Providing limited versions of applications
Disclosed are various embodiments for providing limited versions of applications. A limited version of an application is automatically generated from a full version of the application based at least in part on an expected use of the application by a client computing device during a testing period. The limited version has a smaller data size than the full version. The limited version of the application is sent to the client computing device. The limited version of the application is configured to be executed in a secured environment of the client computing device. The secured environment denies the limited version of the application access to secured resources of the client computing device.
Controlling the access of master elements to slave elements over a communication bus
A system comprises one or more slave elements operably coupled to a plurality of master devices. A central protection function is operably coupled to a first communication bus and configured to control data flow between the one or more slave elements and the plurality of master devices via the communication bus.
Method and apparatus for automating controlled computing environment protection
A method and apparatus for automating controlled computing environment protection is disclosed. In one embodiment, the method for automating controlled computing environment protection includes monitoring a controlled computing environment to process user activity information associated with a user computer and comparing the user activity information with abnormal behavior indicia to identify hostile user activity that denotes browser control circumvention.
Methods and apparatus providing automatic signature generation and enforcement
A system inserts at least one notifying identifier in the computer system. The at least one notifying identifier provides execution information associated with the computer system. The system receives execution information from the at least one notifying identifier, the execution information identifies details associated with a traffic flow on the computer system. The system then generates a signature based on a deterministic link provided by the execution information provided by the at least one notifying identifier. The signature is utilized to prevent further damage caused to the computer system by at least one attack.
Detecting malware in mobile sites
Behavioral analysis of a mobile webpage is performed to determine whether the webpage is malicious. During analysis, the webpage is visited by an emulated mobile device to cause behaviors to occur which may be malicious. The behaviors occurring after accessing the webpage are stored. The behaviors are classified as hard or soft signals. A probability of the webpage being malicious is determined through combining soft signals, and the webpage is classified as malicious or non-malicious. Users of the webpage, the developer of the webpage, or a distributor of the webpage are notified of the webpage classification to enable responsive action.
Identifying relationships between security metrics
A security metrics system receives security information data for a network system of computers and metric definitions from metric sources. Each metric definition defines a heuristic for calculating a score for the network system from one or more security signal values at a time in the plurality of times, wherein the score quantifies a security metric for the network system. The system calculates each metric definition for a plurality of times and selecting metric definitions that are related to the performance of and are indicative of one or more other metric definitions as candidates to be key performance indicators.
Program execution integrity verification for a computer system
A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating the program with an integrity marker value, and verifying the execution integrity of the program based on the integrity marker value and information received from the program during execution. A computer system may also be employed for program instrumentation by modifying the program to include at least one instruction for passing an integrity marker value to an operating system kernel during execution of the instruction.
Method and system for providing terminal security checking service
A terminal security checking service providing method and a system for the same are provided which are capable of updating information to be used as security measures even while the system is being shared among users. When one or more external media are connected to one or more terminals, information for security check is transferred to a security checking server. Security check results are transmitted through the one or more terminals, one or more external media, and an external medium initializing unit to the security checking server. Information to be used as security measure corresponding to the security check results is sent back from the security checking server through the external medium initializing unit to the one or more external media to initialize the one or more external media.
Server based malware screening
An Internet infrastructure is provided to transfer a packet of data between a client device and source device. The infrastructure consists of a support server that screens the packet for malware codes on behalf of a registered client. In order to scan for malware, the support server contains hardware and/or software modules to perform malware detection and quarantine functions. The modules identify malware bit sequence in the packet(s), malware bit sequences or entire contaminated code is quarantined or repaired as appropriate. After identification of malware code (if any), the support server sends warning messages to affected parties, providing information regarding the malware codes that were detected.
System for finding potential origins of spoofed internet protocol attack traffic
The invention computes approximate origins of data packets transmitted over the Internet. Law enforcement agencies and network operators can use it to assign responsibility for observed Internet activities. The invention uses a small number of cooperative locations (incoming links on routers or switches) to provide link identification data: whether a packet or did or did not traverse that location. The system uses these cooperative places to generate the link signature of a data packet—which cooperative locations observed and did not observe the packet. Potential origin locations are divided into pre-computed blocks that have the same link signatures to given destination locations. The blocks are used to generate reverse routing data, potential source addresses for different link signatures. Variations of the invention store relevant link identification and reverse routing data to find the origins of past packets or to compute the origins of packets from partial information about packets of interest.
Coordinated detection of a grey-hole attack in a communication network
In one embodiment, a security device receives one or more first unique identifications of packets sent by a first device to a second device for which a corresponding acknowledgment was purportedly returned by the second device to the first device. The security device also receives one or more second unique identifications of packets received by the second device from the first device and acknowledged by the second device to the first device. By comparing the first and second unique identifications, the security device may then determine whether acknowledgments received by the first device were truly returned from the second device based on whether the first and second unique identifications exactly match.
Methods and apparatus for intrusion protection in systems that monitor for improper network usage
Methods and apparatus for intrusion protection in systems that monitor for improper network usage are disclosed. An example method to protect a service platform comprises detecting responses from the service platform indicative of questionable signaling protocol transactions. The example method further comprises storing transaction records corresponding to questionable signaling protocol transaction records with at least one of the transaction records identifying a signaling protocol message including an associated originating device address corresponding to a respective questionable transaction record. Additionally, the method comprises determining whether the originating device address is associated with an improper intrusion of the service platform based on at least one on the transaction records corresponding to the originating device address.
Tuning of data loss prevention signature effectiveness
In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
Content randomization for thwarting malicious software attacks
Content randomization techniques for thwarting malicious software attacks. In one example, a method comprises the following steps. Content is received at a randomizer module from a first computing device, the content having been retrieved by the first computing device in response to a content request by a second computing device. The content is randomly altered at the randomizer module to generate randomly altered content. Log information about the random alteration to the content is maintained at the randomizer module. The randomly altered content is sent from the randomizer module to the first computing device such that the first computing device is able to provide the randomly altered content to the second computing device in response to the content request by the second computing device. Further, the random alteration may be removed from reply content using the log information.
Fraudulent page detection
A method of determining whether a page is a fraudulent page comprising the steps of: extracting a plurality of tokens from the page, (403) for each token, calculating a token probability being the probability of the token being in a fraudulent page (404), using the calculated token probabilities, calculating a page probability being the probability of the page being a fraudulent page (405), wherein the token probability of a token being in a fraudulent page is calculated based on a number of fraudulent pages and a number of non-fraudulent pages which contain the token from a training corpus of fraudulent pages and non-fraudulent pages.
Computer network security platform
A computer system for managing security information for an organization includes a scanner execution module configured to automatically execute at least two scanners in a predetermined interval to analyze potential vulnerabilities of a computer environment. A vulnerability is acquired from the at least two scanners and stored in a data store. A user associated with the analyzed computer environment is determined based on the vulnerability stored in the data store, the user is notified of the vulnerability.
System and method for maintaining server data integrity
The System Integrity Guardian can protect any type of object and repairs and restores the system back to its original state of integrity. The Client component is the user interface for administering the System Integrity Guardian environment. An administrator can determine which servers to protect, which objects to protect, and what actions will be taken when an event that breaches integrity occurs. The Monitor Agent component is the watchdog of the System Integrity Guardian that captures and addresses any event that occurs on any object being protected. The Server component includes the server and the Protected Object Central Repository. The authoritative copies are maintained, digital signatures are created and stored, objects are validated, and communication between the three units is performed.
System, method, and apparatus for allowing a service provider system to authenticate that a credential is from a proximate device
An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.
Image processing apparatus, controlling method of image processing apparatus, and computer program
In a case where a plurality of users are made correspondent to one IC card, user changeover is performed without a logout process. When the IC card is passed over a card reader while a user is logging in, it is judged whether or not the passed card is the IC card used in a login process of the user who is logging in. If NO, a logout process of the user who is logging in is performed, and a user login process using the newly passed IC card is performed. On the other hand, if YES, it is further judged whether or not the plurality of users are made correspondent to the passed IC card. If YES, selection of the user who intends to newly log in is accepted.
Verification method and computer system using the same
A verification method including a set flow and the identification flow is provided. The set flow includes: displaying an original outline pattern; executing a coloring operation on the original outline pattern in response to a user encryption coloring event to generate and display a colored outline pattern; storing the colored outline pattern. The identification flow includes: displaying an original outline pattern; executing a coloring operation on the original outline pattern in response to a user verification coloring event to generate and display a to-be identified colored outline pattern; determining whether the to-be identified colored outline pattern is equal to the colored outline pattern; if yes, triggering the verification pass event; if not, triggering the verification fail event.
Message administration system
Methods and systems for message administration are described. In one embodiment, an application request for an application associated with an administration tool may be accessed. The application request may be associated with a user. The application may be deployed on a system machine. A particular access level of a plurality of access levels may be identified for the user on the administration tool. The particular access level may identify functionality of the administration tool available to the user. A determination of whether to allow processing of the application request based on the particular access level may be made. When the application request meets the particular access level, communication with the system machine from the administration tool may be made based on the application request. The system machine may be capable of processing the application request. Additional methods and systems are disclosed.
Security for remote access VPN
Techniques are disclosed for improving security in virtual private network. In one embodiment, key information is generated for a virtual private network (VPN) connection between a first device and a second device. A plurality of shares is then generated based on the key information. A first set of one or more shares is stored on a dongle that is paired to the first device. A second set of one or more shares is stored on the first device. In response to a request to resume the VPN connection, the first set of shares is retrieved from the dongle. The key information is reconstructed based on the first set of shares and the second set of shares. The reconstructed key information may then be used to resume the VPN connection.
Unauthorized data transfer detection and prevention
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class.
Service aggregation in a cloud services center
A cloud center infrastructure system may include a service aggregator connected directly to a provider network. The service aggregator may be configured to receive, via the provider network, a data unit from a customer device, associated with a customer; identify a first device, associated with a first traffic processing service, based on a sequence of traffic processing services associated with the customer; and send the data unit to the first device, wherein the first device is located in a cloud services center, and wherein the first device is connected to the service aggregator over a Layer 2 connection.
Dual device system for secure transactions
Methods and systems for operating a Smart Device 102 with a secure communication system. A SPARC Security Device (SSD) 104 is in communication with one or more Smart Devices 102. SSD 104 receives a request for a transaction from a Smart Device 102 executing an application obtained from an Application Controlling Institution (ACI) 101, and is asked to verify the validity of the transaction. A one-time identifier (SSD ID, which replaces the user's account number) is generated by the SPARC Security Device 104. The one-time identifier comprises a unique SSD 104 unit identifier and a one-time transaction number. In a Loyalty Application, an ACIRD 81 stores on behalf of participating entities an accounting of at least one of inducements, rebates, loyalty points, and rewards earned by or attributable to users of the SD's 102, and communicates with the SD's 102 and with the associated ACI(s) 101 and SSD(s) 104.
Non-interactive entity application proxy method and system
A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The configuration data comprises a refresh count, a refresh period, and a session ID. A master refresh period is calculated from the refresh period. Credentials data associated with the NIE software application are retrieved. The credentials data are transmitted to a resource server. A session key generated by the resource server is received by the NIE software application. The NIE software application calculates a stale time associated with the session key. The NIE software application generates a first updated refresh count. The NIE software application stores the session key, the first updated refresh count, the first refresh period, and the first specified stale time.
System and method for authenticating a user through community discussion
Provided are a system and method to authenticate user identities. The method includes gathering metadata from at least one discussion involving at least one pre-defined user identity on a first social network. The method evaluates the metadata of at least one third party response related to a posting by the at least one pre-defined user identity. The at least one pre-defined user identity is authenticated based on the evaluated third party response. And an indication of authentication for the at least one pre-defined user identity is provided. The system and method may also permit bridging of the established authentication between different social networks.
Authentication to an identity provider
An arrangement for authenticating a user at a service provider is described. The arrangement makes use of the fact that a user of a mobile communication device can be readily and securely identified by a telecommunications provider and re-uses that authentication to identify the same user when accessing the service provider from a different client. The client instructs the mobile communication device to contact an identity provider at the telecommunications provider and shared secrets are exchanged between the identity provider, mobile communication device and client to confirm that the same user is at the client and the mobile communication device.
Guest account management using cloud based security services
Guest accounts arise in a variety of ways. Hotels, Coffee Shops, internet cafes, internet kiosks, etc provide internet access to its guests, aka customers. Cloud based security services can serve as a platform for supporting efficient and safe guest account management. Guest accounts are managed by the cloud service and are associated and disassociated with individuals as needed by the guest account provider. The cloud service can also provide a guest account provider with greater control over guest account usage and accountability.
Method for secure user and transaction authentication and risk management
To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a network site, such as a website, directly from the network site. The security server calculates a one-time-password based on the received transaction information and a secret shared by the security server and the network site, but not by the user. The security server transmits the calculated one-time-password for application as the user's signature on the transaction. The one-time-password is independently calculable by the network site based on the shared secret.
Storage gateway activation process
Methods, apparatus, and computer-accessible storage media for activating a gateway to a remote service provider. The gateway serves as an interface between processes on a customer network and the provider, for example to store customer data to a remote data store. A gateway sends a public key and metadata describing the gateway to the provider. The gateway receives an activation key from the provider and exposes the activation key on the customer network. The customer obtains the key and communicates to the provider using the key to provide customer information including a name for the gateway and to authorize registration of the gateway. The provider provides the customer information to the gateway. The gateway requests security credentials from the provider using the customer information and the key. The provider sends a security credential to the gateway. The gateway may then obtain configuration information from the customer via the provider.
Device and method for identification and authentication
A device for identification and authentication of a remote user connecting to a service over a network includes a cryptographic processor and at least one cryptographic key and storage means, additional processing means and interface means to generate and transmit a unique authentication code as emulated keystrokes through a standard input, means of a client terminal. The code may be transmitted only by an explicit command of the user.
Data driven role based security
Data driven role based security is provided. At login, the system queries for a data context in connection with access to computing objects of a computing system. When a request for access to computing objects is received by the computing system, one or more control expressions specified for the computing object being accessed are evaluated. The evaluation of the control expressions may reference the user context or the data context previously established, and returns a set of effective permissions. Access to the computing object is then granted if the set of permissions includes an appropriate permission for the request for access.
Managing hardware reboot and reset in shared environments
In an environment such as a cloud computing environment where various guests can be provisioned on a host machine or other hardware device, it can be desirable to prevent those users from rebooting or otherwise restarting the machine or other resources using unauthorized information or images that can be obtained from across the network. A cloud manager can cause one or more network switches or other routing or communication processing components to deny communication access between user-accessible ports on a machine or device and the provisioning systems, or other specific network resources, such that the user cannot cause the host machine to pull information from those resources upon a restart or reboot of the machine. Further, various actions can be taken upon a reboot or attempted reboot, such as to isolate the host machine or even power off the specific machine.
Authentication control in low-power lossy networks
Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization.
Policy-based application management
Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the enterprise application in accordance with rules established by the enterprise. Together, the enterprise applications running on the mobile device form a set of managed applications. Managed applications are typically allowed to exchange data with other managed applications, but are blocked from exchanging data with other applications, such as the user's own personal applications. Policies may be defined to manage data sharing, mobile resource management, application specific information, networking and data access solutions, device cloud and transfer, dual mode application software, enterprise app store access, and virtualized application and resources, among other things.
Secure network location awareness
Secure network location awareness is provided whereby a client is able to use appropriate settings when communicating with an access node of a communications network. In an embodiment a client receives a signed message from the access node, the signed message comprising at least a certificate chain having a public key. In some embodiments the certificate chain may be only a self-signed certificate and in other embodiments the certificate chain is two or more certificates in length. The client validates the certificate chain and verifies the signature of the signed message. If this is successful the client accesses stored settings for use with the access node. The stored settings are accessed at least using information about the public key. In another embodiment the signed message also comprises a location identifier which is, for example, a domain name system (DNS) suffix of the access node.
Audio/video channel bonding by chunk
Different data communication architectures deliver a wide variety of content, including audio and video content, to consumers. The architectures employ channel bonding to deliver more bandwidth than any single communication channel can carry. In some implementations, the communication architectures distribute video programming in the form of MPEG2 TS packets, flagged by marker packets, in a round-robin manner across the communication channels. Channel bonding synchronization information may be present in packets defined above the data-link layer or added to fields within data-link layer frames.
Decentralized media delivery network
A decentralized approach to delivering a media file to a requesting subscriber in a network of subscribers comprises the steps of segmenting the media file into a plurality of segments and distributing the segments of the media file among the network of subscribers, and responding to a request from the requesting subscriber by directing to that requesting subscriber al of the plurality of segments of the media file. All of the segments are assembled into the media file and displayed or stored by the requesting subscriber.
Rules engine for troubleshooting video content delivery network
A rules engine for application of rules to a plurality of log events from a plurality of log and event sources has separate threads for the collection of log entries and events, which logs and events are merged together to form a merged log events. A rules thread applies the merged events to a series of rules in search of a match condition, where the match condition involves a log source and one or more fields selected from a particular log or event. When a match condition occurs according to criteria specified by the rule, an action is performed. In one example, the action is the presentation of a distilled message which indicates a corrective action or problem source based on the application of the rules to the merged stream of messages. In another example, multi-tab displays indicate unprocessed logs and the results of applied rules.
Interactive television systems with digital video recording and adjustable reminders
An interactive television system is provided in which an interactive television application is used to support network-based or local personal video recorder capabilities. A user may use this application to view lists of program listings. The user may select a program listing of interest. The interactive television application may allow the user to set a reminder for the selected program at the scheduled broadcast time. This application may also allow the user to set a reminder for the selected program at a later time at which the program is not scheduled to be broadcast. The user may be provided with a reminder at this later time. In response, the user may direct the network-based or local personal video recorder to play back the program or may defer the reminder again. The interactive television application may collect information on program usage and popularity to determine how long to retain certain programming.
Scanning and selecting an antenna beam provided in fixed wireless customer premises equipment
An outdoor broadband unit receives a current time, a short term maintenance mode time period, and a long term maintenance mode time period from a remote network device. The outdoor broadband unit determines a mode associated with selection of an antenna beam, provided on an antenna of the outdoor broadband unit, based on at least one of the current time, the short term maintenance mode time period, and the long term maintenance mode time period. The outdoor broadband unit selects an antenna beam to use based on the determined mode.
Program guide system with preference profiles
An interactive television program guide system is provided in which a user may inform a program guide of the user's interests. Information on the user's interests may be stored in a preference profile. There may be more than one preference profile, each for a different user. Each preference profile contains a number of preference attributes (program titles, genres, viewing times, channels, broadcast characteristics, etc.). A preference level (e.g., strong or weak like, strong or weak dislike, illegal, mandatory, don't care, etc.) that is indicative of the user's level of interest is associated with each preference attribute. Preference profiles may be used to restrict the programs that are listed in various program listings display screens and may be used to limit the channels to which the program guide allows the user to tune.
Variability in available levels of quality of encoded content
A server resource provides notification to subscribers in a respective network environment that the content is available for retrieval at a particular bit rate (e.g., a promotional bit rate) or particular level of quality (e.g., promotional level of quality) amongst multiple levels of quality for a limited duration of time. For example, an especially high level of quality (or bit rate) of the content may be available only for the limited duration of time. After making the especially high level of quality of content available for retrieval during a promotional period, the content may be subsequently available for retrieval only at lower levels of quality. Accordingly, one or more configurations as discussed herein include changing the ability to access content encoded at different levels of quality over time.
Mediating digital program insertion for linear streaming media
Exemplary embodiments involve a mediation application executed on a processor determining one or more digital programming insertion breaks in a linear media stream. The linear media stream can include electronic content delivered over a network at a time determined by the content provider. The mediation application can determine that a plurality of clients identified by a common group identifier and in communication with the mediation application are receiving the linear media stream. The mediation application can mediate a plurality of requests for digital programming insertion content provided by a digital programming insertion content provider by identifying digital programming insertion content targeted to the common group identifier. The mediation application can provide the digital programming insertion content during the one or more digital programming insertion breaks to the plurality of clients.
Security processing unit with secure connection to head end
A system includes a transport central processing unit of an information appliance device. The transport central processing unit receives a message from a head-end. The transport central processing unit provides access of the message to the security processing unit. A host central processing unit connected with the transport central processing unit is prohibited access to the message.
Method to optimize reception of entitlement management messages in a Pay-TV system
A method to optimize reception of entitlement management messages in a subscriber unit that is part of a Pay-TV system. The subscriber units are set up to a default reception channel for receiving default entitlement management messages such as the ones addressed to all or a group of subscriber units controlled by the management system. When one or a plurality of operating parameters of a specific subscriber unit needs to be modified, the security module sends an information signal to the subscriber unit which switches to a specific reception channel. In this case only specific entitlement management messages, also called positive addressing entitlement management messages, are received for performing the operating parameters modification of the concerned subscriber units. Once the modification is executed, the subscriber unit switches back to the default reception channel to be ready for receiving default entitlement management messages again.
Group based multicast streaming systems and methods
Group based multicast streaming systems and methods are disclosed. An exemplary method includes a group based multicast streaming system defines a media multicast streaming event, determines that a group of users satisfies a minimum participation level associated with the media multicast streaming event, and executes, based on the determined satisfaction of the minimum participation level by the group of users, the media multicast streaming event by multicast streaming a media program to the group of users during a timeslot, and provides an incentive to the group of users for participation in the multicast streaming of the media program during the timeslot. Corresponding systems and methods are also disclosed.
Media monitoring, management and information system
Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed.
Method and system for constructing and presenting a consumption profile for a media item
A method and system for constructing and presenting a consumption profile, a rating profile, or both a consumption profile and a rating profile for a media item are provided. In general, consumption of a media item by a number of first users is tracked. Thereafter, before and/or during playback of the media item by a second user, a consumption profile for the media item is constructed and presented to the second user. In addition to or as an alternative to tracking consumption of the media item by the first users, ratings for the media item may be obtained from all or a subset of the first users. Thereafter, before and/or during playback of the media item by the second user, a rating profile for the media item is constructed and presented to the second user.
Dynamic provisioning of message groups
The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device, one or more first requests to add multiple messages on a message queue. The first requests specify a message group for the messages. The method further includes determining, by the processing device, that the message group does not exist on the message queue in response to receiving the first requests. The method further includes automatically creating, by the processing device, the message group on the message queue in response to determining that the message group does not exist on the message queue. The method further includes adding, by the processing device, the messages to the message group on the message queue.
Dynamically setting the automation behavior of resources
Embodiments provide a method of dynamically setting the automation behavior of resources via switching between an active mode and a passive mode. One embodiment is a method that includes placing a first computing resource into a first desired state and an active behavioral mode and placing a second computing resource having a relationship to the first resource into the first desired state when a first request for the first resource that specifies the first desired state is received. The method also includes placing the first computing resource into a standby state and a passive behavioral mode and not placing the second computing resource into the first desired state.
Mechanism to build dynamic locations to reduce brittleness in a team environment
Mechanisms to build dynamic locations to reduce brittleness in a team environment are provided. A project includes resources, each resource is assigned a key. Each key is mapped to a current location for its corresponding resource. The keys and locations are maintained in an index. Locations for the resources can change as desired throughout the lifecycle of the project and as changes occur the index is updated. When references are made within the project to the resources, the references are translated to the keys, if necessary. The keys are then used for accessing the index and dynamically acquiring the current locations for the resources at the time the references are made.
Virtualizing a processor time counter during migration of virtual machine by determining a scaling factor at the destination platform
In one embodiment, the present invention includes a method for determining a scaling factor between a frequency of a first processor and a frequency of a second processor after a guest software is migrated from first processor to the second processor, and executing the guest software on the second processor using a virtual counter based on a physical counter of the second processor and the scaling factor. Other embodiments are described and claimed.
System and method for providing hardware virtualization in a virtual machine environment
A system and method for providing hardware virtualization and resource management in a virtual machine environment. An application server environment is extended to provide an interface from the higher layers in the application server environment to the system's actual processing power, such that the allocation of processing can be made in a machine-independent way. A layer of software can be placed between the virtual machine and the hardware that improves the efficiency of the virtualized Java execution system. The system comprises two main components: a first, lower-level, execution environment that replaces the usual operating system; and a second, higher-level, resource broker that is responsible for handing out new virtual machines to the above layers, and for monitoring the current resource usage of the running virtual machines.
System and method of interfacing a workload manager and scheduler with an identity manager
A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.
Thread migration to improve power efficiency in a parallel processing environment
A method and system to selectively move one or more of a plurality threads which are executing in parallel by a plurality of processing cores. In one embodiment, a thread may be moved from executing in one of the plurality of processing cores to executing in another of the plurality of processing cores, the moving based on a performance characteristic associated with the plurality of threads. In another embodiment of the invention, a power state of the plurality of processing cores may be changed to improve a power efficiency associated with the executing of the multiple threads.
Method and apparatus for managing workflow failures by retrying child and parent elements
Method of managing workflow failures in a distributed computing environment. A retry value is associated with one or more workflow elements. An element or section of a workflow that does not successfully execute in the distributed computing network is identified. The workflow that does not successfully execute is retried according to a first retry value. The maximum number of times that the first element can be retried is indicated or represented by the first retry value. If one or more workflow elements fail, parent workflows can be retried according to a parent workflow retry value. Elements of the workflow that failed and successfully executed can be retried when the workflow is retried. Execution of workflow elements can also depend upon a condition concerning one or more other elements.
Interaction with a virtual network
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can host virtual machine networks. A component of a hosted virtual machine network is configured in a manner to receive commands directed towards a simulated network device. The component may then execute a process or processes on the hosted virtual machine network which correspond to the received command.
Virtual machine smart migration
Migration mechanisms are disclosed herein that smartly transfer data among virtual machines, minimizing the down time of migration of such machines but maximizing the consistent state of data stored thereon. Specifically, data can be classified into three types: low volatility data (such as hard disk data), high volatility data (such a random access memory data), and immutable data (such as read only data). This data can be migrated from a source virtual machine to a target virtual machine by sending the immutable data along with the low volatility data first—before the source virtual machine has stopped itself for the migration process. Then, after the source virtual machine has stopped, high volatility data and (again) low volatility data can be sent from the source to the target. In this latter case, only differences between the low volatility data may be sent (or alternatively, new low volatility data may be sent).
On-demand loading of types of software code of a program executing on a computing device
A first computing device receives (over a network) from at least a second computing device a container that includes information relating to types of software code that are potentially invoked by a program executing on the first computing device. A determination is made according to an on-demand basis, during execution of the program, whether a particular type of software code is to be loaded from the at least second computing device to the first computing device.
Vectorization of shaders
Intermediate representation (IR) code is received as compiled from a shader in the form of shader language source code. The input IR code is first analyzed during an analysis pass, during which operations, scopes, parts of scopes, and if-statement scopes are annotated for predication, mask usage, and branch protection and predication. This analysis outputs vectorization information that is then used by various sets of vectorization transformation rules to vectorize the input IR code, thus producing vectorized output IR code.
Holding threads in a software debugger
A debugger includes a thread holding mechanism that analyzes the code being executed by multiple threads, and delays holding each thread that is currently executing system code external to the program until the thread is no longer executing the system code external to the program, or until some threshold is exceeded. Delaying holding of a thread that is executing system code external to the program avoids potential conditions that could lock up the debugger.
Dynamic instrumentation method and apparatus for tracing and analyzing a program
An apparatus and method for dynamically analyzing a program are provided. The apparatus and method help minimize overhead in tracing the execution of the program without substantially affecting the operation of the program at run time. The method includes storing an environment value before execution of a function of a main page by storing a first instruction of the function in a temporary page before execution of the first instruction. The method also includes inserting a break instruction at an address of the first instruction in the main page, executing the break instruction, and storing an environment value after execution of the function by executing a break instruction of the temporary page.
Methods and apparatus for debugging programs in shared memory
A system debugging program code stored in shared memory and executed by multiple processors or processing cores. Exemplary operation includes determining if an address associated with an executing instruction is outside a first address range associated with the first processor, determining if the address associated with the executing instruction is outside a second address range associated with the second processor; and then raising an emulation event based on the first comparison but not the second comparison. Exemplary embodiments are also capable of identifying instructions corresponding to breakpoints which are executed by only one of multiple processors that execute program code stored in the shared memory.
Integrated software development system, method for validation, computer arrangement and computer program product
An integrated software development system including an interface description language adapted to specify constraints on input parameters, a program analyzer adapted to identify input parameters of a software program, and a validation enforcement system adapted to enforce that an interface description in the interface description language complying with a predefined set of validation rules is provided for the input parameters of the software program.
System and method for program stack security
A system having a processor receiving a copy of a program and modifying the copy to create a modified program and a memory including a memory stack, the modified program being stored in the memory stack, wherein a first image of the memory stack storing the modified program is different from a second image of the memory stack storing the copy of the program.
Collaborative software debugging in a distributed system with variable-specific messages
In a distributed system that includes a debug server and debug clients coupled for communications through a data communications network, where the debug server includes a debug administrator, a message router, a back-end debugger, and a debuggee, collaborative software debugging includes: receiving application-level messages, including receiving, from a requesting debug client, a request to establish a variable-specific message for a particular variable; routing the application-level messages among the debug clients, the debug administrator, and the back-end debugger, including establishing the variable-specific message; and returning, to the debug clients, client-specific debug results, including: responsive to each request by a variable evaluating debug client to evaluate a variable and if a variable-specific message has been established for the variable to be evaluated, returning the content of the variable-specific message to be displayed in association with the variable in the variable evaluating debug client's client-specific GUI along with the evaluation of the variable.
Dynamically configuring an integrated development environment
In a method for configuring an integrated development environment for programming a type of computer application, a computer receives a selection of a target application runtime program supporting one or more types of computer applications. The computer sends a request for information and receives information on the one or more types of computer applications supported by the target application runtime program. The computer determines, based on the received information, the one or more types of computer applications supported by the target application runtime program. The computer requests and receives a selection of the type of computer application. The computer configures an integrated development environment for programming the type of computer application selected.
Renaming instances of an entity in a coding environment
Exemplary embodiments provide computer-implemented methods, computer-readable media, and systems for changing the identifier associated with an entity, such as a variable or function, in a portion of code. During editing, a reference may be maintained that identifies the location of each instance of the entity in the code. When the identifier associated with one instance of the entity is changed, the change in the identifier may be propagated throughout the code to change each instance of the identifier in the code. The identifier may be changed without interrupting the workflow of the user and without the need to change to a separate refactoring mode. In some embodiments, a syntactical analysis may be performed and some or all instances of the identifier may be changed based on one or more rules.
Configurable partitioning of parallel data for parallel processing
A data partitioning interface provides procedure headings to create data partitions for processing data elements in parallel, and for obtaining data elements to process, without specifying the organizational structure of a data partitioning. A data partitioning implementation associated with the data partitioning interface provides operations to implement the interface procedures, and may also provide dynamic partitioning to facilitate load balancing.
Method and apparatus for generating infrastructure code
A method, apparatus and computer program product are provided for generating infrastructure code. In the context of a method, an ontology representative of a semantic data model is received. The method then processes the ontology in accordance with configuration information that defines the portion of the ontology to process, mapping information that defines a relationship between type information in the semantic data model and data types in the infrastructure code and one or more rules from the semantic data model relating to a conversion between different versions of semantic data model. In response to the processing, the method also automatically generates the infrastructure code in each of a plurality of computer languages.
System for linking process architectures to technology architectures
Systems and methods for linking process architectures to technology architectures greatly reduces the time and cost associated with common changing business requirements. The design's robust features allows for simplified integration and management to changing business processes and needs. The system incorporates a method of integrating changing business processes with current and up to date technological systems without having to start over every time a new business process is introduced or a new technology or technology upgrade takes place.
Method and circuit to implement a static low power retention state
An apparatus to pre-condition an operating integrated circuit (IC) device in a static low power retention state. The apparatus includes a pseudo random number generator that generates a pseudo random number value to pre-condition the static low power retention state of the operating IC device. The apparatus also includes a controller that drives the pseudo random number value into a test scan chain linking logic elements of the operating IC device responsive to the operating IC device entering a sleep mode. Driving the pseudo random number value into the test scan chain by the controller places the operating IC device into the static low power retention state.
Semiconductor device based on power gating in multilevel wiring structure
A semiconductor device includes: first and second circuit cell arrays extending in first direction; first and second power supply lines each extending in first direction and arranged over first circuit cell array, first power supply line being supplied with first power source voltage; third power supply line extending in first direction separately from second power supply line, arranged over second circuit cell array, and supplied with second power source voltage; first transistor coupled between second and third power supply lines; and first circuit arranged on first circuit cell array and operating on first and second power source voltages supplied from first and second power supply lines, respectively.
Filter design tool
A method according to an embodiment of a filter design tool is provided and includes receiving filter parameters for an analog filter through a user interface, where the filter parameters include an optimization parameter related to an application requirement of the analog filter, optimizing the filter for the optimization parameter, calculating a design output based on the optimized filter, and displaying the design output on the user interface. The method can further include receiving viewing parameters that specify the design output to be displayed. In various embodiments, the user interface includes an input area, a viewing area and a window area in one or more pages, where the input area is contiguous to the viewing area in at least one page. The filter parameters can be entered in the input area and the design output is calculated and displayed in the contiguous viewing area substantially immediately.
System and method for reducing reconfiguration power usage
A system and method for reducing power consumption in a reconfigurable integrated circuit. Some embodiments provide placement and routing programs that reduce the number of bits to be reconfigured. Some embodiments provide placement and routing programs that increase the number of groups of circuits that do not need reconfiguration at some times. Some embodiments include circuits that selectively block reconfiguration.
Modeling multi-patterning variability with statistical timing
Systems and methods for modeling multi-patterning variability with statistical timing analysis during IC fabrication are described. The method may be provided implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to define at least one source of variation in an integrated circuit design. The programming instructions further operable to model the at least one source of variation for at least two patterns in at least one level of the integrated circuit design as at least two sources of variability respectively.
System and method of testing through-silicon vias of a semiconductor die
A method includes contacting a first group of through-silicon vias (TSVs) contacts with a multi-contact probe and applying a first voltage value to each of the first group of TSV contacts via the multi-contact probe, where the first group of TSV contacts corresponds to a first group of TSVs. The method also includes determining, based on a second voltage value detected at a particular TSV of the first group of TSVs, whether the particular TSV corresponds to a TSV test result.
Register retiming technique
An electronic automation system performs register retiming on a logic design, which may be a logic design for a programmable logic integrated circuit. Register retiming is a moving or rearranging of registers across combinatorial logic in a design in order to improve a maximum operating frequency or fmax. In one implementation, the system includes machine-readable code, which may be stored on a computer-readable medium such as a disk, executing on a computer. The system balances timing in order to trade off delays between critical and noncritical paths. Register retiming may make changes to a design at a gate level.
System and method for design, procurement and manufacturing collaboration
A method for designing an electronic component includes receiving a device criteria (e.g., a parametric value, procurement value, etc.) from a designer, querying a database for devices corresponding to the device criteria, querying the database for procurement data and/or engineering data associated with the corresponding devices, presenting the devices to the designer based on the procurement data, and receiving input from the designer identifying one of the presented devices as a selected device. In a particular method, the returned devices are sorted based on one or more procurement values (e.g., manufacturer, price, availability, manufacturer status, etc.), and presented to the designer in a ranked list. Objects representative of the selected devices are then entered into a design file, and the objects are associated with the device's engineering and/or procurement data. In a particular embodiment, the objects are associated with the engineering data by embedding the engineering data in the file object. Optionally, data can be associated with the objects via links to the database. Types of engineering data that can be associated with design file objects include, but are not limited to, device footprint data, device pinout data, device physical dimension data, parametric data, and packaging data. Additionally, connection data and annotation data can be entered into the design file objects by the designer.
Method and device for increasing fin device density for unaligned fins
A method of generating a layout for a device includes receiving a first layout including a plurality of active regions, each active region of the plurality of active regions having sides. The method further includes defining a plurality of elongate mandrels that each extend in a first direction and are spaced apart from one another in a second direction perpendicular to the first direction. The method further includes for each adjacent pair of partially-parallel active regions of the plurality of active regions having a minimum distance less than a specified minimum spacing, connecting at least a portion of nearest ends of pairs of elongate mandrels, each mandrel of a pair from a different active region. The method further includes generating a second layout including a plurality of elongate mandrels in the plurality of active regions, and connective elements between active regions of at least one adjacent pair of active regions.
Method of optical proximity correction according to complexity of mask pattern
A method of optical proximity correction (OPC) includes the following steps. At first, a layout pattern is provided to a computer system. Subsequently, the layout pattern is classified into at least a first region and at least a second region. Then, several iterations of OPC calculations are performed to the layout pattern, and a total number of OPC calculations performed in the first region is substantially larger than a total number of OPC calculations performed in the second region. Afterwards, a corrected layout pattern is outputted through the computer system onto a mask.
OPC conflict identification and edge priority system
An integrated circuit verification system provides an indication of conflicts between an OPC suggested correction and a manufacturing rule. The indication specifies which edge segments are in conflict so that a user may remove the conflict to achieve a better OPC result. In another embodiment of the invention, edge segments are assigned a priority such that the correction of a lower priority edge does not hinder a desired OPC correction of a higher priority edge.
Model-based process simulation systems and methods
Systems and methods for process simulation are described. The methods may use a reference model identifying sensitivity of a reference scanner to a set of tunable parameters. Chip fabrication from a chip design may be simulated using the reference model, wherein the chip design is expressed as one or more masks. An iterative retuning and simulation process may be used to optimize critical dimension in the simulated chip and to obtain convergence of the simulated chip with an expected chip. Additionally, a designer may be provided with a set of results from which an updated chip design is created.
Customized patterning modulation and optimization
The present disclosure provides one embodiment of an integrated circuit (IC) design method. The method includes providing an IC design layout of a circuit; applying an electrical patterning (ePatterning) modification to the IC design layout according to an electrical parameter of the circuit and an optical parameter of IC design layout; and thereafter fabricating a mask according to the IC design layout.
Initiation of actions by a portable computing device from a locked state
A method and apparatus for performing an action while a portable computing device is in a locked state is disclosed. An unlock image is displayed in a first region of a touch-sensitive display. Responsive to detecting contact with the touch-sensitive display at the first region, an action image is displayed in a second region of the touch-sensitive display. While the unlock image remains stationary at the first region, movement of the contact with the touch-sensitive display is detected and a direction of movement of the contact is determined. Responsive to determining the direction of movement of the contact is towards the action image, the action image is visually modified to distinguish it from the unlock image. Responsive to the contact with the touch-sensitive display reaching the second region, an action associated with the action image is performed.
Method and system for displaying group relationships in a graphical user interface
The present invention is directed to a method and system for providing a user interface representing organization hierarchy wherein a group of entities can be displayed as a node, and the node is displayed as a part of a hierarchical chart. In various embodiments, the present invention provides a graphical user interface displaying nodes that represent groups of entities, and the nodes are displayed as a part of a hierarchical chart based on the hierarchical relationship among the nodes that represent groups of entities. In various embodiments, a user is able to select actions for a group of entities displayed on the same node. Based on various criteria, nodes displaying one group of entities may, based on user selections of different grouping criteria, display a different group of entities. There are other features as well, in the graphical interface.
Mobile client application for managing display of messages to users
A mobile phone messaging system and method for managing display of messages to mobile phone users. A mobile client application operates at user's mobile phone. Mobile content providers manage the display of messages and related interactions throughout a specific period of time (e.g., daily, weekly, bi-weekly). Phone wakeup time data and message identifying data are transmitted from a mobile content provider server to a mobile phone. The wakeup time data and message identifying data are stored in the phone. The wakeup times are also added to a registry at the phone that facilitates launching of applications at the times indicated in the registry. At the specified wakeup times, the mobile client application determines the message identifying data associated with the wakeup time, connects to the mobile content provider server, and provides the message identifying data. The provider responds with a specific message and the mobile client application displays the message.
Framed user interface
A framed user interface operating on a computer or similar system may allow a user to select certain interactive instances contained within the framed user interface. The user of the computer system may modify the framed user interface to suit individual or group preferences. The user may select the user interactive instances through the framed user interface and then the framed user interface may act on that selection. Once selected, the user interactive instance may be available in a workspace area for user manipulation. The framed user interface may allow for logical organization of various types of user instances available on a typical computer or consumer electronics platforms. It also may enable ready-availability of certain user interactive instances and instant startup by having them perennially loaded in a random access memory and executable without the need to be later launched or initiated from permanent memory.
Multi-lane time-synched visualizations of machine data events
A visualization can include a set of swim lanes, each swim lane representing information about an event type. An event type can be specified, e.g., as those events having certain keywords and/or having specified value(s) for specified field(s). The swim lane can plot when (within a time range) events of the associated event type occurred. Specifically, each such event can be assigned to a bucket having a bucket time matching the event time. A swim lane can extend along a timeline axis in the visualization, and the buckets can be positioned at a point along the axis that represents the bucket time. Thus, the visualization may indicate whether events were clustered at a point in time. Because the visualization can include a plurality of swim lanes, the visualization can further indicate how timing of events of a first type compare to timing of events of a second type.
Computing resource management in information technology systems
A computing resource management system maintains plural sessions for managing plural computing resources using an administration console. The system further maintains a management user interface on an electronic display screen of the administration console. The management user interface includes plural tabbed user interface elements, wherein each user interface element corresponds to a session for managing a computing resource via a communication link. The system dynamically refreshes the status of each computing resource in a corresponding user interface element tab in the management user interface. User interaction with a user interface element based on user input is monitored, and based on the user interaction with a user interface element, display a panel is displayed on the display for the user managing the corresponding computing resource.
Positive identification and bulk addition of custodians to a case within an electronic discovery system
Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. More specifically, embodiments relate to providing positive identification of individuals for addition, as custodians, to cases or matters within an electronic discovery system. The identification is performed simultaneously, in bulk, using disparate information related to the individuals. In this regard, individuals can be positively identified through one specific identification procedure, without having to search multiple databases to verify the identity of an individual/custodian. In addition to positively identifying custodians, the present invention provides for adding the identified custodians, simultaneously, in bulk, to a case or matter and, in some embodiments, uploading or otherwise transferring custodian profile data to the case management system/database, as need be.
Plug-ins for editing templates in a business management system
A template authoring method and system includes an application business component view that provides an interface to a user to select templates. A dialog provides a wrapper for each template to be edited by launching a server page and a host using controls provides authoring abstractions for selected authoring applications to edit the templates.
Mobile electronic communications dialog using sequenced digital images
The present disclosure provides a system and method for electronic communications dialog between a plurality of users using digital images. The user selects a template for entering a plurality of words and associated images that constitute an initial electronic message. The user then enters a plurality of words into the template corresponding to the initial electronic message. A plurality of images is selected having a direct correspondence with the plurality of words entered into the template. Each image is inserted into the template in a sequence corresponding to the initial electronic message. When the initial template is complete, the initial electronic message containing the sequenced images is sent to at least one other user.
System for collaboration of a specific image and utilizing selected annotations while viewing and relative to providing a display presentation
A system and methodology for collaborating. The system is comprised of a plurality of computing appliances, each of the computing appliances having an input apparatus providing for a respective user input of and storage of annotations input relative to and while viewing a display presentation of a specific image and each of the computing appliances having a display apparatus providing a display presentation of a specific image to be viewed by an associated respective user of the plurality of users. Logic controls communication and utilization of selected annotations in providing a display presentation. At least two of the plurality of computing appliances have input apparatus each providing annotation data responsive to the associated respective user input of annotations using the input apparatus. Memory provides associative storage of the annotation data as mapped relative to the associated respective user of the respective computing appliance providing the respective user input. For at least two of said plurality of computing appliances, the input apparatus provides for input of the annotations while the display presentation of the respective said display apparatus provides the specific image presented for viewing by the respective user while the annotations are being made by that said respective user.
Integrated display and management of data objects based on social, temporal and spatial parameters
In an embodiment, a client device receives a query that specifies social, temporal and spatial parameters relative to a set of users (e.g., a source user or source user group). The client device determines degrees to which the specified parameters are related to a group of target users in social, temporal and spatial dimensions. The client device also determines an expected availability of one or more target users for interaction (e.g., interaction via particular types of communication session types, such as voice, video, text, etc.). The client device performs a processing function on at least one data object associated with the group of target users based on (i) whether the determined degrees of relation satisfy the specified parameters of the query, and (ii) the expected availability of the one or more target users in the group of target users.
Server apparatus, method, program and integrated circuit, for controlling user interface display
A server apparatus of the present invention extracts the second client apparatus cooperable with the first client apparatus and transmits an instruction to the second client apparatus to launch a user interface, based on a user interface request from the first client apparatus, and transmits an instruction to the second client apparatus to display the user interface, based on a cooperation request from the first client apparatus, and thereby the first client apparatus and the second client apparatus cooperate with each other to allow an operation of the server apparatus in a short time after a cooperation request for causing the first client apparatus operated by a user and the second client apparatus different from the first client apparatus to cooperate with each other.
Configurable workflow editor for multimedia editing systems and methods therefor
A distributed system and methods for web-based multimedia content (MMC) including a global media hub (GMH) server computer (500) and a multiplicity of remote media asset node (MAN) server computers (510, 520, 530, 540, 550) and client terminals (515, 525, 535, 536, 537, 545, 555) for network-based coupling to the MAN for editing the MMC; the GMH includes a processing component, memory for storage of all metadata, and includes software operable thereon for orchestrating the processes that act on the MMC and metadata, and further includes a configurable workflow editor module having a messaging events function for notifying the user of the occurrence of user-predetermined at least one trigger event(s) within workflows through the system.
System and method for handling a data refresh procedure in a production execution system
A system for handling a data refresh procedure in a production execution system includes a network having data processing units running a MES software for controlling and monitoring a production process operating production components. A production modeler within the MES software defines a business logic that includes a plant model of the production process and the operating procedures for the production components in a graphical environment. A client application builder within the MES software provides a WEB based graphical user interface for generating cross-functionality graphic screens that form part of the network as presentation clients and display data stemming from the production components and being manipulated by the production modeler, where required. The production modeler defines a presentation logic operating the cross-functionality graphic screens, and updates the data at the presentation clients exclusively when the business logic requires the update to the presentation logic.
Creation of a reference point to mark a media presentation
Methods, systems, and products insert markers into recorded media modules. A pair of reference points is received that marks a position and another position in a recorded media module. A copy of the recorded media module is retrieved from memory. Portions of the copy of the recorded media module occurring before the position, and occurring after the another position, are discarded. The copy of the recorded media module occurring between the position and the another position is then presented to a user.
Method and apparatus for navigating a media program via a histogram of popular segments
A method and apparatus for navigating a media program is disclosed. Viewing data for segments of the media program are monitored and used to compile statistics that are presented to the user in a histogram, so that popular portions of the media program can be identified and navigated to. One embodiment includes a searchable transcript of the media program that is synchronized with the histogram.
Method and apparatus for embedding media programs having custom user selectable thumbnails
A method and apparatus for embedding a media program with a randomly user selected thumbnail is disclosed. The user can scan a media program to identify one of a plurality of media program frames, select the frame of interest, then designate it as the thumbnail to use in connection with the embedded media program.
Interactive digital experience for a literary work
An interactive digital experience for a literary work is described. An embodiment describes a method which provides an interactive service, such as a website or mobile application, to a user. As the user interacts with the service which is related to a literary work, they navigate along a storyline within the service which corresponds to the storyline within the literary work and the user's position along that storyline is stored. Within the service, the user generates elements of user generated content and each element of user generated content which is created is stored with a position reference specifying a position of the user when that element was created. User generated content which was generated by one or more other users of the service is displayed to the user; however content which was generated by any user at a position beyond the user's stored position along the storyline is not displayed.
Systems and methods for integrated application platforms
Systems and methods for integrated application platforms in accordance with embodiments of the invention are disclosed. In one embodiment, a computing device configured to execute an application platform application includes a processor, an operating system configuring the processor to create a computing environment, the application platform application at least partially natively implemented and creates an application runtime environment for cross-platform applications to execute non-natively, the application platform application including a rendering engine process configured to render pages by interpreting instructions and implement a virtual machine configured to execute instructions and an integration process that enables instructions executing within the virtual machine to launch natively implemented applications wherein the application platform application includes a pop up page file containing instructions written in the rendering language that cause the rendering engine process to render a pop up page and wherein the application platform application is configured to launch a natively implemented application.
Automatic detection of item lists within a web page
Embodiments of the invention relate to detecting items lists. In one embodiment, a web browsing interaction history of a user associated with a given web page is analyzed. The web browsing interaction history indicates that the user interacted with at least one element of the web page. A document object model (DOM) of the given web page is constructed. A node within the DOM corresponding to the element in the web page is identified based on analyzing the web browsing interaction history. An ancestor node of the node that corresponds to an item list within the web page comprising the element is identified based on at least a distribution of child tags of the ancestor node.
Apparatus, system and method for selecting a media enhancement
Client application for identification of updates in selected network pages
A client software application that enables identification of updates in well-formatted as well as not-well-formatted network pages, where the pages' items and fields may be selected by a user. The client application comprises: a user interface, business logic, and a database. The client application distinguishes between news channels (NC) pages that are constructed as a data list and content modification channels (CMC). The client application allows the user to create templates where those templates define the parts of the items in the page that will be checked for updates by the application.
Mode identification for selective document content presentation
Methods and apparatuses that identify one of a plurality of modes from a web page associated with a document received at a browser are described. An identified mode may correspond to a user interface configuration. A portion of content may be extracted from the document for a presentation configured by the user interface configuration. A presentation of the extracted content may be displayed on a display screen while excluding a reset of the document without displaying the web page.
Systems and methods for multiple column sorting and locking
Certain examples provide a computer-implemented method. The method includes displaying, at an initial position, a first entry of a plurality of entries of a table. The method includes displaying a first indicator to indicate that the first entry has been assigned from a set of unlocked entries to a set of locked entries, and that the first entry is assigned to a first lock position. The method includes sorting the plurality of entries to determine a first sort order including a first sort position of the first entry that is different from the first lock position. The method includes displaying the set of unlocked entries according to the first sort order and displaying the first entry at the first lock position.
System and method for obtaining a structured address by geocoding unstructured address information
A system and machine-implemented method for populating an electronic form is provided. A command for pasting a string of unstructured data into one of several fields of a structured address form is detected. The string of unstructured data is geocoded to obtain a geolocation. The geolocation is reverse-geocoded to obtain structured address data. Each of the several fields of the structured address form is populated with a corresponding field from the structured address data.
Soft output Viterbi algorithm method and decoder
A method of decoding a block with a Soft Output Viterbi Algorithm (SOVA) using a trellis representation and a sliding window wherein each position of the sliding window has a path determination stage at one end of the sliding window and a symbol decision stage at another end of the sliding window is disclosed. The method comprises determining, for each path determination stage and for each node of the path determination stage, a surviving path (including a surviving path input symbol and a surviving decision stage node) and a concurrent path (including a concurrent path input symbol and a concurrent decision stage node) based on path metrics. A path metric disparity value is calculated and stored for each node. Based on decision criteria, a soft output value of the surviving decision stage node is determined as either of the path metric disparity value of the node of the path determination stage, a function of the path metric disparity value of the node of the path determination stage and the stored path metric disparity value of the concurrent decision stage node, and the stored path metric disparity value of the surviving decision stage node. Corresponding computer program product, decoder and communication apparatus are also disclosed.
Rate matching and de-rate matching on digital signal processors
Provided are systems and methods for rate matching and de-rate matching on digital signal processors. For example, there is a system for rate matching and de-rate matching, where the system includes a memory configured to contain a plurality of blocks of data, and a digital signal processor configured to pre-compute permutation parameters common to the plurality of blocks, wherein the plurality of blocks are subject to a set of given puncturing parameters. The digital signal processor is configured to process each block in the plurality of blocks by computing a block signature from pre-computed puncturing thresholds, matching the block signature to one of a set of pre-computed zone signatures, deriving a zone index corresponding to the one matched pre-computed zone signature, and applying pre-computed permutation and puncturing transformations corresponding to the zone index to the block.
Method for controlling message-passing algorithm based decoding operation by referring to statistics data of syndromes of executed iterations and related control apparatus thereof
A method for controlling a message-passing algorithm (MPA) based decoding operation includes: gathering statistics data of syndromes obtained from executed iterations; and selectively adjusting a decoding operation in a next iteration to be executed according to the statistics data. A control apparatus for controlling an MPA based decoder includes an adjusting circuit and a detecting circuit. The detecting circuit is coupled to the adjusting circuit, and used for gathering statistics data of syndromes obtained from executed iterations, and selectively controlling the adjusting circuit to adjust a decoding operation in a next iteration to be executed according to the statistics data.
Semiconductor memory device and data processing method thereof
Provided is a data processing method in a semiconductor memory device. The data processing method arranges data, which is to be programmed in a row and column of a nonvolatile memory device, in a row or column direction. The data processing method encodes the programmed data into a modulation code in the row or column direction such that adjacent pairs of memory cells of the nonvolatile memory device are prevented from being programmed into first and second states.
Data recovery using additional error correction coding data
A method in a data storage device including a memory and an error correction coding (ECC) engine. A first ECC page including a data block and first main ECC data is stored to the memory. The first main ECC data is usable by the ECC engine to correct errors in the first ECC page. A second ECC page including first additional ECC data is also stored to the memory. The first additional ECC data is usable by the ECC engine to correct errors in a single sub-block of multiple sub-blocks within the data block.
Controller to execute error correcting code algorithms and manage NAND memories
A single virtualized ECC NAND controller executes an ECC algorithm and manages a stack of NAND flash memories. The virtualized ECC NAND controller allows the host processor to drive the stack of flash memory devices as a single NAND chip while the controller redirects the data to the selected NAND memory device in the stack.
Data transfer device and control method of data transfer device
A data transfer device includes a data transmitting circuit includes an error detection code generating unit generating an error detection code for detecting an error in the data, and a transmission unit transmitting the data and the error detection code together with retransmit enable information representing that corresponding data transmitted before the former data or transmitted next can be retransmitted, the data receiving circuit includes a reception unit receiving the transmitted data, the transmitted error detection code and the transmitted retransmit enable information, an error detection unit detecting the error in the received data based on the error detection code, an error data retaining unit retaining the data in which an error is detected when the reception unit receives the retransmit enable information, and an error data comparing unit that comparing the error detected data retained in the error data retaining unit with corresponding data that is retransmitted.
Systems and methods for providing unequal error protection code design from probabilistically fixed composition codes
A method of encoding that uses standard codecs such as linear encoders and decoders for encoding and decoding data with different levels of robustness to errors is described. In one configuration, multiple encoders may be utilized, and one of the encoders may use a standard encoder such as a turbo code followed by a nonlinearity that creates an unequal distribution of ones and zeros in a binary representation of the code. In another configuration, a coder may be utilized that represents message outputs as “channels” that create state transitions (or symbol errors) in a data forward error correction coder.
Transmission controlling method, sender apparatus and receiver apparatus for wireless communication system
In a wireless communication system, a sender apparatus sends a data block, for each of a plurality of stream data, with data block identification information, which does not conflict between stream data, annexed, and a reception apparatus performs a re-sending synthesis process for a data block received already and a re-sending data block to which the same data block identification information is individually annexed based on the data block identification information annexed to the received data block. Consequently, also in a case wherein the number of transmission streams between the sender apparatus and the reception apparatus is varied (reduced), the matching property of the data block which is a re-sending synthesis target can be maintained and communication can be continued normally.
Automatic and on-demand testing of non-volatile storage devices
Systems and methods for testing non-volatile storage devices are disclosed that provide functionality to control when testing of the non-volatile storage device is performed. In one embodiment, information stored in persistent memory indicates whether testing is enabled or disabled. For example, the testing information may indicate that testing is to be performed upon a first initialization of a non-volatile storage device, but not in connection with subsequent power-up events. Furthermore, functionality is disclosed for re-running and/or bypassing testing of the non-volatile storage device.
Systems and methods for fetching troubleshooting data
A computer-implemented method for fetching troubleshooting data may include 1) receiving a request for information describing at least one potential cause of a failure within a computing environment, and, in response to the request, 2) identifying a set of relationships between a plurality of subsystems within the computing environment, 3) identifying a plurality of potential causes of the failure based on the set of relationships, and 4) responding to the request by providing the plurality of potential causes of the failure. Various other methods, systems, and computer-readable media are also disclosed.
Control system for driving a data processing apparatus
A data processing system for performing stuck-at control includes system boards that process data, a crossbar unit having control units to control communication between each system board, and a system controller without causing an availability ratio of a computer system to fall. When a control unit fails, the crossbar unit sends, among IDs uniquely attached to each system board, the ID of each system board under the control of the failed control unit to the system controller. The system controller determines to which of partitions that logically divide a system each system board corresponding to the ID received from the crossbar unit belongs and sends a stop command to stop driving of each system board belonging to the determined partition.
Self-service terminal remote fix
A self-service device for implementing automated fault resolution is provided. The self-service device may include a memory module for storing self-service device fault data. The self-service device may include a computational module for analyzing the self-service device fault data and for selecting an automated fault resolution subroutine to correct the fault condition. The self-service device may also include a monitoring module for determining whether a customer transaction is ongoing. And, if a customer transaction is not ongoing, the computational module may instruct the self-service device to initiate the selected fault resolution subroutine.
Supporting detection of failure event
In a mechanism for supporting detection of a failure event, history information of a system including log information of the system including plural components and/or failure information output from each component upon occurrence of a failure in the system is collected. A detection rule for detecting an event included in a component related to the failure that has occurred is generated, and a symptom with additional information added to the generated detection rule is applied to detect the event that has caused the failure. System configuration information as configuration information of the system is acquired, and from the acquired system configuration information, partial configuration information as system configuration information related to the component that sent out the event the selection of which has been accepted is extracted. The extracted partial configuration information is added to the symptom to update the symptom.
High availability using full memory replication between virtual machine instances on a network device
Techniques are described for providing high availability for a network device, e.g., a router, using full memory replication between a primary virtual machine (VM) and a standby VM running on the network device. In one example, the techniques provide hot-standby high availability for a router by initializing a primary VM and a standby VM on the router at the same time. In another example, the techniques provide high availability for the router by initializing a standby VM on the router upon detecting a failure of the primary VM. In both examples, the primary VM controls the routing functionality and periodically stores a full memory state. Upon a failure of the primary VM, a hypervisor may perform a full memory replication between the primary VM and the standby VM. The standby VM may then take control of the routing functionality at the last stored state of the memory.
LPAR creation and repair for automated error recovery
Various embodiments for automated error recovery in a computing storage environment by a processor device are provided. In one embodiment, if a failure is caused by an operation of a hardware management console (HMC) and a malfunction of a current network connection, a cleanup operation is performed on at least a portion of a current HMC configuration, an alternative network connection to the current network connection is made, and a retry operation is performed.
Methods and apparatuses including a global timing generator and local control circuits
Apparatus and methods are disclosed, such as a global timing generator coupled to local control circuits. Each local control circuit can control programming and reading of a memory element in a tile of memory elements in an array responsive to a timing signal(s) from the global timing generator. Additional apparatus and methods are described.
Skew management in an interconnection system
An interconnection system is described where data lanes may be exchanged between lines at intervals along a transmission path so that the differential time delay between bits on a plurality of the lines is reduced when determined at a receiving location. The data lanes may be bound to the lines through the operation of a configurable switch, or by a configurable switch in conjunction with predetermined manufactured connections, or a combination of the techniques. The wiring of a connectorized node module, which may include a memory device, may be configured so that the differential time delay between pairs of input lines of a node, as measured at the output of a node, is reduced.
Method and a device for controlling a clock signal generator
A device for controlling a clock signal generator includes a processor (101) for forming at least two mutually different control quantities on the basis of reception moments of timing messages such as time stamps, where the reception moments are expressed as time values based on a first clock signal and the timing messages are transmitted in accordance with a second clock signal. The processor also calculates a weighted sum of the control quantities, and controls the clock signal generator with the weighted sum so as to synchronize the first clock signal and the second clock signal. The control quantities may represent, for example, a filtered value of observed phase-errors, a phase-error corresponding to a minimum observed transfer delay, and phase-errors corresponding to a given portion of the delay distribution. Using the weighted sum of the mutually different control quantities improves the utilization of the information content of the timing messages.
Method and apparatus for generating a clock signal and for controlling a clock frequency using the same
A method and a device for generating a clock signal determine a number of pulses to be discarded from each predetermined cycle of a reference clock signal in order to obtain, on average, a target frequency. A masking pattern is created for discarding the number of pulses to be discarded from each predetermined cycle of the reference clock signal. The clock signal, which includes the target frequency, is generated by discarding the number of pulses from the reference clock signal using the masking pattern.
Platform communication protocol
A host chipset heartbeat may be utilized, in some embodiments, to handle interrupts from external devices on a power efficient basis. The availability of the host chipset heartbeat may be signaled to external devices and those external devices may time their activities to a period of time when not only are resources available, but the assertion of the activity is advantageous because the host chipset is already transitioning from a lower power consumption state.
Image processing apparatus and control method thereof
Disclosed is an image processing apparatus, which can differently set a clock ratio according to a use rate of a CPU, and a control method thereof. The image processing apparatus may include a receiver to receive a print command from a user terminal, and a controller to differently set a clock ratio according to a use rate of the CPU based on the print command.
Interface connection control based on voltage at input rail
Embodiments herein relate to controlling a connection to an interface. In an embodiment, a protection circuit is to detect a voltage at an input rail of a regulator, where the regulator is to provide power to a peripheral device via an interface. Next, the protection circuit is to compare the detected voltage to a reference voltage. Then, the protection circuit is to generate a detection signal based on the comparison. Lastly, the protection circuit is to disable a connection between the regulator and the interface based on the detection signal.
System and method for creating and dynamically maintaining system power inventories
In accordance with the present disclosure, a system and method for creating and dynamically maintaining power inventories of an information handling system is presented. A system for creating and dynamically maintaining power inventories of an information handling system may include a memory and a processor. The processor may be operable to generate power inventories for the information handling system and save the power inventories in the memory. Each of the power inventories may correspond to one of the power states of the information handling system. The processor may also be operable to dynamically update each of the saved power inventories in response to changes in the information handling system.
Systems and methods for reducing static and total power consumption in programmable logic device architectures
A method and system for reducing power consumption in a programmable logic device (PLD) is provided. The power consumption may be reduced by preferably continually considering power consumption as a factor in circuit design during the synthesis, placement, routing, and period following routing of the programmable logic device.
Enforcing and complying with a computing device power policy
A computing device configured for enforcing a computing device power policy is described. The computing device includes a processor and executable instructions stored in memory that is in electronic communication with the processor. The computing device generates a power policy. The computing device also sends the power policy. The computing device further receives a suspicious process alert. Additionally, the computing device determines whether to terminate a suspicious process. The computing device also sends a process termination command if it is determined to terminate the suspicious process.
Method of and apparatus for energy savings associated with a graphics core
A method includes executing a workload on a graphics (GFX) core in a first mode the GFX core comprising a plurality of Subslices wherein each of the plurality of Subslices dissipates power. The method further includes calculating a number of clock cycles, Tfirst mode, required for the GFX core to perform the workload in the first mode during a first decision window comprising a plurality of clock cycles and calculating a number of clock cycles, Tsecond mode, required for the GFX core to perform the workload in a second mode during the first decision window wherein the second mode comprises executing the workload with fewer of the plurality of Subslices receiving power than when executing the workload in the first mode. It is then determined, based in part upon Tfirst mode and Tsecond mode, if an energy savings is possible by transitioning the GFX core to the second mode.
Power switch control circuitry isolating or coupling a system power bus of a computer based on a result state of a logical operation
Electronic circuits and methods are provided for conserving power within computers and other apparatus. A logic circuit performs a logical operation on a plurality of variables thus deriving a corresponding output. The output is used to drive and maintain an open or closed state of an electronic switch, accordingly. The electronic switch is disposed between a source of electrical energy and a system power buss of a computer. The computer can assume very low power, full power and other respective operating modes in accordance with the present state of the electronic switch.
Power matching system
A power matching system is applied to a central processing unit (CPU) power supply, which includes a power control chip to regulate the frequency of the signal applied to the CPU power supply. The power control chip includes a detecting pin. The power matching system includes a control unit and a control circuit. The control unit includes a platform controller hub (PCH) to obtain information concerning a CPU, a basic input output system (BIOS) to obtain a power rating of the CPU, and an integrated baseboard management controller (IBMC) to output a required signal to the control circuit according to the power rating established. The power control chip receives the required signal from the control circuit and regulates the frequency of the signal applied to the CPU power supply.
Operating system independent network event handling
Methods and apparatuses for re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a wake state to a sleep state. A network event received by the computing device while in a sleep state may be handled by the firmware environment independent of the operating system and without returning the entire computing device to the wake state.
Data storage system with power management and method of operation thereof
A method of operation of a data storage system includes: providing a standby power source; detecting activity on a communication channel with an upstream re-driver powered with the standby power source; generating a signal-detect output from the upstream re-driver based on the activity; determining a link status with a power control unit based on the signal-detect output, the power control unit powered with the standby power source; and generating a power output from a power supply unit based on the link status, the power supply unit controlled by the power control unit.
Power reduction circuits and methods
An integrated circuit device may include a plurality of external connections, any one of the connections providing both a power voltage path for the integrated circuit (IC) as well as an information signal path for the IC. At least one switch may be coupled to provide a power supply voltage to one of the external connections.
Systems and methods for asymmetrical performance multi-processors
Systems, methods and media for allocating processing functions between a primary processor and a secondary processor are disclosed. In one embodiment, a primary processor performs routine processing duties, including execution of application program code, while the secondary processor is in a sleep state. When the load on the primary processor is deemed to be excessive, the secondary processor is awakened from a sleep state and assigned to perform processing functions that would otherwise need to be performed by the primary processor. If temperatures in the system rise above a threshold, the secondary processor is returned to the sleep state.
Method and system for contained cryptographic separation
To provide for cryptographic separation, embodiments of the invention employ containment mechanisms provided by trusted operating systems to ensure that plaintext data which must be encrypted in accordance with a security policy (or, in reverse, ciphertext data which is to be decrypted) is processed by a suitable encryption routine before being sent onwards for transmission, storage, or the like. Such containment mechanisms usually include mandatory system access control rules which specify to which system resources the output of a system resource (such as an application) may be supplied. By specifying a suitable set of such rules, mandatory encryption can be enforced at the operating system kernel level.
Securely recovering a computing device
A method and an apparatus for establishing an operating environment by certifying a code image received from a host over a communication link are described. The code image may be digitally signed through a central authority server. Certification of the code image may be determined by a fingerprint embedded within a secure storage area such as a ROM (read only memory) of the portable device based on a public key certification process. A certified code image may be assigned a hash signature to be stored in a storage of the portable device. An operating environment of the portable device may be established after executing the certified code.
Device side host integrity validation
Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime.
Time-based function back-off
An embodiment generally relates to a method of increasing user convenience. The method includes displaying a log-in user interface and receiving an authentication attempt in the log-in user interface. The method also includes determining a status of the authentication attempt and delaying a completion of an authentication attempt by a time-based function in response to a status being a failed authentication attempt.
Management and security of personal information
Methods, systems, and computer readable media are provided for managing and securing personal information. Personal information is stored in a central repository (personal information store) for a given personal information owner. As personal information is changed, the owner of the personal information may access the personal information store to update information stored therein. Access codes may be established for all personal information, and the use of the codes may be restricted by application of one or more rules or permissions applied to the information requesters. Alternatively, special access codes may be established for one or more pieces or combination of pieces of personal information data contained in the personal information store. Upon request or requirement for personal information, information requesters may be provided one or more access codes to allow the information requester to receive only that personal information for which they are authorized. Encrypted keys may be provided from the personal information store to information requesters instead of financial information or address information for a given personal information owner. Use of the encrypted address keys allows an information requester process a transaction or to contact a personal information owner without receiving actual financial information or contact information for the personal information owner.
Method and system for robust watermark insertion and extraction for digital set-top boxes
Methods and systems for robust watermark insertion and extraction for digital set-top boxes are disclosed and may include descrambling, detecting watermarking messages in a received video signal utilizing a watermark message parser, and immediately watermarking the descrambled video signal utilizing an embedded CPU. The embedded CPU may utilize code that may be signed by an authorized key, encrypted externally to the chip, decrypted, and stored in memory in a region off-limits to other processors. The video signal may be watermarked in a decompressed domain. The enabling of the watermarking may be verified utilizing a watchdog timer. The descriptors corresponding to the watermarking may be stored in memory that may be inaccessible by the main CPU. The watermark may comprise unique identifier data specific to the chip and a time stamp, and may be encrypted utilizing an on-chip combinatorial function.
Cooperation method and system of hardware secure units, and application device
The present invention provides a cooperation method of a mobile hardware secure unit and a fixed hardware secure unit, comprising: providing user's identification information of a mobile hardware secure unit; providing platform's identification information of a computer-based or other-device-based fixed hardware secure unit; establishing a bidirectional communication pipe between the mobile and fixed hardware secure unit; and binding the mobile and fixed hardware secure units through interaction of the user's identification information and the platform's identification information. The present invention further provides a cooperation system of a mobile hardware secure unit and a fixed hardware secure unit as well as a computer device, with which the security solution based on a fixed hardware secure unit can be combined with a mobile hardware secure unit securing a user's identity.
Systems and methods for maintaining data security across multiple active domains
Systems and methods for maintaining data security across multiple active domains are presented. Each domain includes a token generator that can generate tokens associated with sensitive data such as credit card numbers. The primary domain includes a centralized key manager. In one embodiment, each domain includes its own local data vault and a replica of each data vault associated with every remote domain. Any domain can access the data vaults (local and replica) and retrieve a token created by any other domain. The possibility of token collision is eliminated by a token generation algorithm that embeds a domain designator corresponding to the active domain where the token was created. When multiple tokens represent the same sensitive data, the token manager returns a set of all such tokens found in the data vaults.
Server-side security for untrusted clients using directory hiding
A security mechanism provided by a server protects files in data storage from untrusted clients. In one embodiment, the server generates a filename in response to a request from a client for creating a filename. The filename is associated with a file to be stored in the data storage managed by the server. The server manages a directory that contains the filename, and hides the directory contents from the client. The client is granted access to the file when the client provides the filename associated with the file.
Position based enhanced security of wireless communications
The convenience of a wireless network is tempered by the concern that a rogue device can listen in on the wireless communications. Determining the position of the home device and other devices within range allows the user of the home device to choose the specific wireless devices with which to communicate. The distance to the other devices within wireless communications range is helpful and allows the user to sort between safe and unsafe or rogue devices. Distance can be determined by a variety of methods including use of trusted references, signal strength, and error rate. Once the safe device is selected, the system will then establish a communications path with that device.
Method and system for securing electronic data
The various embodiments herein provide a method for securing electronic data using an automatic key management technique to manage cryptographic keys. The method for securing electronic data comprises providing a data to a writer module, embedding a data usage policy, encrypting the data through a symmetric key encryption, creating a secure data file format for the data, accessing the secure data file format through a reader module, checking for a data file usage policy, dynamically updating the data file usage policy, if there is a change in the file usage policy on an application server, authenticating a user as per the file usage policy, decrypting the secure data file format, invoking one or more adapters and enforcing the data file usage policy. The secure data file format herein comprises data encrypted with a layered structure, instructions for computation of keys along with randomized data and instructions for de-randomizing of data.
Method for authenticating low performance device
The present invention relate to a method for authenticating a low performance device, and more particularly, to a device authenticating method, in which a low performance device such as a smart meter of a smart grid is authenticated in a matrix operation instead of an exponential operation through a homomorphic hash function (HHF) of a non-square matrix M, so that the amount of operations required for authenticating the device can be reduced and the device can be safely authenticated even without a separate certificate authority.
Protected authorization for untrusted clients
One or more techniques and/or systems are provided for securely authorizing a client to consume data and/or services from a service provider server while mitigating burdensome requests made to a validation server. That is, validation data provided to a client from a validation server may be maintained on the client and at least some of that validation data can be used to subsequently authorize the client when the client attempts to consume data and/or services from the service provider server (e.g., download a song). However, the validation data is maintained on the client and/or provided to the service provider server in a manner that inhibits user tampering. In this manner, numerous requests for validation of the client need not be made from the service provider server to the validation server when a client requests content from the service provider server, while also inhibiting unauthorized consumptions of data by the client.
System and method for automatic configuration of portal composite applications
The present invention is directed to the automatic configuration of portal composite applications. A method for automatic configuration of a portal composite application including a portal composite application infrastructure, wherein configuration parameters are managed within a composite application interface of the portal, which interface defines a runtime behavior of instances of the composite application within a predetermined range of variability, and wherein each parameter defines a respective point of variability, includes: storing a collection of parameter values for each of the points of variability; defining a functional component cooperating with the composite application and having read access to the collection of parameter values; invoking the functional component after or at instantiation time of the composite application, yielding a configuration parameter value; including the configuration parameter value into a control for an instance of the composite application; and automatically configuring the instance of the composite application with the included configuration parameter value.
Method and system for hash key memory footprint reduction
A system and method are disclosed for storing data in a hash table. The method includes receiving data, determining a location identifier for the data wherein the location identifier identifies a location in the hash table for storing the data and the location identifier is derived from the data, compressing the data by extracting the location identifier; and storing the compressed data in the identified location of the hash table.
Memory management method, memory management apparatus and NUMA system
Embodiments of the present invention provide a memory management method, a memory management apparatus and a NUMA system. The memory management method includes: determining, according to a memory demand information which includes memory demand information sent by a processor, whether a memory controller meeting the memory demand information exists in a local processing node which the processor; and if exists, determining, in the memory controller meeting the memory demand information, a memory management area meeting the memory demand information, and allocating the memory management area meeting the memory demand information to the processor. Therefore, the memory controller and the memory management area do not need to be determined in a processing node that does not meet the requirements, which can rapidly find a storing area meeting the requirements, and improve the memory allocation efficiency.
Memory allocation in a multi-node computer
Evaluating memory allocation in a multi-node computer including calculating, in dependence upon a normalized measure of page frame demand, a weighted coefficient of memory affinity, the weighted coefficient representing desirability of allocating memory from the node, and allocating memory may include allocating memory in dependence upon the weighted coefficient of memory affinity.
Mass-storage system utilizing auxiliary solid-state storage subsystem
A mass storage system including main and auxiliary storage subsystems and a controller Main storage provides physical storage space and includes non-solid-state storage devices (“NSSDs”) NSSDs provide physical locations, and main storage includes physical storage locations provided by NSSDs Controller is coupled to main storage and may be configured for mapping logical addresses to physical locations, giving rise to a logical storage space The auxiliary subsystem includes a solid-state data retention device (“SSDRD”) capable of permanently storing data and provides a physical location, giving rise to auxiliary space Controller is coupled to the auxiliary subsystem and may override a mapping of logical addresses to physical locations, with a mapping of logical address to physical locations within the auxiliary space, overriding physical storage locations Controller is adapted for loading a snapshot of the data currently stored in the overridden physical storage locations.
Mirroring splitter meta data
A method, system and computer program product for data replication comprising receiving an IO at a first storage processor (SP), sending metadata corresponding to the IO to a second SP, receiving an acknowledgement from the second SP indicating the second SP received the metadata and send the IO down an IO stack.
Method and apparatus for sending data from multiple sources over a communications bus
In a memory system, multiple memory modules communicate over a bus. Each memory module may include a hub and at least one memory storage unit. The hub receives local data from the memory storage units, and downstream data from one or more other memory modules. The hub assembles data to be sent over the bus within a data block structure, which is divided into multiple lanes. An indication is made of where, within the data block structure, a breakpoint will occur in the data being placed on the bus by a first source (e.g., the local or downstream data). Based on the indication, data from a second source (e.g., the downstream or local data) is placed in the remainder of the data block, thus reducing gaps on the bus. Additional apparatus, systems, and methods are disclosed.
Logic verifying apparatus, and computer-readable recording medium in which logic verifying program is stored
A logic verifying apparatus includes a second processor corresponding to a first processor to be verified; and one or more second controllers corresponding to first controllers to be verified, the number of which is less than that of the first controllers, control a second access to a memory, the access being made by the second processor, the second processor and the second controllers serving as elements in the verification model. The second processor includes a storing unit that stores information that assigns one or more of the second controllers that is to be used as the verification model; and a converting unit that converts a first address into a second address, the first address indicating an entity that the second processor is to access through the one second controller assigned by the information stored in the storing unit such that the second processor access to the memory.
Forward progress mechanism for stores in the presence of load contention in a system favoring loads by state alteration
A multiprocessor data processing system includes a plurality of cache memories including a cache memory. The cache memory issues a read-type operation for a target cache line. While waiting for receipt of the target cache line, the cache memory monitors to detect a competing store-type operation for the target cache line. In response to receiving the target cache line, the cache memory installs the target cache line in the cache memory, and sets a coherency state of the target cache line installed in the cache memory based on whether the competing store-type operation is detected.
Methods and apparatuses for improving speculation success in processors
Methods and apparatuses are disclosed for improving speculation success in processors. In some embodiments, the method may include executing a plurality of threads of program code, the plurality of threads comprising a first speculative load request, setting an indicator bit corresponding to a cache line in response to the first speculative load request, and in the event that a second speculative load request from the plurality of threads refers to a first cache line with the indicator bit set, determining if a second cache line is available.
Flash storage device with read cache
A flash storage device includes a first memory, a flash memory comprising a plurality of physical blocks, each of the plurality of physical blocks comprising a plurality of physical pages, and a controller. The controller is configured to store, in the first memory, copies of data read from the flash memory, map a logical address in a read request received from a host system to a virtual unit address and a virtual page address, and check a virtual unit cache tag table stored in the first memory based on the virtual unit address. If a hit is found in the virtual unit cache tag table, a virtual page cache tag sub-table stored in the first memory is checked based on the virtual page address, wherein the virtual page cache tag sub-table is associated with the virtual unit address. If a hit is found in the virtual page cache tag sub-table, data stored in the first memory mapped to the hit in the virtual page cache tag sub-table is read in response to the read request received from the host system.
Cache set replacement order based on temporal set recording
A technique is provided for cache management of a cache. The processing circuit determines a miss count and a hit position field during a previous execution of an instruction requesting that a data element be stored in a cache. The miss count and the hit position field are stored for a data element corresponding to an instruction that requests storage of the data element. The processing circuit places the data element in a hierarchical order based on the miss count and/or the hit position field. The hit position field includes a hierarchical position related to the data element in the cache.
Nandflash controller and data transmission method with Nandflash controller
A Not and Flash (Nandflash) controller and a data transmission method with the Nandflash controller are provided. The Nandflash controller includes a parameter configuration device, configured to receive an operation command from outside, wherein the operation command indicates a current transmission type, number of times needed for transmitting data, size of which is same as that of a buffer in the Nandflash, and command parameters used by each execution; a transmission controlling device, configured to transmit data of a precoded size to/from the Nandflash during each data transmission according to the current transmission type and the command parameters used by this execution the number of times indicated by the operation command. The controller and method advantageously avoid configuring a command for the next operation each time the data of the precoded size is transmitted, save time and clock resources, and greatly improves transmission efficiency.
Load store unit with load miss result buffer
A load/store unit with an outstanding load miss buffer and a load miss result buffer is configured to read data from a memory system having a level one cache. Missed load instructions are stored in the outstanding load miss buffer. The load/store unit retrieves data for multiple dependent missed load instructions using a single cache access and stores the data in the load miss result buffer. When missed load instructions are reissued from the outstanding load miss buffer, data for the missed load instructions are read from the load miss result buffer rather than the level one cache. Because the data is stored in the load miss result buffer, other instructions that may change the data in level one cache do not cause data hazards with the missed load instructions.
Information processing device, memory access control device, and address generation method thereof
An information processing device according to the present invention includes an operation unit that outputs an access request, a storage unit including a plurality of connection ports and a plurality of memories capable of a simultaneous parallel process that has an access unit of a plurality of word lengths for the connection ports, and a memory access control unit that distributes a plurality access addresses corresponding to the access request received for each processing cycle from the operation unit, and generates an address in a port including a discontinuous word by one access unit for each of the connection ports.
Multi-serial interface stacked-die memory architecture
Systems and methods disclosed herein substantially concurrently transfer a plurality of streams of commands, addresses, and/or data across a corresponding plurality of serialized communication link interfaces (SCLIs) between one or more originating devices or destination devices such as a processor and a switch. At the switch, one or more commands, addresses, or data corresponding to each stream can be transferred to a corresponding destination memory vault controller (MVC) associated with a corresponding memory vault. The destination MVC can perform write operations, read operations, and/or memory vault housekeeping operations independently from concurrent operations associated with other MVCs coupled to a corresponding plurality of memory vaults.
Data storage device with integrated DNA storage media
An integral digital memory storage device having a standard form factor to be received by and communicating with a computing device and having memory capability for storage of digital data. An integral multiwell DNA sample tray is carried in a body of the memory storage device for protection and exposed by manipulation of the case for receiving DNA samples.
Storage subsystem that connects fibre channel and supports online backup
The storage system includes first and second disk arrays. The first disk array has a first port coupled to a second port of the second disk array, a port controller controlling the first port, a plurality of disk devices to store data, and a controller managing a plurality of logical units on the plurality of disk drives. The first port controller controls the first port so as to execute, in a time-sharing manner, data transfer corresponding to a initiator task and data transfer corresponding to a target task. The initiator task is generated to execute the data transfer from a first logical unit on the plurality of disk drives of the first disk array to a second logical unit on a plurality of disk drives of the second disk array. The target task is generated to execute the data transfer to receive data from the second disk array.
Dynamic storage hierarchy management
A data block may be moved between a first medium and a second medium. The movement of the data block involves measuring the access characteristic of the data block as the data block is stored on the first medium. The performance characteristics of the first medium and the second medium are then determined, in which each performance characteristic has a static performance characteristic component and a dynamic performance characteristic component. Alternatively or concurrently, the static performance characteristic components of the first medium and the second medium may be compared, and the dynamic performance characteristic components of the first medium and the second medium are compared. Accordingly, the data block is moved from the first medium to the second medium when at least one of these comparisons indicate that the second medium is more suitable for storing the data block having the access characteristic than the first medium.
Semiconductor integrated circuit and method of controlling memory
According to one embodiment, a semiconductor integrated circuit device includes a non-volatile memory, a storing module, and a processing module. The non-volatile memory is having a first area and a second area. The storing module is configured to store a second program for downloading a first program from an outside to the first area. The processing module is configured to execute the first and the second programs. The non-volatile memory is having a first area and a second area. The storing module is configured to store a second program for downloading a first program from an outside to the first area. The processing module is configured to execute the first and the second programs. The first area is capable of being written and erased by the first program, and the second area is not capable of being erased by the first program.
Estimating wear of non-volatile, solid state memory
Completion times of data storage operations targeted to a non-volatile, solid-state memory device are measured. Wear of the memory device is estimated using the measured completion times, and life cycle management operations are performed to affect subsequent wear of the memory device in accordance with the estimated wear. The life cycle management may include operations such as wear leveling, predicting an end of service life of the memory device, and removing worn blocks of the memory device from service.
Information technology integration with automation systems
The subject disclosure pertains to transparent communications in an industrial automation environment amongst automation system components and IT systems. Systems and methods are provided that send and receive data to, from and amongst automation devices and transactional based IT systems. The system is viewed as a control system to the automation device and as a transactional system to the IT system. Accordingly, it is not necessary to provide a custom interface between automation devices and the IT systems.
Electronic measuring device and method of converting serial data to parallel data for storage using the same
An electronic measuring device includes a detection channel module, a sampling module, a control unit, a data path selector and a memory device. A user will be able to selectively enable the desired detection channels and store only data collected from enabled channels. The data collected from the detection channels are in serial data form. The device utilizes a serial-parallel shifter in its sampling module to convert the serial data to parallel data bytes. Two indicators in the storage unit of the memory device allow users to effectively store the parallel data bytes in designated locations. The innovative data conversion and storage methods of this invention will significantly conserve memory space that otherwise will be occupied by data from the disabled channels and allow accurate and efficient reading of the stored data.
Transfer of uncompressed multimedia contents or data communications
A system and corresponding method for transferring data via an interface assembly is provided. The data is transferred between a USB port of a first device and a media port of a second device. Uncompressed high definition media data may be received from the USB port. The received uncompressed high definition media data may be supplied to a media connector in accordance with a first media standard, such that the supplied data can be transmitted in accordance with the first media standard via the media connector to the media port of the second device. The uncompressed high definition media data may include multimedia data and side-band communication data. A single signal may be encoded and decoded in accordance with a protocol that enables the single signal to communicate all side-band communications to and from the source device via a single pin of a USB connector.
Control system for a subsea installation
The invention relates to a control system for a subsea installation based on CAN bus technology. A single cable forms a backbone for transmitting signals and/or power from a central control unit to a number of devices or sensors on the installation. Terminals are attached to the cable at intervals, allowing devices to be plugged in while the system is operable. A termination may also include repeaters or amplifiers for transmitting signals over longer distances.
Apparatus including buffer allocation management and related methods
Memory system controllers can include hardware masters, first buffers, and a switch coupled to the hardware masters and to the first buffers. The switch can include second buffers and a buffer allocation management (BAM) circuit. The BAM circuit can include a buffer tag pool. The buffer tag pool can include tags, each identifying a respective first buffer or a respective second buffer. The BAM circuit can be configured to allocate a tag to a hardware master in response to an allocation request from the hardware masters. The BAM circuit can be configured to prioritize allocation of a tag identifying a second buffer over a tag identifying a first buffer.
A traffic manager includes an execution unit that is responsive to instructions related to queuing of data in memory. The instructions may be provided by a network processor that is programmed to generate such instructions, depending on the data. Examples of such instructions include (1) writing of data units (of fixed size or variable size) without linking to a queue, (2) re-sequencing of the data units relative to one another without moving the data units in memory, and (3) linking the previously-written data units to a queue. The network processor and traffic manager may be implemented in a single chip.
Communication path speed determining method based on priority of the destination address
In a communication apparatus data is inputted to an input section. A priority determination section determines priority of the data inputted by the input section. If the priority of the data determined by the priority determination section is higher than a determined value, then a speed control section sets a transmission speed of the data outputted from an output section to a high value. On the other hand, if the priority of the data determined by the priority determination section is lower than the determined value, then the speed control section sets the transmission speed of the data outputted from the output section to a low value. The output section outputs the data at the set transmission speed.
Event notification system and method
A technique for user notification involves modifying a title associated with a process to include information about an event that calls for user notification. A method according to the technique may include running a process, processing an event, generating a string of characters that includes information associated with the event, and displaying the string of characters as a title associated with the process. A system constructed according to the technique may include a client, a title array, an event processing engine, and a title provisioning engine.
Identification address configuration circuit and method without use of dedicated address pins
An identification address of a sensor interface device is configured in response to the order of connection of first (DXP1) and second (DXN1) package pins to electrodes of a sensor (Q0). A sensor signal processing circuit (23) has first and second inputs coupled through the first and second pins to the sensor for converting a parameter sensed by the sensor to a different representation. A current is forced through the first pin to produce either a high or low voltage on the first pin depending on the order of connection of the first and second pins to the electrodes of the sensor. A voltage on the first pin is compared with a reference voltage to produce a comparison signal which is mapped to produce the identification address.
Interface circuit and an electronic device including the same
An interface circuit for use in an electronic device includes a switch module and a control module including signal receiving and transmitting pins. When a first audio terminal of the electronic device is electrically connected to a second audio terminal of another device, the control module controls the switch module to establish electrical connection between the signal receiving pin and the first audio terminal. The control module controls the switch module to establish electrical connection either between the signal transmitting pin and the first audio terminal for proceeding with a program update when updating information from the second audio terminal is received through the signal receiving pin or between an audio signal providing module of the electronic device and the first audio terminal when no updating information is received.
Information processing device and program product
In an information processing device according to an embodiment, a generating unit generates a descriptor including information indicating an area in a storage unit and state information indicating a state of an entry in which the information indicating the area is stored, and an update unit updates the state information according to at least one of writing and reading of data to the area indicated in the entry selected according to the state information by the input/output unit. The generating unit generates the descriptor in advance before at least one of writing and reading of data to/from the storage unit is started.
Display device, projector, display system, and method of switching device
A display device is capable of switching a function of an indication body in accordance with the need of the user in the case in which the indication body is made to function as a pointing device. The display device is provided with a function device having a first interface. The configuration information of the first interface is stored in the storage section, and is supplied to a host device by a supply section via the function device. A change section is capable of change the configuration information in accordance with the operation of the user received by a reception section.
Information processing apparatus, information processing method, and computer program product
An information processing apparatus provided with a unit that acquires identification information indicating a function of an external device connected to a connector, a holding unit that holds a device driver to control the external device, and a control unit to control an assignment of the device driver to the external device in accordance with control information. The holding unit holds a generic device driver to perform a process not dependent on the function of the external device. If the control information indicates a first value, the control unit assigns the generic device driver to the external device. If the control information indicates a second value, the control unit determines whether the holding unit holds a device driver compatible with the indicated function. If it is determined that the holding unit does not hold the device driver, the control unit assigns the generic device driver to the external device.
A method and apparatus for enhancing/extending a serial point-to-point interconnect architecture, such as Peripheral Component Interconnect Express (PCIe) is herein described. Temporal and locality caching hints and prefetching hints are provided to improve system wide caching and prefetching. Message codes for atomic operations to arbitrate ownership between system devices/resources are included to allow efficient access/ownership of shared data. Loose transaction ordering provided for while maintaining corresponding transaction priority to memory locations to ensure data integrity and efficient memory access. Active power sub-states and setting thereof is included to allow for more efficient power management. And, caching of device local memory in a host address space, as well as caching of system memory in a device local memory address space is provided for to improve bandwidth and latency for memory accesses.
Virtual interface to the PoE device through an expanded registered map in a networking device such as a PHY
Provided is a Power over Ethernet (PoE) device. The PoE device includes a physical layer device (PHY) including a first number of registers PHY and a power sourcing equipment (PSE) device. The PSE device (i) includes a second number of registers and (ii) is electrically coupled to the PHY. The contents of one of the first and second number of registers is an extension of the other of the first and second number of registers.
Rule tree for network device
A method may include receiving a packet; determining a set of characteristics of the packet; searching a first tree structure for a rule matching the set of characteristics, where the first tree structure stores a first group of rules, and where each of the first group of rules has a first number and a first type of criteria; searching a second tree structure for the rule matching the set of characteristics, where the second tree structure stores a second group of rules, and where each of the second group of rules has a second number and a second type of criteria, where the number and type of criteria of the second group of rules are different at least in part than the number and type of criteria of the first tree structure; and performing an action if the rule matching the set of characteristics is found.
Sending application input commands over a network
Disclosed are various embodiments that facilitate sending input commands to an application over a network that may have variable latency characteristics. Multiple input commands are obtained from a client over the network. It is determined whether a delay before one of the input commands is necessary to preserve the meaning of the input command. The input command is provided to an application executed in a hosted environment in one or more computing devices after the delay when the delay is determined to be necessary.
Methods and systems for optimizing network traffic using preemptive acknowledgment signals
Methods and systems for efficient transmission of data between a requesting computer and a server. A request is received for server data from a requesting computer and the request is sent to the server over at least one network. The requested server data responsive to the request is forwarded on to the requesting computer. It is determined whether the requested server data has been previously forwarded either to the requesting computer or at least one other requesting computer. A preemptive acknowledgement signal is sent to the transmitting server substantially upon determining the requested server data has been previously forwarded for causing the transmitting server to cease transmitting any remaining, un-transmitted portions of the requested server data. These methods and systems increase the efficiency of transmission resources in a network.
Method and system for streamlining multimedia transmissions
A customer-premises equipment (CPE) gateway and methods for operation thereof, and a multimedia server and methods for operation thereof are disclosed. The method for the CPE gateway including: (a) receiving, by the CPE gateway, a first internet group management protocol (IGMP) compliant command; (b) generating by the CPE gateway, in response to the first IGMP compliant command, a unicast command that instructs a multimedia server to generate a unicast media stream; wherein the generating including concealing multicast information from at least one IGMP compliant entity that follows the CPE gateway; and (c) transmitting, by the CPE gateway, the unicast command to the at least one IGMP compliant entity; wherein the unicast command passes through the at least one IGMP compliant entity and reaches the multimedia server.
Manifest file updates for network streaming of coded multimedia data
In one example, a device for retrieving multimedia data, the device comprising one or more processors configured to retrieve data of a first segment of a representation of multimedia content in accordance with data of a copy of a manifest file stored by the device, retrieve a portion of a second segment of the representation in accordance with the manifest file, wherein the second segment occurs after the first segment in the representation, and wherein the portion of the second segment indicates that the manifest file is to be updated, update the copy of the manifest file stored by the device based on the indication that the manifest file is to be updated, and retrieve media data of the second segment in accordance with the updated manifest file.
Method and apparatus for transmitting and receiving streaming data based on real-time streaming protocol (RTSP) session
A method and apparatus for receiving streaming data is provided. The method includes establishing a plurality of real-time streaming protocol (RTSP) sessions for receiving the streaming data, and receiving the streaming data through the plurality of RTSP sessions.
Application streaming and network file system optimization via integration with identity management solutions
By placing computer specific remotely originated application data under control of a central identity management system, users can seamlessly run remotely originated applications after logging on to different computers in the enterprise. Cached application content received from a streaming server or network file system, as well as additional application specific data (e.g., files created by the application, configuration changes made by the application on the local computer, etc.), can be configured as central identity management system profile object, using a central identity management system such as Active Directory. This data is thus automatically treated as part of the user settings/profile, and made available on any computer within the enterprise. This results in an optimal application experience for users, regardless of which managed computer they logon to within the enterprise.
Mobile router in EPS
Message routing between a mobile communication network and wireless devices is enabled by establishing a communication session between a mobile router and the mobile communication network which includes the mobile router being assigned an IP address. A wireless device is authenticated to the mobile communication network through the mobile router so that the wireless device is uniquely identifiable to the mobile communication network. A new packet data network (PDN) connection is established between the wireless device and the mobile communication network over the communication session established with the mobile communication network based on an IP address uniquely assigned to the wireless device by the mobile communication network.
Client device connectivity with integrated business rules and multiple network types
Applications executing on mobile client devices may access remote resources via network connections. Operational capabilities and financial costs of these connections may differ. Developers, network administrators, and other parties may wish to moderate usage of various available conditions to conform to business rules. Connectivity information including one or more network grants are integrated into an application received from a developer at ingestion by an application management server, which accesses those business rules. The client devices may coordinate with a proxy server to provide additional controls. Networking public interfaces provide the developer with a simplified pathway for development of applications which use network connections, particularly on mobile devices.
Method and system for updating media lists in portable media devices
A method and apparatus for updating a media list or a media list collection of a portable media player device is disclosed herein. In various embodiments, the updates are generated by a proxy or a third party server, based at least in part on data gathered for media preferences for a user of the portable media play device and one or more other users of one or more portable media player devices. In various embodiments, the method is practiced respecting the access rights of the media files (if access rights are required). Other embodiments may also be described and claimed.
Remote support automation for a storage server
A remote management module receives a command from a support server in response to the remote management module initiating a first secure, authenticated connection with the support server, wherein the remote management module is integrated with, and monitors a condition of, a processing system. The remote management module executes the command to generate a result that provides diagnostic data about the processing system. The remote management module reports the result to the support server upon the remote management module initiating a second secure, authenticated connection with the support server.
Dynamic display using pushed-streamed data
A system and method for dynamic updating of display windows using a pushed stream of data.
System and method for accessing data and applications on a host when the host is in a dormant state
A system for enabling the viewing, distributing and/or manipulation of stored data or applications on a host device when the host device is in a power-save, dormant or other semi-active state. In one embodiment, a peripheral device is provided which runs its own native operating system. When the peripheral device is connected to the host device, which is running a different native operating system, the peripheral device is capable of sharing files that are stored on the host device, thereby permitting the viewing, editing, transferring or other manipulation of the files. In another embodiment, a wireless modem or similar device is integrated into the host device. When the host device enters a power-save or dormant state, a hand-off occurs to the wireless modem such that the files contained on the host device remain accessible.
Auto-connect in a peer-to-peer network
A wireless device that automatically forms a connection to a remote device in accordance with a peer-to-peer protocol. The remote device may be designated as an auto-connect device for the wireless device such that, when the wireless device determines that it is in the vicinity of the auto-connect device, it can re-form a connection to the remote device based on stored information for re-establishing connections among a persistent group of devices, but without any express user input. When a user requests that the wireless device perform a function that involves interaction with an auto-connect device, that function may be performed with the delay associated with forming a connection. Any of multiple techniques may be employed for identifying devices designated as auto-connect devices and for determining when the wireless device and a remote, auto-connect devices are in close proximity.
Peer-to-peer communication session monitoring
The present invention allows primary communication sessions that are established between two communication clients to be monitored, wherein such monitoring occurs without the knowledge of the communication clients. An intercept tunnel is created between an intercept server and an access concentration point, which supports at least one of the communication clients over an access network. The access concentration point and the intercept server will cooperate to allow the communication session to be established, wherein a portion of the communication session will be established over the intercept tunnel. A first communication session is established with the first communication client through the access concentration point, a portion of it provided via the intercept tunnel. A second communication session is established with the second communication client. The intercept server will essentially receive and forward traffic to and from the first and second communication clients over respective first and second communication sessions.
Dynamic capacity management of multiple parallel-connected computing resources
A dynamic capacity management policy for multi-paralleled computing resources (e.g., application servers, virtual application servers, etc.) that includes one or more of a state-change component, a load-balancing component, and a robustness-control component. The state-change component delays the release (e.g., powering down of a physical server, removal from a virtual-server lease, etc.) of each computing resource for a set amount of time. The load-balancing component can work in conjunction with the state-change component to reduce the number of idle computing resources by distributing incoming requests in a manner that keeps the already-processing computing resources as full of requests as possible. The robustness-control component scales capacity as a function of the current number of requests within the system of computing resources to account for variations other than request rate, such as request size, reduced processor frequency, network slowdowns, etc., that affect processing capacity.
Transparent bridging of transmission control protocol (TCP) connections
A transparent TCP proxy device intercepts TCP connection requests received from a TCP client and destined for a TCP server as if acting as the TCP server in a handshake with the TCP client. Only after completing the handshake with the TCP client, the transparent TCP proxy participates in a handshake with the TCP server as if acting as the TCP client. After the handshake with the TCP server is complete, the transparent TCP proxy intercepts and translates subsequent TCP packets received from the TCP client and destined for the TCP server into a form expected by the TCP server including updating an acknowledgement number and TCP checksum; and intercepts and translates subsequent TCP packets received from the TCP server and destined for the TCP client into a form expected by the TCP client including updating an acknowledgement number and TCP checksum.
System and method for optimization of security tasks by configuring security modules
A system and method for dynamic configuration of the security modules for optimization of execution of security tasks are provided. The system includes: a mechanism for identifying the clients connected to the network; a client data collection unit that determines hardware/software configurations of each detected client; a security module selection and installation unit that selects required modules for each client; a statistics collection unit that collects the security tasks execution statistics from user modules and from client modules; and a configuration unit that configures the client and server modules based on the collected statistics in order to optimize execution of the security tasks.
P2P activity detection and management
A network device may receive a peer-to-peer (P2P) activity record corresponding to a P2P data flow of P2P activity in a network. The P2P data flow may include content information communicated from a first user equipment device (UE) to a second UE via the network, and the P2P activity record may include information identifying the P2P data flow. The network device may insert the information identifying the P2P data flow into a P2P activity map and compare the P2P activity map to a P2P pattern of interest. The network device may also determine a P2P activity of interest probability based on the comparison of the P2P activity map to the P2P pattern of interest, which may describe the likelihood that P2P activity of interest is occurring in the network. The network device may also generate a system response based on the P2P activity of interest probability.
Administering event reporting rules in a distributed processing system
Methods, systems and products are provided for administering event reporting rules in a distributed processing system that includes identifying that one or more nodes of the distributed processing system is idle; for each identified idle node, collecting by the idle node any suppressed events and logged data from the node; sending the suppressed events and logged data to a database of events; and changing the event reporting rules for one or more components on the identified idle node in dependence upon the suppressed events and the logged data.
System, method and computer program product for monitoring and controlling network connections from a supervisory operating system
A system, method and computer program product that is designed to support high-availability, rapid fault recovery, out of band condition signaling and/or other quality of service assurances and security in a networked environment. In one aspect, a method of the invention includes the step of providing a processing system with a dual-kernel or multi-kernel software operating system. The operating system includes a supervisory operating system and a secondary operating system that provides network functions to user applications. The method also includes the step of providing a Network Control Software (NCS) in the supervisory operating system. The NCS is configured to transparently monitor and control network operations in the secondary operating system.
Connection device and protocol
A common communications protocol is described among devices in a unified communications network. Native devices receive upstream commands and forward them to downstream devices without interpreting the commands. The native devices reformat commands intended for mapped devices in the unified communications network. The common communications protocol calls for left shifting address fields for transmitted commands until the command arrives at its intended destination.
System and method for routing service requests
Service requests may be routed to services in a service framework provided by a plurality of hosts. A first candidate host may receive a service request. The service latency of the first candidate host may be determined. The service latency for one or more candidate host zones may also be determined. The first candidate host may service the service request or route the service request to one or more candidate host zones. In some embodiments, a probabilistic distribution based at least in part on the service latency of the first candidate host and the service latency for each of the one or more candidate host zones is used to determine whether the first candidate host services the service request or routes the service request to the one or more candidate host zones.
Load balancing for single-address tenants
When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address.
Business continuity on cloud enterprise data centers
Business continuity services in a data processing environment where a service provider offers virtual data center services to numerous customers.
Application scope adjustment based on resource consumption
Various embodiments of systems and methods for application scope adjustment based on resource consumption are described herein. A load parameter of a data center is measured. A request is received at the data center. An implementation variant to process the request is selected based on the measured load parameter and a threshold value of the load parameter. The implementation variant comprises a standard process for processing the received request and an alternative process for processing the received request that reduces the impact on the load parameter compared to the standard process. The received request is processed using the selected implementation variant.
Method for privacy management in an identity network, physical entities and computer program therefor
A controller (12) is used for privacy management in an identity network (10) for a principal (20). An identity network (10) is a computer network including at least an identity provider (14), a discovery service provider (16), and a service provider (18) with which the principal (20) can make transactions. A principal (20) is a system entity whose identity can be authenticated. An identity resource (14) is either data related to an identity or group of identities, or a service associated with an identity or group of identities. The controller (12) queries a discovery service provider to obtain information regarding available identity resources (14), it receives back addressing information for addressing attributes of the identity resources (14), and it then interacts, based on the addressing information, with a service provider (18) to create, read, modify or delete a privacy attribute governing the use of an identity resource (14).
Multi-platform operational objective configurator for computing devices
Application configuration settings are managed for a plurality of diverse computing devices having different resources including independent applications. An operational objective defining certain behaviors for a plurality of applications executable computing devices is received via a user input. Configuration and resource information is obtained for each computing device. A determination is made of applications on each of the computing devices for which the specified operational objective can be at least partially achieved. The determination is based on the user input, on the configuration and resource information for each of the computing devices, and on a predefined set of resource mappings that defines requirements for meeting various operational objectives and resources needed for meeting each of the requirements. Configuration instructions particularized to one or more of the computing devices is generated in response to the determination that the operational objective can be at least partially achieved.
Automatic management of configuration parameters and parameter management engine
A mechanism is provided for an automatic management of configuration parameters of computing resources between related computing systems. Services instances of computing systems are generated according to associated configuration parameter sets and respective corresponding configuration parameter values. A determination is made of configuration parameter value changes in the configuration parameter sets for each generated service instance of the computing systems. The configuration parameter value changes for each generated service instance are compared with a first subset configuration parameter values and with a second subset configuration parameter values. The determined configuration parameter value changes in one service instance are then propagated to another service instance according to a definition of rules for mapping configuration parameters and their values between second subsets of configuration parameters.
Accessing cached data from a peer cloud controller in a distributed filesystem
The disclosed embodiments provide a system that archives data for a distributed filesystem. Two or more cloud controllers collectively manage distributed filesystem data that is stored in one or more cloud storage systems; the cloud controllers cache and ensure data consistency for the stored data. During operation, a cloud controller receives a request from a client for a data block of a file stored in the distributed filesystem. Upon determining that the requested data block is not currently cached in the cloud controller, the cloud controller sends a peer cache request for the requested data block to a peer cloud controller in the distributed filesystem.
Providing disaster recovery for a distributed filesystem
The disclosed embodiments provide a system that distributes data for a distributed filesystem across multiple cloud storage systems. Two or more cloud controllers collectively manage distributed filesystem data that is stored in one or more cloud storage systems; the cloud controllers cache and ensure data consistency for the stored data. Whenever each cloud controller receives new data from a client, it outputs an incremental metadata snapshot for the new data that is propagated to the other cloud controllers and an incremental data snapshot containing the new data that is sent to a cloud storage system. During operation, a backup cloud controller associated with the distributed filesystem is also configured to receive each (incremental) metadata snapshot, such that, upon determining the failure of a cloud controller, the backup cloud controller can immediately begin receiving data requests from clients associated with the failed cloud controller.
Rich content download
According to the invention, a content download system for downloading a content file and additional content using a window is disclosed. The content download system includes a content site, a content provider and a third party. The content site presents the window that displays the download progress of the content file, presents the additional content while the content file is downloaded, and allows selection of the additional content. The content provider serves as an origin server for the content file. The third party receives information on the content file and provides the additional content.
Making publisher content available to specific users
Disclosed are various embodiments for using a virtual file system interface to provide media titles from remotely located user-specific media storage. A selected media title and associated metadata is stored in a user-specific media storage area. The selection of a media title is based at least in part on user-specific consumption data. A request for the media title is received from a client. The requested media title and the associated metadata are provided to the client. Consumption data for the requested media title is received from the client.
Exploiting cluster awareness infrastructure through internet socket based applications
Provided are techniques related generally to computer communication and, more specifically, to techniques that provide legacy applications with access to a cluster infrastructure. A pseudo interface layer provides applications with internet protocol (IP) family sockets access to cluster awareness protocols in a manner that may be transparent to both the application and the cluster awareness layer of a kernel.
Method and apparatus for providing media mixing with reduced uploading
A method for providing media mixing with reduced uploading may include receiving device situation description data and content analysis data from each of a plurality of devices. The device situation description data and content analysis data received from each of the plurality of devices may be descriptive of media data associated with a common event and recorded separately at respective ones of the plurality of devices. The method may further include determining media segments defining one or more portions of the media data to be requested from selected ones of the plurality of devices based on the device situation description data and content analysis data, causing communication of a request for corresponding ones of the media segments to respective devices among the selected ones of the plurality of devices, and causing generation of mixed content based on receipt of the media segments. A corresponding apparatus and user terminal-side method and apparatus are also provided.
Differential file and system restores from peers and the cloud
Provided herein are systems and methodologies for highly efficient restoration in a network-based backup system. As described herein, differential-based analysis can be utilized such that a new complete differential is calculated based on signatures and/or other information relating to a given item to be restored prior to retrieving backup data. Based on the differential, only blocks determined to be unique between the current version of the item and the desired version are transmitted, which can then be merged with non-unique locally present blocks to obtain the fully restored version of the item. Further, a hybrid architecture can be employed, wherein signatures and/or data are stored at a global location within a network as well as one or more local peers. Accordingly, a backup client can obtain information necessary for restoration from either the global location or a nearby peer, thus further reducing latency and bandwidth consumption.
System and method for populating a cache using behavioral adaptive policies
A method, system and program are disclosed for accelerating data storage in a cache appliance cluster that transparently monitors NFS and CIFS traffic between clients and NAS subsystems and caches files using dynamically adjustable cache policies which populate the storage cache using behavioral adaptive policies that are based on analysis of clients-filers transaction patterns and network utilization, thereby improving access time to the data stored on the disk-based NAS filer (group) for predetermined applications.
Intelligent network interface system and method for protocol processing
A system for protocol processing in a computer network has an intelligent network interface card (INIC) or communication processing device (CPD) associated with a host computer. The INIC or CPD provides a fast-path that avoids host protocol processing for most large multipacket messages, greatly accelerating data communication. The INIC or CPD also assists the host for those message packets that are chosen for processing by host software layers. A communication control block (CCB) for a message is defined that allows DMA controllers of the INIC to move data, free of headers, directly to or from a destination or source in the host. The CCB can be passed back to the host for message processing by the host. The INIC or CPD contains hardware circuits configured for protocol processing that can perform that specific task faster than the host CPU. One embodiment includes a processor providing transmit, receive and management processing, with full duplex communication for four fast Ethernet nodes.
Method and system for remote device access in virtual environment
A method, system and computer program product for accessing remote devices is provided. The proposed method allows users to remotely access devices or tools controlled by a Virtual Environment (VE) implemented on a remote server. A user of a client machine or a mobile communications device can access a remote device controlled by a server or by local client of the server. The server can have a number of VEs implemented on it. Each of the VE can run a Guest OS that has guest device drivers installed on it. The VE receives the user request and passes on user commands to a device controlled by the guest device driver installed on the Guest OS of the VE.
System and method for combining content site visitor profiles
Embodiments of the systems described herein can implement one or more visitor stitching processes. Visitor stitching can include, among other things, one or more processes by which multiple visitors that may appear distinctly independent may be merged into a new single united visitor profile due to the leveraging of one or more unique persistent identifiers.
Method and system for message pacing
A system for managing message volume and timing, which permits first and second messages to be spaced apart over time, with the pacing controlled in part by a characteristic of the second message. The system sends the first message to an intended recipient. The system determines a separation based on a pacing algorithm and sends the second message to the recipient according to the separation.
Optimized routing for proxy use
A system is provided for applying optimized selection to route an email message over a network to a recipient mailbox. An email message may be enabled to be transmitted through a plurality of servers to a destination recipient mailbox server. An external message transfer agent may receive the email message using Simple Mail Transfer Protocol (SMTP) and may transmit the received email message to a proxy transport server. The proxy transport server may apply a selection for an optimal store-and-forward (SAF) transport server to which to route the email message. The selection may provide for identifying available SAF transport servers, organizing the SAF transport servers into server groups, and selecting the optimal SAF transport server belonging to a server group where a recipient mailbox server is located. The proxy transport server may transmit the email message to the SAF transport server for delivering the message to the recipient mailbox.
Enterprise service bus and message processing method thereof
An enterprise service bus (ESB) and message processing method thereof are disclosed. The ESB includes: a message receiving unit, a message queuing unit, a processing-thread-group, and a request processing unit. The message receiving unit includes multiple message receiving channels which are used to receive messages each having at least one service request. The message queuing unit is used to receive messages from the multiple message receiving channels and to sort the messages according to predefined rules. The processing-thread-group is used to receive a predefined number of sorted messages from the message queuing unit. The request processing unit is used to acquire service requests of the messages from the processing-thread-group and to process the service requests. The present disclosure integrates various application programs into an electronic trading platform, and achieves program invocation by ESB. Therefore, service users are no longer required to perform complicated asynchronous invocations, while ESB is used to convert a synchronous mode to an asynchronous mode.
System and method for enabling an external-system view of email attachments
A method and system for enabling viewing of email attachments through a system external to the email application itself In one embodiment, the email application creates categories and the email attachments are accordingly categorized. These categories are mapped into a format understandable by the external system, and provided to the external system in such format. In one embodiment, the email application appears as a file system to the operating system of a user's computer. The created categories are provided to the operating system as the “folders” in the file system. In one embodiment, the file system seen by the external system is a virtual file system, and any sub-categories and/or email attachment themselves are provided to the external system upon a specific request.
Methods and systems for a distributed group activity network
A distributed group activity network system and corresponding method over a computer network. It synchronizes and provides access by system users to shared data files of a group activity. The distributed group activity network system comprises one or more server computers and client computers that are connected to the server computer(s) by network connections. Each of the server computers comprises a network server and a memory system. The system modules of the client computers use the memory systems of the client computers and the available basic network services at the server computer(s) to synchronize and provide access to the shared data files by the system users by also using the memory systems of the client computers and the available basic network services at the server computer(s) to synchronize access to and access the synchronization files.
Method of evaluating a function and associated device
A method for evaluating a function of a finite field of characteristic p into itself, for an element x of the field, uses an evaluation, for the element x, of a polynomial formed by a plurality of monomials. The evaluation of the polynomial includes the following steps: determining monomials the degree of which is an integer power of the characteristic p by successive raisings of the element x to the power p; and determining monomials the degree of which is different from an integer power of the characteristic p on the basis of the determined monomials, the degree of which is an integer power of the characteristic p, and by at least one multiplication. An evaluating device is also provided.
Ordering generating method and storage medium, and shared memory scalar parallel computer
When a Cholesky decomposition or a modified Cholesky decomposition is performed on a sparse symmetric positive definite matrix using a shared memory parallel computer, the discrete space in a problem presented by the linear simultaneous equations expressed by the sparse matrix is recursively sectioned into two sectioned areas and a sectional plane between the areas. The sectioning operation is stopped when the number of nodes configuring the sectional plane reaches the width of a super node. Each time the recursively halving process is performed, a number is sequentially assigned to the node in the sectioned area in order from a farther node from the sectional plane. The node in the sectional plane is numbered after assigning a number to the sectioned area each time the recursively halving process is performed.
System and method for generating discrete-time model (DTM) of continuous-time model (CTM) for a dynamical system
Method and apparatus for processing continuous-time models (CTM) in a digital processing architecture is disclosed. The discrete state-space technique maps the CTM into the discrete-time model (DTM) and stores the states of the system in a sample time independent discrete state space set of matrices. The resulting state-space matrices can be processed in software or directly in hardware. The method disclosed is particularly suited to be used in automatic synthesis algorithms where a digital circuit is generated from an algorithm described in a high level language or model representation such as, for example, data flow or bond graph into a hardware description language (HDL), and the HDL model can be synthesized using system specific tools to generate an application specific integrated circuit (ASIC) or an FPGA configuration.
Random number generation device having a ring oscillator
It is made possible to provide a random number generation device which generates a physical random number with as little power dissipation as possible. A random number generation device includes: a ring oscillator having at least one set, each set comprising a current noise source and a Schmitt inverter configured to receive an output of the current noise source; and a conversion circuit configured to convert output frequency fluctuation of the ring oscillator to a random number and output the random number.
Extended-width shifter for arithmetic logic unit
A processor includes a shift device for extending the width of a rotator without increasing propagation delays. An extended-width result is obtained by combining a rotation result with a shift result in accordance with a mask that is selected in response to at least a portion of the value of the degree to which a data word is to be shifted.
Managing snapshot storage pools
Various embodiments of the invention relate to an apparatus and a method of managing a snapshot storage pool (SSP) associated with a storage unit of a distributed data storage system. One apparatus includes a logic module and a processor. The logic module is adapted to provide a threshold corresponding to a ratio between a current amount of storage resources used for storing snapshots in the SSP and a total storage capacity defined for the SSP. The processor is adapted to trigger an action that may be effective for managing the SSP in response to the amount of storage resources used for storing snapshots in the SSP crossing the threshold.
Method and apparatus for functional integration of metadata
A computer implemented method for functional integration of metadata for a plurality of databases, includes: creating a single set of classes and instances for the classes for metadata of at least one relational data schema and at least one non-relational data schema for the plurality of databases; defining semantic relationships between the instances based on the structural information in the relational data schema and the non-relational data schema for the plurality of databases; associating the semantic relationships with a property class; creating a single set of triples for the semantic relationships between the instances; storing the single set of triples in a file; and using the set of triples stored in the file to navigate between the plurality of databases to formulate a response to a query.
Cooperative grid based picture archiving and communication system
A Cooperative Grid Based Picture Archiving and Communication System (Grid PACS for short) is a multimedia (imaging) medical information archiving, communication and application system used in hospitals. Based on the existing PACS servers, workstations, or other networked multimedia image management systems, it adds and integrates grid-based network functionality into the existing image systems to form new grid-based image communication and management system.It uses service-oriented and event-driven concepts and methods to design and implement a new grid-based image communication and management system to solve the problems encountered in distributing archived image information, coordinating work and managing in a virtually centralized way (Virtual Super-PACS) of different PACS or archiving systems under varied operating environments.
Systems and methods for maintaining group membership records
A method for maintaining group membership records includes 1) maintaining a record of group memberships for a membership hierarchy, the membership record identifying a direct relationship between a first object and a second object in the membership hierarchy, 2) receiving a membership update indicating that, as of a first point in time, a direct relationship between the second object and a third object changed, 3) updating the record of group memberships to reflect the change in the relationship between the second object and the third object, 4) deducing, based on the membership update and the record of group memberships, a change in an indirect relationship between the first object and the third object as of the first point in time, and 5) providing a view of object relationships within the membership hierarchy as the object relationships exist at the first point in time and a historical record of object relationships.
Recoverable single-phase logging
A log manager may store a validation indicator with each data block of a log entry. The log manager may create a header block for each log entry that may include a validation indicator or tag. Such a validation indicator may be stored within the metadata for each data block. The validation indicator may additionally be stored in the metadata for the header block and it may be stored in header block itself. When recovering such a log, according to some embodiments, the validation indicators for each data block are checked against the validation indicator in the header block.
Method, system and program product for interning invariant data objects in dynamic space constrained systems
Under the present invention, a hierarchical tree and corresponding Least Recently Used (LRU) list are provided. Both include a predetermined quantity of nodes that are associated with invariant data objects. The nodes of the tree typically include a set of pointers that indicate a position/arrangement of the associated invariant data objects in the LRU list, and a set of pointers that indicate a logical relationship among the other nodes.
Systems and methods for publishing profiled content
Systems and methods are provided for publishing profiled content, where such profiled content can be personalized to individual members. Policies for displaying such content can be set by business personnel obviating the need to hard-code such policies by information technology personnel. These polices may stipulate that personalized content covering geographic information, products owned, products available, etc., may be arranged in various ways and at various times to enhance a member's experience with such content. Personalization may be initiated by member login information, where such login information allows for the matching up of a member's profile against stored data corresponding to such a profile. Once this matching up is accomplished, member personalized content can be displayed across various web pages.
Programmatically enabling user access to CRM secured field instances based on secured field instance settings
Access to customer relationship management (CRM) secured field instances is enabled based on field settings. A requester's identity determines action paths to be executed in order to enable access to fields. A client application's user privileges are inherited to enable access to secured fields. Such access through a granted privilege is provided through an API intermediating inheritance of user's privileges from client application.
Reputation based access control
The reputation based access control system of the present invention allows or denies access to a requested controlled resource to a requesting subject based upon predetermined associations between the resource and security contexts to determine the subject's reputation in those contexts. The reputation based access control system utilizes an authentication system (biometric, challenge/response, etc.) to identify a subject. Once the identity is determined, a resource to be accessed is determined by a reputation based access control unit. The system interfaces with a reputation assessment system to gauge the subject's reputation in these contexts. If the subject's reputation meets the predetermined limits for reputation in those contexts for that resource, the subject is allowed access to the resource. Otherwise access is denied and the proper agents are notified.
Establishment, optimization, and routing of remote transitive name space access
A mechanism is provided for establishment, optimization, and routing of remote transitive name space access. The illustrative mechanism adds a new protocol primitive to distributed file systems, which establishes a new multiplexed client connection between the client, the transitive server, and the destination server(s). The protocol allows establishment of remote mounts on a transitive file server. The protocol allows the client to request a “recipe” for a direct connection to the destination file server without intermediate nodes. The protocol allows the intermediate server to be established as a multiplexer that forwards requests/responses to/from destination servers without unmarshalling/remarshalling.
System and method for managing enterprise-level interrelated site, channel, and content objects
Systems and methods for managing enterprise-level interrelated content items used in Web sites. In accordance with the present disclosure, site objects, channel objects and content objects are associated with each other to form a hierarchical site structure. The content objects are linked to corresponding content items in a content repository, and are grouped together by association with channel objects in the site structure. Each of the objects in the site structure has an associated set of content services and can be deployed individually or in combination, while maintaining references to the related objects in the hierarchical site structure.
Systems and methods for information retrieval
An information retrieval system implements a search language, through which a querying entity (e.g., a user, a program or process, or the like) formulates a search query. Preferably, a search query is composed of an ordered set of clause definitions, and each clause can have set membership operations applied to it. Each clause includes a clause pipeline, and a time constraint. A clause pipeline includes an ordered set of clause specifications separated by a pipeline operator. A clause specification can be either an expansion operation or a filtering operation. Preferably, a first clause specification in a pipeline operates on an initial universe of all objects, and each subsequent clause specification operates on a set of objects produced from the previous clause specification. The search language is exposed to users (typically, IT administrators), and one or more builder programs within the system (each referred to as a “model builder”) are used internally to present data models to the search language. A model builder extracts data from a given type of data source (including, without limitation, a relational database system, an application programming interface (API), or the like), and enables that data to be presented to one or more constructs of the search language according to a single unified data model.
Multi-input, multi-output-per-input user-defined-function-based database operations
The current application discloses a database management system that provides multiple-input, multiple-output-per-input user-defined-function-based operations. The database management system comprises at least one processor and electronic memory, a database-query processor, executed on a computer processor controlled by computer instructions stored in a computer-readable memory, that makes multiple calls to a multiple-input, multiple-output-per-input user-defined-function, in each call transmitting a next input to the multiple-input, multiple-output-per-input user-defined-function, and the multiple-input, multiple-output-per-input user-defined-function, executed on a computer processor controlled by computer instructions stored in a computer-readable memory, that uses three different memory buffers, the contents of which are maintained for three different time periods, to compute and return to the database-query processor multiple outputs in response to at least one of the multiple inputs.
Systems and methods for cross-lingual audio search
Methods and arrangements for executing an audio search. A search query in a first language variety is accepted, the search query being in a form of at least one of: text and audio. A corpus of material in the first language variety is accessed, and first language variety baseforms are obtained via data obtained from a second language variety. A first language variety phonetic model is built, and the first language variety phonetic model and the second language variety are employed in executing an audio search based on the accepted search query.
Video search method using motion vectors and apparatus thereof
A video search method and an apparatus thereof are provided. In the video search method, the bit streams of a query video file and a plurality of video files to be searched are parsed to obtain a plurality of corresponding motion vectors (MVs). A plurality of corresponding MV maps is constructed in a time domain according to the MVs. Correlations are obtained according to the MV map corresponding to the query video file and the MV maps corresponding to the video files, and a video search result is obtained according to the correlations.
Methods and systems to train models to extract and integrate information from data sources
Methods and systems to model and acquire data from a variety of data and information sources, to integrate the data into a structured database, and to manage the continuing reintegration of updated data from those sources over time. For any given domain, a variety of individual information and data sources that contain information relevant to the schema can be identified. Data elements associated with a schema may be identified in a training source, such as by user tagging. A formal grammar may be induced appropriate to the schema and layout of the training source. A Hidden Markov Model (HMM) corresponding to the grammar may learn where in the sources the elements can be found. The system can automatically mutate its schema into a grammar matching the structure of the source documents. By following an inverse transformation sequence, data that is parsed by the mutated grammar can be fit back into the original grammar structure, matching the original data schema defined through domain modeling. Features disclosed herein may be implemented with respect to web-scraping and data acquisition, and to represent data in support of data-editing and data-merging tasks. A schema may be defined with respect to a graph-based domain model.
Processing encoded data elements using an index stored in a file
An index of data elements is stored with a file. The file encodes the data elements. The index indicates memory locations of the data elements within the file. The index and the file are stored in a storage device. A parser or decoder accesses the index to identify data elements. At least one of the storing and accessing are performed by a computing device.
Automatic query execution plan management and performance stabilization for workloads
A method, apparatus, and computer program product are disclosed for managing query execution plans for a workload. In one embodiment, the method includes gathering an initial set of performance characteristics generated from a database management system (DBMS) executing a database workload according to one or more query execution plans (QEPs). The database workload includes one or more database statements. The method determines a QEP change for one or more QEPs of the database workload. In addition, the method gathers a subsequent set of performance characteristics generated from the DBMS executing the one or more QEPs of the database workload influenced by the QEP change. Furthermore, the method determines a performance difference created by the QEP change based on the initial set of performance characteristics and the subsequent set of performance characteristics and responds to the performance difference in accordance with a monitoring policy.
Framework for large-scale multi-label classification
A framework for large-scale multi-label classification of an electronic document is described. An example multi-label classification system is configured to first apply weak classifiers and identify seed labels, then determine additional labels based on the seed labels and label correlation data derived from member profiles maintained by an on-line social network system. The multi-label classification system then constructs an s-t graph comprising nodes that correspond to the seed labels and the additional labels. A clustering algorithm is then applied to the constructed graph to arrive to a labels graph. The labels graph is deemed to include nodes that correspond to topics discussed or referenced in the electronic document.
Method for displaying search results
Methods and systems for presenting document search results to a user. A user enters search terms to be matched with indicators mentioned in documents from a specific corpus of documents. The search results, which are the documents with indicators or content that match the search terms, are provided to the user using a user interface. Each document in the search results are represented by a marker on a map in the user interface. Other indicators which appear with the searched for indicators in the documents are also mapped to the user interface. Documents with similar indicators in their content are clustered together in the map and the markers which represent them are color coded to differentiate them from markers belonging to other clusters.
Clustering system, method and program
A method for clustering a plurality of data items stored in a computer includes calculating, with the computer, a plurality of components comprising kernels based on a distribution that gives similarity between the data items, wherein a non-negative mixture weight is assigned to each of the kernels; preparing a set of active components that are composed of subscripts of the mixture weights; applying operations to the set of active components; and determining whether the mixture weight has converged, and if not converged yet, reapplying the operations to the set of components, and if the mixture weight has converged, clustering the data items based on the mixture weight.
Analysis of computer network activity by successively removing accepted types of access events
An analysis system is described for identifying potentially malicious activity within a computer network. It performs this task by interacting with a user to successively remove known instances of non-malicious activity, to eventually reveal potentially malicious activity. The analysis system interacts with the user by inviting the user to apply labels to identified examples of network behavior; upon response by the user, the analysis system supplies new examples of network behavior to the user. In one implementation, the analysis system generates such examples using a combination of feature-based analysis and graph-based analysis. The graph-based analysis relies on analysis of graph structure associated with access events, such as by identifying entropy scores for respective portions of the graph structure.
Systems and methods for automatic item classification
An item categorization service is described that automatically categorizes items of interest to a user. The user may possess an item that they wish to offer for sale using a network-based service. The user may submit item information to the item categorization service to categorize the item of interest. Upon receipt, the categorization service may assess the relevance of the item information to hierarchically organized categories maintained by the network-based service. Categories having the highest relevance may be identified as first category candidates. The deepest common ancestor of the first category candidates may be identified the first category. One or more categories, representing sub-categories of the first category, may be identified and subjected to relevance assessment. Those sub-categories having the highest relevance may be identified as second category candidates. The deepest common ancestor of the second category candidates may be identified as a second category for the item of interest.
Systems and methods for integrated management of large data sets
Systems, methods and techniques for managing data sets are described. In particular, systems and methods for modeling, representing, acquiring and disseminating large data sets and data files using metadata are described. The large data sets may include geospatial information. The metadata may be extracted from the data or provided separately. Such metadata may be used to represent the underlying data so as to avoid unnecessary and/or unwanted transfer, exposure or manipulation of the underlying data. The metadata may be represented in a static or dynamic fashion, and may be shared via, for example, social media networks and the like.
Enhancing personal data search with information from social networks
The personal data search technique uses data input by users for a given user's personal data on a social networking site to enrich the given user's personal data. The technique annotates personal data stored on a personal computing device or in a computing cloud with data obtained from social networking sites (for example, tags, comments, likes/dislikes and so forth) provided by friends/other users in the given user's social network or networks. Such annotations can later are used by search engine to enhance the search functionality and/or to improve the ranking of search results. Since the data is entered by actual human users it is very accurate and since the data is already readily available on social networks the cost to obtain it is very inexpensive.
Web application for accessing media streams
A web page has a player for playing media objects, a sequencer which displays a playlist that defines an order in which media objects are played by the player, and a media access area for containing a plurality of graphical icons. Each graphical icon representing a media object, and the graphical icons can be manipulated by a user to modify the play list. For example, the media icons may be dragged to the sequencer to add them to the sequencer.
Providing information regarding prior searches
A system is configured to identify prior search history associated with a user, where the prior search history includes information regarding searches initiated by the user and information regarding search results provided based on the searches. The system is further configured to filter the prior search history to select one of the search results, generate an information item for the search result, and provide the information item to a client, associated with the user, for presentation on a display associated with the client.
Attribute prioritized configuration using a combined configuration-attribute data model
A combined configuration rules-attribute configuration system uses an integrated configuration model to efficiently identify and attribute prioritize valid configuration answers. Submitting an attribute-based configuration query to the combined configuration rules-attribute configuration system allows the query to be answered in a single step. The combined configuration rules and attribute data guide product configuration processing and minimize configuration processing by, for example, calculating only the valid configuration answers that are candidates for the preferred valid answer(s). Thus, the combined configuration rules-attribute configuration system can minimize the number of valid configuration answers to be considered for presentation to a client system or other user of the combined configuration rules-attribute configuration system.
Knowledge base search utility
A method is disclosed. The method includes performing a first search in response to initiating a communication session between an agent and a customer. The first search is performed using first data, attributes of a service interaction, and second data. The first data represents a second search requested by the customer, and the second data represents items viewed by the customer from among first results of the second search. Second results of the first search are displayed.
Techniques to consume content and metadata
A client device may receive a request from a remote control device to capture a still image from content in a broadcast received at the client device. The client device may capture the still image from the content in the broadcast responsive to the request. The still image is transmitted for receipt and display at the remote control device. Image data is received from the remote control device that includes a portion of the still image displayed at the remote control device. The portion of the still image is selected by a user via a user interface output at the remote control device and includes an object to be identified using image recognition.
String and sub-string searching using inverted indexes
Inverted indexes for terms and for term separators are separately provided to minimize data redundancy. Search queries are parsed to identify terms and term separators, if any, and the corresponding inverted indexes are searched for responsive documents. Related apparatus, systems, techniques and articles are also described.
Automated, tiered data retention
The automatic, tiered retention storage system according to certain aspects can automatically classify data items based on content, such as based on the inclusion of search terms in the data items, or based on metadata or other characteristics associated with the data. Based on the classification, the system can assign the data items to corresponding user-defined “buckets.” In some embodiments, each bucket is associated with a particular tier in the storage system having a specific retention period.
Retail deployment model
A method of determining and optimizing the location of a new insurance agency is disclosed to increase market penetration of underrepresented markets. The method comprises the use of a scoring algorithm to rank various geographic regions or related zip codes. The scoring algorithm may be implemented by a location modeling system based on variables selected by a user. In addition, the various ranked geographic regions or related zip codes may be analyzed for proximity to natural or man made perils.
Identifying duplicate messages in a database
A system for storing data in a memory comprises a memory operable to store a database, wherein the database comprises an array, and the array comprises a number of elements uniquely identifiable by their location in relation to an origin point of the array, an interface operable to receive first data to be stored in the array; and a processor communicatively coupled to the memory and the interface, the processor operable to convert the first data to a hash using a hash function, determine a selected number of character positions of the hash, and identify an array element according to the character values of the selected character positions of the hash.
Auditing data in a wireless telecommunications network
Media are provided for performing a method of auditing data associated with a wireless telecommunications network. The method includes determining whether or not to audit data associated with a given sector in a wireless coverage area in a wireless telecommunications network based off of either a sector exclusion/inclusion list or a field in a database. The method also includes comparing attributes of sectors to be audited across network elements to determine if any data inconsistencies exit. Finally, the method presents any data inconsistencies of audited sectors to a user. In an alternate embodiment, all sectors could be audited, and certain sectors could be denoted on an audit report as to indicate that this sector already has known inconsistencies or is out of service to prevent confusion and further errors.
Data storage integrity validation
Embodiments of the present disclosure are directed to, among other things, validating the integrity of received and/or stored data payloads. In some examples, a storage service may perform a first partitioning of a data object into first partitions based at least in part on a first operation. The storage service may also verify the data object, by utilizing a verification algorithm, to generate a first verification value. In some cases, the storage service may additionally perform a second partitioning of the data object into second partitions based at least in part on a second operation. The second partitions may be different from the first partitions. Additionally, the archival data storage service may verify the data object using the verification algorithm to generate a second verification value. Further, the storage service may determine whether the second verification value equals the first verification value.
System and method for managing images over a network
Images created by one or more image acquisition devices are initially stored in remote data bases at one or more remote or satellite locations and copies of the images are subsequently transferred to a central server at a central storage location over a network and stored in a central data base. A common catalog listing local image files stored at the central data base and remote image files stored at one or more remote data bases is stored at the central location and is accessed by users to search for images. User requests for images associated with local image files result in transfer of the requested images by the central server to the user. User requests for images associated with remote image files are relayed by the central server to the associated remote location, and the requested images are then relayed to the user from the remote location via the central server.
Transactional virtual disk with differential snapshots
Some embodiments provide a system that provides a virtual disk in a computer system. During operation, the system stores data for the virtual disk in a virtual disk file on the computer system. Next, the system loads a differential location data structure corresponding to a snapshot of the virtual disk into memory on the computer system and processes input/output (I/O) operations to the virtual disk using the differential location data structure and the virtual disk file. Finally, the system periodically generates a new snapshot of the virtual disk by transactionally committing changes made to the differential location data structure by the I/O operations to the virtual disk file.
Network architecture for content backup, restoring, and sharing
A method may include generating a list of current files stored in a user device, wherein the list of current files includes unique file identifiers, each associated with a corresponding one of the current files. The method may further include sending the list of current files from the user device to a network device and receiving a copy list from the network device in the user device. The copy list may be generated by comparing the list of current files to a list of previously copied files, and the list of previously copied files may include unique file identifiers, each associated with a different one of the previously copied files. The method may include sending the files listed in the copy list from the user device to the network device.
Shared storage of categorization, labeling or tagging of objects in a collaboration system
A computer that is programmed with collaboration software receives a new value of an attribute (or property or characteristic) which is specific to a label (or tag or category) as applied to an object managed by the computer. The computer does not use the new value to overwrite a corresponding old value in existing metadata. Instead, the computer is programmed to hold the new value in an incremental label application for the object. The computer is further programmed to respond to a request for the object's label application, by retrieving the incremental label application, and a full application of said label to said object. The computer uses attribute values in the incremental label application to update corresponding attribute values in a copy of the full label application, in a time sequence based on the time of creation of incremental label applications, thereby to generate a current label application.
Representing an object as an aggregate of identifiable parts shareable by users of a collaboration system
A computer that is programmed with collaboration software receives a change to be made to an object that can be of any type among several predetermined types such as message, document, contact, discussion and meeting. The object is represented as an aggregate of identifiable parts shareable by users, including at least a content part, a lock part, and an access-control part. Each version of the object is represented by a set of identifiers of these parts. In response to receipt of information identifying the change, the computer automatically identifies a specific part to be changed from among multiple parts of the object. Thereafter, the computer automatically creates a new instance of the specific part which contains the change as per the received information. The computer automatically stores a new version of the object as a new set that includes a new identifier of the new instance of the specific part.
Data record collapse and split functionality
Management of data records corresponding to duplicate entities is provided, in which multiple data records are collapsed into a master data record for an entity. Attributes of the multiple data records which are to be included in the master data record for the entity are determined and a source data record is selected from the multiple data records to become the master data record. At least one remaining data record is a candidate data record to be collapsed into the master data record. The selected source data record is updated with the determined attributes to form the master data record. The selected source data record remains active in its database and becomes the master data record in response to the updating, and the at least one candidate data record is deactivated.
Relationship serialization and reconstruction for entities
Systems and methods that enable relationship information to be carried along with the entity when serializing/deserializing entities among application tiers. A tracking component tracks information on relationships associated with an entity, and further enables users to perform subsequent change processing on the entity's relationship information. Accordingly, relationship information can be carried along with the entity such that database operation can be performed without requirement of additional information from the database (e.g., foreign key information that is part of associated graphs).
Minimizing latency in network program through transfer of authority over program assets
Authority over an artificial intelligence (AI) asset can be controlled among two or more processing devices running a common program over a network using a technique in which authority can be transferred. A first processing device can exercise authority over the AI asset by executing code that controls one or more actions of the AI asset according to a decision tree. The decision tree can determine whether to engage the program asset based on criteria other than a distance between the AI asset and the program asset. The first processing device can broadcast a state of the AI asset to one or more other devices running the program. If the decision tree determines that the AI asset should engage a program asset over which another processing device has authority the first processing device can relinquish authority over the AI asset and transfer authority to the other device.
A computer implemented method for knowledge validation includes identifying a fact for validation. A semantic model representing the fact for validation can be created. A context associated with the fact can be identified, and an automaton can be created based at least in part on the identified context. The fact can be validated using the automaton.
Methods and systems for modifying a knowledge base system
In one embodiment, a query is received at a knowledge base system via a communications link and a new rule is generated in response to an indication that a rule library of the knowledge base system does not include a rule associated with the query. A synthetic document descriptor is received and a value associated with the synthetic document descriptor is stored at an action identifier of the new rule. The new rule is then stored at the rule library. The new rule has a condition identifier field and an action identifier field, and the condition identifier field of the new rule has a value associated with the query. The synthetic document descriptor includes a first reference to a portion of a first document and a second reference to a portion of a second document.
Method and system for configuring rules for execution
Data-driven rules are eliminated from an application, and replaced with goal-driven rules that formally and completely characterize high-level business concepts, while enabling the resulting goal-driven rules to be executed eagerly using a forward chaining rule engine in a way that preserves the data-driven behavior of the original rules. A computer-implemented method for executing business rules provides a unified rule that encapsulates a goal-oriented rule with triggering information selected from dependencies of the goal-oriented rule. The unified rule may be eagerly executed in response to changes in data specified by the dependencies, or lazily executed in response to a request for the value computed by the rule.
Computerized system for monitoring and controlling physical data-producing apparatus
A computerized system for monitoring physical data for anomalies, which physical data are predictable given predetermined information, the system comprising a predetermined information data point generator operative to compute a sequence of model data points which the physical data, given predetermined information, can be expected to duplicate at each of a corresponding sequence of temporal sampling points; a wayward point monitor including a processor operative for monitoring the physical data including identifying wayward points within said physical data that are incongruous with the predetermined information; and an anomalous episode-prompted alarm generator operative for identifying anomalous episodes, each including a cluster of wayward points satisfying predefined anomalous episode-defining criteria and generating an alarm for each anomalous episode identified.
Computer implemented method for determining all markov boundaries and its application for discovering multiple maximally accurate and non-redundant predictive models
Methods for discovery of a Markov boundary from data constitute one of the most important recent developments in pattern recognition and applied statistics, primarily because they offer a principled solution to the variable/feature selection problem and give insight about local causal structure. Even though there is always a single Markov boundary of the response variable in faithful distributions, distributions with violations of the intersection property of probability theory may have multiple Markov boundaries. Such distributions are abundant in practical data-analytic applications, and there are several reasons why it is important to discover all Markov boundaries from such data. The present invention is a novel computer implemented generative method (termed TIE*) that can discover all Markov boundaries from a data sample drawn from a distribution. TIE* can be instantiated to discover all and only Markov boundaries independent of data distribution. TIE* has been tested with simulated and re-simulated data and then applied to (a) identify the set of maximally accurate and non-redundant molecular signatures and to (b) discover Markov boundaries in datasets from several application domains including but not limited to: biology, medicine, economics, ecology, digit recognition, text categorization, and computational biology.
Enhanced DeepQA in a medical environment
A DeepQA engine is enhanced to provide a digital medical investigation tool which assists a medical professional in researching potential causes of a set of patient conditions, including clues, facts and factoids about the patient. The DeepQA engine provides one or more answers to a natural language question with confidence levels for each answer. If a confidence level falls below a threshold, the enhanced DeepQA engine performs a crowd sourcing operation to gather additional information from one or more domain experts. The domain expert responses are provided to the medical professional, and are learned by the enhanced DeepQA system to provide for better research of similar patient conditions in future queries.
Link spam detection using smooth classification function
A spam detection system is disclosed. The system includes a classifier training component that receives a first set of training pages labeled as normal pages and a second set of training pages labeled as spam pages. The training component trains a web page classifier based on both the first set of training pages and the second set of training pages. A spam detector then receives unlabeled web pages uses the web page classifier to classify the unlabeled web pages as spam pages or normal pages.
Matching offers to known products
A method and apparatus for electronically matching an electronic offer to structured data for a product offering is disclosed. The structure data is reviewed and a dictionary of terms for each attribute from the structure data is created. Attributes in unstructured text may be determined. Each pair of the attributes (name and value) from the unstructured data and the structured data are obtained, the attribute pairs of the structured data and the unstructured data and compared and a similarity level is calculated for the matching the attribute pairs. The structured data pair that has the highest similarity score to the unstructured data pair is selected and returned.
Learning device, learning method, and computer program product
According to an embodiment, a learning device includes a selecting unit, a learning unit, and an evaluating unit. The selecting unit performs a plurality of selection processes of selecting a plurality of groups including one or more learning samples from a learning sample storage unit, where respective learning samples are classified into any one of a plurality of categories. The learning unit learns a classification metric and obtains a set of a classification metric. The evaluating unit acquires two or more evaluation samples of different categories from an evaluation sample storage unit where respective evaluation samples are classified into any one of a plurality of categories; evaluates the classification metric included in the set of the classification metric using the two or more acquired evaluation samples; acquires a plurality of classification metric corresponding to the evaluation results from the set of the classification metric; and thereby generates an evaluation metric including the plurality of classification metric.
User class based media content recommendation methods and systems
An exemplary method includes a media content recommendation system assigning a user of a media content service to a user class included in a plurality of predefined user classes each associated with the media content service, selecting a weight-based recommendation heuristic that is associated with the user class from a plurality of available weight-based recommendation heuristics each associated with a distinct user class included in the plurality of predefined user classes, and generating, in accordance with the selected weight-based recommendation heuristic, a recommendation score associated with a media content instance available for access by the user by way of a media content access device associated with the media content service. Corresponding methods and systems are also disclosed.
Providing comparison experiences in response to search queries
Computer-readable media, computer systems, and computing devices facilitate providing a comparison experience to a user in response to a search query. Upon receiving a search query from the user, entities are extracted from the query. The entities are associated with entity classes. The entities, entity classes, previous user behavior, and other information are used to infer whether the user likely is engaging in a comparison task. If the inference indicates that the user likely is engaging in a comparison task, a comparison experience is generated and access to the comparison experience is provided to the user.
Smart card purchasing transactions using wireless telecommunications network
A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card.
Tracking, distribution and management of apportionable licenses granted for distributed software products
A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
Method and apparatus for verifying financial account information
An apparatus and method for verifying a customer's financial information is disclosed wherein a seller accepts information about the details of price and quantity of the goods to be purchased, and accepts information about customer's financial account. Payment is authorized or processed for desired goods in a variable transaction amount that is not equal to the total price of the goods. Then the amount of the transaction is received from the customer and compared to the amount charged to the bank. If the two amounts match then the goods are shipped to the customer and if not already processed payment is settled.
Fraud prevention and replacement of credit/debit cards—lost, stolen, defective or fraudulently used
A credit card security system method for preventing fraudulent use, comprising the steps of a credit card provider opening one account with two different card numbers, with a first “main credit card” and a second credit card for a spare. The main credit card is activated by the provider and the spare credit card remains “deactivated”. On a pre-set time basis the credit card provider will automatically upon notice to the customer, deactivate the main card and activate the spare card. If any suspicious or fraudulent transaction is detected by the credit card provider, the main credit card is deactivated. If the transaction is authorized, then the main credit card is re-activated. If the transaction is not authorized, the spare credit card is activated to be used as the main credit card. The credit card provider then replaces the deactivated credit card with a new number and sends a new credit card with the new credit card remaining deactivated.
System and method for determining model credit default swap spreads
A system and method of determining a model default swap spread for a firm which includes the following steps: (i) determining a calibration group of the firm, wherein the calibration group comprises other firms having a region, a sector and a coarse quality related to the firm; (ii) setting firm leverage variables through combining observable data with a value of at least one model parameter; (iii) calibrating variables based on the calibration group; (iv) calculating the model default swap spread based on at least one of calibration variables; and (v) storing the model default swap spread.
Single premium deferred annuity
Systems and methods relating to a single premium deferred annuity are provided. In one embodiment, the annuity may be used for retirement planning. Aspects disclosed herein relate to an annuity that provides protection against market losses and allows the purchaser/owner to choose the level of protection.
Construction project submittal management
A network based construction project management system. The system includes network accessible databases of project information including drawings and specifications. The system allows for varying amount of access for various user including general contractors, subcontractors, architects and project owners. The system allows for the effective creation, management and long term accessible storage of project submittals.
Online shopping using NFC and a mobile device
A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.
Payment vehicle recommendations based on payment rules
Systems and methods for providing payment vehicle recommendations are provided herein. In the systems and methods, a transaction associated with one of a transaction amount and purchase items is identified based on the transaction data; one or more payment rules associated with the transaction are identified; the terms of the one or more payment rules are compared with the transaction amount or purchase items; the most favorable payment vehicle for the transaction is determined based on the comparison of the terms of the one or more payment rules and the transaction amount or purchase items; and a recommendation of at least one payment vehicle is provided based on the determination of the most favorable payment vehicle on a display of a mobile device of a user.
System, method and computer program product for providing information in response to receiving a product identifier
A system, method and computer program product are included for providing product-related information. In use, a product identifier associated with a product is received after a point of sale, where such product identifier is received utilizing a network. Further, information associated with the product is provided utilizing the network in response to the receipt of the product identifier.
Wireless network hotel room management system
A wireless network hotel room management system includes a communications network. The system includes a computer connected to the communications network and includes a memory configured to store programming and a processor to execute the programming. A guest room unit is situated in each guest room and is in data communication with the network. A housekeeping module is in communication with the network. The computer monitors real time status of the room. Each guest unit is configured to receive projected absence data from a guest and to communicate the same to the computer through the communications network. Programming executed by the processor determines if received projected absence data is indicative that a guest will be gone long enough for housekeeping to clean the room and, if so, communicates a housekeeping order. The system includes a room reservation module for reserving a room and receiving a room key.
Two-layer data architecture for reservation management systems
A reservation management system includes at least one processing node that includes a memory and a processor. The at least one processing node further includes a set of reservation processing and transaction modules that manage and process reservation requests and inquiries. At least one general purpose database is communicatively coupled to the at least one processing node. The at least one general purpose database includes a set of pre-allocated tables of fixed length records. At least one persistent storage device is communicatively coupled to the at least one processing node. The general purpose database persistently stores the set of pre-allocated tables of fixed length records on the at least one persistent storage device.
Seat routine processes
The subject matter of this specification can be embodied in, among other things, a process that includes selecting accommodations during a travel reservation is described. The method includes receiving, at a software application that manages travel reservations, input that customizes configurable attributes of software travel objects representing accommodations used in transportation of passengers. The method also includes receiving criteria from a customer specifying preferences that affect a passenger's experience during travel, ranking the received criteria so that one or more criterion are preferred, selecting one or more of the accommodations using an optimization function to compare the ranked criteria to the customized configurable attributes, and outputting the selected one or more accommodations for use by the customer in selecting a first accommodation for the passenger.
System and method for determining insurance group dividends
Systems and methods for providing dividends to customers are disclosed. The system includes a database for storing data and a business logic processor for determining a dividend to provide to a customer. The stored data includes eligibility criteria for membership in one of a plurality of group dividend plans, data about customers assigned to the plans, and premium payments associated with the customers. The business logic processor receives eligibility data related to a customer's eligibility for assignment to a group dividend plan. The business logic processor uses the received data to identify a dividend group plan that a customer is eligible to join and assigns the customer to the identified plan. Finally, the business logic processor calculates a dividend to provide to the customer based on the assigned plan.
Bio-sample collection kits, systems and methods for generating biomarker data for use in determining an insurance score
The present disclosure generally relates to bio-sample, such as a dried blood spot (DBS) sample, a breath sample, an endothelial sample, saliva sample, etc., collection kits and identity authenticating mechanisms for the sample donors. The present disclosure further relates to systems and methods for generating biomarker data using bio-sample analysis information and authenticating information. The biomarker data may be used to determine an insurance score.
Systems and methods for managing insurance account documents
A Personal Health Application (PHA) management system stores templates that are used to generate customized PHA documents. The PHA management system receives a request for a PHA document, where the request includes information that describes a new insurance policy or modification of a policy that an insurance consumer is requesting, that indicates the state or other area in which the insurance consumer lives, that indicates the reason that the consumer is requesting the new policy or modification, and/or other information. The PHA management system generates a PHA document based on a stored template and the information included in the request, and the generated PHA document may be provided to the insurance consumer.
Interactive medical card and method of processing medical information stored thereon
The present disclosure relates generally to an apparatus, system and method, and more specifically to a portable electronic interactive medical card, which includes a cardholder's medical information for which access is authenticated by biometric verification means, and more particularly to an IMC, which includes an electronic data card configured for storing thereon a biometric identifier used for releasing a detachable prescription element.
Systems and methods for travel, asset, and personnel information and risk management
A system(s) and method(s) for providing travel, asset, and personnel information accumulation, analysis, and reporting for improved risk assessment and management are disclosed. In various embodiments methods and systems may provide travel information to a consumer, by for example, acquiring information from at least one information source, characterizing the acquired information by its pertinence to travel, transforming the characterized travel information into a useable format, applying rules to this transformed travel information in connection with the consumer-specific travel profile, and delivering a report to the consumer. In various embodiments, risk assessments(s) may be provided and may include receiving intelligence from at least one intelligence source, receiving information about one or more asset(s), and generating a risk assessment report. Various embodiments may also include receiving intelligence from at least one intelligence source, receiving asset information, and generating a risk assessment report based on the intelligence and a personnel or employee profile.
Quality improvement techniques in an audio encoder
An audio encoder implements multi-channel coding decision, band truncation, multi-channel rematrixing, and header reduction techniques to improve quality and coding efficiency. In the multi-channel coding decision technique, the audio encoder dynamically selects between joint and independent coding of a multi-channel audio signal via an open-loop decision based upon (a) energy separation between the coding channels, and (b) the disparity between excitation patterns of the separate input channels. In the band truncation technique, the audio encoder performs open-loop band truncation at a cut-off frequency based on a target perceptual quality measure. In multi-channel rematrixing technique, the audio encoder suppresses certain coefficients of a difference channel by scaling according to a scale factor, which is based on current average levels of perceptual quality, current rate control buffer fullness, coding mode, and the amount of channel separation in the source. In the header reduction technique, the audio encoder selectively modifies the quantization step size of zeroed quantization bands so as to encode in fewer frame header bits.
Efficient beat-matched crossfading
Methods and devices to enable efficient beat-matched, DJ-style crossfading are provided. For example, such a method may involve determining beat locations of a first audio stream and a second audio stream and crossfading the first audio stream and the second audio stream such that the beat locations of the first audio stream are substantially aligned with the beat locations of the second audio stream. The beat locations of the first audio stream or the second audio stream may be determined based at least in part on an analysis of frequency data unpacked from one or more compressed audio files.
Melodis crystal decoder method and device for searching an utterance by accessing a dictionary divided among multiple parallel processors
The technology disclosed relates to a system and method for fast, accurate and parallelizable speech search, called Crystal Decoder. It is particularly useful for search applications, as opposed to dictation. It can achieve both speed and accuracy, without sacrificing one for the other. It can search different variations of records in a reference database without a significant increase in elapsed processing time. This is accomplished by first accessing the database, and for each word representation in the database, searching an utterance for likely instances of the word representation utilizing multiple parallel processors. Even the main decoding part can be parallelized as the number of words increase to maintain a fast response time.
System and method for detecting synthetic speaker verification
Disclosed herein are systems, methods, and tangible computer readable-media for detecting synthetic speaker verification. The method comprises receiving a plurality of speech samples of the same word or phrase for verification, comparing each of the plurality of speech samples to each other, denying verification if the plurality of speech samples demonstrate little variance over time or are the same, and verifying the plurality of speech samples if the plurality of speech samples demonstrates sufficient variance over time. One embodiment further adds that each of the plurality of speech samples is collected at different times or in different contexts. In other embodiments, variance is based on a pre-determined threshold or the threshold for variance is adjusted based on a need for authentication certainty. In another embodiment, if the initial comparison is inconclusive, additional speech samples are received.
Method and apparatus to search fixed codebook using tracks of a trellis structure with each track being a union of tracks of an algebraic codebook
A method and apparatus to search a codebook including pulses that model a predetermined component of a speech signal. The method includes the operations of selecting a predetermined number of paths corresponding to a predetermined number of pulse locations that are most consistent with the predetermined component, from among paths corresponding to pulse locations of a predetermined pulse location set allocated to at least one branch that connects one state of a predetermined Trellis structure to another state, performing the path selecting operation on each of states other than the one state, and selecting a path corresponding to pulse locations that are most consistent with the predetermined component, from among paths including the selected paths, wherein each path corresponds to a union of plural tracks of an Algebraic codebook. Accordingly, the number of calculations required during a codebook search is reduced.
Audio signal transient detection
Provided are, among other things, systems, methods and techniques for detecting whether a transient exists within an audio signal. According to one representative embodiment, a segment of a digital audio signal is divided into blocks, and a norm value is calculated for each of a number of the blocks, resulting in a set of norm values for such blocks, each such norm value representing a measure of signal strength within a corresponding block. A maximum norm value is then identified across such blocks, and a test criterion is applied to the norm values. If the test criterion is not satisfied, a first signal indicating that the segment does not include any transient is output, and if the test criterion is satisfied, a second signal indicating that the segment includes a transient is output. According to this embodiment, the test criterion involves a comparison of the maximum norm value to a different second maximum norm value, subject to a specified constraint, within the segment.
Deep model statistics method for machine translation
In one embodiment, the invention provides a method for machine translation of a source document in an input language to a target document in an output language, comprising generating translation options corresponding to at least portions of each sentence in the input language; and selecting a translation option for the sentence based on statistics associated with the translation options.
Electronic device and method for supporting multiple languages in image measurement programs
An electronic device connected to a measurement machine is installed with an image measurement program. The electronic device records detailed information in relation to a new language file added to a template file provided by the image measurement program, and creates one or more executable files for the image measurement program based on the template file. When the image measurement program is started, the electronic device adds the new language to a language selection menu of a user interface of the image measurement program by executing the one or more executable files, displays all languages available to the image measurement program under the language selection menu of the user interface, and after selection and displays all information in a user-selected language.
Translation cache prediction
Techniques for client side translation cache prediction are provided. The techniques include obtaining meta data associated with a request, applying a cache prediction model to the meta data to automatically predict one or more translations associated with the request, and storing the one or more translations in a client translation cache.
On-demand language translation for television programs
In an embodiment, a method of providing an on demand translation service is provided. A subscriber may be charged a reduced fee or no fee for use of the on demand translation service in exchange for displaying commercial messages to the subscriber, the commercial messages being selected based on subscriber information. A multimedia signal including information in a source language may be received. The information may be obtained as text in the source language from the multimedia signal. The text may be translated from the source language to a target language. Translated information, based on the translated text, may be transmitted to a processing device for presentation to the subscriber. The received multimedia signal may be sent to a multimedia device for viewing.
Method for calculating primary time constant of power grid
A method for calculating a primary time constant of a power grid. It comprises the steps of: establishing an electromechanical transient model of the power grid using the widely used power system analysis software package (PSASP) according to the actual power grid parameters and network topology; establishing an electromagnetic transient model under PASAP using the actual power grid parameters for a site which requires the calculation of the primary time constant of the power grid, and setting a ground short circuit fault at the site; obtaining a transient short circuit current of the short circuit point of the power grid using a hybrid simulation method of the electromechanical and electromagnetic transient models; filtering out a periodic component in the transient short circuit current to obtain a non-periodic component attenuated with time, and finding the attenuation time constant of the non-periodic component which is the primary time constant of the power grid.
Method and system for coupling reservoir and surface facility simulations
A method, system and apparatus are disclosed for coupling independent reservoir and surface facility network simulators. A reservoir simulator is configured to simulate fluid flow in subterranean reservoirs and a surface facility network simulator is configured to simulate fluid flow in production equipment. Simulation of fluid flow in a subterranean reservoir is initiated using the reservoir simulator. Simulation of fluid flow in production equipment is initiated using the surface facility network simulator. The simulated fluid flow in the production equipment includes fluids produced from the subterranean reservoir. The simulation of fluid flow in the subterranean reservoir is coupled with the simulation of fluid flow in the production equipment using a sub-domain inflow performance relationship.
Supervised nonnegative matrix factorization
Graph embedding is incorporated into nonnegative matrix factorization, NMF, while using the original formulation of graph embedding. Negative values are permitted in the definition of graph embedding without violating the nonnegative requirement of NMF. The factorized matrices of NMF are found by an iterative process.
Methods, systems and devices for linking user devices to activity tracking devices
Methods, systems and devices for linking devices to tracking devices is provided. One method includes scanning, by an activity tracking device, for a semi-unique identifier broadcasted by a device. The method connects the device with the activity tracking device after the semi-unique identifier is found to be of the device by the activity tracking device. The activity tracking device is configured to communicate with the device to obtain a device identification (ID) of the device. The method then automatically linking the device to the activity tracking device when the device ID of the device matches a copy of the device ID stored in the activity tracking device. In one example, the tracking devices operate as a master and the devices operate as a slave.
System and method for determining a position of a movable object, arrangement of general lighting LED and light sensor for a position determination of a movable object
A system for determining a position of a moving object is described, having: an arrangement having at least three general lighting LEDs, wherein each of the general lighting LEDs is implemented to transmit one light signal each with a transmission time information and a transmitter information, wherein the wavelength ranges of the general lighting LEDs for the signal transmission overlap, wherein the transmitter information enables at least a determination of a position of the respective general lighting LEDs and the transmission time information is information on a point in time when the respective signal was transmitted; a light sensor mounted to the moving object and implemented to receive the light signals and allocate one signal receive time each; and an evaluation unit which is implemented to determine the position of the object based on the transmitter information, the transmission time information and the receive time information.
Positioning apparatus, positioning method, and storage medium
A positioning apparatus includes: a position measuring section to measure a present position of the positioning apparatus to obtain measured position data; a movement measuring section to measure a moving direction and a moving distance; a position calculating section to calculate the present position to obtain calculated position data by accumulating, with respect to reference position, moving data corresponds to the moving direction and the moving distance measured by the movement measuring section; a selecting section to compare accuracy of the measured position data with an accuracy index of the calculated position data to select more accurate position data; and a reference position setting section to set the measured position data as the reference position when the measured position data is selected by the selecting section; wherein the accuracy index of the calculated position data is set such that the accuracy falls correspondence with increasing distance from the reference position.
Sensor for measurement of desired variable of medium
A sensor for measurement of a desired variable of a medium includes a sensor having at least two measured value pick-ups and at least two processing units within a sensor housing. The measured value pick-up is defined as a part of the sensor which directly responds to a measured variable to be detected. Each measured value pick-up may be connected via a signal line to each processing unit so that the signal value representing the measured value can be transferred to the processing unit. The at least two measured value pick-ups pick up at least two measured values independently of one another and transfer them to their connected processing units. With this arrangement, the effective actual values of the measurement value to be checked is applied to both measured value picks-ups without time delay.
Systems and methods for remote electronics device testing
Testing systems and methods are operable to perform diagnostic testing of a remote electronic device under test (DUT). An exemplary embodiment establishes a communication link between a diagnostic test device and the electronic DUT, receives a plurality of diagnostic commands from the electronic DUT, each of the plurality of diagnostic commands defined by at least one device diagnostic instruction (DDI) and a corresponding DDI description; generates a diagnostics script based upon selection of at least one of the diagnostic commands, wherein the generated diagnostics script includes at least one return device diagnostic instruction (RDDI) corresponding to the selected at least one diagnostic command; and transmits the at least one RDDI from the diagnostic test device to the DUT.
Method and apparatus for clock synchronization
A system for synchronizing components of a downhole system includes: a source assembly including a source clock; an electromagnetic source associated with the source assembly and configured to emit an electromagnetic signal into an earth formation at a transmission time; a receiver assembly including a receiver clock; an electromagnetic receiver associated with the receiver clock and configured to detect the electromagnetic signal; and a processor configured to identify a receipt time of the electromagnetic signal based on the receiver clock and adjust the receiver clock by comparing the transmission time to the receipt time.
Method and system for organic specimen feature identification in ultrasound image
A system, method, and computer program product. The system includes an ultrasound transducer configured for coupling ultrasound incident waves into selected regions of an organic specimen and transferring resultant ultrasound data from specimen features for selected ultrasound incident waves to a processor, a location detection unit configured for detecting locations of the ultrasound transducer and organic specimen and for transferring that data to the processor, a memory module configured for storing anatomic model data for at least part of the organic specimen, the processor configured for identifying the region associated with the selected ultrasound data, creating an ultrasound image from that data, obtaining model extracted data from the anatomic model data corresponding to the selected ultrasound data region, creating a model image from the model extracted data, and transferring the ultrasound and model images to a display module, and the display module configured for displaying the ultrasound and model images.
Apparatus and method for comparing gas pressure measurements
A singular sealed apparatus and method suitable for confirming pressure measurements in a rebreather prior to use of the rebreather. The singular sealed apparatus may have a canister lid, gas sensors and a processor, all from a rebreather, as well as a pressure sensor, an input device, a processor, an indicator and a pod with a pressure measurement outlet, a gas supply inlet, a relief valve and a gas exit valve. Alternatively, the singular sealed apparatus may have a gas sensor from a rebreather and an analyzer, a pressure sensor, an input device, a processor, an indicator, a lid and a pod with a pressure measurement outlet, a gas supply inlet, a relief valve and a gas exit valve. The inventive method is characterized by assembling the singular sealed apparatus, inputting a concentration of a gas present in a gas mixture, admitting the gas mixture into the singular sealed apparatus, expelling ambient gas present in the singular sealed apparatus, measuring absolute pressure of the gas mixture, calculating partial pressure of the gas, indicating the calculated partial pressure of the gas, measuring partial pressure of the gas, indicating the measured partial pressure of the gas and comparing the calculated partial pressure of the gas to the measured partial pressure of the gas.
Method and system for characterizing wear damage on a rolling-element bearing
Methods and systems for characterizing and estimating the wear damage of a rolling-element bearing are provided. At least one geometric attribute, such as the length, of a damage feature (e.g., a spall cavity) on the rolling-element bearing is calculated based on a geometry of the rolling-element bearing. An accumulated mass of damage particles ejected from the rolling-element bearing during operation of the rolling-element bearing is determined. When the accumulated mass of the damage particles exceeds a predetermined threshold, an indication or a signal is generated. The predetermined threshold of the accumulated mass is based on the at least one geometric attribute of the damage feature. The calculation of the at least one geometric attribute may be based on, for example, a depth of the damage feature, a radius of the rolling elements in the bearing, a radius of an outer race of the bearing as measured from an inner surface thereof, and the number of rolling elements in the bearing.
Engine life predicting apparatus and refrigerating apparatus
A current detector and a voltage detector respectively detect a current value and a voltage value outputted from an engine generator. An operating block determines a weight constant on the basis of the current value and the voltage value, weights the operating time of an engine by using the weight constant, and integrates the weighted operating time to calculate an integral time. A judging block compares the integral time and a reference time, and gives a notification to an indicator when it judges that the integral time exceeds the reference time. Receiving the notification, the indicator makes an external indication. The current detector and the voltage detector can be made of electric circuitry, so that the life of the engine can be predicted at low costs and with high reliability.
Apparatus and method for comparing protein structure using 3D RDA and Fourier descriptor
Provided is an apparatus and method for comparing a protein structure, which can search a protein similar to an inquiry protein in a 3D protein database in real time by describing a feature of a protein structure by using a three-dimensional (3D) relative directional angle (RDA) and a Fourier descriptor. The apparatus includes: a 3D RDA coder configured to code a 3D RDA of a target protein data or an inquiry protein data inputted from the outside; a Fourier transformer configured to obtain Fourier coefficients by Fourier transforming 3D RDA coding values coded by the 3D RDA coder; a comparator configured to compare the obtained Fourier coefficient of the target protein data with the obtained Fourier coefficient of the inquiry protein data; and a data generator configured to output protein data in order from high similarity to low similarity according to the comparison result of the comparator.
Tissue disorder imaging analysis
Methods and systems are described for quantitatively determining a score for a patient having a disorder, e.g., a stroke, in a tissue, such as the brain, by analyzing both the extent and location of damage to the tissue caused by the disorder.
Method and apparatus for monitoring offshore contamination
The invention provides a method of detecting seawater contamination from an offshore hydrocarbon well facility comprising seabed wellheads connected by hydrocarbon conduits to a seabed pipeline head from which a hydrocarbon pipeline leads to a remote hydrocarbon receiving facility, each said wellhead being provided with a protective cover to which is removably attached a sensor unit, each said sensor unit comprising a biological sensor and a data transmitter coupled by a data transmission line to said remote facility, said well facility further comprising a seawater velocity sensor, a seawater conductivity sensor and a temperature sensor also coupled by a data transmission line, wherein data from said data transmission line is analysed to determine indicia of seawater contamination at said well facility and of the seawater flow at said well facility and thereby to provide a signal indicative of seawater contamination above a preselected limit deriving from said well facility.
Downhole sample analysis method
A method for downhole fluid analysis is disclosed. The method includes positioning a downhole fluid sampling tool at first and second locations; extracting and compositionally analyzing samples of reservoir fluid while positioned at the first and second locations; comparing analysis results; and repositioning the tool to a third location depending on the results of the comparison. The compositional analysis can be performed using downhole gas chromatography and mass spectrometry systems and preferably can identify subtle non-homogeneities such as biomarkers. The fluid extraction can be performed using a focuses dual-flowline type sampling probe.
Methods for estimating annual average daily traffic
Methods for estimating annual average daily traffic for a road segment from historical traffic counts are disclosed.
The present invention provides, with reference to FIG. 1, an internal combustion engine (10) having a fuel injector which comprises a sprung piston (55) or a resilient diaphragm piston (8155) and an electrical coil (57, 8158) for displacing the piston (55, 8155). The piston draws fuel into and expels fuel from a pumping chamber (52, 8152). The number of operations of the injector per engine cycle is controlled by an electronic controller (23, 8159) to control the quality of fuel delivered per cycle to a combustion chamber. A voltage measured in the coil (52, 8158) by movement of the piston under action of the spring or due to its own resilience is used to give an indication of vapour pressure of the fuel. A device akin to the injector can be used to draw fuel from a pipeline to measure the vapour pressure of the fluid.
Vehicle pneumatic booster system operating method and apparatus
An apparatus and method for improving vehicle performance by application of pneumatic boost to vehicle engines, including diesel engines having at least one turbocharger supplying air to the engine, in a manner which increases engine torque output while minimizing the potential for exceed various operating limits to the maximum practicable extent. The vehicle's pneumatic booster system controller implements strategies for shaping the rate of the air injection during a boost event, tailoring the air injection to obtain maximum engine torque output while respecting the operating limits, by controlling the timing, duration, quantity and/or injection pattern during a boost event to achieve a refined distribution of compressed air injection over the course of the boost event to provide desired engine torque output and fuel efficiency while minimizing the potential for exceeding a wide variety of operation limits, regulatory, engineering and passenger comfort limits.
Method for adjusting a steering system in a vehicle
In a method for adjusting a steering system in a vehicle, a setpoint trajectory is produced to which a tolerance corridor is assigned, a basic steering torque for guiding the vehicle within the tolerance corridor being generated. In the event that the vehicle leaves the tolerance corridor, a steering guidance torque which acts upon the vehicle in the direction of the tolerance corridor is superimposed on the basic steering torque.
Dynamic configuration of distribution feeder parameters in a power grid
In one embodiment, a system identifies a grid topology of a plurality of distribution automation (DA) devices of a distribution feeder circuit in a power grid, and determines parameters for each of the DA devices of the distribution feeder circuit based on the grid topology e.g., protection parameters such that DA devices further from a power source in the power grid up to a normally open point (NOP) are configured to trigger protection earlier than DA devices closer to the power source. The DA devices may then be configured with respective parameters as determined, and in response to detecting a change of the grid topology, updated parameters may be determined for one or more of the DA devices based on the changed grid topology. The system then reconfigures respective parameters of each of the DA devices that have updated parameters due to the change of the grid topology.
Electrical appliance energy consumption control
An electrical appliance configured to receive power and a power consumption signal from an electrical power distribution system comprises an energy storage device and a controller. The energy storage device includes a heat storage medium and a heater. The heater is configured to heat the heat storage medium at a heating rate. The controller adjusts the heating rate based on the power consumption signal.
Wind turbine arranged for independent operation of its components and related method and computer program
A wind turbine which is composed of several subunits is provided. Each of the several subunits includes a controller. Each of the controllers is adapted to operate in a cooperative mode and in an isolated mode. In the cooperative mode, one of the controllers operates as a master controller and the remaining controllers operate as slave controllers. In the isolated mode, each subunit is exclusively controlled by its respective controller, wherein each of the controllers acts as an independent master controller for its subunit. Further, a method for operating a wind turbine which includes at least two subunits is provided. Each of the at least two subunits includes at least one sensor, at least one actuator and a controller. The method for operating the wind turbine is carried out independently in each subunit and includes detecting at least one sensor signal; and determining and transferring a command to at least one actuator. Further, a segmented computer program for controlling a wind turbine which includes at least two subunits is provided.
Control system for a water distribution system
A control system for remotely controlling the operation of a water distribution system is disclosed. The control system comprises a communication interface to enable communication between the control system and the water distribution system such that communication includes receiving from the water distribution system payment for dispensing of water, data on the working of its various components and data on the quality of the water dispensed by it. The control system further comprises a control processor configured to analyze data received from the water distribution system to determine if the quality of the water at the water distribution system satisfies a predetermined quality standard and to determine if the components of the water distribution system are functioning within a predetermined range. The control processor is further configured to issue component parameter adjustment instructions to modify the working of the water distribution system or instructions to stop dispensing of water if the quality standard is not satisfied or the components of the water distribution system are not functioning within the predetermined range.
Fluid identification and tracking
Embodiments disclosed herein include systems and methods for fluid identification and tracking. At least one embodiment of a method includes determining that a vehicle is discharging a fluid, determining an ingredient of the fluid, and determining a first vehicle location. Some embodiments include determining, based on the ingredient, whether discharge of the fluid at the first vehicle location is allowable and in response to determining that discharge of the fluid at the first vehicle location is not allowable, performing, by a computing device, a first preventative measure.
Pressure compensated flow rate controller with BTU meter
A constant-flow control valve and BTU meter assembly that has a pressure independent, constant-flow control valve assembly connectable to the fluid-based heating or cooling system. A valve stem is connected to a valve member and is rotatable as a unit relative to a valve body to change the position of valve member to change a fluid flow rate through the valve. The valve member's position relative to the fluid path is directly related to the fluid flow rate. A BTU meter assembly is connected to the valve stem, which is rotatable relative to the BTU meter assembly. A position sensor of the BTU meter assembly detects a rotational position of the valve stem relative to the BTU body. A controller of the BTU meter assembly determines the fluid flow rate based upon the pressure drop across the valve assembly and the rotational position of the valve stem.
Fan speed control of rack devices where sum of device airflows is greater than maximum airflow of rack
Computing devices have fan speeds governing airflows through the computing devices. The rack has a maximum airflow associated with a cooling component for the rack. The computing devices transmit their current airflows. A sum of the current airflows is determined. Where the sum is greater than the maximum airflow, the fan speeds of one or more selected computing devices are decreased. The fan speeds of lower priority computing devices may be reduced before the fan speeds higher priority computing devices are reduced. Fan speed reduction may be achieved in a centralized manner, by employing a centralized management component, or in a decentralized manner, without employing a centralized management component.
Handling apparatus, control device, control method, and program
A handling apparatus having a belt conveyor (2) for conveying a work (10), a robot (4) for performing a predetermined operation for the work (10), a visual sensor (3) for photographing the work (10) being conveyed to produce work data indicating each work (10) in the photographed image, and a robot controller (5) for gathering the work data for each image thereby to produce a tracking data, and for storing the tracking data in a database, thereby to control the robot (4) with the database so that a predetermined operation is performed on the work (10) transferred to the position of the robot (4). The robot controller (5) performs a predetermined calculation on the work data read out from the database, detects the overlapped work data, and cancels the control of the actions of the robot (4) based on the overlapped work data. The robot controller (5) rearranges the sequences, in which the robot (4) performs the operation on each work (10).
Procedural memory learning and robot control
Methods and apparatus for procedural memory learning to control a robot by demonstrating a task action to the robot and having the robot learn the action according to a similarity matrix of correlated values, attributes, and parameters obtained from the robot as the robot performs the demonstrated action. Learning is done by an artificial neural network associated with the robot controller, so that the robot learns to perform the task associated with the similarity matrix. Extended similarity matrices can contain integrated and differentiated values of variables. Procedural memory learning reduces overhead in instructing robots to perform tasks. Continued learning improves performance and provides automatic compensation for changes in robot condition and environmental factors.
System and method for configuring workstations
A method for managing an inventory system includes receiving an operation request that identifies an inventory item and selecting, from a plurality of workstations, a workstation at which to fulfill the operation request. The method also includes moving an inventory holder storing the identified inventory item to the selected workstation and moving a supply holder storing a supply item associated with the received operation request to the selected workstation. The method additionally includes fulfilling the operation request, at least in part, at the workstation.
System and method for order fulfillment
A system includes a first mobile drive unit and a second mobile drive unit. The system also includes a first inventory holder, a second inventory holder, and a third inventory holder. An inventory station includes a first location and a second location and the inventory station operable to receive a first inventory item from the first inventory holder at the first location. The first inventory holder transported by the first mobile drive unit. The inventory station also operable to receive a second inventory item from the second inventory holder at the first location. The second inventory holder transported by the second mobile drive unit. The inventory station also operable to receive a third inventory item from the third inventory holder at the second location. The third inventory holder is fixed at the second location while the inventory station receives the first and second inventory item.
Method of controlling semiconductor process distribution
A method of controlling process distribution of a semiconductor process includes receiving process distribution data representing the process distribution of the semiconductor process, receiving a parameter related to the process distribution, generating a virtual metrology model corresponding to the process distribution based on a relationship between the process distribution data and the parameter, and modifying a process variable affecting the process distribution based on the virtual metrology model.
Cutting information determination method, and strip-shaped polarizing sheet manufacturing method therewith, optical display unit manufacturing method therewith, strip-shaped polarizing sheet, and polarizing sheet material
Provided are a cutting information determination method that can use a simpler process to improve yield, and a strip-shaped polarizing sheet manufacturing method using such a method, an optical display unit manufacturing method using such a method, a strip-shaped polarizing sheet, and a polarizing sheet material. A cutting position in the width direction A2, in which a polarizing sheet material MP is to be cut along its longitudinal direction A1, is determined based on the numbers of defects counted with respect to plural points in the width direction A2 of the polarizing sheet material MP. This makes it possible to determine the cutting position in such a way that a region with many defects does not fall within the cut width, so that a higher-yield cutting position can be determined. The cutting position can also be determined using a simple process in which defects are counted with respect to plural points in the width direction A2.
Noise based interest point density pruning
Systems and methods for noise based interest point density pruning are disclosed herein. The systems include determining an amount of noise in an audio sample and adjusting the amount of interest points within an audio sample fingerprint based on the amount of noise. Samples containing high amounts of noise correspondingly generate fingerprints with more interest points. The disclosed systems and methods allow reference fingerprints to be reduced in size while increasing the size of sample fingerprints. The benefits in scalability do not compromise the accuracy of an audio matching system using noise based interest point density pruning.
Electronic music box
Music data memory includes pieces of music within a group and other pieces of music outside the group. The next piece to be played is automatically determined by random table among pieces within the group. Favorite or newest piece is weighted to be more frequently played in the group. Piece in music data memory is automatically included into the group by random table. Newly downloaded piece into music data memory is included into the group by priority. Most frequently played piece is excluded from the group in place of newly included piece. Favorite or newest piece may be an exception of exclusion. Next piece is capable of being played in tempo similar to that of preceding piece by means of tempo-adjusted or piece replacement or repetition of the same piece for the purpose of continued baby cradling in synchronism with the same tempo of succeeding pieces.
Method and system for discovery, validation and delivery of power through a universal power center
A system and method of discovery, validation and delivery of power to an electronic device through a universal power center is provided. The method comprises providing a power tip for an electronic device with a unique identification and broadcasting the unique identification to a power center. The method further includes verifying the unique identification and connection location of the electronic device, determining power requirements for the connected electronic device based on the unique identification and connection location, and delivering power to the electronic device based on the determined power requirements.
Methods and apparatus for multi-vessel renal neuromodulation
Methods and apparatus are provided for multi-vessel neuromodulation, e.g., via a pulsed electric field. Such multi-vessel neuromodulation may effectuate irreversible electroporation or electrofusion, necrosis and/or inducement of apoptosis, alteration of gene expression, action potential attenuation or blockade, changes in cytokine up-regulation and other conditions in target neural fibers. In some embodiments, the multi-vessel neuromodulation is applied to neural fibers that contribute to renal function. Such multi-vessel neuromodulation optionally may be performed bilaterally.
Parylene-based microelectrode array implant for spinal cord stimulation
An implantable electrode array assembly configured to apply electrical stimulation to the spinal cord. A substantially electrically nonconductive layer of the device has a first portion positionable alongside the spinal cord that includes a plurality of first openings and a second portion that includes a plurality of second openings. Electrodes and traces are positioned inside a peripheral portion of a body portion of the device and alongside the layer. At least one of the first openings is adjacent each of the electrodes to provide a pathway through which the electrode may provide electrical stimulation to the spinal cord. At least one of the second openings is adjacent each of the traces to provide a pathway through which the trace may receive electrical stimulation. At least one trace is connected to each electrode and configured to conduct electrical stimulation received by the trace(s) to the electrode.
Lead electrode for use in an MRI-safe implantable medical device
A medical lead is configured to be implanted into a patient's body and comprises a lead body, and an electrode coupled to the lead body. The electrode comprises a first section configured to contact the patient's body, and a second section electrically coupled to the first section and configured to be capacitively coupled to the patient's body.
MRI compatible cable
An MRI compatible cable construct is provided. The cable is adapted to be used with a medical device in direct electrical contact with a patient. Each cable or cable set includes a plurality of filter components. The filter component comprises at least two filter components. One filter component may be a resonant filter at a distal end that resolves the issue of insufficient attenuation by effectively blocking the RF induced current on the cable from exiting the cable at the distal. The second filter component may comprise one or more non-resonant filter(s) or inductors positioned along the length of the cable that resolve(s) the issue of excessive heating of the resonant LC filter by significantly attenuating the current induced on the cable before it reaches the resonant LC filter.
Systems and methods of neuromodulation stimulation for the restoration of sexual function
Systems and methods use an external and/or implantable pulse generator system for neuromodulation stimulation to treat sexual dysfunction by the unilateral or bilateral stimulation of a target nerve A and/or a target nerve B using one or more leads and electrodes implanted in tissue in the pelvic region. The electrical stimulation waveform may be conveyed to the target nerve A electrode for a first predetermined amount of time, and conveyed to the target nerve B electrode for a second predetermined amount of time.
Power generation for implantable devices
An implantable, rechargeable medical system comprised of an implanted device, a power storage device connected to the implantable device, and a charging device operatively connected to the electrical storage device. The charging device can be thermoelectric and have components for transferring thermal energy from an intracranial heat accumulator to an extra-cranial heat sink, for generating an electrical current from the thermal energy transfer, for charging the electrical storage device using the electrical current, for measuring power generation, usage and reserve levels, for measuring temperatures of the intracranial and extra-cranial components, for physically disrupting heat transfer and charging operations, and for generating signals relevant to the status of temperature and electricity transfer in relation to energy generation criteria. The system may also have long-range and short range wireless power harvesting capability as well as movement, and photovoltaic charging capability. Components may be dual purpose, being used for receiving wireless energy as well as for accomplishing other operations such as sensing or stimulating. Specialized accessories assist with providing enhanced wireless power charging.
Implantable medical device which may be controlled from central station
An implantable medical device (IMD) comprises a transmitting/receiving (T/R) device for transmitting medical data sensed from a patient to, and for receiving control signals from, a medical expert (a human medical professional and/or a computerized expert system) at a remote location; an electronic medical treatment device for treating the patient in response to control signals applied thereto; and a sensor circuit, having a sensor circuit output, for producing sensor circuit output signal(s) representing medical data sensed from the patient. The IMD also includes logic device which analyzes the sensor circuit output signal(s) to detect a medical abnormality and, upon detecting an abnormality, either sends a notification signal representing a medical state of said patient to the medical expert at the remote location or sends a local treatment device control signal to the medical treatment device, or does both.
Wireless physiological monitoring
Embodiments of the invention relate to a wireless physiological monitoring system. The system includes at least one wireless sensor and a monitoring device which are linked to one another of a wireless fashion for measuring physiological signals of a patient. The at least one wireless sensor is located on the patient and may comprise a wireless surface electrode assembly or a wireless needle assembly. The system may also comprise a wireless stimulator synchronized with the wireless sensor for performing certain diagnostic tests, such as nerve conduction velocity tests, for example. The wireless sensor preferably includes active, reference and common conductors. The common conductor can be used to measure the common mode voltage of the patient in the vicinity of the testing, and this voltage can then be subtracted from the measured active and reference voltages.
Therapy program modification based on an energy threshold
A therapy program is modified to decompose an electrical stimulation signal defined by the therapy program into a plurality of subsignals based on a comparison between an energy associated with the stimulation signal and a threshold value. An electrical stimulation signal defined by a therapy program may be decomposed into a plurality of subsignals when an electrical stimulation energy of the stimulation signal exceeds the maximum energy output of the medical device or of a channel of the medical device. The energy associated with each one of the subsignals may be less than the energy threshold value of the medical device.
System and method for displaying stimulation field generated by electrode array
An implantable pulse generator includes a current steering capability that allows a clinician or patient to quickly determine a desired electrode stimulation pattern, including which electrodes of a group of electrodes within an electrode array should receive a stimulation current, including the amplitude, width and pulse repetition rate of such current. Movement of the selected group of electrodes is facilitated through the use of remotely generated directional signals, generated by a pointing device, such as a joystick. As movement of the selected group of electrodes occurs, current redistribution amongst the various electrode contacts takes place. The redistribution of stimulus amplitudes utilizes re-normalization of amplitudes so that the perceptual level remains fairly constant. This prevents the resulting paresthesia from falling below the perceptual threshold or above the comfort threshold.
Dressing for tissue treatment
A dressing for treating a damaged tissue, incorporates a pair of electrodes and a conductive gel between the electrodes. An electric current passes between the electrodes through the gel to repair the damaged tissue. Sensors can be incorporated into the dressing along with a control unit. The control unit can vary the current supplied to the electrodes according to environmental parameters detected by the sensors. Alternatively, one or more pre-defined programs can be stored in the control unit for supplying an alternating current to the electrodes with a varying amplitude, frequency and waveform.
Implantable system enabling responsive therapy for pain
An implantable neurostimulator system for treating pain includes scheduled and responsive therapy capabilities including responsive stimulation applied to the brain and peripheral sections of the nervous system. Methods for treating chronic nociceptive, neuropathic, and psychogenic pain employ an inventive system to advantageously reduce multiple symptoms and components of pain and to address underlying causes of pain.
Integrated system and method for treating disease using cognitive training and brain stimulation and computerized magnetic photoelectric stimulator (CMPES)
An integrated system and method for treatment of various diseases, including psychiatric, mental and brain disorders, which preferably combines personalized non-invasive neuronal brain stimulation together with appropriate personalized cognitive training, and which iteratively fine-tunes this treatment by monitoring specific cognitive and brain functions in response to the treatment. A novel brain stimulator device and method, Computerized Magnetic Photo-Electric Stimulator (CCMPES), is described, which integrates electromagnetic stimulation with laser stimulation to generate a magnetic photo-electric stimulation.
Methods and systems for achieving a physiological response by pudendal nerve stimulation and blockade
Methods and apparatus are therefore provided herein for stimulating a desired physiological effect. The methods and apparatus can be used to control micturition, defecation and/or ejaculation. The methods and apparatus also can be used to control pain in the lower pelvic region, for example and without limitation, interstitial cystitis. The methods and apparatus also can be used to increase sexual sensation.
Methods for controlling labor and treating menstrual cramps in uterine muscle
A method of promoting the healing of a lesion in a smooth muscle (200), comprises selecting a smooth muscle portion having a lesion, and applying a non-excitory electric field (210) to the portion, which reduces the mechanical activity of the portion.
System and method for programming neurostimulation devices using cached plug-in software drivers
A system for programming a plurality of different models, or generations, of neurostimulation devices includes a plurality of plug in software drivers stored on a hard drive of the system, wherein the plurality of plug-in software drivers are respectively configured for facilitating communication between the plurality of different models of neurostimulation devices and the system processor via a transceiver. In a method of programming a plurality of different models of neurostimulation devices, the system processor dynamically identifies the model of an interrogated neurostimulator and determines which plug-in software driver to use for programming the interrogated neurostimulator. The plug-in software drivers are cached into memory upon start-up of the system.
Titrated intermittent pacing therapy
Cardioprotective pre-excitation pacing may be applied to stress or de-stress a particular myocardial region delivering of pacing pulses in a manner that causes a dyssynchronous contraction. Such dyssynchronous contractions are responsible for the desired cardioprotective effects of pre-excitation pacing but may also be hazardous. Described herein is a method and system that uses measures of a patient's heart rate or exertion level to control the duty cycles of intermittent pre-excitation pacing.
Method of scaling navigation signals to account for impedance drift in tissue
A method for scaling the impedance measured during the course of an electrophysiology study accounts for impedance drifts. By scaling the impedance there is greater assurance that previously recorded positional information can be used to accurately relocate an electrode at a prior visited position. The scale factor may be based upon a mean value across several sensing electrodes. Alternatively, the scale factor may be calculated specifically with respect to an orientation of a dipole pair of driven electrodes.
Extraction of fetal cardiac signals
A method for processing cardiac signals includes accepting, from a sensor system, a set of one or more signals, the signals including components of a desired cardiac signal and components of a substantially periodic interfering signal. The method is applicable for extraction of desired fetal cardiac signals from signals with interference from the maternal cardiac signal. A periodicity of the interfering signal is determined, and one or more iterations of mitigating an effect of a component of the signals that exhibit periodicity at the determined periodicity of the interfering signal are performed. In some examples, the method further includes determining a periodicity of the desired cardiac signal, and performing one or more iterations of enhancing an effect of a component of the signals that exhibit periodicity at the determined periodicity of the desired cardiac signal.
Radiosurgical ablation of the myocardium
The invention provides a non-invasive system and method for treatment of the heart. In a first aspect, a method for treatment of an anatomical site related to arrhythmogenesis of a heart of a patient comprises creating a target shape encompassing the anatomical site, directing particle beam radiation or x-ray radiation from outside the patient toward the target shape wherein one or more doses of radiation ablates the target shape and disregarding at least one orientation of cardiac motion while creating the target shape or directing the particle beam or both.
Method and a computer program for determining a functional property of a moving object
A system for determining a functional property of a moving object includes a tag contactable to the object such that the tag follows the movement of the object. The system further includes a movement determination device configured to determine the movement of the tag. The system also includes a functional property determination device configured to determine a functional property of the object from the determined movement of the tag.
Methods of performing a power injection procedure including identifying features of a subcutaneously implanted access port for delivery of contrast media
Methods of performing a power injection procedure are described. One method includes taking an x-ray of a subcutaneously implanted access port in a patient to determine whether the access port includes a radiographic feature indicating that the access port is suitable for flowing fluid at a rate of at least about 1 milliliter per second through the access port, identifying the indicating radiographic feature on the x-ray, and flowing a fluid through the access port at a rate of at least about 1 milliliter per second.
System and method for tracking a position of an interventional medical device using a magnetic resonance imaging system
A system and method includes a medical device configured to be inserted into a subject having an imaging coil coupled thereto and configured to be inserted into the subject during a medical procedure to provide tracking information regarding a position of the medical device. A circuit is connected to the imaging coil to switch the circuit between an energy harvesting configuration and an image data acquisition configuration. The circuit includes an energy harvesting path and an imaging data path connected to the imaging coil that are electrically distinct. An energy storage device is connected to receive power delivered along the energy harvesting path when the circuit is in the energy harvesting configuration. An amplifier is connected to receive power from the energy storage device and receive imaging data signals from the imaging coil over the imaging data path to thereby amplify the imaging data signals.
MRI diffusion weighted imaging with estimated motion probing gradient b-factors based on acquired apparent diffusion coefficients for each pixel
A magnetic resonance diagnostic apparatus includes a derivation unit to derive an apparent diffusion coefficient regarding a pixel position for each pixel position included in a region of interest in at least two original images obtained by imaging a same imaging region of a same subject using at least two b-factors which are different from each other, respectively, based on pixel values of each of at least two original images regarding the pixel positions, and a first estimation unit to estimate a pixel value obtained by using a b-factor which is different from the at least two b-factors, regarding each pixel position included in the region of interest, based on the apparent diffusion coefficient derived for each pixel position.
Treatment of female stress urinary incontinence
The present invention relates to the diagnosis and treatment of stress urinary incontinence. In one embodiment, the diagnosis and treatment involves the use of a positional feedback catheter. Positional sensors may be embedded in the catheter to provide real-time tracking of the position and movement of the catheter.
Protective device for mobile devices
The present invention discloses a protective device for a mobile device, comprising: a frame comprising a first sidewall, a second sidewall opposite to the first sidewall, a third sidewall and a fourth sidewall opposite to the third sidewall, the sidewalls being terminated with each other and thereby enclosing and defining a space for accommodating the mobile device, each of the first sidewall and the second sidewall being provided with a first engaging feature; and a backboard provided with a second engaging feature corresponding to the first engaging feature; wherein the backboard is formed separately from the frame and is assembled with the frame through the engagement of the first engaging feature and the second engaging feature of the frame. With the present invention, the style of the protective device enclosing the mobile device can be altered by merely replacing its backboard with a new one.
Slide-type portable electronic device
A slide-type portable electronic device includes a first body, a second body, two sliding assemblies, and a first elastic assembly. The sliding assemblies connect the first body and the second body. The first elastic assembly includes a first guiding member and a first elastic member connecting with the first guiding member. A first fixing portion is formed on the second body. A connecting pole is formed on the first body. The first elastic member is connected to the first fixing portion, and the first guiding member is rotatably sleeved on the connecting pole.
Communication device comprising two or more antennas
The present invention provides an electronic device adapted for performing a wireless communication for a transmission of data. The device comprises at least a first antenna having a first antenna feed point and a second antenna having a second antenna feed point, The antennas are adapted to transmit and receive electromagnetic signals for providing the wireless communication using a multiple antenna communication scheme.
Method and apparatus for intrinsically safe operation of a communication device
An intrinsic safety approach is provided for a battery powered communication device. Sparking is prevented at radio contacts during attachment and removal of a battery (104, 204, 304, 404) from a radio (102, 202, 302, 402) through the use of switches (112, 212, 312, 412/424) to isolate the radio capacitors from the radio contacts and/or dissipate energy from the radio capacitor through a discharge resistor (214, 314, 414).
Dynamically provisioning a device
A wireless communication device comprises a first wireless interface configured to communicate with a device over a first wireless network, and a second wireless interface configured to communicate with a remote server over a second wireless network, the remote server storing one or more executables. The wireless communication device includes a configured to receive device configuration information from the device over the first wireless network, the device configuration information identifying at least processing hardware resources in the device. The controller is configured to select an executable based on the device configuration information, the executable for configuring the device to process data in a particular format and determine whether the selected executable is stored within the wireless communication device, and if not, to retrieve the selected executable from the remote server by way of the second wireless network, and download the selected executable to the device over the first wireless network.
Intelligent contact management
An intelligent contact management technique that automatically manages contacts on a communication device such as a mobile phone is described. The intelligent management technique can automatically determine and display a user's favorite contacts on a display of a mobile device. The technique can also intelligently group contacts based on their contact frequency. It can provide a contact-oriented event notification that notifies a user when a contact event has occurred. The contact-oriented event notification can be associated with a visual representation of an associated contact.
Handset service migration automation and subscriber identity module tracking
A subscriber identity module (SIM) tracking system comprises a computer comprising a processor and a memory. An application is stored in the memory that, when executed by the processor, creates a data record associated with a subscriber identity module, updates the data record with a second mobile device identification of a second mobile device and a second time, and analyzes the data record to determine a usage statistic. The data record comprises at least a first mobile device identification of a first mobile device and a first time. The usage statistic is used to achieve a business objective selected from at least one of determining a marketing opportunity and offering a service based on associating the subscriber identity module with the second mobile device, and the second mobile device has different functional capabilities than the first mobile device.
Wearable and customizable mobile device for multiple users
A customizable mobile device comprising a processing element and a memory element and optional detachable displays is sensory-capable and provides multi-user capability.
System, method, service server, and end-point terminal for providing relevant sound content
The present invention relates to a system and method for providing relevant sound content from an end-point terminal. The invention enables music files in the end-point terminal to be utilized in various kinds of sounds used while using a mobile communication terminal with the system including the end point terminal, the mobile communication terminal, and a service server. The mobile communication terminal is connected to the end-point terminal through a local area network and to the service server through a mobile communication network and is in charge of data transmission between the end-point terminal and the service server for downloading the relevant sound content from the service server which transmits the relevant sound content corresponding to the music file to the mobile communication terminal.
Mobile terminal and method for controlling the same
A mobile terminal includes a sub-device that is attached thereto or detached therefrom, to remotely control the operation and state of the terminal. The mobile terminal includes: a sub-device having an input/output unit and attached to or detached from the terminal; and a controller configured to receive a user input via a certain communication path from the sub-device when the sub-device is separated, and control elements and applications of the terminal according to the user input.
Analog baseband interface for communication systems
A communication system interface between a baseband unit and a radio frequency (RF) unit is configured to advantageously use a common set of lines to carry both transmit and receive baseband analog signals between the baseband and RF unit, thereby enabling a relatively lower signal count and permitting loopback testing of elements within the baseband and the RF units.
Dual-mode mobile device and method for enhancing mutual interference sensitivity of the dual-mode mobile device
A dual-mode mobile device comprises two mode systems. If both of two mode systems of the dual-mode mobile device are in a working status, the mobile device uses a first mode system to control a first power amplifier of the first mode system to transmit power signals, informs a second mode system that the first power amplifier is transmitting power signals, and controls the second mode system to enter into a mixed mode. If the second mode system is in a working status and the first mode system is in a required to work status, the mobile device uses the first mode system to inform the second mode system enter into the mixed mode, and controls the first mode system to inform a second power amplifier of the second mode system to transmit power signals causing both of the first and second mode systems to work synchronously.
Network-adaptive function control method for dual-mode mobile terminal
A network-adaptive function control method is provided for a dual-mode mobile terminal. The network-adaptive function control method for a dual-mode mobile terminal supports communication via first and second-type networks includes registering at least one function as a network-adaptive; determining, when a function is requested to be activated, whether the requested function is the network-adaptive function. If it is determined that the requested function is the network-adaptive function, it if determined whether the mobile terminal is in the first-type network; and activating, if the mobile terminal is in the first-type network, the requested function in association with the first-type network. The network-adaptive function control method of the present invention allows registering portable IP network-friendly functions that are served only in a portable IP network domain but not in the cellular network domain, thereby restricting handover to the costly cellular network, resulting in reduction of communication cost.
Channel reuse with cognitive low interference signals
A computing system in which devices communicate wirelessly as secondary users in a band assigned to primary users. The computers communicate using new signals developed to reduce disruption to primary users of the band. The new signals may be produced by sensing, or otherwise determining, signals used by primary users and developing signals using a modulation scheme or other signal parameters that provides little disruption to primary users. These techniques make available to users unused and/or underused portions of the radio spectrum, such as whitespaces between television channels. The new signals may be generated by software defined radios within the computing devices or by switching between modulation schemes supported by conventional wireless network interface card.
Message filter program for a communication device
A communication device is configured to receive messages. The communication device may comprise a display screen upon which messages are displayed. A microprocessor configured to execute at least one message management program on the communication device, filters incoming messages. The message management program comprising a message filter application filters received messages based on a comparison of sender identification data associated with a received message to approved sender identification data.
Methods and system for integrated messaging are disclosed. Interaction by a user of a mobile device with a graphic user interface of the mobile device is detected. A command is generated based on such interaction independent of further user interaction. An SMS message including the command is transmitted to server, which stores executable instructions associated with the command. Such instructions provide for generation of data in response to the command and may be executed by the server (or another server). The responsive data is then transmitted to the mobile device.
Management of roadside service requests
A method and apparatus to manage a service request involves the use of a smart phone's ability to communicate GPS information over the internet. A customer in need of roadside service can submit a roadside service request through a mobile web site or mobile application, and can provide location information through the smart phone's GPS receiver. Should the system not have a location for the customer, a unique URL can be created that identifies the service request and sent for the customer to access on the smart phone, which allows the web server to request the smart phone's GPS location and automatically associate it with the correct service request.
Dynamic contact list display
A dynamic contact list for a mobile device presents address book contacts in varying arrangements based on external factors. The mobile device may receive a request to display a contact list and may retrieve a sort procedure for the contact list. The sort procedure may be based on a user's prior selections from a group of contact sort rules. The mobile device may retrieve a list of contact identifiers and other information associated with each contact identifier that is applicable to the sort procedure. The mobile device may then apply the sort procedure to the list of contact identifiers and to the information associated with each contact identifier so as to displaying a sorted list of contact identifiers based on the applied sort procedure.
Method and system for mobile device selectively reporting of GPS position information to others
A privacy enhancement device for electronic device such as a cellular telephone. The privacy enhancement device may include a jammer which may produces false information, e.g. false information indicative of pseudo ranges. In addition, the navigation information used on the position detecting device may be locally stored versions of dynamically changing information. The navigation operation may be carried out using a Web service.
Systems and methods for determination of mobile devices in or proximate to an alert area
Systems and methods for determining whether a mobile device is within a specified area and for providing information related to the mobile device are disclosed. A request may be received which inquires as to whether any mobile devices are within an alert area. The request may include a description of the alert area and other preferences or indications. The relevant devices may be determined, as well as related information such as user information. The relevant information may be provided to the requester by any effective means and in any effective format.
Surveying wireless device users by location
The present invention is a system and method for conducting survey using wireless devices. The system architecture of the present invention comprises a location server and a location system. The location server can receive a survey request from a subscriber, delineate a survey area for the survey, broadcast a query containing the survey to a plurality of wireless devices, process responses received from the wireless devices, and deliver a result of the survey to the subscriber. The location system can generate location information for each of the wireless devices that received the query. The location system may be a network-based unit or a portable unit provisioned at each of the wireless devices. In one of the embodiments, the location system is a GPS receiver that generates the longitude and the latitude of the wireless devices at which it is provisioned.
Service provision system
Under a state where a vehicular navigation apparatus and a cellular phone connect a Bluetooth communication link, the cellular phone acquires position information that is detected by the vehicular navigation apparatus and transmits the position information to a server. The server determines a position of a user who is provided with a service based on the position information received from the cellular phone, and provides the service to the user of which the position is determined.
Using wired endpoints to determine position information for wireless endpoints in a network
Provided are a computer readable recording media, system, and method for using wired endpoints to determine position information for wireless endpoints in a network. Identification information from a detected wired endpoint connected to the network is received and a command is issued to the detected wired endpoint to cause the detected wired endpoint to transmit signals identifying the wired endpoint. Information is received from a communicating wireless endpoint, comprising one of the wireless endpoints, using wireless communication, including wireless endpoint identification information and information identifying at least one of the wired endpoints transmitting signals received at the wireless endpoint. Position information is determined for the wired endpoint indicated in the information received from the communicating wireless endpoint. Information on the communicating wireless endpoint is updated to associate with the determined position information.
System and method for providing location information for communications through an access network
A system and method for providing location information for communications through an access network in accordance with embodiments of the invention are disclosed. The system and method involve receiving a communication including a message from an origination device. The communication includes access point information and the message includes an identifier of the communication. The access point information from the communication is extracted and the access point information or geographic data based on the access point information is stored in a database. The message including the identifier is sent to a destination device of the message. The storing of the access point information or the geographic data in the database enables the destination device to obtain the access point information or the geographic data using the identifier included in the message by querying the database.
Method and system for intelligent switch between client based location and server based location for hybrid location client devices
A client device dynamically selects one of client based location computation and server based location computation, based on propagation environment around the client device, to determine its own location. The client device may switch between client based location computation and server based location computation based on the local propagation environment for a desired quality of location and low data load from a remote location server. The client device measures power of received radio transmissions from radio transmission sources such as WLAN access points and/or cellular base stations. For a client based location solution, the client device performs location computation utilizing the local power measurement and assistance data downloaded from the remote location server. For a server based location solution, the remote location server may perform location computation for the client device. The client device determines the corresponding server based location solution by decoding information received from the remote location server.
System and method for locating WIMAX or LTE subscriber stations
A system and method for estimating a location of a subscriber station receiving a first signal from a first base station and receiving a second signal from a second base station where the first and second base stations are nodes in a WiMAX or LIE network. A message may be received from the subscriber station containing first and second information, and a range ring determined from the first base station using the first information. A location hyperbola may be determined using the second information wherein the location hyperbola has the first and second base stations as foci. A location of the subscriber station may be estimated using the range ring and the location hyperbola.
Dock station for mobile devices
Systems, methods and computer program products for processing a call as between a mobile device and a linked base telephone system are described. A phone docking station allows the mobile device to be linked to the base telephone system. Features of either the mobile device or the base telephone system may be used to support a call. For example, through the phone docking station, one or more features and functions of the mobile device may be enabled on or supported by the base telephone system.
Implementation method for improving service call completion ratio and radio network controller
The present invention provides an implementation method for improving a service call completion ratio and a radio network controller. a radio network controller sends a radio bearer establishment message to a user equipment; the radio network controller judges whether a radio bearer response message from the user equipment is not received within a first predetermined period, and if YES, the radio network controller triggers the user equipment to report a cell update message; the radio network controller receives the cell update message from the user equipment and determines a configuration status of the user equipment according to information carried in the cell update message and/or time when receiving the cell update message; and the radio network controller performs call reestablishment processing according to the configuration status of the user equipment.
Dynamic radio capabilities based upon available transport bandwidth
A monitor and control unit is described herein which is associated with a land-based controller (e.g. base station controller) and one or more satellites, where the monitor and control unit is arranged to dynamically configure mobile-based controllers (e.g., radio base stations) located on mobile vessels (e.g., transport vessels, cruise liners) to provide bandwidth (voice and data capabilities) based at least on the number of mobile vessels being served by each of the satellites.
Inter-rat coverage determination for energy saving management
Embodiments of systems and techniques are described for determining inter-radio access technology (inter-RAT) coverage for energy saving management (ESM). In some embodiments, a network management (NM) apparatus may determine that a source cell of a network of a first RAT is triggered to activate an energy saving state and that the source cell is partially overlapped by each of a plurality of cells of one or more networks of one or more RATs different from the first RAT. The NM apparatus may instruct the source cell to activate the energy saving state when a combination of the plurality of cells provides coverage of the source cell. Other embodiments may be described and claimed.
System and method for quality of service in a wireless network environment
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for providing on-demand quality of service guarantees in a wireless network environment. The system determines an on-demand quality of service for a segment of a communication path between a user equipment communicating with a radio access network connected to a core network and an external network connected to the core network. The system then determines if the on-demand quality of service for the segment meets a quality of service requirement. If the on-demand quality of service for the segment does not meet the quality of service requirement, the system identifies an alternate communication path between the user equipment and the external network, wherein the alternate communication path differs from the communication path. The system can then setup the alternate communication path for traffic between the user equipment and the external network.
Apparatus and method for handover between a heterogeneous communication system and a broadband wireless communication system
An operating method, a base station, and terminal of a cell of a first communication system for a handover between the first communication system and a second communication system are provided. The method includes, when a terminal initiates a handover between the first communication system and the second communication system, transmitting, by the base station, a message, requesting to measure a signal level of a downlink, to the terminal, when a signal level measured by the terminal falls below a preset threshold, requesting, by the base station, a handover to the second communication system over a core network, receiving, by the base station, a message, including radio channel parameters the that is required when the terminal accesses to the second communication system, from the second communication system, and forwarding, by the base station, the message, including the radio channel parameters of the second communication system, to the terminal.
Controlling reselection from access points in a telecommunications network
A GSM or UMTS mobile telecommunications network is disclosed. In addition to the conventional radio access network comprising macro base station, one or more additional access points are provided. The access point is connected to the network core by an IP transport broadband connection. The access point is configured to appear to the mobile terminal as a conventional base station—that is, it communicates with the mobile terminal using GSM or UMTS transport protocols and does not require any modification to a standard GSM or UMTS mobile terminal. A subscriber may be provided with a designated “home” access point to provide coverage in their premises. Arrangements are described which will tend to reduce the likelihood that reselection to the macro base station while radio coverage is available from the home access point.
Satellite (GPS) assisted clock apparatus, circuits, systems and processes for cellular terminals on asynchronous networks
An electronic circuit for use with time of arrival signals from a network, including a position determination unit, a first clock, a second clock, and processing circuitry coupled to said first clock, said second clock, and said position determination unit. The processing circuitry is operable to project a relatively-accurate subsequent global time based on said first and second clocks and to then return said relatively-accurate subsequent global time to said position determination unit to facilitate a subsequent position determination by said position determination unit.
Multi-radio handover manager system and algorithms for heterogeneous wireless networking
A multi-radio handover manager and supporting algorithms are disclosed. The multi-radio handover manager (MRHM) minimizes the “on” time of one radio when the other radio is connected to the Internet. The MRHM also prevents unnecessary inter-RAT (radio access technologies) WLAN-to-WWAN handovers in a “multi-AP” WLAN, where intra-RAT WLAN-to-WLAN (layer 2) roaming is possible. The MRHM minimizes the impact of IP address changes due to WWAN-to-WLAN handover on an active TCP/IP session. And, the MRHM optimizes its handover-triggering algorithm based on traffic and environment.
Identifying hand-over targets in lightly coordinated networks
In general, a method performed on a portable access terminal operating in an active mode includes detecting a presence of a personal base station. An encoded identification message transmitted from the personal base station is received, and the encoded identification message includes a unique identifier associated with the personal base station. The encoded identification message is decoded to extract the unique identifier, and the unique identifier is transmitted to a source network entity.
Method and system for load-balancing across multiple access networks
An approach is provided for interworking between radio access networks that utilize different radio access technologies. Loading information of a plurality of radio access networks that are accessible by a terminal is determined. A list of candidates from the radio access networks are output based on the loading information for use by the terminal.
Small base station apparatus, base station apparatus, mobile station apparatus, and mobile communication system
A procedure when a mobile station apparatus accesses a CSG cell in which it is unregistered is defined and a procedure based on the definition is performed. A small base station apparatus applied to a mobile communication system, receives a originated call request message including a user identifier and priority information from a camping mobile station apparatus, determines whether or not to permit the originated call request of the mobile station apparatus, based on the user identifier and the priority information, and transmits the determination result to the mobile station apparatus. In addition, the small base station apparatus permits the originated call request, if the user identifier included in the originated call request message of the mobile station apparatus indicates that the mobile station apparatus is registered.
Registration with a mobile telecommunications service provider
A method performed by a mobile device to register for cellular data connection service provided by a mobile telecommunications service provider. The mobile device determines that it does not have a valid cellular data connection subscription with the mobile telecommunications service provider. Responsive to that determination, the mobile device connects to a cellular data connection service registration site to allow a user of the mobile device to register for data connection service provided by the mobile telecommunications service provider. The mobile device is limited to accessing the data connection service registration site until the user registers for data connection service.
Smart antenna for interference rejection
A smart antenna system is provided for communicating wireless signals between a mobile device and a plurality of different fixed base stations using one or more channels and one or more beams. The smart antenna system includes a control subsystem, a radio transceiver and an antenna subsystem coupled to each other and adapted to perform scanning of one or more combinations of base stations, channels and beams using one or more test links established with one or more of the fixed base stations where the test links use at least some of the channels and the beams. A first combination of base station, channel and beam is selected based on the scanning; and a first operating link is established for transmitting a wireless signal to the selected base station using the selected channel and beam.
Method and apparatus for providing intelligent deactivation of electronic devices in aircraft
A method and apparatus for automatically deactivating an electronic device during flight of an aircraft. The method utilizes a global positioning system (GPS) or assisted global positioning system (AGPS) circuit to facilitate computing the acceleration, velocity and altitude of the electronic device and comparing this information to a profile to determine whether the acceleration, altitude and velocity meets a profile threshold of an airliner taking off. If the profile is that of the take-off of an aircraft, then the circuitry connected to the GPS/AGPS circuit will be deactivated.
Telecommunication call support for mobile devices with presence features
A system and method for achieving or assisting dynamic transfer of call support information across a network including at least a wireless portion coupled to a wireless communication device. The call support information providing the wireless communication device with updated caller identification and status or presence information by way of a service or server provisioned product and method.
Determining virtual location based upon scanned wireless signals
A method for determining proximity of two or more mobile units within a defined locale is disclosed. Each of the mobile units is operable to scan at least a portion of the locale associated with the scanning one of the mobile units. The presence of the ones of the plurality of wireless devices is detected within the associated portion of the locale, detecting receiving the unique information from the detected ones of the plurality of wireless devices or device IDs. The received information is formed into a wireless fingerprint and transmitted to a server, which has a database of stored wireless fingerprints that are compared to the received fingerprint and a determination made as to the stored wireless fingerprints within the locale. The relative proximity position of the mobile devices associated with stored wireless fingerprints within the locale is then determined and are transmitted to the scanning one thereof.
Caller identification for missed calls
Methods and devices are provided for identifying a caller after receiving a missed call from a calling device that is not associated with the caller. An exemplary method involves obtaining an audio message from the caller, recognizing the caller as being a first contact of the called individual by matching an audio sample associated with the first contact to at least a portion of the audio message, and graphically indicating an association between the first contact and the missed call after recognizing the first contact as the caller.
Method and apparatus for updating live data on mobile devices
A mobile device updating method and system for live data.
Method and apparatus pertaining to contact information disambiguation
These teachings provide for receiving from a user (via, for example, a voice-recognition component) a name-based identifier for an entity to be contacted via wireless communications and then using that name-based identifier to access a contacts list to identify a corresponding communications address to use when contacting the entity via the wireless communications. Upon determining that the contacts list includes at least two contacts having the same name-based identifier, these teachings then provide for providing to the user location information as pertains to at least one of the candidate contacts to thereby facilitate disambiguation.
Method and system for managing communication of a dual-standby portable terminal
A method and system for managing communication of a dual-standby portable terminal are provided, in which upon generation of communication traffic with a first communication network among a plurality of communication networks, the portable terminal transmits a hold signal to a second communication network for which communication traffic has not been generated, other than the first communication network, and upon receipt of the hold signal, the second communication network restricts a communication connection to the portable terminal.
Context aware message presentation system
The specification and drawing figures describe and show an apparatus, method, and system for presenting context aware messages. The system includes a mobile wireless communication. The mobile wireless communication instrument is operatively connected to a data processor. The data processor is adapted to receive, store, execute and compose information and data into a global message. At least one context management protocol is stored in the mobile wireless communication instruments. The context management protocol is adapted to accompany a global message and to selectively modify the global message into one or more context aware messages for receipt by any of the plurality of mobile wireless communication instruments.
Maintaining mobile terminal information for secure communications
Methods and systems for maintaining mobile terminal information for secure email communications are provided. Information concerning multiple mobile terminals are maintained. Such information may include encryption information and an identifier for each mobile terminal. A service activation code that includes encryption information and an identifier from an authenticated user of the mobile terminal is received. The encryption information may be provided to a connectivity function for use in establishing an encrypted data channel. The established encrypted data channel may then be used to convey e-mail communications to and from the mobile terminal.
Device and method for storing subscriber information in mobile terminal
A method stores subscriber information in a mobile terminal. The method includes checking whether a received message includes a plurality of sets of subscriber information when a message is received, checking whether there is registered subscriber information if the message includes subscriber information, and updating the registered subscriber information to different subscriber information included in the message if there is registered subscriber information.
Method for briefing a schedule in a mobile communication terminal
There is provided a schedule briefing method of a mobile communication terminal having a user schedule management function. The steps of this method include a step for initiating a schedule briefing, a step for determining whether a schedule exists for a predetermined period of time, a step for audibly outputting content of the schedule, and a step for terminating the briefing. The schedule is outputted in a vocal format to allow a hands-free review of a user's schedule.
Audio phone number capture, conversion, and use
A portable electronic device is provided. The portable electronic device comprises a processor, a memory, and a capturing application stored in the memory that, when executed on the portable electronic device, monitors a first voice telephone call with a first transmitting device. The portable electronic device also comprises records a telephone number spoken during the first voice telephone call. The portable electronic device also comprises sends a first message to the first transmitting device, the first message containing the telephone number and requesting confirmation of the telephone number. The portable electronic device comprises receives a second message from the first transmitting device, the second message confirming the telephone number.
Payment transactions on mobile device using mobile carrier
A user makes a purchase request through a merchant app on a mobile device, such as by selecting an item for purchase. A mobile SDK of a payment provider is installed in the merchant app. The payment request includes the phone number for the mobile device. The payment provider verifies the phone number of the user and requests approval of the payment from a mobile operator providing wireless communication services on the mobile device. If the request is approved, the payment is charged to the user mobile operator account. The user simply taps a button to select an item to purchase and selects another button to confirm the purchase. Once processing is done, the user is notified on the mobile device of a successful payment.
Methods and systems of implementing call-cost features on a mobile device
A method of providing cost information associated with one or more contact numbers in an address book may include receiving cost information, storing the cost information, mapping at least a portion of the cost information to one or more contact numbers using one or more pre-defined rules and transmitting the mapped cost information to a mobile device.
Method and system for message collision avoidance
A system that incorporates the subject disclosure may include, for example, receiving first and second audio input signals from first and second communication sources. First and second emergency alert system messages are respectively identified from each of the first and second audio input signals. A temporal overlap is detected between a portion of the first emergency alert system message and the second emergency alert system message. In response to detection of the temporal overlap, a relative delay is applied between the first and second audio output signals. First and second audio output signals are generated including the first and second messages adjusted by the relative delay, such that the first and second emergency alert system messages in the first and second audio output signals are non-overlapping. Other embodiments are disclosed.
Filter unit, mobile communication terminal test system, and mobile communication terminal test method
[Problem] To provide a band stop filter unit, a mobile communication terminal test system, and a mobile communication terminal test method that are flexibly adaptable to the addition/change of a specification in a frequency band for mobile communication.[Means for Resolution] There are provided a first variable filter (102) and a second variable filter (103) which are connected to each other in series, respectively have YIG elements to vary tuning frequencies (f1 and f2), and attenuate the desired signal within predetermined bandwidths (ΔBW1 and ΔBW2) having centers of the tuning frequencies. The tuning frequency (f1) and the tuning frequency (f2) are controlled to be the same as each other or around each other when the desired signal is located at a low frequency band side. The tuning frequency (f1) and the tuning frequency (f2) are controlled to include the desired signal in a connected bandwidth and to make the connected bandwidth wider than any of the predetermined bandwidth (ΔBW1) and the predetermined bandwidth (ΔBW2) when the desired signal is located at a high frequency band side.
Method for determining optimum power amplifier configurations using list mode testing
A calibration system for calibrating wireless circuitry in an electronic device is provided. The test system may include test equipment, a computer, and a device under test (DUT). The test equipment may measure the output power of the DUT. The DUT may include power amplifier circuitry that is provided with a power supply voltage supplied by power supply circuitry. A list mode sequence of commands may be provided to the DUT and the test equipment to calibrate the power amplifier circuitry. The list of commands may be processed by the DUT to produce radio-frequency signals. The list of commands may be simultaneously processed by the test equipment to perform measurements on the radio-frequency signals. The computer may retrieve measurement data from the test equipment after testing is complete. The computer may subsequently determine calibrated control settings for the DUT that reduce power consumption while ensuring satisfactory adjacent channel leakage performance.
Drop zone rally point beacon
A VLF beacon operates in the near field of the antenna, providing a low impedance (magnetic) wave located by employing simple amplitude gradient and phase alignment direction finding (DF) methods. When rotated, the beacon antenna radiates its signal with little attenuation. Beacon antennas include a loop antenna which has a 1/r3 B-field amplitude relationship with distance. The antenna radiation range is limited, but the detectable near field signal is strong. The receiver comprises a simple 2-channel RF front end with filtering and an A/D converter. The antenna for each channel is a much smaller ferrite rod loaded loop.
Transceiver with compensation for transmit signal leakage and method therefor
A transceiver (10) includes an RF transmitter (12) and an RF receiver (14) coupled together through a duplexer (30) or non-filtering multiport device (30′). Either device may leak significant portions (56, 58) of the transmit signal (20) into the receive signal (44), and may significantly distort the transmit signal (20). Distortion is compensated in the transmitter (12) through the use of a linear predistorter (68) that is adjusted in response to an RF feedback signal obtained from the antenna-side of the device. Transmit signal leakage is compensated in the receiver (14) by producing an RF cancellation signal (106) that, when combined with the receive signal (44) at RF at least partially cancels the transmit signal portions (56, 58) leaked into the receive signal (44). Residual leakage signal and intermodulation products thereof may be cancelled digitally.
Field programmable transceiver circuits
A transceiver circuit includes: a transmit path with at least one of each of a digital to analog converter converting a digital input signal to an analog signal, a filter, a first frequency synthesizer, a mixer to produce an RF output, and an amplifier amplifying the RF output for transmission; and a receive path with at least one of each of a second amplifier amplifying a received RF input, a second frequency synthesizer, a second mixer to produce a baseband signal, a second filter, and an analog to digital converter converting the baseband signal to a digital output signal; at least one switch selectively connecting different points of the circuit thereby to bypass at least one component of the circuit; and a control input connected to the switch to receive control signals for controlling operation of the switch.
Power switching for electronic device test equipment
An apparatus, system and method are provided for testing a battery-powered electronic device-under-test in a transport frame engaged with a test fixture. A transport frame power supply is arranged to provide power to the DUT in a pre-testing stage. A switching circuit is arranged to switch from the transport frame power supply to a test fixture power supply in response to receiving a power switching signal indicating satisfaction of a pre-testing condition. Power from the test fixture power supply can then be switched back to the first transport frame, or to a second transport frame, to begin testing a second DUT. The ability to start a DUT test without having to wait for the DUT to boot-up in the test fixture reduces test time and increases efficiency of use of test equipment.
Systems, methods, and devices for electronic spectrum management for identifying signal-emitting devices
Systems, methods, and apparatus are provided for device sensing in white space, by identifying, classifying and cataloging sources of signal emission based on radio frequency measurements. In an embodiment, signal emission devices are analyzed by automatically detecting signals, analyzing signals, comparing signal data to historical and reference data, and creating corresponding unique signal profiles. The detected, analyzed and compared data may be presented to a user.
Interference identification and mitigation in wireless communication
Interference in a wireless communication system receiver, such as at a base station, is identified based on monitoring automatic gain control (AGC) events. AGC statistics in combination with base band processing are used to identify the interference. Performance degradation is evaluated, and interference mitigation solutions are proposed based on the identified interference. Mitigation solutions include IRC, scheduling restrictions, and filter modifications including replacement of filters.
Inter-cell interference relief method
In a method of mitigating inter-cell interference, terminals are grouped into groups. A base station transmits data to a first terminal belonging to a first group among the groups, without cooperation with a neighboring base station. The base station transmits data to a second terminal belonging to a second group among the groups, through cooperation with the neighboring base station.
Main board, and method of implementing network/card locking and mobile terminal in which network/card locking is implemented
The disclosure discloses a main board, wherein the main board includes: a first pad; a second pad connected to the first pad; and a third pad connected to both the first pad and the second pad. The disclosure also discloses a method of implementing network/card locking, wherein the method includes: transmitting, by an encryption chip, a blocking request to a central processing unit when the encryption chip detects authentication-related information that is provided by a user identification unit to the central processing unit, and determines that the authentication-related information does not meet a preset network/card locking requirement from a mobile operator; blocking, by the central processing unit, the mobile terminal from normal operation when receiving the blocking request. Meanwhile, the disclosure also discloses a mobile terminal in which network/card locking is implemented, wherein the mobile terminal includes a central processing unit, a user identification unit and an encryption chip. By using the main board, the method and the mobile terminal of the disclosure, the costs for producing a mobile terminal which is respectively adapted to different sales modes of mobile terminals can be reduced.
Method and system for Bluetooth 802.11 alternate MAC/PHY (AMP) transmit power control (TPC)
Aspects of a method and system for Bluetooth 802.11 alternate MAC/PHY (AMP) transmit power control (TPC) may include one or more processors, receiver circuits and/or transmitter circuits that are operable to determine a maximum input level based on signals received via a Bluetooth basic rate (BR) connection and/or via a Bluetooth extended data rate (EDR) connection. The processors and/or circuits may be operable to determine a transmitted signal power level based on the determined maximum input level. The processors and/or circuits may be operable to transmit subsequent signals via a distinct Bluetooth connection based on the determined transmitted signal power level. The data rate for signal transmission via the distinct Bluetooth connection may exceed the data rate for signal transmission via the BR connection and the data rate for signal transmission via the EDR connection.
Method and system for roaming in a peer to peer network among radio sites having dynamic rest channel base repeater stations
In a peer to peer trunked radio network having a plurality of network locations, each network location includes a plurality of repeaters and a dynamically selected at least temporarily act as a rest channel repeater at each network location. A first repeater at the first network location may determine a first timing at which to broadcast an intra-site beacon and a second timing at which to broadcast an inter-site roaming beacon, the intra-site beacon including at least a rest channel identifier indicating a rest channel of the first network location and the inter-site roaming beacon including at least remote rest channel repeater information identifying a second repeater at a second network location that is currently acting as a rest channel repeater at the second network location. The first repeater may then broadcast the intra-site beacon at the first timing and the inter-site roaming beacon at the second timing.
Process unit positioning device and image forming apparatus including the same
Provided is a process unit positioning device which performs positioning of a plurality of process units with respect to an apparatus main body, including: a positioning plate in which bearing holes into which individual drum shafts are fitted and a fitted portion onto which positioning portion of the apparatus main body is fitted are formed; and a holder portion supported by the apparatus main body so as to be able to pivot while holding the positioning plate so that a position changes by contact between the bearing holes and the drum shafts.
Developer transport device and image forming apparatus
Disclosed is a developer transport device including a recovery chamber where a developer is recovered, an accommodation chamber that accommodates the developer, a transport unit that transports the developer into the accommodation chamber by rotation, a hollow guiding path that guides the developer in the recovery chamber into the accommodation chamber, and a transport assisting member disposed inside the hollow guiding path and deformed and restored by rotation of the transport unit to assist transport of the developer. The transport assisting member includes a first part extending along an inner wall of the hollow guiding path from a discharge port of the recovery chamber to a position for contact with the transport unit, and a second part intersecting with a front surface of the first part and extending from an intermediate position of the first part to a position for contact with the transport unit.
Apparatus and methods for delivery of a functional material to an image forming member
The presently disclosed embodiments relate generally to an image forming apparatus including a delivery member for delivering a functional material in contact with an intermediate transfer belt such that functional material is transferred onto one or more imaging members via the intermediate transfer belt. Embodiments also pertain to an improved electrophotographic imaging member comprising a very thin outer layer on the imaging member surface, where the outer layer comprises functional materials, such as paraffin, that act as a lubricant and or a barrier against moisture and/or surface contaminants. The improved imaging member exhibits improved xerographic performance, such as reduced friction and deletions in high humidity conditions.
Fixing device and image forming apparatus
A fixing device includes an endless belt, a fixing rotating body that contacts with and separates from the belt and fixes an image formed on a recording medium nipped between the fixing rotating body and the belt while rotating in contact with the belt, a support member provided so that the belt slides on the support member during circulation, the support member supporting a load provided when the fixing rotating body is in contact with the belt so as to form a nip portion where the recording medium is nipped between the belt and the fixing rotating body, a guide member that guides the recording medium to separate the recording medium from the belt after the recording medium passes through the nip portion, and a moving unit that moves the guide member away from the belt along with separation of the fixing rotating body from the belt.
Applying device, fixing device, and image forming apparatus
An applying device includes an applying member that applies an applying material to an outer peripheral surface of a fixing member that rotates, while a peripheral velocity difference is caused to exist between a peripheral velocity of the fixing member and a peripheral velocity of the applying member. The applying material contains a fluorocarbon resin material.
Fusing apparatus and electrophotographic image forming apparatus using the same
A fusing apparatus to fuse a toner image transferred to a printing medium by applying heat and pressure. The fusing apparatus includes a separation member that is rotatably mounted on a rotation axis to separate the printing medium from one of a heating roller and a pressing roller. The separation member includes a hollow portion into which the rotation axis is inserted, and a separation portion that contacts an outer circumference of the heating roller. The separation member is installed so as to be pitched around the rotation axis and a pitching axis having an inclination angle within a range of ±10° with respect to a line that connects a contact point between the separation portion and the outer circumference of the roller from which the printing medium is to be separated and a center of the roller from which the printing medium is to be separated.
Image forming apparatus having curved contact surface
An image forming apparatus includes an image bearing member for bearing a toner image, a movable endless transfer belt for transferring the toner image from the image bearing member onto a transfer material, and a transfer device for transferring the toner image from the image bearing member toward the transfer belt. The transfer device includes a transfer member for sliding on an inner surface of the transfer belt in contact with the inner surface, a supporting member for supporting the transfer member, and an urging member for urging the supporting member toward the transfer belt, wherein the transfer member contacts the inner surface of the transfer belt at a contact surface thereof without rotation relative to the supporting member during movement of the transfer belt. The supporting member is rotatable about a center axis during movement of the transfer belt, and the contact surface is convex with predetermined curvature toward the transfer belt.
Developer unit for an image forming apparatus
A developer unit for an image forming apparatus is provided. The developer unit includes a developer device with a developer agent carrier and a developer agent supplier, and a developer agent container, which contains the developer agent and is arranged in a lower position with respect to the developer device. The developer agent container is formed to have a fitting wall, which is curved inward at a position to be adjacent to the developer device. The fitting wall is formed to have a feeding opening and a collecting opening. The developer unit is further provided with a first conveyer, which is rotated about a rotation axis to sweep an inner surface of the developer agent container and convey the developer agent toward the feeding opening, and a second conveyer, which is arranged along the developer agent supplier and conveys the developer agent toward the collecting opening.
Toner replenishing device and image forming apparatus including toner replenishing device
A toner replenishing device includes a sub hopper (toner container), a toner detection sensor, an agitator, and a paddle. The sub hopper contains toner. The toner detection sensor is located on a wall surface in the sub hopper and detects whether toner remains at a height at which it is located. The agitator rotates in the sub hopper to clean the detection surface of the toner detection sensor. The paddle serves as a toner collecting unit that collects toner to the vicinity of the detection surface of the toner detection sensor in the sub hopper.
Charging member, process cartridge, and image forming apparatus
A charging member includes a substrate and an outermost layer that is on the substrate, is in contact with a member to be charged, and contains a cross-linking fluorocarbon siloxane rubber composition, wherein the charging member charges the member to be charged by being brought into contact with the member to be charged while a voltage is applied.
The present invention relates to a process cartridge, comprising a photosensitive drum driving component in conjunction with an image forming apparatus driving head, wherein said image forming apparatus driving head includes a twisted recess and said photosensitive drum driving component includes a drum gear provided at an end of a photosensitive drum and connected to the photosensitive drum, a drum shaft outwardly projected in an axis direction from an end of the drum gear for rotatably supporting said photosensitive drum during operation and a boss outwardly projected from an end surface of the drum shaft. A first teeth and a second teeth in a radial direction of the boss are provided on a side wall of said boss, wherein said first teeth is engaged with a twisted-section of the twisted recess in said image forming apparatus and said second teeth is engaged with an end surface edge of other twisted-sections of the twisted recess in said image forming apparatus. Thereby, the process cartridge according to this invention ensures an effectively and continuously transmitted driving force and contains a simple prepared photosensitive drum driving head, which will be less damaged even during long time operation.
Image forming apparatus with detachable holding member
An image forming apparatus includes: a plurality of photosensitive members, an endless belt, and a separation mechanism. The photosensitive members are arranged in parallel with and spaced from one another and correspond to respective colors. The plurality of photosensitive members includes a first photosensitive member and at least one second photosensitive member. Each of the photosensitive members has a first end portion and second end portion that is opposite to the first end portion in a longitudinal direction of each of the photosensitive members. The endless belt contacts the photosensitive members. The separation mechanism is configured to swing the second photosensitive member around the first end portion of the second photosensitive member as a fulcrum between a contact position at which the second photosensitive member contacts the endless belt and a separated position at which the second photosensitive member is separated from the endless belt.
Image forming apparatus having waste toner box
An image forming apparatus includes: an image forming unit including a plurality of photoconductor drums arranged in tandem; a conveyor belt arranged opposite to the photoconductor drums and configured to convey a recording sheet; and a cleaning unit including a cleaning member positioned in contact with the conveyor belt and configured to collect substance adhering to the conveyor belt, and a receptacle configured to store the substance collected by the cleaning member. The cleaning member is arranged on the same side as the image forming unit with respect to the conveyor belt and upstream from the image forming unit as viewed in a sheet conveyance direction along which the recording sheet is conveyed on the conveyor belt, and the image forming unit and the cleaning unit are pulled out together from a main body of the image forming apparatus toward an upstream side of the sheet conveyance direction.
Printing apparatus allowing setting range of sheet characteristic values and method for controlling the same
Printing processing is performed on a sheet having a characteristic value within a range of a characteristic value of a sheet which is defined usable in the printing processing in accordance with a specific print job. Specifically, in a case where a test page print job is input, a CPU selects a sheet feeding tray on which sheets having a characteristic value within a range of a characteristic value represented by characteristic value range information. The CPU performs a control operation so that a sheet is fed from the selected sheet feeding tray to a printer unit and the printer unit executes the test page print job.
Image forming apparatus
An image forming apparatus including a heating rotating body (first body) and a pressurizing rotating body (second body) disposed in a pressure contact state, and commencing image forming when a temperature of the first body reaches a predetermined temperature lower than a fixing temperature. The apparatus acquires a value indicating a temperature of the second body upon commencement of warm-up, and when the value is below a threshold value, heats the first body until the temperature thereof reaches the fixing temperature while rotating the two bodies at a first speed, and when the value equals or exceeds the threshold value, heats the first body until the temperature thereof reaches the predetermined temperature while rotating the two bodies at a second speed slower than the first speed and further heats the first body until the temperature thereof reaches the fixing temperature while rotating the two bodies at the first speed.
Fixing device and image forming apparatus
A fixing device includes a rotatable fixing member that heats a surface of a recording medium on which an unfixed image is carried, a rotatable pressing member that makes pressure-contact with the fixing member to form a nip portion therebetween, a heat source that heats the fixing member, a temperature detecting unit that detects a temperature of the fixing member, and a temperature control unit that controls turning-on/off the heat source in accordance with a predetermined duty for a predetermined control cycle in a turning-on/off cycle, based on input temperature information. The temperature control unit, during execution of a continuous image-forming job for continuously forming images on a plurality of recording media, sets the control cycle and a space between the recording media to be conveyed to the nip so that a number of turn-ons of the heat source is the same for all the recording media.
Image forming apparatus, image forming system, and transfer method
An image forming apparatus includes a transfer unit configured to transfer a toner image onto a recording medium; a power supply unit configured to output one of an alternating-current-based voltage including at least an alternating-current voltage and a direct-current voltage to the transfer unit; and a power supply control unit configured to cause the power supply unit to start switching to the alternating-current-based voltage a first time after the power supply unit stops outputting the direct-current voltage in the case that output of the power supply unit is switched to the alternating-current-based voltage, and cause the power supply unit to start switching to the direct-current voltage a second time after the power supply unit stops outputting the alternating-current-based voltage in the case that output of the power supply unit is switched to the direct-current voltage. The second time is longer than the first time.
Image forming apparatus
An image forming apparatus includes photosensitive drums, electrostatic latent image forming units, developing sleeves, patch detection sensors which detect image densities of the toner images formed by the electrostatic latent image forming units, and toner replenishment units which replenish the developing sleeves with the toner based on the detection results of the patch detection sensors. Further, controllers are provided to control the rotation speeds of the developing sleeves at the time of forming the reference toner image to be higher than the rotation speeds of the developing sleeves at the time of forming a normal image.
Image forming apparatus using common AC voltage source for plural charging members and photosensitive members
An image forming apparatus includes photosensitive drums; drum charging members, an AC voltage source for outputting an AC voltage commonly to at least two of the charging members; AC voltage control devices for the charging members; variable resistors connected between the AC voltage source and the at least two charging members, respectively; a use situation detecting unit for detecting use situations of the drums, respectively; and an adjusting unit for adjusting electric resistances of the variable resistors, respectively. The adjusting unit adjusts the electric resistances of the resistors in accordance with the detection results of the use situation detecting unit such that the discharge currents applied to the at least two charging members are within predetermined ranges, respectively.
Image forming apparatus, toner image transfer and fixing method, and computer-readable recording medium having recorded thereon toner image transfer and fixing program
According to one embodiment, an image forming apparatus includes a photoconductive member, an intermediate transfer belt, a transfer and fixing belt, a fixing and pressing roller, and a heating device. The heating device heats a toner image on the transfer and fixing belt between a first toner image transfer position for transfer from the intermediate transfer belt onto the transfer and fixing belt and a second toner image transfer position for transfer from the transfer and fixing belt onto a sheet in a moving direction of a belt surface of the transfer and fixing belt and, at the same time, heats the sheet conveyed to the second toner image transfer position.
Image forming apparatus with toner degradation suppression
An image forming apparatus includes an image forming portion that forms an image on a first image bearing member, a transfer member that transfers the image on the first image bearing member to a second image bearing member, a power supply, a detecting portion that detects a voltage value and a current value, a velocity changing portion, an environment detecting portion, and a controller that determines a transfer voltage value in transferring an image based on a result detected at the detecting portion. An image can be formed at the plurality of velocities. The controller determines a transfer voltage value at a velocity other than the plurality of velocities based on a result detected at the detecting portion and a result detected at the environment detecting portion when the first image bearing member is operated at a predetermined velocity.
Toner calculation in an image forming device
Provided is an image forming apparatus that consumes toner to form an image, including a first calculation portion, a second calculation portion, and a third calculation portion. The first calculation portion calculates a toner consumption by a first calculation method. The second calculation portion calculates the toner consumption by a second calculation method according to a predetermined calculation formula after a predetermined switching criterion is satisfied. The third calculation portion calculates a value of a parameter in the predetermined calculation formula of the second calculation method based on the toner consumption calculated by the first calculation method.
Use detection element for a cartridge
A cartridge which may include a housing, a driving input member provided at the housing wherein the driving input member is configured to be rotated by an externally supplied rotation driving force, and a rotational member configured to receive the rotation driving force, which is transmitted from the driving input member, and be rotated thereby. The cartridge may also include a detection protrusion provided at a position away from a rotational center of the rotational member. The detection protrusion may include a main body protruding from the rotational member away from the housing and a pivot part configured to pivot relative to the main body. The detection protrusion may be configured to be changeable between an extended state and a collapsed state with respect to the rotational member.
Efficient computation and compensation of linear and nonlinear distortion in dispersion-managed fiber-opic transmission
In one embodiment, a method for performing nonlinearity compensation on a dispersion-managed optical signal that was transmitted over an optical communication link, the method including virtually dividing the communication link into a plurality of steps, performing lumped dispersion compensation on a received optical signal to obtain a waveform upon which digital backward propagation (DBP) can be performed, performing DBP by performing dispersion compensation and nonlinearity compensation for each step, and generating an estimate of the transmitted signal based upon the performed DBP.
System and method for polarization de-multiplexing in a coherent optical receiver
A system and method for polarization de-multiplexing in a coherent optical receiver. De-multiplexing is achieved using a modified constant modulus algorithm (CMA) wherein filter coefficients are determined as a function of a coupling coefficient to avoid convergence of the CMA outputs.
Single pin coherent receiver
In a coherent optical receiver of an optical communications system, methods and systems for receiving a data signal x(t) modulated on an optical signal. A linearly polarized LO light is generated, which has a frequency of f1=f0±Δf, where f0 is a frequency of a narrowband carrier of the optical signal, and Δf corresponds with a band-width fB of the data signal x(t). The LO light and a received light of the optical signal are heterodyned on a photodetector. An analog signal generated by the photodetector is low-pass filtered to generate a filtered signal, using a filter characteristic having a sharp cut-off at a frequency of Δf+nfB, where n is an integer multiple. An analog-to digital (A/D) converter samples the filtered signal at a sample rate of 2(Δf+nfB) to generate a corresponding multi-bit digital sample stream. The multi-bit digital sample stream is digitally processed to recover respective In-Phase and Quadrature components of the received light of the optical signal.
Time synchronization method and device in passive optical network and passive optical network
A time synchronization method and a time synchronization device in a passive optical network (PON), and a PON are provided. The method includes receiving a synchronization packet sent after time synchronization of an optical line terminal (OLT) with a master clock (MC) is achieved, wherein the synchronization packet carries a timestamp TMt1i determined after the time synchronization of the OLT is achieved, adjusting a local clock according to the timestamp to achieve time synchronization of an optical network unit/optical network terminal (ONU/ONT) with the OLT, and after the time synchronization of the OLT is achieved, instructing an slave clock (SC) to perform time synchronization. A time synchronization device and a time synchronization system for implementing the method in a PON are further provided.
Optical transmission system
An optical transmission system includes a polarization multiplexing optical transmitter for transmitting an optical signal, where an X-polarized signal and a Y-polarized signal each having a having predetermined frame structure are polarization-multiplexed, to an optical fiber transmission path, and a polarization multiplexing receiver for receiving the optical signal that has propagated through the optical transmission path. The polarization multiplexing optical transmitter delays a frame assignment signal (FAS) in the Y-polarized signal, by a predetermined delay time τ, relative to FAS in the X-polarized signal. The polarization multiplexing optical receiver includes a polarization splitter for splitting the received optical signal into two branches of polarized signals which are orthogonal to each other, a time difference detector for detecting a time difference of FASs between the two polarized signals, and a polarization identifying unit for identifying which of the two polarized signals is the X-polarized signal or Y-polarized signal.
Dispersion compensation design method and dispersion compensation design system
A dispersion compensation design system includes a changing unit setting a changed value for the amount of dispersion compensation for a span connecting nodes constituting an optical network; a path classification unit determining whether respective paths in the optical network are capable of transmission with the changed value and classifying one or more of the paths as second category paths based on the determination results; an updating unit updating the amount of dispersion compensation with the changed value if the number of the second category paths in the latest classification result is less than the number of the second category paths in the retained previous classification result; and a repeating unit that, if not all of the paths in the optical network are capable of transmission, prevents use of combinations of amounts of dispersion compensation applied to the spans in the second category paths in the latest classification result.
Optical transceiver including optical fiber coupling assembly to increase usable channel wavelengths
An optical transceiver may include an optical fiber coupling assembly for coupling optical fibers to transmitter and receiver sub-assemblies to increase the number of usable channel wavelengths by reducing an incident angle on a WDM filter without causing unwanted back reflection to a laser. In one example, the optical fiber coupling assembly may be used to increase the number of usable channel wavelengths between the L-band and the C-band. The optical transceiver may be used, for example, in an optical line terminal (OLT) and/or optical networking unit (ONU) in a wavelength division multiplexed (WDM) passive optical network (PON) capable of transmitting and receiving optical signals on multiple channel wavelengths.
Visible light wireless communication method and system
A visible-light wireless communication system includes a plurality of light transmitters for generating light signals modulated at different frequencies and at least one terminal for wirelessly communicating with the plurality of light transmitters using the light signals.
Polarization-multiplexed optical transmission system, polarization-Multiplexed optical transmitter, and polarization-multiplexed optical receiver
There is a need to prevent two receivers from converging on a state of receiving the same polarization state, fast start receivers, and ensure highly reliable operations. A polarization-multiplexed transmitter previously applies frequency shifts of frequencies +Δf and −Δf to X-polarization and Y-polarization digital information signals to be transmitted. Optical field modulators modulate and polarization-multiplex the signals. As a result, a frequency difference of 2Δf is supplied to X-polarization and Y-polarization components. A polarization diversity coherent optical receiver 215 receives the signal. A frequency estimation portion in a digital signal processing circuit detects a frequency difference signal in both polarization components. This signal is used to a polarization splitting circuit in the digital signal processing circuit.
Optical line terminal (OLT) and method therefore for performing in-band and out-band OTDR measurements
An OLT operable in a PON and structured to perform OTDR measurements. The OLT comprises an electrical module for generating continuous downstream signals and processing received upstream burst signals according to a communication protocol of the PON; an optical module for transmitting continuous optical signals over a first wavelength, receiving optical upstream burst signals over a second wavelength, and transmitting optical upstream burst signals over a third wavelength, wherein the optical module further includes an ONU traffic processing module being electrically coupled to the optical module and the electrical module, wherein the ONU traffic processing module is configured to emulate one of a plurality of ONUs of the PON, to generate an analysis pattern to be transmitted as an optical upstream burst signal over a third wavelength, and analyze an analysis pattern received in an optical upstream burst signal for the purpose of performing the OTDR measurements.
Systems and methods of optical path protection for distributed antenna systems
Systems and methods for optical path protection for distributed antenna systems are provided. In one embodiment, a system comprises a hub and at least one node located remotely from the hub. The hub is coupled to the node by first and second fiber paths, the first fiber path comprising an uplink fiber and a downlink fiber, the second fiber path comprising an uplink fiber and a downlink fiber. The node is coupled to the downlink fibers of the first and second fiber paths via an optical combiner, and is further coupled to the uplink fibers of the first and second fiber paths via an optical splitter. The node further monitors a signal quality of a downlink optical signal and communicates to the hub information indicative of the signal quality. The hub switches communications between the hub and the node from the first to second fiber path based on the information.
Service protection method and device based on automatic switched optical network
The present invention discloses a service protection method and device based on an automatic switched optical network (ASON), which are adapted to restoring a service when a fault occurs in the connection of the service. The method comprises: comparing a dynamic restoration lag time of the service with a protection switching lag time of the service; and starting a protection switching process to restore the service if the dynamic restoration lag time is greater than the protection switching lag time; and starting a dynamic re-routing process to restore the service if the protection switching lag time is greater than the dynamic restoration lag time. By the present invention, the reliability of the network is enhanced and the self-healing capacity of the ASON is improved.
Method and apparatus for composing 3D photographs
A 3D photographic printer uses a digital display device for displaying two or more images for composing a 3D photograph. The images are displayed at different locations so that these images can be projected onto a 3D print material through a projection lens at different projection angles. With the digital display device, it is possible to electronically locate the images at different locations and shift the images or mechanically moving the display device during the 3D photographic composing process. It is also possible that only the print material is mechanically shifted to different locations. The display device and the projection lens can be stationary. The display device can have a monochrome LCD panel and a color light source for illuminating the LCD panel for printing.
Image taking system and operating apparatus
An image taking system including: a lens apparatus; a first and a second operating apparatus, the first and the second operating apparatus configured to output a command information for an optical member movable in the lens apparatus, and the lens apparatus includes: a driving unit for the optical member; and a lens controller for driving the optical member based on a command from the first and the second operating apparatus, wherein the first operating apparatus includes: an operating unit; and a demand controller for outputting, to the lens controller, an information for driving the optical member, and wherein the demand controller outputs a position command information for the optical member to the lens controller when the operating unit being operated, and outputs other information for the optical member to the lens controller when the operating unit not being operated.
Constructing video frames and synchronizing audio data in a media player from data received via a plurality of diverse protocol stack paths
Video frames from a sequence of video frames and corresponding audio are received and processed by a media player. A first portion of the sequence depends on fewer reference frames then a second portion of the sequence. The number of reference frames per frame is limited. The first and second portions of the sequence are treated differently. The first portion is received at a lower data rate, with greater security and processed with a more robust protocol stack than the second portion. The first and second portions may be stored in a single queue and/or separate queues. The first portion of frame data is utilized to compensate for lost frames by repeating and/or interpolating video frames. The media player constructs a local video frame and synchronizes corresponding audio content with it. The received, repeated and/or interpolated video frames are assembled into display order and decoded.
Information processing apparatus and method therefor
An apparatus inputs data described in a markup language, and analyzes a uniform resource identifier including a fragment description, which is contained in the data. As a result of the analysis, the apparatus determines whether there are connectable fragments which refer to the same resource. In a case where it is determined that there are connectable fragments which refer to the same resource, the apparatus generates a uniform resource identifier by integrating the connectable fragments.
Method and apparatus for creating a custom track
A method and system for creating and editing video and/or audio tracks is described. The method includes providing at least one artist, venue, and track available for selection and providing at least one clip associated with the at least one artist, venue, and track. The method also includes allowing a user to create a custom track from the at least one clip. The system includes a plurality of video cameras for recording a live performance at a plurality of positions. The system also includes at least one server for storing a plurality of video clips created from the plurality of video cameras and an application stored on the at least one server for allowing a user to access the plurality of video clips via the Internet.
Image display device and reservation recording method
Provided are an image display device and a reservation recording method. According to the method, a user can conveniently set series reservation recording on a recording list on the basis of history data of a record material.
Communication apparatus, control method, and computer-readable recording medium
A communication apparatus includes a communication unit that communicates with an external apparatus via communication lines conforming to HDMI standard, a first detection unit that determines whether a first signal is detected indicating that the communication unit and the external apparatus are connected, a second detection unit that determines whether a second signal is detected indicating that the external apparatus is in a state where the external apparatus displays video data transmitted from the communication unit, and a control unit that controls the communication unit to transmit the video data to the external apparatus if the first signal and the second signal are detected.
Reproducing device, control method, and recording medium
A reproducing device includes: one or more input source selectors for selecting content to reproduce; two or more decoding processors for decoding the content; two or more output controllers for reproducing and outputting the decoded content; an instruction reception unit for receiving a reproduction instruction specifying arbitrary content, to have the specified content reproduced and output by one of the output controllers; a reproducibility determiner for deciding, on a basis of usage conditions of the input source selectors and the decoding processors, whether or not the specified content can be reproduced with one of the decoding processors; a reproduction path determiner for designating, on a basis of the decision, which decoding processor and which output controller to use to reproduce the specified content; and a reproduction controller for using the designated decoding processor and output controller to reproduce the specified content.
Scalable and modular automated fiber optic cross-connect systems
This invention discloses scalable and modular automated optical cross-connect devices which exhibit low loss and scalability to high port counts. In particular, a device for the programmable interconnection of large numbers of optical fibers is provided, whereby a two-dimensional array of fiber optic connections is mapped in an ordered and rule based fashion into a one-dimensional array with tensioned fiber optic elements tracing substantially straight lines there between. Fiber optic elements are terminated in a stacked arrangement of flexible fiber optic elements with a capacity to retain excess fiber lengths while maintaining an adequate bend radius. The combination of these elements partitions the switch volume into multiple independent, non-interfering zones. The separation into spaced-apart zones provides clearance for one or more robotic actuators to enter the free volume substantially adjacent to the two-dimensional array of connectors and mechanically reconfigure connectors without interrupting other fiber elements.
Optical waveguide device
An optical waveguide device that uses a thin substrate having an electro-optical effect and a thickness of 10 μm or less, in which slab propagation light that is reflected from an end face of the device is removed and thus deterioration in an operational characteristic is suppressed. The optical waveguide device includes: a thin substrate which has an electro-optical effect and thickness of 10 μm or less, and in which an optical waveguide is formed; and a supporting substrate that is adhered to the thin substrate through an adhesion layer. An antireflective film is formed on a part of a side surface of the optical waveguide device.