coordination service may be configured to receive a selection of one or more items of a merchant. The one or more items may be registered for fulfillment service with a fulfillment service provider. The fulfillment coordination service may also be configured to generate a sales listing for each selected item for listing with a sales listing provider. The fulfillment coordination service may in various embodiments receive an order indication for one or more of the selected items listed on the sales listing. The fulfillment coordination service may be configured to send a fulfillment request to the fulfillment service provider for the one or more items indicated by the order indication.
Maintenance of a company profile of a company associated with a supplier/buyer commerce network
Embodiments for maintaining a company profile of a company associated with a supplier/buyer commerce network are disclosed. One method includes collecting activity information of the company. The collecting includes monitoring a plurality of databases that each maintains activity information associated with the company, assigning a unique identification for the company across the plurality of databases, exporting the activity information associated with the company from each of the plurality of databases, and aggregating the activity information. The method further includes updating the company profile with the aggregated activity information of the company.
Method for integrated recommendations
A recommendation appliance, system and method are provided for generating and deploying additional web page content or functionality (e.g., retail recommendations) to an existing web page server system. For example, the present invention may be embodied as a reverse proxy server that is inserted as an intermediate network node between a web server and the end users accessing the web server. In this position, the recommendation appliance can introduce recommendation messages to web pages generated by the web server without requiring any modification to the code or architecture of the web server. In addition, the appliance may separately track the transaction activities of end users who receive recommendation messages and the transaction activities of end users who do not receive recommendation messages, so that a comparison of the effectiveness of the recommendations may efficiently be demonstrated without requiring any modification to the code or architecture of the web server.
Using model information groups in searching
Managing user accesses is disclosed, including: generating journal files over a predetermined period of time, wherein a journal file includes merchandise information associated with an accessed webpage; determining, for a merchandise category, information related to an attribute based at least in part on the generated journal files; aggregating information associated with the attribute from journal files associated with the merchandise category, wherein the aggregated information is to be included in a model information group associated with the merchandise category; and returning, in a subsequent search of merchandise information corresponding to the merchandise category, search results that are based at least in part on information associated with the model information group. Conducting searches of merchandise information is disclosed, including: determining a merchandise category associated with a query based at least in part on received keywords associated with the query; retrieving a model information group corresponding to the determined merchandise category; extracting attribute information from the retrieved model information group based at least in part on a quantity associated with an attribute; and presenting the extracted attribute information.
Real-time ride share system
A method of organizing the sharing of vehicle trips includes receiving a ride request from one or more riders, wherein the ride request includes a rider location and a rider destination, identifying a beginning waypoint and an ending waypoint for vehicle travel, determining a vehicle route based on the beginning and ending waypoints, choosing a rider whose rider location or rider destination is geographically closest to the determined vehicle route, presenting the rider location and rider destination of the chosen rider to the driver, and if the driver accepts, sending a notification to the chosen rider alerting the chosen rider of the acceptance.
Systems and methods to facilitate transactions
Systems and methods to facilitate programmatic access to a network-based commerce facility via a network are described. In some embodiments, a method includes receiving a request from a third party application via the network at the network based commerce facility. The request performs an action pertaining to electronic commerce and being one of a plurality of requests recognized by the network-based commerce facility. In responsive to the request, the method performs the action pertaining to the electronic commerce and communicates from a result of the action from the network-based commerce facility to the third party application in a programmatically accessible format.
System and method for dynamic online advertisement creation and management
A method and system may in response to a request for advertisement components stored at a server, select a subset of advertisement components, and transmit the advertisement components to a client. The client may, for example insert the components into an advertisement in order to, for example, display an advertisement that is custom made for the particular client, or includes a random selection of components, or is an advertisement with components assembled for a different reason.
Opportunistic alignment of advertisement delivery with cellular basestation overloads
A method includes controlling communications by users across a network with a predetermined capacity for desired communication flows for all the users and opportunistically aligning advertisement delivery to the users when an overload condition in the network occurs so that users perceive the disruption in communication service by the network as a minimum.
Method, algorithm, and computer program for targeting messages including advertisements in an interactive measurable medium
Techniques for improving and optimizing or attempting to optimize performance of messaging campaigns, particularly to marketing campaigns in which advertisements or other messages are distributed over an interactive measurable medium. When message is an advertisement, campaign involves a list of ad alternatives and a target customer population. Goal of message manager or marketing manager is to allocate ad alternatives to customer population to optimize business objectives such as maximizing the number of positive responses received. This is achieved by segmenting customer population into segments and then finding best allocation of ad alternatives for each segment. The number of segments and grouping of a customer population changes at different stages of the campaign. When the message is other than an advertisement, goal is to allocate messages to optimize analogous business or campaign objectives, typically measured by the number of successes or successful responses.
Offer insertion system
The invention provides a computer system and method for managing electronic transactions. A plurality of consumer and merchant accounts are stored in a data store. Each consumer account has a first consumer account identifier. Each merchant account has a merchant account identifier. A merchant offer is stored in the data store in association with the merchant account having the respective merchant account identifier. A push module associates the merchant offer with the consumer account identifier. A communication and routing module receives a charge request over the network interface device, the charge request including an amount and a second consumer account identifier and identifies a selected one of the consumer accounts by associating one of the first consumer account identifiers with the second consumer account identifier. A transaction processing system that processes the charge request based on an account detail of the selected consumer account.
Parking locator system providing variably priced parking fees
A parking locator system providing variably priced parking includes one or more parking sensors and one or more parking kiosks. The parking sensors may generate parking information identifying one or more occupied parking spaces and one or more unoccupied parking spaces within a vicinity. Promotion information including one or more discounts to parking fees may be received at the parking kiosks. The parking kiosks may display the discounted parking fees and receive payment of the same. The discounts to parking fees may expire at particular times. The size of the discounts may be set based on traffic congestion, which may be determined based on the number of occupied parking spaces within the vicinity.
Method for continuous sampled satisfaction polling
Systems and methods for polling populations. In one embodiment, a method includes forming a respondent pool (which can be, 10% of the population), and polling the pool at first time in a roiling period. The method also includes randomly replacing a fraction (20% in some embodiments) of the respondents with respondents who were previously polled more than one rolling period ago. The poll is then repeated and the results compared with the results from about one rolling period before. The population can be small enough that the results tend to exhibit skew and kurtosis. In some embodiments, the skew can be outside of the range of −0.8 to 0.8 and the kurtosis can be either leptokurtic or platykurtic. The organization taking the poll can have an ongoing relationship with the population. Some embodiments include an order taking system for a merchant (such as a promotional goods merchant) along with a polling system.
Method and apparatus for collecting data for an item
A sale of a product or service may trigger a third party, such as a payment provider, to arrange for the collection of individual post-sale market data from the consumer. Alternatively, such post-sale market data may be directly provided by smart devices and the like. Dependent upon the type of product or service involved, a schedule for continuously submitting post-sale market data for the product or service may be provided and the consumer may be encouraged to submit post-sale market data in accordance therewith through a variety of incentives. The received, individual, post-sale market data may be aggregated by one or more sources to determine aggregate post-sale market data for the product or service. The submitted individual data and/or the determined aggregate post-sale market data may then be provided to consumers in order to assist them in making purchasing decisions.
System and method for targeting family members of transaction account product holders to receive supplementary transaction account products
Utilization of information in a closed loop data system further augments modeling while at the same time enabling customization of offers based on spend patterns. Data mining techniques are leveraged to identify rules to determine higher response rate populations. These rules are referred to herein as “triggers,” in that the presence of particular attributes will trigger a cardholder as being more likely to respond to a particular offer. The benefit yielded by this approach is a greater acceptance rate to an offer provided by a transactional account company. To identify the triggers, records of cardmembers who already utilize a given product are analyzed to determine their spend patterns. The spend histories of customers who are eligible to use the product are analyzed according to the identified triggers. Customers whose spend patterns most closely correspond to the triggers are then targeted with offers for the given product.
Method and system enabling dynamic composition of heterogenous risk models
A method and system for quantifying risk by composing a heterogeneous risk model are provided. The method comprises providing risk input data associated with one or more risk nodes to a processor, running one or more risk models to output individual risk quantifications for each risk node, and aggregating the individual risk quantifications into a single output. The system comprises a processor operable to provide risk input data associated with one or more risk nodes to a processor, run one or more risk models to output individual risk quantifications for each risk node and aggregate the individual risk quantifications into a single output.
Information technology resiliency classification framework
Techniques for assessing a resiliency level in an information technology system and architecting the information technology system in accordance with the resiliency level are disclosed. An estimated resiliency level may be estimated from different system characteristics to obtain an estimated resiliency level for the information technology system. The cost and the degree of effort to design for the information technology system may be estimated from the estimated resiliency level. The resiliency level may be further determined from different system factors. Consequently, a specification for a resiliency feature is obtained by accessing a set of resiliency guidelines based on the resiliency level and a technology theme. The resiliency feature may then be applied to the information technology system.
System and method for transferring articles such as airline transfer bags
A system and method for transferring articles such as, for example, airline transfer bags, according to which, in several exemplary embodiments, the articles are transferred from an arrival gate of an inbound flight to one or more departure gates of connecting flights.
Broker price opinion evaluation and scoring system and method
A system and related methods for the management and evaluation of broker price opinions comprising, a method of determining a standardized score representative of the accuracy and quality of a broker price opinion. Data from the broker price opinion is extracted and evaluated according to a plurality of rules applicable to the type of broker price opinion. Each rule is given a particular weight, and an appraisal score may be calculating by summing each instance of a rule triggered multiplied by the weight assigned to that rule. Weights may be set by experts, or determined by statistical analysis.
Attachment alignment measurement system, method and device
The present invention provides an Attachment alignment measurement system, method and tool, for identifying the level of Attachment Variance in a relationship between a caregiver and a subject (e.g. new member) in the social structure. Attachment Variance is the degree of alignment (or misalignment) between a subject's (e.g. new member) actual Attachment to the social structure compared with the Attachment of the subject as perceived by the caregiver. The Attachment alignment measurement method for measuring attachment variance in social structure, including the steps of measuring a Subject's actual Attachment to a social structure (Actual Attachment), measuring a primary carer's perception of the Subject's Attachment to a social structure (Perceived Attachment), and comparing Actual Attachment and Perceived Attachment such that Attachment Variance is assessable, wherein Attachment Variance provides an indication of alignment between a Subject's Actual Attachment the Perceived Attachment and the programming instructions for performing the steps.
Associating ad results with purchases made via a mobile devices
Implementations and techniques for associating ad results with purchases made via mobile devices are generally disclosed.
System and method for determining a hotel marketability index score in a network environment
A method for evaluating travel accommodations is provided that includes identifying a plurality of hotel properties and assigning a hotel marketability index score to one or more of the properties such that one or more of the properties may be ranked. The hotel marketability index score may be based on a selected one or more characteristics associated with one or more of the hotel properties, the characteristics including rate competitiveness, hotel availability, hotel location within a cluster location, and hotel quality within the cluster location.
System, method and program for setting wage for call center personnel
System, method and program product for dynamically setting a wage offered to a multiplicity of inactive call center personnel. First program instructions automatically estimate a wait time for calls to a call center. The calls are handled by a plurality of active call center personnel. Second program instructions automatically determine and set a wage, based in part on the estimated wait time, offered to inactive call center personnel to induce them to become active call center personnel to handle calls. Third program instructions, responsive to a request by an inactive call center person to become active at said wage, automatically designate the requesting inactive call center person as active at the wage and assign a call to the requesting inactive call center personnel that was designated as active. Program instructions also set a renewal wage paid to active call center personnel, based in part on the estimated wait time, to induce the active call center personnel to remain active.
Automated accounts receivable management system with a self learning engine driven by current data
An automated system is disclosed for managing accounts receivable for outstanding healthcare accounts. In particular, the system in accordance with the present invention is an automated system which preemptively assesses the risk of denials of outstanding healthcare accounts by way of a self-learning engine driven by current data and prioritizes those accounts for follow up according to the risk profile of the account. As such, the system is able to minimize denials by the respective payers thereby improving optimizing the efforts of healthcare accounts receivable personnel while improving the revenue yield and minimizing the revenue cycle.
Method, system, and computer program product for determining a narcotics use indicator
A method, system, and computer program product for determining a narcotics use indicator to enable a physician, or other prescriber, to quickly review a numerical score that reflects a patient's past drug use and is indicative of proper, or improper, future drug use. This score analyzes many aspects of a patient's past activities to determine multiple individual indicator values that may be selectively weighted to create a final narcotics use indicator. Such individual indicator values may include a usage related indicator factoring in the patient's past drug use, particularly the type of narcotics and controlled substances used; an instruction related indicator that may consider the patient's past use of prescribers, quantity of prescriptions, or the number of open prescriptions from different prescribers; a dispensing related indicator that examines a patient's use of pharmacies, in filling prescriptions; or even an auxiliary indicator that may reflect the patient's number of active prescriptions.
Patient health record access system
An integrated system provides patients with secure, real-time access to their Personal Health Record and an Enterprise Health Information System (PHR and EHIS, respectively). Access may be provided by way of the Internet and via a Personal Health Portal (PHP) web page. From the secure PHP web page, patients can view information created and maintained by their health care providers and their affiliated staff. The patients can also request services and information from their health care providers and affiliated staff, directly access EHIS-related services, such as scheduling an appointment, scheduling, paying a bill, enrolling in a class, completing insurance and other forms, and viewing information and Internet services that are relevant to their particular health status.
Liability insurer and health plan data exchange
A data information exchange, which accesses data from liability insurers and health plans, manages the data and allows health plans to identify when their plan participants are third party claimants in injury claims. In another aspect, subrogation entities access the data information exchange in order to perform subrogation operations for the health plans, relating to the health plan's participants. In another aspect, coordination of benefit recovery entities access the data information exchange in order to perform recovery operations for the health plans, relating to health providers which rendered services to participants of the health plans.
System and method for identifying a prospective clinical therapy for a prospective patient having a medical device
System and method for identifying a prospective clinical therapy for a prospective patient. The patient has a medical device, performed with a medical apparatus. The system has a historical database and an analyzer. The historical database incorporates information relating to a multiplicity of patients, each of the multiplicity of patients having a medical device and each of the multiplicity of patients having undergone a clinical therapy, the information including, for each of the multiplicity of patients, device characteristics of the medical device and an assessment of efficacy of clinical therapy. The analyzer correlates device characteristics of the prospective patient with the device characteristics and the assessment of efficacy of clinical therapy of the multiplicity of patients using the historical database to identify a prospective clinical therapy for the prospective patient associated with the device characteristics in the historical database having a relatively greater efficacy than the clinical therapy.
System and method for automatic response piece information retrieval
Disclosed is a system, method, and medium for automatically analyzing response pieces. The system may scan the response piece, identify the response piece, and generate an image from the response piece. The system also processes the image. Processing the image may include determining response piece identification information and sending the response piece identification information to an accounting system to update an account associated with the response piece identification information. Processing the image may also include reading information from the response piece.
Media auto exchange system and method
A network based distribution system and method is disclosed for automatically exchanging playable media items, such as movies in a digital format. The automatic exchange system includes a number of components that interoperate to improve a subscriber's experience, including an intelligent queue monitor which works on his/her behalf to identify potential items of interest for the subscriber. The system can thus automatically exchange for desirable tides, including other titles from other subscribers, under a set of programmed directives from the user, and/or in response to supply/demand requirements of other subscribers.
Electronic registry for authenticating transferable records
An electronic registry stores information relating to a transferable electronic record and the controller of an authoritative copy of the transferable electronic record. The electronic registry includes information for authenticating a true copy of the authoritative copy of the transferable electronic record. The electronic registry also facilitates registration of the transferable electronic record and transfer of legal rights associated therewith.
Transmitting apparatus, transmitting method, receiving apparatus, receiving method, computer program, and broadcasting system
The transmitting apparatus includes an encoder creating an encoded content signal by encoding the content, a generator generating sign language word identification information corresponding to chronologically-ordered sign language words appearing in a speech in the content, a creating unit creating control information containing the generated chronologically-ordered sign language word identification information, a storage unit storing sign language word images for displaying a sign language video corresponding to the sign language words by grouping the sign language word images into a plurality of modules according to a frequency of appearance of the sign language words in the speech in the content, a multiplexer creating a data stream by combining the encoded content signal with the control information and by repeatedly replicating the plurality of modules at a frequency corresponding to the frequency of appearance, and a transmitter transmitting the created data stream.
Facilitating text-to-speech conversion of a domain name or a network address containing a domain name
A method and apparatus of facilitating text-to-speech conversion of a domain name are provided. At a processor of a computing device, a pronunciation of a top level domain of a network address is determined by one or more of: generating a phonetic representation of each character in the top level domain pronounced individually; and, generating a tokenized representation of each individual character of the top level domain suitable for interpretation by a text-to-speech engine. For each other level domain of the network address, at the processor, a pronunciation of the other level domain is determined based on one or more recognized words within the other level domain.
Intent mining via analysis of utterances
According to example configurations, a speech processing system can include a syntactic parser, a word extractor, word extraction rules, and an analyzer. The syntactic parser of the speech processing system parses the utterance to identify syntactic relationships amongst words in the utterance. The word extractor utilizes word extraction rules to identify groupings of related words in the utterance that most likely represent an intended meaning of the utterance. The analyzer in the speech processing system maps each set of the sets of words produced by the word extractor to a respective candidate intent value to produce a list of candidate intent values for the utterance. The analyzer is configured to select, from the list of candidate intent values (i.e., possible intended meanings) of the utterance, a particular candidate intent value as being representative of the intent (i.e., intended meaning) of the utterance.
Disambiguation of contact information using historical and context data
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for disambiguating contact information are described. A method includes determining, for each of multiple communications that were initiated by a user of a mobile device, a time when the communication was initiated or received; determining, for each of multiple contacts associated with the user, a probability associated with the contact based at least on the times when the communications were initiated or received; weighting a contact disambiguation grammar according to the probabilities; and processing audio data using the contact disambiguation grammar to select a particular contact.
Method and system for domain-specific noisy channel natural language processing (NLP)
A method for processing transcriptions using natural language processing (NLP), the method includes obtaining transcriptions corresponding to an utterance from a user device, where each of the transcriptions is a different speech-to-text conversion of the utterance. The method further includes tagging a first transcription with at least one entity tag and a first transcription-level tag to obtain a first tagged transcription, tagging the second transcription with at least one entity tag and a second transcription-level tag to obtain a second tagged transcription, determining a highest probability transcription-level tag from the first transcription-level tag and second transcription-level tag. The method further includes identifying a subject-matter domain using the highest probability transcription-level tag, retagging the first transcription and the second transcription using entity tags associated with the subject-matter domain to obtain retagged transcriptions, performing, using the retagged transcriptions, an action to obtain a result, and sending the result to the user device.
Method and apparatus to facilitate provision and use of an energy value to determine a spectral envelope shape for out-of-signal bandwidth content
One provides (101) a digital audio signal having a corresponding signal bandwidth, and then provides (102) an energy value that corresponds to at least an estimate of out-of-signal bandwidth energy as corresponds to that digital audio signal. One then uses (103) the energy value to simultaneously determine both a spectral envelope shape and a corresponding suitable energy for the spectral envelope shape for out-of-signal bandwidth content as corresponds to the digital audio signal. By one approach, if desired, one then combines (104) (on, for example, a frame by frame basis) the digital audio signal with the out-of-signal bandwidth content to provide a bandwidth extended version of the digital audio signal to be audibly rendered to thereby improve corresponding audio quality of the digital audio signal as so rendered.
Generating speech and voice from extracted signal attributes using a speech-locked loop (SLL)
A speech processing system includes a plurality of signal analyzers that extract salient signal attributes of an input voice signal. A difference module computes the differences in the salient signal attributes. One or more control modules control a plurality of speech generators using an output signal from the difference module in a speech-locked loop (SLL), the speech generators use the output signal to generate a voice signal.
Packet loss concealment for speech coding
A speech coding method of significantly reducing error propagation due to voice packet loss, while still greatly profiting from a pitch prediction or Long-Term Prediction (LTP), is achieved by limiting or reducing a pitch gain only for the first subframe or the first two subframes within a speech frame. The method is used for a voiced speech class; a pitch cycle length is compared to a subframe size to decide to reduce the pitch gain for the first subframe or the first two subframes within the frame. Speech coding quality loss due to the pitch gain reduction is compensated by increasing a bit rate of a second excitation component or adding one more stage of excitation component only for the first subframe or the first two subframes within the speech frame.
Systems and methods for normalizing input media
A method and system for processing input media for provision to a text to speech engine comprising: a rules engine configured to maintain and update rules for processing the input media; a pre-parsing filter module configured to determine one or more metadata attributes using pre-parsing rules; a parsing filter module configured to identify content component from the input media using the parsing rules; a context and language detector configured to determine a default context and a default language; a learning agent configured to divide the content component into units of interest; a tagging module configured to iteratively assign tags to the units of interest using the tagging rules, wherein each tag is associated with a post-parsing rule; a post-parsing filter module configured to modify the content component by executing the post-parsing rules identified by the tags assigned to the phrases and strings. The context and language detector, tagging module, learning agent and post-parsing filter module are configured to iteratively process the content component and modifications thereto until there are no further modifications or a threshold number of iterations are performed.
Systems for translating text messages in an instant messaging system comprise a translation engine for translating text messages into a preferred language of a recipient of the text messages. The systems are preferably configured to send and receive the text messages and to determine whether the text messages that are received in a source language are in the preferred language of the recipients so that the text messages are displayed in the preferred language of the recipients of the text messages. Other systems and methods are also provided.
Using computational phases to model the load on a computer system
Embodiments of the present invention provide a system that simulates a load on a computer system. The system starts by collecting a set of sampled values from one or more monitors in the computer system during the execution of program code. Next, the system uses the set of sampled values to determine if one or more repeating computational phases occurs during the execution of the program code. If one or more repeating computational phases occurs, the system subsequently simulates a load on the computer system by executing portions of the program code that caused each repeating computational phase one or more times.
Method of modelling a porous geologic medium traversed by a network of fractures
A method of modelling a fractured reservoir having application for petroleum reservoir development is disclosed utilizing a set of several families of equivalent blocks of regular shapes and sizes. The fractured reservoir is modelled by a complex porous medium made up of irregular blocks. A function defining the progress of an imbibition front within these blocks, whose derivative A′(X) is calculated, is determined. A function defining the progress of an imbibition front within regular equivalent blocks, whose derivative A′eq(X) is calculated, is then determined. This derivative, which constitutes at least two line segments with distinct slopes, depends on the dimensions of the equivalent blocks. Finally, the dimensions of the equivalent blocks are obtained by adjusting the two derivatives A′eq(X) and A′(X).
Efficient evaluation of network robustness with a graph
Likely disconnections or system-level-impact producing slowdown in a flow parameter in a network can be identified by annotating a graph representing the network with a weight to edges of a graph representing the network. The weight can be linearly or non-linearly proportional to the inverse of the severity of the impact, and/or linearly or non-linearly proportional to the inverse of the likelihood of disconnection. Minimal cut sets needed to generate a disconnection in the network are identified from the annotated network based on the weights on the edges. Subsets of each minimal cut set are generated and evaluated during a simulation. The subsets can correspond to almost isolated scenarios for the network. The scope of the simulations can be reduced by selecting the minimal cut sets employing the weight.
Method for predicting the operational reliability of an aircraft system
The present invention relates to a method for predicting the reliability of an aircraft system (S) onboard an aircraft, constituted by a plurality of elements. The operation of the aircraft is constituted by a sequence of cycles, each cycle comprising a flight phase and a ground station phase. The method of reliability prediction allows in particular calculation of the breakdown probability of the aircraft system at each cycle of operation of the aircraft. The present invention can also estimate the rate of operational interruption of this system.
Methods and systems for improved pharmaceutical intervention in coagulation control
Contemplated methods and devices for coagulation control allow to establish a more constant dosage of required medication and to quantify/take into account patient-specific sensitivity to warfarin and Vitamin K by using logit (1/INR) as the dependent variable to so stabilize the variance across all values of INR. Moreover, it should be noted that such use simplifies the relation between INR and dose of coumarins or Vitamin K and reduces the number of parameters to be estimated for each patient.
Identification of fluid flow bottlenecks
Techniques for determining one or more fluid flow characteristic values of a structure are disclosed. A fluid flow vector and a pressure gradient vector for a portion of the structure are determined, and a dot/cross product of the fluid flow vector with the pressure gradient vector is obtained to provide a fluid flow characteristic value. The fluid flow characteristic value can be used for modifying the structure to improve fluid flow through the structure.
System and method for solving chemical engineering equations and model development using equation editor
A system includes a process controller and an equation evaluation apparatus. The equation evaluation apparatus includes an equation editor, a model factory, and an equation evaluation engine. The equation editor is adapted to receive equations describing a process to be controlled by the process controller. The equation editor is also adapted to generate model information representing the equations. The model factory is adapted to receive the model information and generate an equation stack representing the equations. The equation evaluation engine is adapted to receive evaluation information from the process controller, evaluate at least one of the equations using the evaluation information and the equation stack, and send a result of the evaluation to the process controller. The model information could include information representing algebraic equations, differential equations, algebraic states, differential states, inputs, parameters, constants, and/or expressions.
Cable management and inventory enhancement
A cable-management system that integrates management information about infrastructure into objects and provides a visualization of cable and inventory objects within a building. An embodiment of the present invention comprises a computer-implemented cable management system comprising a cable module configured to manage at least one cable object associated with at least one physical cable and to automatically synchronize cable availability information with at least one inventory database, an infrastructure module configured to manage at least one infrastructure object associated with a building layout, wherein attributes of the at least one infrastructure object are associated with the at least one cable object, and a capacity module configured to calculate at least one utilization value associated with the at least one infrastructure object, whereby the at least one utilization value, the at least one cable object, and the at least one infrastructure object are integrated into a visualization of the building layout.
Method for determining an arrangement of measurement points on an anatomical structure
A method for determining arrangement data which represents an arrangement of measurement points on an anatomical structure of a patient, wherein the arrangement data is individually determined for different regions of the anatomical structure.
Remote monitoring systems and methods
A system for monitoring an industrial process, comprising one or more sensors connected to one or more operating components of the industrial process; a remote monitoring station, comprising a computer and a database; and a connection between the one or more sensors and the remote monitoring station, wherein the remote monitoring station is at least about 100-2500 miles away from the industrial process, for example 500-1000 miles.
Strobe-offset control circuit
A method of operation in a memory controller is disclosed. The method includes receiving a strobe signal having a first phase relationship with respect to first data propagating on a first data line, and a second phase relationship with respect to second data propagating on a second data line. A first sample signal is generated based on the first phase relationship and a second sample signal is generated based on the second phase relationship. The first data signal is received using a first receiver clocked by the first sample signal. The second data signal is received using a second receiver clocked by the second sample signal.
Error calculation method for angle detection device
An angle detection device formed in the shape of a disk includes: a graduation plate having a plurality of graduation lines being provided radially from the center toward the circumference thereof; and two detectors being disposed along the circumference of the graduation plate in a manner to be opposite to each other in a radial direction, the detectors detecting the graduation lines. The angle detection device is configured to calculate a center error based on angles detected by the detectors.
Targeted data collection for positioning systems
Selecting devices from which to receive data for adjusting the performance of a positioning system. The positioning system infers the location of the devices based on beacons observed by the devices. The performance of the positioning system is compared to performance targets. One or more of the devices are selected based on the comparison. Data collection from the devices is adjusted to affect performance of the positioning system (e.g., improved or reduced). For example, if the positioning system predicts positions poorly for a particular area, data collection from selected devices within the particular area may be increased.
Data center power conversion efficiency management
A data center energy management (DCEM) server configures a power supply in the data center. The DCEM server sums input alternating current (AC) power of the power supply to a total AC power of the data center, wherein the total AC power of the data center is a sum of AC power of a plurality of power supplies. The DCEM server sums output direct current (DC) power of the power supply to a total DC power of the data center and reports a ratio of total AC power to total DC power as data center power conversion efficiency. The DCEM server sets a preset power supply efficiency threshold. The DCEM server determines that a real-time power efficiency level is below the power supply efficiency threshold. The DCEM server, responsive to a determination that real-time power efficiency level is below the power supply efficiency threshold, may remedy the power supply.
System and method for testing a light sensor of a portable electronic device
An improved system and method for testing a sensor of a portable electronic device based on expected sensor data and not timing information. The system and method for testing a sensor of a portable electronic device retrieves sensed data from the portable electronic device (i.e. device under test) after the device has traversed a series of test areas or zones. The sensed data is compared against a set of expected sensor data patterns to determine which components of the sensed data correspond to each test area or zone. The sensor of the portable electronic device may be tested based on an association of the test areas or zones with segments of the sensed data.
Thermoelectric evaluation and manufacturing methods
A means for determining the electrical resistance and resistivity of thermoelectric material allows quality control at all steps in the construction of a bismuth telluride and antimony telluride thermoelectric generator. The method involves measuring negative thermoelectric voltage with no current flowing and then a measure of negative thermoelectric voltage while forcing known current through the material in the same direction as shorted to accurately determine thermoelectric resistance. A manual and automatic method of manufacturing thermoelectric rings using forcing current for in-process testing means.
Methods for selecting initial doses of psychotropic medications based on a CYP2D6 genotype
Methods for selecting a medication for a patient are described that include determining the patient's genotype for a panel of genes and selecting the medication based on the genotype. Articles of manufacture also are provided that include nucleic acid molecules for detecting alleles of genes encoding drug metabolizing enzymes and genes encoding products involved in neurotransmission.
Detection of downhole vibrations using surface data from drilling rigs
Disclosed is a method for estimating downhole lateral vibrations a drill tubular disposed in a borehole penetrating the earth or a component coupled to the drill tubular. The method includes rotating the drill tubular to drill the first borehole and performing a plurality of measurements in a time window of one or more parameters of the drill tubular at or above a surface of the earth during the rotating using a sensor. The method further includes estimating the downhole lateral vibrations using a processor that receives the plurality of measurements.
Even driven data acquisition switch
A method and apparatus in a vehicular telemetry system and a remote data analysis system for detecting an event and switching a data acquisition mode. Checking a state of a data acquisition mode. If the state is in a filtered data state and if an indicator value is at or above a threshold value, then switch the data acquisition mode to an unfiltered data state and acquire unfiltered data. If the data acquisition mode is in an unfiltered data state and if the indicator value is below the threshold value, switch the data acquisition mode to a filtered data state and acquire filtered data.
System and method of using automatically-identified prominent establishments in driving directions
A system and method provides turn-by-turn directions by identifying placemarks, such as businesses or other landmarks that appear along a traveled route. The system may determine whether signage is associated with each placemark along the route and whether the signage is visible from the route. The system may also determine how prominent the signage is from the route. The system selects the placemark by determining how easily the placemark may be identified from the route, based on the signage's visibility and prominence. The selected placemark may then be identified in connection with the turn-by-turn directions.
Method and system for locating and monitoring first responders
The present invention is directed to methods and systems for locating and monitoring the status of people and moveable assets, such as first responders, including firefighters and other public service personnel, and their equipment both indoors and out. The invention can provide for locating and monitoring the status of people and assets in environments where GPS systems do not operate, or where operation is impaired or otherwise limited. The system and method uses inertial navigation to determine the location, motion and orientation of the personnel or assets and communicates with an external monitoring station to receive requests for location, motion orientation and status information and to transmit the location, motion orientation and status information to the monitoring station. The system and method can include storing the location, motion and orientation data as well as status data, in the event that the communication system is unable to communicate with and transmit information to the monitoring station, the system will wait until communication is restored and transmit the status information to the monitoring station to update the location, motion orientation and status information for the person or asset.
Multiple directions to a destination without providing a specific origin
The automatic generation of multiple sets of directions for navigating geographically to a specific destination without specification of an origin. Based on the destination, candidate roads or other transportation conduits are selected for analysis. Candidate meta-departure points are analyzed and selected along the roads based on distribution about the destination, cardinal directions relative to the destination, road metadata, distance to the destination, driving time, and other factors. The number of departure points generated to represent routes to the destination from the several logical cardinal directions is minimized. The generated departure points also represent routes that a majority of people would likely take to the destination. Additionally, the generated departure points originate from places that users are likely to be familiar with and can get to without additional guidance. The final instruction sets for navigating to the destination are presented along with a map that identified the departure points.
Information display method, information processing apparatus, and information display program
Disclosed is an information display method whereby an information processing apparatus displays a map on a display screen such that a cursor is displayed at a position measured as the current position of a position indication object on the map. The method includes the steps of, when the moving speed of the position indication object is equal to or less than a threshold speed, scrolling the map on the display screen in accordance with the movement of the position indication object in a first display mode, and when the moving speed of the position indication object is greater than the threshold speed, fixing the map on the display screen in a second display mode or reducing the speed of scrolling the map on the display screen so that the scrolling speed is less than that in the first display mode.
Data mining in a digital map database to identify blind intersections along roads and enabling precautionary actions in a vehicle
Disclosed is a feature for a vehicle that enables taking precautionary actions in response to conditions on the road network around or ahead of the vehicle, in particular, a blind intersection along a section of road. A database that represents the road network is used to determine locations where a blind intersection is located along a section of road. Then, precautionary action data is added to the database to indicate a location at which a precautionary action is to be taken about the blind intersection located along the section of road. A precautionary action system installed in a vehicle uses this database, or a database derived therefrom, in combination with a positioning system to determine when the vehicle is at a location that corresponds to the location of a precautionary action. When the vehicle is at such a location, a precautionary action is taken by a vehicle system as the vehicle is approaching a blind intersection.
Image-based localization for addresses
The present localization system determines a precise location for an address based on images. Some implementations identify the precise location using one image. Other implementations identify the precise location using multiple images. While still other implementations identify the precise location by interpolation, which uses precise locations of addresses nearby that were previously localized using one or more images. The images used in determining the precise locations have a visual feature associated with the address appearing in the image.
Storage and visualization of points of interest in a navigation system
A navigation system accepts driver input that extends the navigation capabilities of the navigation system, while permitting the driver to navigate using a digital map that indicates vehicle position. The driver input may identify a new point of interest, an icon for the new point of interest, and location information for the new point of interest. The navigation system supplements a pre-configured navigation database with the driver input. During a subsequent trip, when the vehicle approaches the new point of interest, the navigation system alerts the driver of the new point of interest.
Method for determining a remaining range
A method determines a partial area of a map which is described by features, the partial area describing the remaining range of a motor vehicle. An energy-storage system supplies a drive system which acts on at least one wheel of the motor vehicle. The remaining range is determined as a function of energy stored in the energy-storage system using an algorithm which expands from a current position of the motor vehicle. The method uses divides the map into geometric, in particular rectangular, structures of equal size. Whenever, in the context of the expansion, a feature lying in a structure or corresponding to a structure is added, the structure is added to the partial area.
Method for operating a fording-capable motor vehicle, and fording-capable motor vehicle
A motor vehicle having an internal combustion engine, a differential pressure sensor or two pressure sensors for detecting a pressure difference, which may be in an exhaust tract of the internal combustion engine, and an evaluation unit for evaluating the detected pressure difference. Moreover, the present invention relates to a method for operating a motor vehicle. A controlling arrangement is provided for controlling an automatic start-stop system or an ignition system of the motor vehicle as a function of the result of the evaluation of the detected pressure difference used to detect immersion or submersion of a tailpipe of the exhaust tract in water, sludge, or a similar liquid medium in order to prevent the internal combustion engine from shutting off when the tailpipe is immersed or submerged.
Idle stop control method and control device
There is provided an idle stop system that can more quickly restart with small noise in conducting idle stop. In preparation for a restart request during an engine inertial rotation, after a motor is rotated in a state where a starter motor is not coupled to the engine, a pinion is engaged with a ring gear during the motor is subjected to inertial rotation like the engine. In this situation, the rotational speed including future pulsation of the engine is estimated with the use of information on the crank angle, and a pinion pushing timing is controlled so that the pinion and the ring gear contact each other with a given rotational speed difference taking a delay time of a pinion pushing unit into consideration.
Torque estimating system for internal combustion engine
A torque estimating system for an internal combustion engine includes a plurality of cylinders and estimates torque for each cylinder. A cylinder pressure of a cylinder pressure sensor (CPS) mounted cylinder #1 is acquired. Measured indicated torque Te1 resulting from an explosion in the CPS-mounted cylinder #1 is calculated based on the cylinder pressure. A first angular acceleration dω1/dt and a second angular acceleration dω2/dt are calculated. Estimated indicated torque Te2 resulting from an explosion in a CPS-less cylinder #2 is calculated using the measured indicated torque Te1 of the CPS-mounted cylinder #1 and a difference value between the second angular acceleration dω2/dt and the first angular acceleration dω1/dt.
Control device for internal combustion engine
When the variation of the knock control system learning value is large, an idle speed learning control is performed in a learning acceleration mode. In this mode, the idle speed learning update increases and idle speed learning is performed at a high speed. By performing the idle speed learning in the learning acceleration mode, the idle speed learning can immediately follow large variations of the knock control system learning value. Accordingly, the idle speed learning control performed during idling of a hybrid car can be completed in a short time, and fuel consumption during idling can be reduced.
Fuel injection control apparatus
A fuel injection control apparatus of the invention includes: a temperature acquisition portion that estimates the present temperature of a catalyst and the convergence temperature of the catalyst; an increase value calculation portion that calculates a base OT increase value that is an increase value for the fuel injection amount that a fuel injection valve provided in an internal combustion engine needs to inject, on the basis of the present temperature and the convergence temperature of the catalyst estimated by the temperature acquisition portion; a correction portion that calculates an OT increase correction-reflected value by correcting the base OT increase value on the basis of the present temperature and the convergence temperature if the present temperature is lower than the convergence temperature; and an increase value determination portion that selects one of the base OT increase value and the OT increase correction-reflected value as the OT increase value for the fuel injection amount that the fuel injection valve needs to inject, on the basis of the base OT increase value and the OT increase correction-reflected value.
Engine control system with algorithm for actuator control
An engine control apparatus which may be employed in automotive vehicles. The engine control apparatus is equipped with a controlled variable arithmetic expression which defines correlations between a plurality of combustion parameters and a plurality of controlled variables of actuators for control of an operation of the engine to calculate a combination of command values to be outputted to the actuators for regulating the controlled variables needed to achieve target values of the combustion parameters. When one of the command values is produced outside an allowable operation range of a corresponding one of the actuators, the engine control apparatus corrects or limits the one of the command values to an upper or a lower limit of the allowable operation range, thereby ensuring the stability in bringing engine output characteristics close to desired values.
Modification of engine control signal timing by emulation of engine position sensors
The timing of a controlled event is advanced or retarded in an IC engine by emulating the engine speed and position signal pattern prior to transmission of that signal pattern to an output such as a fuel injector. In a multi-controller engine in which a second controller is controlled at least in part by signals delivered by first controller, the signal preferably is emulated in the first controller prior to transmission to the second engine controller in order to allow the shifting of a timing of a controlled event without direct data transfer from the second controller to the first controller. The technique is particularly well-suited for controlling diesel fuel injection in a dual fuel or other multi-fuel engine. In this case, the first controller must be a dual fuel controller and the second controller may be a diesel controller.
Hybrid powertrain and method for controlling a hybrid powertrain
A hybrid powertrain includes a combustion engine, an electric machine arrangement, a gearbox operable to receive motive power from at least one of the combustion engine and the electric machine arrangement for providing motive power to a load of the powertrain. The powertrain is configurable in operation so that its combustion engine is switchable between an inactive state and an active state. The combustion engine is cranked to switch it from its inactive state to its active state. Application of cranking torque to the combustion engine is controlled in operation to substantially temporally coincide with a gear change in the gearbox.
An electric motor includes one or more separate coil sets arranged to produce a magnetic field of the motor. The electric motor also includes a plurality of control devices coupled to respective sub-sets of coils for current control. A similar arrangement is proposed for a generator. A coil mounting system for an electric motor or generator includes one or more coil teeth for windably receiving a coil for the motor and a back portion for attachably receiving a plurality of the coil teeth. A traction control system and method for a vehicle having a plurality of wheels independently powered by a respective motor. A suspension control system and method for a vehicle having a plurality of wheels, each wheel being mounted on a suspension arm of the vehicle and being independently powered by a respective motor.
An electric motor includes one or more separate coil sets arranged to produce a magnetic field of the motor. The electric motor also includes a plurality of control devices coupled to respective sub-sets of coils for current control. A similar arrangement is proposed for a generator. A coil mounting system for an electric motor or generator includes one or more coil teeth for windably receiving a coil for the motor and a back portion for attachably receiving a plurality of the coil teeth. A traction control system and method for a vehicle having a plurality of wheels independently powered by a respective motor. A suspension control system and method for a vehicle having a plurality of wheels, each wheel being mounted on a suspension arm of the vehicle and being independently powered by a respective motor.
Method for recuperating kinetic energy of a motor vehicle in a optimum way in terms of energy
So that kinetic energy of a motor vehicle is recuperated in an optimum way in terms of energy, after a target point for braking or initiation of braking by the motor vehicle driver during travel of the motor vehicle has been detected, an optimum braking distance is determined insofar as the energy which can be recuperated is concerned, and a signal for the vehicle driver is generated which informs the driver the form of the measure which he has to perform in order to brake the vehicle or during braking of the vehicle for braking to actually occur over the optimum braking distance and for kinetic energy to be recuperated in an optimum way. The method combines the calculation of optimum operating states with autonomy of the vehicle driver during braking.
Vehicle brake control device
A vehicle brake controller is provided with a master cylinder, a wheel cylinder, a brake hydraulic actuator, a vehicle-stop-state motor-OFF controller and a pressurization rate controller. The vehicle-stop-state motor-OFF controller performs a vehicle-stop-state motor-OFF control that stops the pump motor upon the vehicle being stopped by the brake operation, and that maintains a stop state of the pump motor as is during stopping of the vehicle. The pressurization rate controller adjusts a pressurization rate of the wheel cylinder pressure to a higher value as a road surface gradient becomes larger upon resuming operation of the pump motor after the vehicle-stop-state motor-OFF control ends due to acceleration from the vehicle stop state.
Method for managing a braking system for an aircraft fitted with electromechanical brakes
A braking system for an aircraft with electric brakes comprising plural electromechanical actuators (2). The system comprises a braking control unit (20) delivering a normal braking setpoint (21) for one or more controllers (10) of the actuators, and selection logic (15) for causing the braking system to operate in a plurality of modes. The system includes: a normal braking mode where the control unit generates a normal braking setpoint (21) for the controller(s); an ultimate braking mode, having priority over the normal braking mode, being responsive to a parking control member, and controlling actuators to respond to the actuation of the parking control member; and a parking braking mode, applied in response to the parking control member and only if the aircraft is stationary, in which the actuators are controlled to apply a force in response to the parking control member being actuated and are then blocked in position.
Method and system for providing a neutral tow mode in a shift-by-wire transmission
A method and system provides a Neutral Tow mode in a vehicle with a shift-by-wire transmission by displaying a Neutral Tow mode option when the transmission control mechanism has been used to select Park, an ignition switch is on, and an engine is off or an information button has been pushed and entering a Neutral Tow mode upon detecting a triggering event. The Neutral Tow mode is canceled upon detecting a certain sequence of events, such as turning on the ignition switch, depressing and holding a brake pedal, and selecting Park. When in Neutral Tow mode the transmission will stay in Neutral, without automatically shifting to Park or using battery power, thereby enabling the vehicle to be towed long distances without draining battery power.
Systems, methods, and devices for controlling a movement of a dipper
Systems, methods, and devices for controlling an industrial machine. The industrial machine includes, for example, a dipper, a boom, a hoist motor, a crowd motor, one or more operator control devices, and a controller. The control devices are configured to be manually controllable by an operator of the industrial machine. The controller receives an output signal associated with a desired movement of the dipper, receives a signal associated with a hoist motor characteristic, and receives a signal associated with a crowd motor characteristic. The controller determines a present position of the dipper with respect to a boom profile, determines a first future position of the dipper with respect to the boom profile and based on the output signal from the operator control devices, and automatically controls a movement of the dipper with respect to the boom profile when the first future position of the dipper approximately corresponds to a boom profile limit.
System and method for determining ground engaging tool position based on fluid pressure
An agricultural implement is provided that includes a ground engaging tool configured to engage soil in a working position and to disengage the soil in a non-working position. The agricultural implement also includes an actuating cylinder coupled to the ground engaging tool and configured to transition the ground engaging tool between the working position and the non-working position based on a flow of fluid from a fluid supply system. In addition, the agricultural implement includes at least one sensor configured to output a signal indicative of a fluid pressure within the fluid supply system, and a controller configured to determine whether the ground engaging tool is in the working position or the non-working position based on the signal.
Method to enhance performance of sensor-based implement height control
In an example embodiment, a system for providing a height change command for an implement, comprises a height control module configured to interact with a computer, and configured to receive topographical data, provide a virtual field map based on said topographical data, provide a forward view polygon for an implement based on said virtual field map, and provide a height change command for said implement based on said forward view polygon and an implement control unit configured to receive said height change command and control movement of said implement.
Apparatus and method for movement control of a vehicle
When a start-up operation by a driver is detected while a vehicle is maintained at a stopped state, a target driving force for suppressing the movement of the vehicle on the road to be driven is calculated, based on the grade obtained regarding the road to be driven on. After the vehicle is driven by the target driving force, the braking force is released so as to terminate the maintaining of the stopped state of the vehicle. Preferably, the state of being driven by the target driving force is maintained until the releasing of the braking force is completed. When the releasing of the braking force is completed, the driving force is increased to start-up the vehicle. With such a start-up control, vehicles are prevented from moving temporarily in a direction opposite from the traveling direction, and a smooth star-up can be achieved.
Wire harness and electronic device control system
A wire harness includes a standard connection circuit part which connects a standard electronic device and an ECU, and an optional connection circuit part which connects optional electronic devices and the ECU. The optional connection circuit part includes a communication connector which is provided to be connectable to the optional electronic devices, and an optional circuit which connects the ECU to the communication connector. The communication connector performs multiplex communication which multiplexes communication of the optional electronic devices and the ECU.
Traffic density estimation
Traffic density may be estimated by increasing a value of a parameter if an object enters a predefined zone on a side of the vehicle and decreasing the value of the parameter after an object exits the predefined zone such that the value of the parameter increases as traffic in a vicinity of the vehicle increases and decreases as traffic in the vicinity of the vehicle decreases.
Vehicle information system with customizable user interface
In accordance with one embodiment, an information system located within a vehicle includes a data storage device configured to store programmed instructions to implement a web browser, a data communication module, and a controller operatively coupled to the data storage device, and the data communication module, the controller configured to execute the web browser to receive a plurality of data elements, identify a respective content type for each of the plurality of data elements, assign a relevance level to each of the plurality of data elements based on the respective identified content type, compare the assigned relevance to a predetermined relevance threshold; and generate a user interface using at least one of the plurality of data elements based upon the comparison.
Procedure for adaptive configuration recognition
The invention involves a procedure for adaptive configuration recognition after the run-up of a control device with or without configuration storage, which performs an automatic and operator-assisted, optimal configuration of the operating software of a motor vehicle.In a first variant, a central control device, after its run-up, receives at the earliest possible time, as a rule after activation of the ignition, identifying information from other components connected directly or indirectly to the central control device by data link. Upon receipt of the identifying information of a component, the central control device assumes that this component is present. Otherwise it assumes that it is not present. An additional configuration memory area is envisioned in a second variant in which the central control device, after the first receipt of the identifying information of a component, stores either the information, the associated software parts, or the software configuration resulting from the total of the recognized components. In this way, the appropriate software configuration can be quickly made available upon the new start of the vehicle with an unchanged hardware configuration. Furthermore, the procedure facilitates a guarantee that no error reports will be generated about components that are not present.
DC converter diagnostics for vehicles
Methods, program products, hybrid, and non-hybrid vehicles are provided for providing diagnostics for a direct current (DC) converter of the hybrid, and non-hybrid vehicle. The vehicle includes an engine, a rechargeable energy storage system (RESS), the direct current (DC) converter, and a controller. The engine is automatically turned on and off based on driver inputs in accordance with an auto-stop feature. The RESS at least facilitates turning on the engine. The DC converter is coupled to the RESS. The controller is coupled to the DC converter, and is configured to determine a status of the engine, receive a DC converter voltage value from the DC converter, and provide diagnostics for the DC converter based on the engine status, RESS voltage, and the DC converter voltage.
Driving assistance system for vehicle and vehicle equipped with driving assistance system for vehicle
A driving assistance system for vehicle obtains short-duration data representing a present traveling condition and driving operation and intermediate-duration data representing a traveling condition and driving operation of that day. A drive diagnosis is carried out by comparing a distribution of the short-duration data and a distribution of the intermediate-date, and a drive diagnosis result is evaluated with two evaluation criteria so as to provide an alarm or an operation improvement suggestion.
Method and device for monitoring that a vehicle in standby mode is correctly immobilized for transport, and vehicle equipped with such a device
A method for monitoring that a vehicle on standby has been correctly immobilized for transport, the vehicle including a course control device, wheel speed sensors, a yaw speed sensor, a processing unit processing information managing operation modes of the vehicle, and a device for immobilizing the vehicle. The method includes detecting the vehicle is in a standby mode at a standstill following installing of the vehicle on a transport support, detecting a non-zero vehicle speed through the speed sensors of at least two wheels over a defined period, detecting a non-zero yaw speed through the yaw speed sensor, over a predefined period, and under these conditions determining a mode whereby immobilization of the vehicle for transport is monitored, in which mode information from at least the wheel speed sensors is filtered after a determined number of attempts at immobilizing the vehicle and allowing the vehicle to be fired up.
Active and stateful hyperspectral vehicle evaluation
A system, method and program product for evaluating a vehicle. A system is disclosed that includes: a plurality of hyperspectral sensors located in the vehicle; a system for fusing hyperspectral sensor data with user data into a feature vector; a support vector machine having a set of models, wherein the support vector machine implements a selected model based on the feature vector and outputs an evaluation based on data in the feature vector and the selected model; and a system for training the set of models.
Hybrid power system braking control
A method, apparatus, and system are disclosed for hybrid power system braking. In one embodiment, a deceleration input is received. In response to receiving the deceleration input, a target negative torque trajectory is determined. To achieve the target negative torque trajectory, a regenerative braking device and an electrical energy dissipation device are activated.
In a power converter a controller determines that an AC motor is in an abnormal state when a voltage of each phase of the AC motor detected by a voltage detector is in an unbalanced state where the voltage exceeds a predetermined value, and turns an opening/closing unit OFF to prevent damage generated in the AC motor from becoming worse. Moreover, the controller determines abnormality of the opening/closing unit based on a current of each phase detected by a current detector, and the controller performs control to reduce the number of revolutions of the AC motor upon determining that at least one of the AC motor and the opening/closing unit is in an abnormal state.
Hybrid vehicle and control method thereof
The invention provides a hybrid vehicle and a control method thereof with which, in a case where a vehicle speed V obtained by a vehicle speed sensor equals or exceeds a first determination vehicle speed V1 at a time of occurrence of an internal combustion engine-related abnormality, which is when an abnormality relating to motors MG1 and MG2 is determined not to have occurred but an abnormality relating to an engine is determined to have occurred while the engine is operative, the motors MG1 and MG2 are controlled such that traveling torque is output to a ring gear shaft serving as a drive shaft from the motor MG2 while the engine is motored by the motor MG1 such that a crankshaft rotates at a target rotation speed until the vehicle speed V subsequently falls to or below a second determination vehicle speed V2.
Methods and systems for continually measuring the length of a train operating in a positive train control environment
Methods and systems for continually measuring the length of a train operating in a positive train control environment are provided. Particularly, the methods and systems provided herein equate repetitive line of sight ranging measurements from the head end to the rear end of a train with the physically draped length of the train along a mapped track with various horizontal and vertical curvature characteristics.
Method for maximum data collection with a control moment gyroscope controlled satellite
The present invention relates to a method for maneuvering an imaging satellite, and more particularly a method for commanding control moment gyroscopes on an imaging satellite to change the attitude of the satellite. In one embodiment, a method for generating a gimbal rate trajectory for maneuvering a satellite to point to a target includes providing a final attitude for pointing to the target and a final satellite rate for imaging the target, providing an initial attitude and an initial set of gimbal angles, and determining a gimbal rate trajectory from the initial set of gimbal angles to a final set of gimbal angles.
Supervisory control and data acquisition system for energy extracting vessel navigation
A Supervisory Control And Data Acquisition (SCADA) system guides navigation of a vessel enabled to extract energy from wind and/or water currents primarily in offshore marine environments. An exemplary SCADA system embodies server and client software applications running on microprocessor systems at a remote control central service logging and energy distribution facility, and the vessel itself.
Real-time flexible vehicle control apparatus and method
An apparatus on an integrated circuit, and method thereof, provides a real-time flexible interface between inputs from a vehicle components and outputs to the vehicle control components. The functions comprises of a programmable interconnection matrix, engine sensors and a control interface. Both engine sensors and control functions comprise of fixed hardwired functions and a customization hardware area. The apparatus therefore provides means for flexible powertrain events control target for the next generation of low-polluting power trains of vehicles.
Motion stabilizer for tractor
A pendular motion determination unit of a motion stabilizer for a tractor includes a parameter computation unit configured to compute a determination parameter PA indicative of a quantity of change in an actual yaw rate Y, a threshold value setting unit configured to compute a threshold value PAth for the determination parameter PA, and a determination unit configured to determine that a pendular motion caused by swaying motion of a trailer is imparted, if the determination parameter PA is greater than the threshold value PAth. At least one of PAth and PA is changed based upon a correlation of a value related to a lateral acceleration based yaw rate Yg with a value related to the standard yaw rate Ys and a correlation of a value related to the actual yaw rate Y with a value related to the standard yaw rate Ys.
Total energy limiting and controlling device, and total electric power limiting and controlling device and method
The total electric power limiting/controlling device comprises: a total allocated electric power inputting portion for receiving information on the total allocated electric power; a heating time estimating portion for estimating a heating time when an operating quantity of an individual controlled loop has been set from its present value to a specific output value; electric power limiting portions for estimating a required output that is the operating quantity that is required in order to change the controlled quantity for an individual loop in accordance with a change in a setting value during the heating time, for finding a required output wherein the electric power use total quantity does not exceed the total allocated electric power, and for setting, as an operating quantity output upper limit value for an individual controlled loop, the required output that has been found; and a controlling portion that is provided for each individual controlled loop.
Methods for controlling an economizer of an HVAC system are disclosed. An illustrative control method may include positioning one or more controllable dampers in first and second configurations such that a mixed air stream has first and second mixing ratios of incoming outside air to return air. First and second measures related to the temperature of the mixed air stream may be recorded when the dampers are in each of the first and second configurations. Based on the recorded first and second measures, it may be determined whether and/or how much of the incoming outside air to admit into the economizer via the one or more controllable dampers during subsequent operation of the HVAC system.
Mobile robot system and method of controlling the same
Disclosed herein are a mobile robot system to restrict a traveling region of a robot and to guide the robot to another region, and a method of controlling the same. Only when a remote controller reception module of a beacon senses a signal transmitted from a mobile robot, the sensed result is reported to the mobile robot in the form of a response signal. In addition, the Field-of-View (FOV) of the remote control reception module is restricted by a directivity receiver. Only when the signal transmitted from the mobile robot is sensed within the restricted FOV, the sensed result is reported to the mobile robot.
Device for dispensing a preparation, with automatic or semi-automatic adjustment of the properties of the preparation by means of an integrated sensor of the surroundings
A cosmetic or dermatological system includes a packaging and dispenser device containing one or more compositions from which the dispensed preparation is prepared, a surroundings sensor that is suitable for delivering at least information associated with a physical magnitude of the surrounding environment of the device, an adjustment system that is coupled to or suitable for coupling to the packaging and dispenser device, and that enables at least one characteristic of the dispensed preparation to be varied, and a processor for automatically controlling the adjustment system as a function of data delivered by the surroundings sensor or for informing the user, as a function of the data, about an action to be exerted on the adjustment system.
Processing of undeliverable as addressed mail
A computerized method includes sorting mail that comprises a multiple pass mail sort operation, wherein the multiple pass mail sort operation for a mail piece that is undeliverable as addressed comprises performing a first pass of the multiple pass mail sort operation, wherein performing the first pass comprises capturing data to identify a feature of the mail piece. The multiple pass mail sort operation also includes generating a first fingerprint for the mail piece between performing the first pass and performing a second pass of the multiple pass mail sort operation. The multiple pass mail sort operation also includes performing the second pass of the multiple pass mail sort operation. Performing the second pass includes determining a final disposition of the mail piece that is undeliverable as addressed.
Semi-automated lab tube selection apparatus for rack contained tubes
A tube handling system with a semi-automatic lab tube selection apparatus for enabling a user to pick a select lab tube in a standard lab tube holding rack with open-bottom wells that contain one or more lab tubes that includes a tube selection unit having, a housing with a top deck having a tube rack support, a transport mechanism contained within the housing having a carriage assembly, with the carriage assembly having a carrier with a push-pin, a drive system that moves the carrier and the push-pin under the tube rack support, and an actuator that raises the push-pin on command for removal, and, a control system to locate the carrier and the push-pin at a select location corresponding to a selected position under an open-bottom well of a tube rack positioned on the tube rack support to raise the push-pin for removal.
Configuration of machine processes
A method enables a user to create, edit, monitor and/or optimize the overall machine process of a programmable machine or system assisted by a graphics editor. The programmable machine or system is initially put together as a system of individual machine units which are involved in the overall machine process during certain times by running a number of partial machine processes that are firstly synchronized with one another once they have been set up and then parameters are set for them. These method steps take place in a two-dimensional process diagram created by the graphics editor that plots all the partial machine processes involved in the overall machine process via assigned process symbols that are positioned or repositioned by the graphics editor so that they are arranged in a machine component dimension and in a time dimension.
Systems and methods for sound recognition
Systems and methods for recognizing sounds are provided herein. User input relating to a sound is received from a computing device. Instructions, which are stored in memory, are executed by a processor to discriminate the sound, analyze one or more databases using data included in the discriminated sound, the one or more databases being selected based upon the discrimination of the sound. Additionally, the processor may be executed to obtain information regarding the discriminated sound, from the one or more databases, based on the analysis, and in response to the search query, transmitting for display the information regarding the discriminated sound to the computing device.
Remote control system and communication system
When a controlled device has changed the value of a parameter, the controlled device transmits the result of the change as updated information UPDATE to controllers by multicast, and aside from this, also transmits synchronization data SYNC in each synchronization period by multicast. Upon detecting a reception error of those data, the controller requests, from the controlled device, the information of the parameter which has been changed in one or more synchronization periods including and after the synchronization period subsequent to the last synchronization period in which the controller could normally receive all of the packets, and corrects the parameter value in the controller based on the current value of the changed parameter transmitted from the controlled device in response to the request.
Method and system for content sampling and identification
A method and system for content sampling (106) and identification is presented. A data stream is recorded, and samples of the stream are identified. Samples (106) can be initially taken at random for identification. Once a sample (106) is identified and segmented within the data stream, the next time to sample (106) may be calculated to be outside the time frame of the identified sample (106). Thus, the sampling period can be adaptively adjusted to be at times after identified tracks.
Operation monitoring system for processing apparatus
In a processing apparatus having: moveable parts disposed to form a predetermined processing environment within a processing chamber in which a predetermined processing is performed on an object to be processed; and a control means for controlling the operation of each of the moveable parts, abnormality inclusive of deterioration with time of the moveable parts constituting the processing apparatus is made to be easily judged. There is provided a vibration detection means for detecting the waveforms of vibrations that occur accompanied by the operation of the moveable parts. When control is made from the control means in order to operate any one of the moveable parts, there are obtained event data corresponding to the control and the waveforms of vibrations of all the moveable parts that are operating simultaneously at the time in question. Each time the control corresponding to the event data is selected, or when a waveform of vibration corresponding to another event data of the same kind as that of the above-mentioned event data has been obtained, the change in the waveform is monitored. When the waveform has changed beyond a predetermined range, the processing apparatus is judged to be abnormal.
Method for identifying the operating state of a control element, and a control apparatus
In order to flexibly identify the current operating state of control elements which are used to control a process installation, the invention provides a method for identifying the operating state of at least one control element, which is designed for an active and a passive operating state, for a control apparatus, wherein, in the active operating state, the control element controls a process function of an area of a process installation, comprising the following steps: the control apparatus is connected to the process installation, the control element is functionally associated with the process function, and the operating state of the control element is identified as active on the basis of successful functional association of the control element with the process function. The invention also provides a control apparatus for controlling at least one process function for an area of a process installation, as well as a process installation which is suitable for carrying out the method according to the invention.
Method and apparatus for controlling fans in heating, ventilating, and air-conditioning systems
Systems, apparatus, and methods of controlling a variable-speed fan of an environmental maintenance module that controls temperatures of a plurality of zones of a building are provided. A first critical zone of the building is identified by analyzing the first zone temperature errors, which are used to determine a final speed setting of the variable-speed fan. Systems, apparatus, and methods of calibrating an environmental maintenance module that controls a temperature of a zone of a building are also provided. A location parameter is calculated for a plurality of zone temperatures, and a scale parameter is computed that quantifies a variation of the zone temperatures relative to a location parameter. A first temperature setpoint for the zone is determined and used in controlling the temperature of the zone.
Distributed control system for monitoring a significant control
Provided is a control system capable of reducing cost while securing reliability of original processing of a microcomputer. An engine control device and a meter control device each store a control amount calculating procedure for calculating a control amount regarding a significant control to be performed on the control target of the engine control device. The engine control device compares a control amount regarding the significant control calculated by the engine control device, and a control amount regarding the significant control calculated by the meter control device, to thereby control the control target of the engine control device based on a result of the comparison.
Implantable medical elongated member including fixation elements along an interior surface
An implantable medical elongated member includes a first outer surface portion and a second outer surface portion extending around at least ten percent of an outer perimeter of the elongated member. A fixation element extends a distance from the first outer surface portion of the implantable medical elongated member. A longitudinally-extending section of the second outer surface portion proximate to a distal end of the elongated member is substantially devoid of any fixation elements that extend the distance from second outer surface portion.
Endotracheal tube apparatus
An apparatus for monitoring EMG signals of a patient's laryngeal muscles includes an endotracheal tube having an exterior surface and a first location configured to be positioned at the patient's vocal folds. A first electrode is formed on the exterior surface of the endotracheal tube substantially below the first location. A second electrode is formed on the exterior surface of the endotracheal tube substantially above the first location. The first and second electrodes are configured to receive the EMG signals from the laryngeal muscles when the endotracheal tube is placed in a trachea of the patient.
Medical probe and a method of providing a medical probe
A medical probe is provided that has a single longitudinally uniform interconnect that provides a connection between a distal end and a proximal end of the probe. The interconnect is obtained by forming a thin uniform film as a spiral on a wafer and subsequently applying this spiral as a helix on a base element of a medical probe. The thin film spiral is manufactured with multiple connecting wires to enable connection between an electronics module and a multiplicity of electrodes (an electrode array) at the distal end of the medical probe.
Implantable medical device impedance measurement module for communication with one or more lead-borne devices
Example techniques for communicating between two medical devices are described. One medical device may be an implantable medical device. Another medical device may be a lead-borne implantable medical device. The lead-borne implantable medical device may be referred to as a satellite. The implantable medical device may measure impedance of a path including at least two electrodes, at least one of which is on the lead, using an impedance measurement module. In some example implementations of this disclosure, the implantable medical device may also use the impedance measurement module to communicate with the satellite on the lead.
Stimulus timing for a stimulating medical device
Methods and systems are disclosed for determining the timing of stimulation applied using a medical device. In embodiments, the medical device filters a received signal to obtain a plurality of band-pass filtered signals, each corresponding to one or more stimulation channels. The medical device then determines the envelopes of these band-pass filtered signals. Next, the medical device determines the stimulation timing (i.e., the pulse times) for the corresponding stimulation channel based on the timing of a particular phase (e.g., a peak, a minimum, etc.) of the envelope. A pulse amplitude for the stimulation channel may then be determined, and stimulation applied using the determined amplitude and pulse time.
Systems, devices and methods for the treatment of neurological disorders and conditions
The present disclosure relates to methods, devices, and systems used for the treatment of and/or promoting recovery from various neurological disorders and conditions, including epilepsy and other seizure disorders and movement and other related disorders; for promoting recovery from acute or chronic brain injury (e.g. stroke, hypoxia/ischemia, head trauma, subarachnoid hemorrhage, and other forms of brain injury, for awakening and/or promoting the recovery of patients in various levels of coma, altered mental status or vegetative state); or for promoting recovery from chronic daily headache and migraine and related disorders via external (cutaneous) stimulation of the sensory branches of the trigeminal nerve in the face and forehead. More specifically, devices and electrode assemblies configured for stimulation of the supraorbital, supratrochlear, infraorbital, auriculotemporal, zygomaticotemporal, zygomaticoorbital, zygomaticofacial, nasal and infratrochlear nerves are disclosed.
Dynamic sampling of physiological parameters based on the next anticipated occurrence of a relatively periodic physiological event. Embodiments of the invention may be used to increase the battery life or effective data storage capacity of implantable medical devices while retaining or improving measurement resolution.
Method to detect proper lead connection in an implantable stimulation system
An implantable pulse generator or external trial stimulator for coupling to a lead with a distal end and a proximal end, the lead comprising at least one terminal disposed at the proximal end. The implantable pulse generator comprises a connector for receiving the proximal end of the lead, the connector having at least one contact, and a sensor configured and arranged for detecting electrical connectivity between the implantable pulse generator or external trial stimulator and the lead, the sensor comprising at least one sensor contact, the sensor contact being configured and arranged for electrically coupling to a terminal of the lead and at least one of the contacts of the connector when the lead is fully inserted in the connector and thereby detecting electrical connectivity between the implantable pulse generator or external trial stimulator and the lead.
Autothreshold with sensing from pacing cathode
Cardiac electrostimulation energy is delivered to a heart chamber of a subject according to a normal pacing mode using a set of implantable pacing electrodes. When a threshold test for the heart chamber is initiated and a sensing electrode independent from the set of pacing electrodes is unavailable for the heart chamber, cardiac electrostimulation energy is delivered to the subject according to a threshold test mode. The threshold test mode includes sensing a cardiac activity signal from a subject using a set of sensing electrodes that includes an electrode common to the set of pacing electrodes, and changing the electrostimulation energy and sensing a resulting cardiac activity signal using the set of sensing electrodes to determine the optimum electrostimulation energy for capture of the heart chamber.
Managing cross therapy sensing in a multiple therapy implantable device
An apparatus comprises a cardiac signal sensing circuit configured to sense an electrical cardiac signal from at least one of an atrium or ventricle of a heart of a subject, a therapy circuit configured to provide electrical pacing therapy and electrical autonomic neural modulation therapy to the subject, and a control circuit. The control circuit is configured to initiate delivery of the autonomic modulation neural therapy, and the control circuit includes a signal detection circuit configured to detect delivery of the autonomic neural modulation therapy in the sensed cardiac signal. The control circuit is configured to change, in response to detecting the delivery, a sensitivity of the cardiac signal sensing circuit during delivery of the autonomic neural modulation therapy.
Implantable neurostimulator-implemented method for managing bradycardia through vagus nerve stimulation
A method for managing bradycardia through vagus nerve stimulation is provided. An implantable neurostimulator configured to deliver electrical therapeutic stimulation in both afferent and efferent directions of a patient's cervical vagus nerve is provided. An operating mode is stored, which includes parametrically defining a maintenance dose of the electrical therapeutic stimulation tuned to restore cardiac autonomic balance through continuously-cycling, intermittent and periodic electrical pulses. The maintenance dose is delivered via a pulse generator through a pair of helical electrodes via an electrically coupled nerve stimulation therapy lead independent of cardiac cycle. The patient's physiology is monitored, and upon sensing a condition indicative of bradycardia, the delivery of the maintenance dose is suspended. A progressively increasing amount of time is spent waiting via a controller and, upon sensing a condition indicative of an absence or termination of the bradycardia, a progressively increasing partial maintenance dose is delivered via the pulse generator.
Implantable medical device crosstalk evaluation and mitigation
Electrical crosstalk between two implantable medical devices or two different therapy modules of a common implantable medical device may be evaluated, and, in some examples, mitigated. In some examples, one of the implantable medical devices or therapy modules delivers electrical stimulation to a nonmyocardial tissue site or a nonvascular cardiac tissue site, and the other implantable medical device or therapy module delivers cardiac rhythm management therapy to a heart of the patient.
Device for ambulatory monitoring of brain activity
A device for ambulatory monitoring of brain activity includes a patch secured to a head of a monitoring subject and an electrode secured to the head of the monitoring subject. The electrode produces a signal indicating brain activity of the monitoring subject. The device further includes a signal processor that receives the signal produced by the electrode and processes the signal to produce data. The signal processor is secured to the monitoring subject. The device further includes a display that displays the data produced by the signal processor, the display being secured to the monitoring subject. The device also includes a power source secured to the monitoring subject, the power source providing power to the electrode, the signal processor, and the display wherein the monitoring subject may ambulate unimpeded by the patch, the electrode, the signal processor, the display and the power source.
Method and system for meshing human and computer competencies for object categorization
The subject disclosure relates to a method and system for visual object categorization. The method and system include receiving human inputs including data corresponding to passive human-brain responses to visualization of images. Computer inputs are also received which include data corresponding to outputs from a computerized vision-based processing of the images. The human and computer inputs are processing so as to yield a categorization for the images as a function of the human and computer inputs.
System and methods for graphic display of ST-segment deviation
Systems and methods are provided for monitoring a patient and graphically representing ST-segment deviations.
Dual sensing for brady-tachy pacemaker/ICD
A system detects events related to cardiac activity. The system comprises a primary cardiac signal sensing circuit, at least one secondary cardiac signal sensing circuit having a higher sensitivity than the primary sensing circuit, and a controller circuit coupled to the primary and secondary cardiac signal sensing circuits. The controller circuit determines a rate of depolarization using the primary sensing circuit and detects tachyarrhythmia using the rate. The controller circuit also detects tachyarrhythmia using the secondary sensing circuit and also deems the tachyarrhythmia valid if the controller circuit detects the tachyarrhythmia using both the primary and secondary sensing circuit.
Medical imaging system
A medical imaging system is provided. The medical imaging system includes a patient positioning table and a patient examination area that is open on at least three sides and accessible from a front side. The patient positioning table is able to be moved into the patient examination area. At least one positioning motor is arranged on a rear side and is separated from the front side by a rear wall element. The at least one positioning motor is operable to adjust the position of a framework. The patient positioning table is disposed on the framework.
Magnetic resonance imager, method and program which continuously applies steady-state free precession to k-space
A magnetic resonance imager for forming images of a moving portion of a patient includes imaging coils. The imager includes a computer that causes the imaging coils to apply continuously steady-state free precession to k-space of a magnetic resonance image series of the patient and acquire the image series, and generates images from the image series. A method for forming images of a moving portion of a patient includes the steps of applying continuously steady-state free precession to k-space of a magnetic resonance image series of a patient. There is the step of acquiring the image series. There is the step of generating images from the image series. A method for forming images of a patient includes the steps of triggering a steady-state free precision imaging sequence to an ECG r wave of cardiac cycles of the patient. There is the step of performing the steady-state free precision imaging sequence with imaging coils of a magnetic resonance imaging scanner such that data for a series of k-space data sets associated with the imaging sequence are acquired in a manner that is time resolved through the cardiac cycle, with data acquired over a number of consecutive cardiac cycles. A computer program embodied on a computer readable medium to form an image of a patient with an MRI.
High-resolution magnetocardiogram restoration for cardiac electric current localization
Magnetocardiogram (MCG) provides temporal and spatial measurements of cardiac electric activities, which permits current localization. An MCG device usually consists of a small number of magnetic sensors in a planar array. Each sensor provides a highly low-resolution 2D MCG map. Such a low-res map is insufficient for cardiac electric current localization. To create a high resolution MCG image from the sparse measurements, an algorithm based on model learning is used. The model is constructed using a large number of randomly generated high resolution MCG images based on the Biot-Savart Law. By fitting the model with the sparse measurements, high resolution MCG image are created. Next, the 2D position of the electric current is localized by finding the peak in the tangential components of the high resolution MCG images. Finally, the 2D current localization is refined by a non-linear optimization algorithm, which simultaneously recovers the depth of the electric current from the sensor and its magnitude and orientation.
Programmable ECG sensor patch
The invention provides a disposable programmable ECG sensor patch for the non-invasive detection of risk patterns according to programmed criteria. The patch is programmed by a medical professional to select one or more monitoring parameters for detection and alarm indication. One application is to detect changes in the ECG due to cardioactive drugs. Another application is triggering an alarm for a cardiac patient during a stress condition. The programmable patch operates in conjunction with an external programming unit for selecting the detection monitoring parameters.
Device for measuring blood, tissue, and skin parameters
The invention relates to a device and a method for measuring blood, tissue, or skin parameters, in particular the oxygen saturation in blood, by attaching one or more sensors to body parts such as fingers, earlobes, toes, hand, or foot. The invention relates further to a method for the preparation of said device.
Noninvasive photoplethysmographic sensor platform for mobile animals
A noninvasive photoplethysmographic sensor platform for mobile animals such as small rodents, namely rats and mice is useful such as in a laboratory research environment. The noninvasive photoplethysmographic sensor platform may be a collar which provides an easily affixed, adjustable attachment mechanism that encircles the animal, such as the neck. The neck of the animal provides several particular advantages as a sensor mounting platform for photoplethysmographic sensors. For pulse oximetry, the neck location will provide significant blood flow under all conditions. For small mammals, such as rats and mice, transmittance pulse oximetry through the neck of the subject remains possible. The neck mounted collar also offers inherent bite resistance to the sensor platform.
A superconductive electric cable is provided in which a cable core is arranged in a cryostat, where the cable core is composed of three phase conductors arranged concentrically around an inner cooling duct, with an electric insulation arranged between the phase conductors, and where the cryostat is surrounded by an electric insulation, which is surrounded by a neutral conductor of normally conductive materials. In this cable, a neutral conductor or a screening is arranged only outside of the cryostat, and is formed by normally conductive material which surrounds the cryostat as a common neutral conductor, where an insulating material is arranged between this neutral conductor and the cryostat.
System and method for detecting use of a wireless device while driving
A system for detecting the use of wireless devices such as a mobile phone, personal digital assistant (PDA), or pagers in a moving vehicle receives wireless signals inside a vehicle using a radio frequency (RF) sensor(s) and converts the RF signals into voltage signals. The voltage signals are then compared with known waveforms to determine if the wireless signals indicate a received call, if the received call is answered, a transmitted call, an SMS text message, data associated with internet browsing on a wireless device, or Bluetooth activity.
A mobile terminal includes a terminal main body including a circuit board for processing a radio signal, a conductive member including an exposed surface exposed to the outside of the main body and a plurality of recesses formed to be recessed toward the interior of the main body from the exposed surface and disposed to be spaced apart, at least a portion thereof being formed to transmit and receive the radio signal, and a filling member forming an external appearance of the main body and filling the recess portions.
Components with mechanically-bonded plastic and methods for forming such components
Components and methods for forming such components with mechanically-bonded plastic are provided. A representative method includes: providing a metal chassis, the chassis having an opening extending through; placing the chassis in a mold; flowing plastic into the mold such that the plastic flows into the opening, the plastic being mechanically bonded to the metal of the chassis to form an integrated metal and plastic component; and removing the integrated metal and plastic component from the mold.
Integrated, detachable ear bud device for a wireless phone
An integrated, detachable ear bud system that is attached to an associated wireless phone. The integrated, detachable ear bud system may be one ear bud, or pair of ear buds, or ear bud or ear buds including a microphone. In certain embodiments an integrated, detachable, attached auditory device is physically connected to its associated wireless phone via an extendable and retractable electrical cord, and integrated into the case of the associated wireless phone, to forcibly keep with the wireless phone even when not in use, preventing misplacement, loss, or even inadvertent separation from the wireless device. The ear buds may connect to a recharge port on the wireless phone, and be charged when the wireless phone is charging. When in its attached home position, the ear-mountable speaker may tuck into a mating cavity. A latch or magnet may assist in attaching the integrated, detachable ear bud to the wireless phone.
Method and device for reducing latency by anticipating responsive data communications
A method and system for reducing latency by anticipating responsive data communications is described. When the user of a first mobile station receives a message sent from a second mobile station, the user of the first mobile station may responsively reply. If, before the reply is sent, the second mobile station releases its network radio link and goes dormant, the reply may be delayed as the radio link is set up again after the reply is sent. To reduce this latency, the first mobile station may monitor its user's actions and, upon an indication that the user intends to soon reply to the earlier received message, the first mobile station may send a signal into the network which causes the second mobile station to maintain its radio link or to set up a new radio link if it has gone dormant.
Wireless communication method and system for transmitting data over a selected part of bandwidth on a communication path
A method providing wireless communication between a first station and a second station. The method establishes at least one communication path between at least one pair of antennas including a first antenna of the first station and a second antenna of the second station, wherein at least one of the first and second antennas is a narrow beam antenna, selects at least one part of the bandwidth available on the communication path, and transmits data between the pair of antennas over the selected part of the bandwidth.
Method and apparatus for controlling link margin
A method and apparatus for controlling a link margin are provided. The method includes: receiving, from a second device, a link margin frame including information about the link margin related to a communication link between a first device and the second device; and performing at least one operation selected from among a change in transmission power, a change in a modulation and coding scheme (MCS), beam forming, and a change of the communication link to another frequency band, based on the received link margin frame.
Method and apparatus for communicating with blind interference alignment using power allocation and/or transmission architecture
A method and system are disclosed herein for power allocation and/or clustering in a wireless communication system that uses blind interference alignment. In one embodiment, the system comprises a plurality of receivers, where each receiver in the plurality has a multi-mode antenna with a single radio frequency (RF) chain that is operable in a plurality of antenna modes, and wherein each receiver shifts between the plurality of antenna modes in a predetermined manner. The system also includes a plurality of base stations to perform cluster-based transmission, each base station in the plurality of base stations having one or more transmitters having a transmit antenna and being operable to communicate with one or more of receivers in the plurality of receivers using a blind interference alignment (BIA) scheme, and wherein the plurality of base stations are grouped in different clusters at different times according to cluster patterns.
Method for creating a peer-to-peer immediate messaging solution without using an instant messaging server
A messaging method in a system including a wireless network, a routing server, and a plurality of mobile stations. A first mobile station has first communications applications and a first PIN and a second mobile station has second communications applications and a second PIN. The method includes sending an invitation including the first PIN from the first mobile station to the second mobile station using one of the first communications applications, and sending an acceptance including the second PIN from the second mobile station to the first mobile station using one of the second communications applications. The method further includes creating first messages including the second PIN and sending them to the second mobile station through the wireless network, and creating second messages including the first PIN and sending them to the first mobile station through the wireless network. The routing server routes the messages based on the PINs.
Methods for identifying messages and communicating with users of a multimodal message service
Methods for combining speech with existing text wireless Short Message Service (SMS) to create a multimodal SMS service are provided. A user of standard SMS text service is provided with a link within each message that allows adding or retrieval of a voice message associated with an SMS text message. A speech server in the wireless network may be used for recognition of voice commands, rendering of test into speech, and recording or playing back voice recordings. An automatic and unique identification of each message is created to allow retrieval of the message without manually selecting the message. Additional services include message lists, integration with voicemail systems, image and video messages, cross-functional applications with Multimedia Messaging Services (MMS) and Enhanced Message Services (EMS), and extensions of the combination of voice with text SMS to other computing devices such as PDAs and PCs.
System and method for location-based, interactive consumer engagement platform
A location based wireless consumer interactive system is disclosed. The system includes a first gateway device stationed at a first location which includes a first antenna configured to generate a first wireless zone covering a preassigned area proximal to the first location. The first gateway device includes a first network interface coupled to the first antenna which is configured to communicate with a client device that is connected to the first wireless zone. The first gateway device includes a first memory configured to store a first content profile received from a server device via the first network interface, wherein the first memory stores executable programming instructions to process preloaded consumer content of the first content profile. The first gateway device includes a first processor configured to generate a first interactive content site containing the consumer content on the client device.
Method and apparatus to configure mobile communication and applications
Aspects of the disclosure provide methods and apparatuses to configure mobile communication and applications based on location detection. A method for operating a mobile terminal includes storing operational configurations in association with locations in the mobile terminal, detecting a location of the mobile terminal, determining an operational configuration based on the detected location, and configuring the mobile terminal according to the determined operational configuration. The operational configurations include communication configurations and application configurations.
Concurrent wireless transmitter mapping and mobile station positioning
The subject matter disclosed herein relates to concurrently estimating locations for one or more mobile stations and one or more wireless transmitters.
Method and device for resource allocation control in radio communications system
A resource allocation control method and device that can reduce inter-cell interference in a radio communications system are provided. According to a method for resource allocation control between a plurality of cells in a radio communications system, radio communication devices respectively controlling at least two cells notify information about control resources of its own cell to each other. In the resources of its own cell, each of the radio communication devices sets a buffer resource within a predetermined resource range corresponding to a control resource of the other cell. At a request for information transmission in its own cell, each of the radio communication devices restricts the allocation of the set buffer resource.
Method for operating a WiMAX femtocell base station and femtocell base station
A method for operating a WiMAX femtocell base station, wherein the femtocell base station has an active operational mode, in which the radio interface subsystem of the femtocell base station is fully power supplied, is characterized in that a power saving mode with reduced radio interface activity is provided, wherein the femtocell base station is enabled to transit between the active operation mode and the power saving mode. Furthermore, a corresponding femtocell base station for deployment in a WiMAX network is disclosed.
Sensing wireless transmissions from a licensed user of a licensed spectral resource
Sensing wireless transmissions from a licensed user of a licensed spectral resource includes obtaining information indicating a number of adjacent sensors that are concurrently sensing wireless transmissions from the licensed user of the licensed spectral resource. Such information can be obtained from a main node controlling the sensor and its adjacent sensors, or by the sensor itself (e.g., by means of short-range communication equipment targeting any such adjacent sensors). A sensing rate is then determined as a function, at least in part, of the information indicating the number of adjacent sensors that are concurrently sensing wireless transmissions from the licensed user of the licensed spectral resource. Receiver equipment is then periodically operated at the determined sensing rate, wherein the receiver equipment is configured to detect wireless transmissions from the licensed user of the licensed spectral resource.
Apparatus and methods for facilitating simulcasting and de-simulcasting in a distributed antenna system
An RF connection matrix may include first and second carrier-specific RF connection matrix modules. The first carrier-specific RF connection matrix module can be adapted to route a first downlink transmission to one or more remote antenna units for transmission on a first carrier. The second carrier-specific RF connection matrix module can be adapted to route a second downlink transmission to one or more remote antenna units for transmission on a second carrier. Methods for facilitating simulcasting and de-simulcasting may include receiving a signal associated with a sector ID, which signal includes a first downlink transmission for a first carrier and a second downlink transmission for a second carrier. The first downlink transmission can be routed to one or more remote antenna units for transmission on the first carrier. The second downlink transmission can be routed to one or more remote antenna units for transmission on the second carrier.
Grade of service (GoS) differentiation in a wireless communication network
Techniques for handling arriving calls with grade of service (GoS) differentiation for multiple tiers of services are described. The multiple tiers may be for different levels of service subscriptions, different types of calls, etc. In one design, calls in multiple tiers of services may be received by a base station. The calls in the multiple tiers may be differentiated based on at least one parameter. In one design, different blocking rates may be supported for calls in different tiers, e.g., with progressively lower blocking rates being supported for calls in progressively higher tiers. In another design, different call setup queuing delays may be supported for calls in different tiers, e.g., with progressively shorter queuing delays being supported for calls in progressively higher tiers.
Method and system for providing toll-free telematic and mobile services applications
Methods and systems of providing toll-free services access from a telecommunications network to a mobile device supported by toll-free telecommunications networks entail placing a called telephone number on a service provider's telecommunications network by identifying the called telephone number as a toll-free call, querying a database for called telephone number information for routing to a destination number, and routing the called telephone number using the called telephone number information through the service provider's telecommunications network to a wireless telecommunications network. The called telephone number is routed through the wireless telecommunications network by mapping the called telephone number and information to a mobile service identification number that identifies a mobile device hosted by a mobile switching center. A connection between the mobile switching center and the mobile device using the mobile service identification number is established to connect the toll-free call to the mobile device.
Method and system for inter-frequency handoff
An inter-frequency handoff of a mobile station engaged in a call via wireless network is effected by gradually changing a carrier frequency of a forward link signal from a first-channel frequency, corresponding to a first frequency channel, to a second-channel frequency, corresponding to a second frequency channel. Initially, a first transmitter in the wireless network transmits the forward link signal in the first frequency channel. A second transmitter then transmits the forward link signal while changing the carrier frequency from the first-channel frequency to the second-channel frequency at a specified tuning rate. The tuning rate may be dynamically adjustable in response to requests from the mobile station. Once the second-channel frequency is reached, a third transmitter continues transmitting the forward link signal in the second frequency channel. The mobile station may also gradually change the carrier frequency of the reverse link signal that it transmits for the call.
Method for falling back to 2G/3G network, relevant device and communication system
Embodiments of the present invention provides a method for falling back to a 2G/3G network, a relevant device and a system. The embodiments of the present invention includes: receiving, by a mobility management entity, a first message from an access network device, where the first message carries location area information of a target 2G/3G cell to which a user equipment UE prepares to connect; sending a second message for requesting to perform a location update on the UE to a mobile switching center MSC corresponding to a location area of the target 2G/3G cell; receiving a third message from the MSC, where the third message carries a temporary mobile station identity TMSI allocated to the UE by the MSC; and sending, to the UE, a fourth message carrying the TMSI, so that the UE, after being connected to the target 2G/3G cell, communicates with the MSC by using the TMSI.
RRC messages and procedures
A method and apparatus for radio resource control (RRC) messaging. A method in a Node B includes transmitting a RRC change command including a plurality of commands to a wireless transmit/receive unit (WTRU), and receiving an RRC change response from the WTRU, wherein the RRC change command includes a command for performing a measurement gap configuration procedure and a command for performing a measurement gap activation procedure.
Method and system for a transmitting mobility state
A method for transmitting a mobility state is provided in the present invention, the method includes: when an source evolved NodeB (eNB) performs a handover of a user equipment (UE) in a connectivity state, it sends the UE historical information to a target eNB; the target eNB decides a mobility state of the UE according to the UE historical information. Alternatively, when the source eNB performs a handover of the UE in a connectivity state, it decides the mobility state of the UE according to the UE historical information, sets the corresponding mobility state instruction information and sends it to the target eNB; the target eNB acquires the mobility state corresponding to the UE according to the received mobility state instruction information. A system for transmitting a mobility state is also provided in the present invention.
UE handling of common configuration after handover
A method for a user equipment (UE) operating in a Long Term Evolution network. The method includes the UE receiving a command for a handover from a source cell to a target cell. The method further includes, when the UE has valid stored system information for the target cell, the UE discarding a dedicated radioResourceConfigCommon information element received from the source cell in the handover command and the UE applying radio resource configuration information retrieved from the stored system information.
Access control according to a policy defined for a group of associated electronic devices comprising a cellular modem
Access control according to a policy defined for a plurality of electronic devices comprising a cellular modem and associated with the same user If an end user has two electronic devices, such as a fire alarm or an electricity meter, which both have a cellular modem and are allowed to operate in parallel under the same subscription, the end user can abuse this subscription by lending or selling one of the devices to another person. This abuse can be prevented by the present invention in that the network access is controlled according to a policy defined for the plurality of electronic devices operating under the same subscription. In particular, the policy defines a threshold distance between a primary electronic device and each additional electronic device belonging to said plurality of electronic devices operating under the same subscription which specifies the maximum distance from the primary electronic device which still allows to gain access to the network.
Method and system for implementing location service
The present invention discloses a method and a system for implementing location service, in which the method comprises: sending a location request message from a source user to a MMSG by a MMSC; sending the location request message to a multimedia message generating platform by the MMSG; initiating a location request to an LSP by the multimedia message generating platform according to the location request message; performing location according to the initiated location request and returning a location result to the multimedia message generating platform by the LSP; generating multimedia message information according to the location result and sending the multimedia message information to the MMSG by the multimedia message generating platform; and sending the received multimedia message information to the source user through the MMSC by the MMSG. The present invention can not only reduce the requirement of the location service on terminal capability, but also more conveniently develop the location service, thereby realizing the aim of providing convenient and efficient location service to users by using multimedia message information.
Apparatus and method for limiting searches for a home PLMN according to its proximity
Apparatus and methods are disclosed for reducing or eliminating searches by a UE for its home PLMN when the mobile station is roaming in a network not in the vicinity of the home PLMN. That is, the UE may be provisioned with information about its home PLMN. For example, some embodiments can comprise a neighbor database indicating neighbor relationships between PLMNs and the home PLMN. This can enable a UE to determine whether the home PLMN is likely to be nearby when it is visiting a different PLMN. Forgoing a PLMN home search reduces processing and can aid in conserving power resources. Other aspects, embodiments, and features are also claimed and described.
Voice bridging gateway for tactical communications
Each of a number of gateway network radios operates with a transmission protocol of an associated one of plural incompatible communication networks. Each network radio has an audio terminal for producing first audio signals detected from transmissions of user radios in its associated network, and a microphone terminal for receiving second audio signals for transmission to the user radios. A voice bridging gateway server has multiple ports each corresponding to one of the networks for coupling to the network radio associated with the one network. Each port receives the first audio signals from the audio terminal of the associated network radio, and produces the second audio signals for applying to the microphone terminal of the network radio. The server implements a private branch exchange application whereby user radios in a given communication network can be voice bridged with user radios in a selected one or more of the other networks.
Method for setting control multi point in wireless communication system and apparatus thereof
The present invention relates to a method for setting a control multi point of a serving cell in a wireless communication system. The serving cell selects more than one adjacent base station as a control multi point set based on first link information between terminals and the adjacent base stations received from the terminals. Furthermore, the serving cell: receives a pre-coding matrix index corresponding to the adjacent base stations which is selected by the terminals, selects more than one pre-coding matrix index from the received pre-coding matrix indexes according to a preset condition, generates a pre-coding matrix index list, and transmits pre-coding matrix index list to the corresponding base station.
Position information assisted network control
A network controller including processing circuitry may be configured to receive dynamic position information indicative of a three dimensional position of at least one mobile communication node, compare fixed position information indicative of fixed geographic locations of respective access points of a network to the dynamic position information to determine a relative position of the at least one mobile communication node relative to at least one of the access points based on the fixed position information and the dynamic position information, and provide network control instructions to at least one network asset based on the relative position.
Multiple user profiles and personas on a device
A mobile device is configurable to accommodate multiple personas and associated profiles. Once the mobile device is triggered to configure itself with a selected persona/profile, no more information is required by a user (the provider of the trigger) of the mobile device. Each persona/profile is autonomous from any other persona/profile with which the mobile device can be configured. A persona is indicative of a personality, role, or identity portrayed by the device, such as a phone number, for example. A profile is indicative of functions associated with a persona. The mobile device is easily reconfigured via simple UI operations.
System for targeting advertising content to a plurality of mobile communication facilities
A system for targeting advertising content includes the steps of: (a) receiving respective requests for advertising content corresponding to a plurality of mobile communication facilities operated by a group of users, wherein the plurality includes first and second types of mobile communication facilities with different rendering capabilities; (b) receiving a datum corresponding to the group; (c) selecting from a first and second sponsor respective content based on a relevancy to the datum, wherein each content includes a first and second item requiring respective rendering capabilities; (d) receiving bids from the first and second sponsors; (e) attributing a priority to the content of the first sponsor based upon a determination that a yield associated with the first sponsor is greater than a yield associated with the second sponsor; and (f) transmitting the first and second items of the first sponsor to the first and second types of mobile communication facilities respectively.
Providing supplemental content to wireless communication devices based on device status
What is disclosed is a method of operating a wireless communication system. The method includes receiving a registration request from a wireless communication device, and in response, monitoring device status and updating a data structure with device status data for the wireless communication device. The method also includes receiving a content request from the wireless communication device for primary content from a primary content provider, and in response, determining an anonymous key associated with the wireless communication device and transferring the anonymous key for delivery to a supplemental content provider. The method also includes receiving a device status request comprising the anonymous key transferred by the supplemental content provider, and in response, transferring the device status data from the data structure for delivery to the supplemental content provider. The method also includes receiving supplemental content transferred by the supplemental content provider responsive to the transferred device status data, receiving the primary content transferred by the primary content provider, and transferring the primary content and the supplemental content to the wireless communication device.
System and method for integrating an outgoing cellular call as an enterprise call
A method on a wireless user equipment (UE) device facilitates integration of an outgoing cellular call as an enterprise call. The UE device attaches to a wide area cellular network on which the device has a non-enterprise address. Upon blocking incoming calls, the UE device sends a request to a node in a data network to initiate an outgoing cellular call with an expectation of receiving an incoming circuit-switched (CS) call back from the network node within a time window. The incoming CS call contains an enterprise address associated with a user of the wireless UE device as a calling line identity to identify that the incoming CS call is related to the request to initiate the outgoing cellular call. The UE device indicates to the network node that a call leg is established between the enterprise user and the network node.
Systems and methods of voice call setup involving mobile devices
A mobile device can send a notification to place a call using a PBX (e.g., using SIP signaling) or receive a notification of call availability for the mobile device at the PBX. An authentication token is provided over a data channel for use in authenticating the mobile device when calling the PBX on a voice channel. However, when the mobile device calls the PBX (e.g., on a DNIS number, where ANI information is made available to an application server), if ANI information is found to correspond to the mobile device, the PBX can send tone(s) indicating that the mobile device can respond with an abbreviated validation tone, rather than the entirety of the authentication token. If the ANI information is not obtained or not matched, then a different tone(s) is sent, indicating to provide the authentication token. If the authentication token provided does not match or if the mobile device does not respond, the voice channel is not set up.
System and method for mobile service geochronous validation
In one embodiment of the present invention, a system and method may be provided for validating communication for a wireless communications device. The system and method may include receiving a geographic location of a wireless communications device. A database comprising records correlating the geographic location with permissions may be accessed in order to determine, based upon the received geographic location information and the accessed database record, if there are restriction on communication associated with the wireless communications device. An indicator may be communicated in response to the determined restriction, effectively providing the information needed to inform the wireless communications device of any current restrictions.
Subscriber identifier and method for subscriber authentication
The subject innovation relates to a subscriber identifier for subscriber authentication in a mobile telecommunications network. The subscriber identifier comprises a memory device that contains a first subscription data record for subscriber authentication in a first mobile telecommunications network. The memory device further contains a second subscription data record for subscriber authentication in a second mobile telecommunications network. Based on an available mobile telecommunications network, one of the contained subscription data records being usable for subscriber authentication in each case.
Method and apparatus for measurement of active user devices per quality-of-service class indicator
Methods, apparatus, and systems for measuring, on a per-QoS-class basis, the average number of user devices active on the uplink of a wireless communication system are disclosed. In an exemplary method, a number of mobile terminals with buffered data for transmission to a base station is estimated based on received buffer status reports. An estimated quantity of active mobile terminals is calculated, based on the received buffer status reports and a number of mobile terminals for which a semi-persistent scheduling grant has been granted. In some embodiments, the estimated quantity of active mobile terminals is estimated on a per-traffic-class basis, in which case the technique includes calculating first and second estimated quantities, corresponding to mobile terminals having active data bearers for first and second traffic classes, respectively, based on the received buffer status reports and the number of mobile terminals for which a semi-persistent scheduling grant has been granted.
Agent notification triggered by network access failure
A method of electronic communication is provided. The method comprises receiving a first call detail record (CDR), where the first call detail record comprises usage information associated with a portable wireless communication device, and the usage information comprises at least a first parameter. Based on the value of the first parameter, a copy of the first call detail record is transmitted to a computer, where the computer does not perform billing functionality. The computer then changes a subscriber account associated with the portable wireless communication device or changes a provisioning associated with the portable wireless communication device.
Mobile radio with independent, user-operated messaging channel carrying location information
A mobile communication system may include a remote communication system which may transmit communications to and receive communications from a plurality of mobile radios over one or more wireless communication channels. Each mobile radio may include a location sensing system which may sense the location of the mobile radio. A user interface within each mobile radio may receive a request from the user to transmit information indicative of the location of the mobile radio to a remote messaging system. A message transmitter within each mobile radio may transmit the location of the mobile radio sensed by the location sensing system to the remote messaging system in response to the request by the user over a wireless messaging channel. The remote messaging system may aggregate the location information from each mobile radio and deliver this aggregate location information to the remote communication system and/or to the mobile radios.
Push-pull low-noise amplifier with area-efficient implementation
An amplifier integrated circuit (IC) including a push-pull amplifier having a push stage and a pull stage. A first loop of wire configured to form a first degeneration inductance of the push stage. A second loop of wire configured to form a first degeneration inductance of the pull stage. The first loop and the second loop are concentric. The first loop is connected to a reference potential. The second loop is connected to a supply voltage.
Mobile station and mobile communication method
A mobile station (UE) according to the present invention includes: a measurement unit (13) configured to measure a radio quality of a serving cell and a peripheral cell; a filtering unit (14) configured to perform filtering on the measurement result; and a determination unit (15) configured to determine as to whether or not to notify the measurement result after the filtering. The filtering unit (14) configured to adjust a filter coefficient for filtering the measurement result, when the mobile station (UE) is in a discontinuous reception state.
Method for predicting channel quality indicator (CQI) values
The object of the present invention is to perform an enhanced prediction technique. The object is achieved by a method in a base station comprised in a radio access network. The base station is adapted to communicate with at least one user equipment, the method comprises the steps of receiving a sequence of CQI values sampled at the times t=1, . . . , n, from one or more of the at least one user equipments; estimating for each of the received specific CQI value k, the conditional expectation of the CQI value at time t+d, given the specific CQI value k at time t; and obtaining a predicted CQI value for the specific CQI value k, which predicted CQI value is the estimated conditional expectation of the CQI values at a time t+d for the specific CQI value k.
Method and system for selective equalization enablement based on modulation type
Aspects of a method and system for selective equalization enablement based on modulation type are disclosed. One such method includes receiving a signal via an RF channel, detecting a modulation type of the signal, and selecting an equalization circuit for processing the signal based on the modulation type.
Magnetic latching mechanism for use in mating a mobile computing device to an accessory device
A mobile computing device and an accessory device are individually equipped with features and components that enable magnetic coupling of the two devices. Specific embodiments provide for the use of one or more horseshoe magnets for use in the magnetic coupling mechanisms. As an addition or alternative, electromagnetic coupling may be used to selectively maintain and/or orient the two devices in a mated position.
Repeater with mobile communication device feedback
The apparatus comprises a plurality of antennas that are configured to receive wireless signals comprising communication signals and interference signals. Each antenna provides an antenna output signal that is processed by a wireless signal processor of the apparatus to generate a processed wireless signal. A user equipment (UE) communication interface is configured to transmit the processed wireless signal to the mobile wireless communication device. A signal quality feedback interface receives, from the mobile wireless communication device, a wireless feedback signal indicating the characteristic of the processed wireless signal received at the mobile wireless communication device. The wireless signal processor combines the antenna output signals based on the wireless feedback signal to minimize interference signals received at the mobile wireless communication device.
Radio base station, relay station, radio communication system and radio communication method
In order to achieve effective utilization of radio communication resource, there is provided a relay station, for relaying a signal to be transferred between a radio base station and a radio terminal, which includes a storage section adapted to store communication controlling information for communication control with the radio terminal, a base station side signal reception section adapted to receive, from the radio base station, scheduling information in communication between the radio base station and the radio terminal through the relay station, a complementation section adapted to complement contents of the scheduling information received by the base station side signal reception section in accordance with the communication controlling information stored in the storage section, and a terminal side signal transmission section adapted to transmit the scheduling information whose contents are complemented by the complementation section to the radio terminal.
Radio access network integrated set-top device
A device may receive a signal strength indicator associated with a connection between a mobile device and a first base station. The signal strength indicator may indicate a strength of a radio signal received by the mobile device from the first base station. The device may transmit the signal strength indicator to a network device, and may receive, from the network device, a first notification to activate a second base station based on the signal strength indicator. The device may activate the second base station based on the first notification. The second base station may provide temporary wireless connectivity for the mobile device.
Broadcast response system
A broadcast response system provides, e.g., a radio broadcast listener with the ability to obtain media content such as music or speech while listening to the radio. The user can respond to items in the radio broadcast such as advertisements, fund raising drives, or interactive listener polls during the broadcast. Data such as song title and artist, author or publisher and the IP address for the location where the digital version of the content is stored, can be transmitted using, e.g., the RBDS/RDS data stream. A reference number representing song title and artist, author or publisher and the IP address for the location where the digital version of the content is stored can also be employed for ease of implementation. This reference number can reside in a lookup table to be accessed by broadcast response server.
Image formation unit and image formation apparatus
An image formation unit includes an image carrier, a developer carrier configured to supply developer to the image carrier to form a developer image on the image carrier, first and second developer supply members configured to supply the developer to the developer carrier, a first developer container room configured to contain therein the developer and accommodating therein the first developer supply member, and a second developer container room configured to contain therein the developer and accommodating therein the second developer supply member.
Development device, processing unit and image forming apparatus
A development device includes a developer carrier configured to carry on a surface thereof a developer, the developer carrier being disposed to face a latent image carrier, a developer tank having the developer carrier, a developer container configured to house the developer to be supplied to the developer tank, the developer container being connected to the developer tank through a partition having an opening, and a developer carrier member configured to carry the developer in the developer container, the developer being supplied to the developer tank from the opening while being carried by the developer carrier member, and the amount of developer to be supplied to the developer tank from the opening being gradually increased in a developer carrying direction of the developer carrier member.
Drive transmission device including a detection device and a protection member made of a conductive material
A drive transmission device includes drive transmission members including a detection target gear, a detection device detecting the rotational position of the target gear and including a position detection member and a detection unit, and a conductive protection member protecting the detection unit. The detection unit and the protection member are assembled to the same member to be installed to an external apparatus. If there is a dimensional error in the protection member causing a portion of the protection member closest to the target gear to shift in position relative to the detection unit beyond a predetermined range, the protection member comes into contact with the detection unit in the assembling process, and is corrected in shape by the detection unit, with the shift in position relative to the detection unit of the portion of the protection member closest to the target gear kept within the predetermined range.
Process cartridge and electrophotographic image forming apparatus
A process cartridge is provided for detachably mounting to a main assembly of an electrophotographic image forming apparatus. The process cartridge includes an electrophotographic photosensitive drum, a developing roller for developing an electrostatic latent image formed on the electrophotographic photosensitive drum, a drum frame supporting the electrophotographic photosensitive drum, a developing frame supporting the developing roller, the developing roller being movable between a contacting position in which the developing roller is in contact with the electrophotographic photosensitive drum and a spacing position in which the developing roller is spaced from the electrophotographic photosensitive drum, a force receiving member capable of taking an operating position for moving the developing frame from the contacting position to the spacing position, and a stand-by position retracted from the operating position, an urging portion for urging the force receiving member, and an engaging portion for engaging with the force receiving member.
Image forming apparatus having a cartridge and an exposure device that can each be rotated and inclined at different angles to detach the cartridge
An image forming apparatus to which a cartridge having a photosensitive drum is detachably mounted. A cartridge supporting member supports the cartridge mounted to a main body of the apparatus, and an operation member is operated to be moved when the cartridge is mounted. When the operation member is moved in a state in which the cartridge is mounted, the cartridge supporting member is rotated away from the transfer member so that the cartridge is rotated and inclined at an angle θ1 with respect to the transfer member, and an exposure device is rotated away from the transfer member and is inclined at an angle θ2 greater than the angle θ1 with respect to the transfer member, so that the cartridge is allowed to be detachable from the main body of the apparatus.
Image forming apparatus
An image forming apparatus includes an image forming section, a paper supply section, a housing member and an ion generating unit. The housing member is disposed at least below the image forming section, and gives the same shape in plane view as the image forming section and the paper supply section. The ion generating unit is contained in the housing member. The ion generating unit includes a duct forming a pathway of flow to guide the air that is sucked in from outside of the housing member again to outside of the housing member, an ion generating device disposed inside the duct, and a fan for generating an air current in the duct.
Image forming apparatus configured to direct cooling air flow to a fixing device roller proximate the outer side of the apparatus main body
An image forming apparatus includes a fixing device that has: a fixing roller heated by induction and a pressing roller brought into press-contact with the fixing roller to fix a toner image borne on a paper sheet conveyed toward the fixing device by a conveyor unit. When a paper sheet having a width smaller than a width of a maximum-width recording medium that can be passed through the fixing device is passed through the fixing device, a non-paper passing region is formed at each end portion of each of the fixing and pressing rollers. Sirocco fans cool the non-paper passing region at a part of an outer peripheral surface of the pressing roller. The pressing roller is disposed opposed to the outer side of the main body of the image forming apparatus.
Fusing device of an electrophotography image forming apparatus including a heating roller
A heating roller including a resistive heating layer and a fusing device including the heating roller. By separately disposing a plurality of electrodes in an axis direction of the heating roller, and by independently controlling each electrode, the heating roller may correspond to various papers having different sizes. Accordingly, the temperature of the heating roller may be stably controlled.
Image heating apparatus
An image heating apparatus includes an image heating rotational member configured to heat an image on a recording material, a pressure member configured to form a nip portion with the image heating rotational member and pinch the heated recording material in the nip portion, a first external heater including a first heat generation member and configured to contact an outer surface of the image heating rotational member and heat an area of the image heating rotational member that has passed the nip portion, and a second external heater including a second heat generation member and configured to contact an outer surface of the image heating rotational member and heat an area of the image heating rotational member heated by the first external heater. In the image heating apparatus, maximum power applied to the second heat generation member is smaller than maximum power applied to the first heat generation member.
Image forming apparatus and image forming method
An image forming apparatus includes an image forming unit that forms, on an image bearing member, an image for adjusting operations of the image forming apparatus, a container that contains toner removed from the image bearing member, and a controller that controls formation of the image for adjusting the operations of the image forming apparatus so that after an amount of toner contained in the container reaches a threshold value, an amount of toner removed from the image bearing member and to be contained in the container is reduced to less than before the amount of toner contained in the container reaches the threshold value.
Image forming apparatus
An image forming apparatus includes a rotatable image carrying member, a rotatable transfer member cooperative with the image carrying member, and a fixing unit having a fixing nip for nipping and feeding the recording material discharged from the transfer nip while fixing the toner image. In addition, a bowing amount measuring unit measures a bowing amount of the recording material, a storing portion stores a target bowing amount, and a speed controller controls a feeding speed of the recording material. The storing portion stores a plurality of target bowing amounts, which are selectable depending on kinds of the recording material, and the speed controller controls the feeding speed in the fixing nip, and then controls the feeding speed so that the bowing amount is substantially zero at the time when a trailing edge of the recording material leaves the transfer nip.
Belt drive apparatus for correcting belt position in direction of width
A belt drive apparatus is equipped with an endless belt rotationally movable by being supported by a plurality of rollers. A moving speed signal output part outputs a signal based on a rotational movement of the endless belt. A width direction position signal output part outputs a position signal for which its value changes in response to a position of the endless belt in a direction of width of the endless belt. A width direction position control part controls a position of the endless belt in the direction of width of the endless belt. A process execution part performs a predetermined process using the signal output from the moving speed output part based on the position signal output from the width direction position signal output part.
Image forming apparatus
An image forming apparatus, to which a plurality of cartridges are detachably mountable, with the cartridges each having a cartridge side identification portion, includes an image forming unit configured to form an image, a plurality of mounting portions to which the cartridges are demountably mountable, and an identification urging mechanism provided in each of the mounting portions. The identification urging mechanism permits a cartridge to be mounted to the mounting portion when the cartridge is to be properly mounted to the mounting portion on the basis of correspondence with the cartridge side identification portion, and urges the cartridge in a direction opposite a direction in which the cartridge is mounted when the cartridge is improper for the mounting portion. The identification urging mechanism permits, even when the cartridge is improper for the mounting portion, the cartridge to enter to a mount position where the proper cartridge is mounted.
OSNR measuring device and optical communication system
An OSNR measuring device n OSNR measuring device includes an input port to which a signal light is given; a wavelength filter which includes a variable passband, and selectively takes out an optical component corresponding to a signal optical wavelength to be measured from the signal light; a wavelength control circuit which controls the passband of the wavelength filter; a delay interferometer which branches a light output from the wavelength filter and delays one of the branched lights with respect to the other branched light and in which the branched lights are made to interfere with each other; a photodetector which detects a power of a delay interference light output; and an OSNR calculation circuit which calculates, based on a bandwidth of a passband of the wavelength filter and the power of the delay interference light, an optical signal to noise ratio of a signal optical wavelength to be measured.
Feedback light tuning device and optical communication system and method using the same
A feedback light tuning device and the optical communication system and method using the same are provided. By tuning the feedback light, the mechanism can completely correct the mean-wavelength drift up to 30 nm or 19400 ppm. The mechanism can be applied to various harsh environments which cause the mean-wavelength drift, so as to achieve a required stable mean-wavelength for the light source and to increase the acceptable range of radiation dose.
Method, device and system for generating and receiving a phase polarization modulated signal
In the field of communications transmission, a method, a device, and a system for generating and receiving a phase polarization modulated signal are disclosed. The device for generating the phase polarization modulated signal includes: a Laser Diode (LD), a time division demultiplexer, a phase precoding module, a phase modulating module, a polarization precoding module and a polarization modulating module. The device for receiving the phase polarization modulated signal includes: an optical splitter, a polarizer, a phase demodulating and receiving unit, a Polarization Beam Splitter (PBS), a balanced receiver, a power divider, an exclusive OR, a delayer and a data interface processing unit. Therefore, problems in the prior art that a Differential Quadrature Phase Shift Keying (DQPSK) signal cannot bear and transmit information at a higher rate and that non-linear effect is strong during transmission are solved, and transmission performance of an optical signal is improved.
Optical access network having emitter-free customer premise equipment and adaptive communication scheduling
An access network includes an access device having an optical interface module that outputs a plurality of pairs of optical communication signals, each of the pairs of optical communication signals comprising a modulated optical transmit signal and an unmodulated optical receive signal, each of the pairs of optical communication signals having a different wavelength. A customer premise equipment (CPE) comprises an optical interface module to receive the modulated optical transmit signal and the unmodulated optical receive signal for any of the plurality of pairs of optical communication signals. The optical interface module includes a receive module to demodulate the modulated optical transmit signal into inbound symbols and a transmit module having an optical modulator and reflective optics to modulate the unmodulated optical receive signal in accordance with a data signal and reflect a modulated optical receive signal to communicate outbound data symbols to the access device.
Voltage generator, control circuit, vector sum phase shifter, and optical transceiver
A voltage generator (400) includes a resistor ladder including resistors (4000-4008) which divide a supplied voltage to generate a plurality of reference voltages, a resistor (4009) provided between a power supply voltage (VCC) and one terminal of the resistor ladder, and a resistor (4010) provided between a power supply voltage (VEE) and the other terminal of the resistor ladder.
Vector sum phase shifter, optical transceiver, and control circuit
A vector sum phase shifter includes a 90° phase shifter (1) which generates an in-phase signal (VINI) and a quadrature signal (VINQ) from an input signal (VIN), a four-quadrant multiplier (2I) which changes the amplitude of the in-phase signal (VINI) based on a control signal (CI), a four-quadrant multiplier (2Q) which changes the amplitude of the quadrature signal (VINQ) based on a control signal (CQ), a combiner (3) which combines the in-phase signal (VINI) and the quadrature signal (VINQ), and a control circuit (4). The control circuit (4) includes a voltage generator which generates a reference voltage, and a differential amplifier which outputs the difference signal between a control voltage (VC) and the reference voltage as the control signal (CI, CQ). The differential amplifier performs an analog operation of converting the control voltage (VC) into the control signal (CI, CQ) similar to a sine wave or a cosine wave.
To provide an optical transceiver with which a plurality of optical transmitters and receivers constituting the optical transceiver can be detached individually and exchanged/repaired easily, so that waste of components can be avoided. The optical transceiver includes: an optical transceiver main body; a plurality of pairs of optical transmitters and optical receivers housed inside the optical transceiver main body by being disposed in parallel; optical transmitter substrates and optical receiver substrates, which individually hold each of the optical transmitters and the optical receivers; an optical transceiver substrate which holds each of the optical transmitter substrates and the optical receiver substrates; and connectors which connect each of the optical transmitter substrates as well as the optical receiver substrates to the optical transceiver substrate detachably.
Method and arrangement for transmitting signals in a point to multipoint network
Bidirectional data signals are exchanged between a central unit and a plurality of network terminals. The optical carrier frequencies of the downstream and upstream signals are chosen so that reflections do not interfere with the selected signal at the optical network unit and not with the received upstream signals at the central unit. The optical network units select their associated downstream signal and generate an associated upstream signal.
Standby restoration signaling for optical networks
Systems and methods are described that provide a distributed restoration signaling protocol for shared mesh restoration with standbys for transparent optical networks.
Image capturing device and activation method therefor
An image capturing device includes a first controller operable to control image capturing; an operation section including a switch; a detector operable to detect a change to an image capturing mode and to send a signal representing the change; a second controller operable to monitor and process the sent signal, the second controller having a power consumption less than that of the first controller; and a power supply operable to supply power to the first controller, the second controller, and a functional section of the device. When the second controller receives the signal sent from the detecting section in a power saving state in which power is supplied from the power supply to the second controller, the power saving state is changed to a power supplying state capable of image capturing by supplying power from the power supply to portions of the device including the first controller.
Halogen water heater
A fluid heating apparatus includes a housing containing a flattened tube and lamps. The apparatus further includes a first conduit flow-coupled to the flattened tube, the first conduit being adapted to provide fluid to the flattened tube. The apparatus further includes a second conduit flow-coupled to the flattened tube, the second conduit being adapted to channel fluid from the flattened tube. The lamps are arranged to irradiate the flattened tube, and the flattened tube is adapted to absorb radiation from the lamps and heat fluid contained therein.
System and method for digital content retrieval
Flexibility with respect to access and enjoyment of time shifted content in a content distribution network is provided, especially with regard to content not present on a DVR. A DVR accesses a network storage device over a network for particular portions of content not available on the DVR and the network storage device provides those missing portions. The user may then rewind and playback not only already locally stored content but also that content provided by the storage device. Content can be provided through faster-than-real-time transmissions such that the content is made available to the DVR prior to it being needed for rewind functionality or playback.
Apparatus and a record carrier for, and a method of recording a sequence of video data signals
An apparatus for recording a sequence of video data signals on a record carrier has been proposed. The apparatus comprises input means (1) for receiving video data signals, generating means (100) for generating characteristic point information signals, processing means (100) for processing the characteristic point information signals for a plurality of characteristic points into a sequence of characteristic points information signals (CPI) and writing means (102) for writing the sequence of video data signals and the sequence of characteristic points information signals on the record carrier. The characteristic point information signals identify a characteristic point in the sequence of video data signals. Various measures are proposed in relation to the CPI aiming at improving quality of trickplay and random access playback operations.
Method and a digital broadcast receiver for providing a list of records
A method for providing a list of records in a digital broadcast receiver and a digital broadcast receiver for providing a list of records are disclosed. A reception unit receives a broadcast signal including a data broadcast-associated application. A storage medium store records. And A controller manages the application, receives a list request for requesting a list of record series belonging to a series from the application, generates a list, selects a record from a list of the stored records based on a link between the series and the record, includes the selected record in the generated list, and transmits the generated list to the application.
Video recording system, video recording apparatus, and video recording method
A content can be recorded for certain in a video recording system including a video recording apparatus and a video recording and transmitting apparatus. The video recording apparatus includes: a recording control unit that starts recording the content when a period of time indicated by scheduled recording information starts; and a message transmitting unit that transmits recording-state information to the video recording and transmitting apparatus at regular intervals. The video recording and transmitting apparatus includes: a recording-state monitoring unit that determines whether or not the continued reception of a signal has been suspended during the period of time; and a recording control unit that starts recording the content when the recording-state monitoring unit determines that the continued reception of the signal has been suspended.
Fiber optic component holders and enclosures and methods including the same
A method for securing a fiber optic component includes: providing a holding medium having a tack and mounted on a substrate; and placing the fiber optic component in intimate contact with the holding medium to thereby secure the fiber optic component to the substrate. The tack of the holding medium releasably bonds the fiber optic component to the holding medium and the holding medium retains its tack upon removal of the fiber optic component to permit re-placement of the fiber optic component or placement of a further fiber optic component on the holding medium to secure said fiber optic component or further fiber optic component to the substrate.