This website is currently dormant!

API Evangelist Partners

These are my partners who invest in API Evangelist each month, helping underwrite my research, and making sure I'm able to keep monitoring the API space as I do.

Uptrends

Uptrends is the ultimate monitoring tool to stay in control of the uptime, performance, and functionality of your websites, APIs, and servers.

3Scale

3scale makes it easy to open, secure, distribute, control and monetize APIs, that is built with performance, customer control and excellent time-to-value in mind.

API Definitions Patents

When I can make time I read through patent filings from the USPTO. I have a regular script running that downloads new patent filings, and looks through them for keywords like API, Application Programming Interface, Hypermedia, and other buzzwords for the sector. These are the patents I've found that are related to this area of my research.

Service provisioning

Embodiments disclosed herein provide systems and methods that can bridge the gap between business operations and data management operations. An interface layer provides customizable interfaces for interactions with a master entity index (MEI) system to accomplish association, storage, management or processing of data records based on user-defined business service operations. The interface layer allows a user to define business services, operations, and logical procedures according to a desired data model such that the inputs and outputs for each operation of the service correspond to the particular needs of the user and allow different terminology to be employed by the user.

  • Pub Date: 2007/31/12
  • Number: 08423514
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing human capital management software application as enterprise services

Methods and apparatus, including systems and computer program products, for a service architecture design that provides enterprise services having human capital management functionality at the level of an enterprise application. The design includes a set of service operations, process components, and optionally deployment units. Suitable business objects are also described.

  • Pub Date: 2007/31/12
  • Number: 08671034
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for addressing DNS rebinding

A computer-implemented method comprising detecting a resolution of an internet address to a first computing-device address, the internet address being associated with a first domain. The method may also comprise storing a domain-name record, the domain-name record associating the internet address with the first computing-device address. The method may comprise using the domain-name record to bind the first domain to the first computing-device address and preventing, until a request to leave the first domain is detected, the first domain from being rebound to a second computing-device address. Systems and computer-readable media for addressing DNS rebinding are also disclosed.

  • Pub Date: 2007/31/12
  • Number: 07970939
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus to route a communication session directly to a voicemail mailbox

Methods and apparatus to route a communication session directly to a voicemail mailbox are disclosed. An example method includes receiving a communication session initiation message from a caller at a source telephone number, the communication session initiation message including a destination telephone number and a direct voicemail feature identifier, determining that the direct voicemail feature identifier indicates that the caller requests that the call be sent to a voicemail mailbox associated with the destination telephone number, and forwarding the call directly to the voicemail mailbox associated with the destination telephone number without ringing the destination telephone number.

  • Pub Date: 2007/31/12
  • Number: 08879545
  • Owner: AT&T Intelletual Property I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Location bound secure domains

A method, apparatus, and electronic device with secure operation based on geography are disclosed. A positioning mechanism may determine a geographic location of the apparatus or electronic device. A processor may identify a secure domain for a virtual machine application. The processor may determine an availability of an application programming interface for the virtual machine application based on the geographic location.

  • Pub Date: 2007/31/12
  • Number: 09223938
  • Owner: Google Technology Holdings LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Balancing wireless access based on centralized information

A method and apparatus for managing and balancing wireless access based on centralized information is provided. A request to provide service to a wireless client is received from a first access node in a plurality of access node. An access policy, applicable to the first access node, is selected from a plurality of stored policies. The stored policies may include a variety of rules, such as how many or which wireless clients may be serviced by an access node. A centralized manager, such as an AAA server, may perform the selection of the access policy. A determination is made as to whether to allow the first access node to provide service to the wireless client based on the selected access policy. A message that instructs the first access node whether to provide or deny service to the wireless client is transmitted to the first access node.

  • Pub Date: 2007/31/12
  • Number: 07929973
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for service procurement application software

Methods, systems, and apparatus, including computer program products, for implementing a software architecture design for a software application implementing service procurement. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service operations, each being implemented for a respective process component. The process components include a Project Processing process component; a Purchase Request Processing process component; a Purchase Order Processing process component; a Purchasing Contract process component; a Goods and Service Acknowledgement process component; an RFQ Processing process component; and a Time and Labor Management process component.

  • Pub Date: 2007/31/12
  • Number: 08447657
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Architectural design for personnel events application software

Methods, systems, and apparatuses, including computer program products, for implementing a software architecture design for a software application implementing personnel events functionality. The application is structured as multiple process components interacting with each other through service interfaces, and multiple service operations, each being implemented for a respective process component. The process components include a personnel administration process component, a payroll processing process component, an expense and reimbursement management process component, a time and labor process component, a compensation management process component, an employee payroll administration process component, and numerous country-specific employer regulatory compliance process components.

  • Pub Date: 2007/31/12
  • Number: 08671033
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Dynamic item-space allocation and retrieval

Embodiments of the present invention address deficiencies of the art in respect to staging manufactured items and provide a method, system and computer program product for staging items in a manufacturing environment. In an embodiment of the invention, a method for staging items in a manufacturing environment can be provided. The method can include defining attributes of staging locations in a distribution area of the manufacturing environment, defining a set of staging strategies for use in the distribution area of the manufacturing environment, receiving a manufactured item in the distribution area and obtaining characteristics of the manufactured item, comparing the obtained characteristics of the manufactured item to the set of staging strategies to select the staging strategy to apply to the manufactured item and applying the selected staging strategy to the manufactured item to assign the manufactured item to storage in one of the staging locations in the distribution area based on matching the obtained characteristics of the manufactured item to the defined attributes of the one of the staging locations. The method can further include the retrieval of the manufactured item from the staging location at the appropriate time to allow for subsequent processing or shipment, and may include multiple iterations of the staging-retrieval process as required by the particular implementation.

  • Pub Date: 2007/29/12
  • Number: 08140180
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Video on hold for VoIP system

A system for placing a telephone call on hold and presenting video to the user that has been placed on hold comprises video on hold arbiter that either is a part of the server or the switch of an IP telephony system. The video on hold arbiter comprises a hold monitoring module, a switch interface module and a media source interface module. The video on hold arbiter monitors calls between parties for the selection of a hold signal indicating that a first caller is placing a second caller on hold. The video on hold arbiter then determines the capabilities of the first caller and the second caller, a source video signal and switches the call to a video-on-hold status. In the video-on-hold status, the video on hold arbiter provides a video signal to the caller on hold from the determined source video and matching the capabilities of the party on hold. Video on hold arbiter and monitors for an off hold signal. Once the off hold signal is detected, the video on hold arbiter reestablishes the video and audio connections between the parties. The present invention also includes a variety of methods including a method for initializing and configuring a video on hold system and a method for providing video content when a call is placed on hold.

  • Pub Date: 2007/28/12
  • Number: 08335301
  • Owner: ShoreTel, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Video conferencing

A video conferencing system is provided, in which at least two cameras are used to capture images of people at a first location participating in a video conference. One or more active speakers are identified among the people at the location, and one of the at least two cameras is automatically selected based on a position or positions of the one or more active speakers. Images from the selected camera are provided to a person at a second location participating the video conference.

  • Pub Date: 2007/28/12
  • Number: 08289363
  • Details: Visit USPTO

Visit USPTO Page


Translation of register-combiner state into shader microcode

An apparatus and method for translating fixed function state into a shader program. Fixed function state is received and stored and when a new shader program is detected the fixed function state is translated into shader program instructions. Registers specified by the program instructions are allocated for processing in the shader program. The registers may be remapped for more efficient use of the register storage space.

  • Pub Date: 2007/28/12
  • Number: 08004523
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Technical support agent and technical support service delivery platform

An embodiment of a method for providing technical support service includes generating a plurality of problem resolutions that are determined to resolve an identified technical problem; attributing weights to each of said plurality of problem resolutions according to frequency of use; and in response to a request to resolve said identified problem, selecting a problem resolution from among said plurality of problem resolutions based at least in part on said attributed weights.

  • Pub Date: 2007/28/12
  • Number: 08271402
  • Owner: Troppus Software Corporation
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for facilitating financial transactions over a network

Systems and methods for facilitating financial transactions over a network include a merchant device, a client device and a payment processing device. The merchant device is adapted to allow a merchant to provide items for purchase via the network. The client device is adapted to allow a user to access the merchant device via the network and view the items for purchase. The client device is adapted to provide a payment mechanism to the user. The user generates a purchase request for an item by selecting the one item, dragging the item to the payment mechanism, and dropping the item over the payment mechanism. The payment processing device is adapted to receive the purchase request from the client device via the network and authorize the user to purchase the item from the merchant based on information passed with the purchase request.

  • Pub Date: 2007/28/12
  • Number: 08224702
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for biometric information automation

A method identifies persons based on biometric information. The method includes providing a cache of biometric templates. The cache stores segments of the biometric templates associated with biometric features contained in the segments. The method also includes receiving a sample biometric template to be identified; dividing the sample biometric template into jobs based on the biometric features contained in the sample biometric template; comparing the jobs to the segments corresponding to the biometric features of the sample biometric template to determine candidate biometric templates associated with the segments that match the jobs; and generating a candidates list identifying the candidate biometric templates and entities related to the candidate biometric templates.

  • Pub Date: 2007/28/12
  • Number: 08218828
  • Details: Visit USPTO

Visit USPTO Page


System for facilitating discovery and management of feeds

A web feed portal can enable users to discover new web feeds and manage existing subscriptions of feeds. Recommended feeds can be generated for a user that reflect the user's interests or that are popular within a user community. Users can subscribe to feeds by selecting recommended web feeds or by contributing web feeds to the web feed portal. The user's web feed subscriptions can also be ranked to display the feeds in order of update time and/or time viewed by the user.

  • Pub Date: 2007/28/12
  • Number: 07984056
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of a passphrase account identifier for use in a network environment

A system and method for facilitating a financial transaction over a network including use of a passphrase account identifier is described herein. In one embodiment, a system for facilitating a financial transaction over a network comprises a communication interface; and a payment provider system configured to receive via the communication interface a passphrase account identifier from a merchant system, match the passphrase account identifier to a corresponding funding instrument number of a corresponding funding instrument, communicated the corresponding funding instrument number to an issuer system, receive from the issuer system a notification indication of one of acceptance of the funding instrument or decline of the funding instrument, and communicate back to the merchant system the notification indication.

  • Pub Date: 2007/28/12
  • Number: 08214288
  • Owner: Ebay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for performing distributed consistency verification of a clustered file system

A system and method for performing a distributed consistency check of a clustered file system. File system functions for loading an inode and/or buffer tree are modified so that in response to either of these functions being invoked, a consistency check is performed. The consistency check verifies both local consistency on a node of the clustered file and a distributed check across the nodes of the storage system.

  • Pub Date: 2007/28/12
  • Number: 08301673
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for conducting a gift value transaction

A system and method for conducting a gift value transaction is described herein. The method includes receiving a request for payment for a gift; notifying a gift recipient of the gift; prompting the gift recipient to accept or reject the gift; and receiving a response from the gift recipient, wherein if the response is to accept the gift, the gift is released to the gift recipient, and if the response is to reject the gift, prompting the gift recipient to select an alternative gift in place of the gift.

  • Pub Date: 2007/28/12
  • Number: 08036944
  • Owner: eBay, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Power management in electronic systems

In one embodiment, an electronic apparatus comprises at least one processor and a computer readable medium coupled to the processor and comprising logic instructions encoded in the computer readable medium, wherein the instructions, when executed in a processing system, cause the processing system to perform operations comprising initializing a direct memory access profiler in an electronic system, wherein the direct memory access is coupled to a policy manager in the electronic system, measuring at least one memory consumption characteristic of the electronic system, communicating the at least one memory consumption characteristic to a policy manager of the electronic system, and using the at least one memory consumption characteristic to adjust a power state of the electronic system.

  • Pub Date: 2007/28/12
  • Number: 07971084
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and appratus for demand-based memory mirroring

A method includes determining an amount of memory space in a memory device available for memory mirroring. The method further includes presenting the available memory space to an operating system. The method further includes selecting at least a portion of the amount of memory space to be used for memory mirroring with the operating system. The method further includes adding a non-selected portion of the available memory to memory space available to the operating system during operation. An associated system and machine readable medium are also disclosed.

  • Pub Date: 2007/28/12
  • Number: 07949850
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for selecting and providing a relevant subset of Wi-Fi location information to a mobile client device so the client device may estimate its position with efficient utilization of resources

A method of providing a relevant subset of information to a client device is based in part on scanning for Wi-Fi access points within range of the client device, using a Wi-Fi database that covers a large target region to retrieve information about these access points, using this information to estimate the position of the mobile client device, selecting a limited region in the vicinity of the estimated location of the client device, and providing information about Wi-Fi access points within this limited region to the client. For efficient transfer and maintenance of data, the target region may be divided into a hierarchy of fixed geographical tiles.

  • Pub Date: 2007/28/12
  • Number: 08369264
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for reducing power consumption for isochronous data transfers

A method and article for reducing power consumption for isochronous data transfers are described. The method may include receiving packets of data having multimedia information with empty spaces. The packets of data may be stored in a first buffer having a first buffer size allocated for a universal serial bus processing stack. The empty spaces may be removed from the packets of data and the packets of data having the empty spaces removed may be copied to a second buffer having a second buffer size allocated for a media information processing stack. Other embodiments are described and claimed.

  • Pub Date: 2007/28/12
  • Number: 2095441
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Managing contact list status notifications in collaboration systems to reduce network traffic

An awareness notification management system including a contact list manager managing an awareness service subscriber contact list including an active sublist for active contacts and an archive sublist for disabled contacts, and an awareness manager for monitoring the status contact list members, where the awareness manager is configured to access a history including at least one timestamp of a last communication exchange between the awareness service subscriber and any of the members of the contact list, and query the history for any of the timestamps and classify any of the contacts as a disabled contact on the archive sublist if the timestamp for the contact is older than a predefined age, and where the awareness manager is configured to forward to the awareness service subscriber awareness notifications regarding the status of the active contacts and withhold from the awareness service subscriber awareness notifications regarding the status of the disabled contacts.

  • Pub Date: 2007/28/12
  • Number: 08799925
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Discovering and updating templates

Embodiments are provided to maintain templates associated with a client. New and updated templates can be provided to the client and accessed by a user. In an embodiment, a system can be configured to automatically update locally stored templates with updated templates associated with a library. The updated templates can replace or be used to update the locally stored templates and be used by an application user. In one embodiment, a client can be configured to automatically initiate an update process to retrieve and/or receive new and updated templates from an associated document library. The update process can also be used to provide additional information associated with a template, such as metadata describing aspects of an associated template.

  • Pub Date: 2007/28/12
  • Number: 07933871
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Dental filler and methods

A dental filler is disclosed. The filler is produced by admixing a metal oxide sol and a water-soluble organic binder; drying said mixed sol into a dried product; and calcining said dried product; wherein said filler is a substantially amorphous cluster. The filler can be mixed into a hardenable resin to provide radiopaque dental materials having desirable strength and aesthetic character.

  • Pub Date: 2007/28/12
  • Number: 08647426
  • Owner: 3M Innovative Properties Company
  • Location: St. Paul, US
  • Details: Visit USPTO

Visit USPTO Page


Conditional actions based on runtime conditions of a computer system environment

Conditionally performing delegated actions based on runtime conditions of the environment. A component of an Information Technology environment conditionally performs an action, such as its own recovery, based on whether the component can have such action delegated to it and/or whether that component is currently being shared by multiple business applications of the environment.

  • Pub Date: 2007/28/12
  • Number: 07958393
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Compounds, compositions, kits and methods of use to orally and topically treat acne and other skin conditions by 19-Nor vitamin D analog

Oral and topical pharmaceutical compositions, kits and methods of treatment thereof for treating various skin disorder including acne, psoriasis, ichthyosis, photoaging, photodamaged skin, and, skin cancer. Exemplary vitamin D analogs as active pharmaceutical ingredients include 2-methylene-19-nor-20(S)-1α-hydroxy-bishomopregnacalciferol, 19-nor-26,27-dimethylene-20(S)-2-methylene-1α,25-dihydroxyvitamin D, 2-methylene-1α,25-dihydroxy-(17E)-17(20)-dehydro-19-nor-vitamin D, 2-methylene-19-nor-(24R)-1α,25-dihydroxyvitamin D, 2-methylene-(20R,25S)-19,26-dinor-1α,25-dihydroxyvitamin D, 2-methylene-19-nor-1α-hydroxy-pregnacalciferol, 1α-hydroxy-2-methylene-19-nor-homopregnacalciferol, (20R)-1α-hydroxy-2-methylene-19-nor-bishomopregnacalciferol, 2-methylene-19-nor-(20S)-1α-hydroxy-trishomopregnacalciferol, 2-methylene-23,23-difluoro-1α-hydroxy-19-nor-bishomopregnacalciferol, 2-methylene-(20S)-23,23-difluoro-1α-hydroxy-19-nor-bishomopregnancalciferol, (2-(3′hydroxypropyl-1′,2′-idene)-19,23,24-trinor-(20S)-1α-hydroxyvitamin D, 2-methylene-18,19-dinor-(20S)-1α,25-dihydroxyvitamin D, a stereoisomer thereof, a prodrug thereof in oral compositions, a salt thereof, and/or a solute thereof. Compounds that activate retinoic acid receptors, such as retinoyls and retinoyl esters, include 13-cis-retinoic acid, all-trans-retinoic acid, (2E,4E,6Z,8E)-3,7-dimethyl-9-(2,6,6-trimethyl-1-cyclohexeneyl)nona-2,4,6,8-tetraenoic acid, 9-(4-methoxy-2,3,6-trimethyl-phenyl)-3,7-dimethyl-nona-2,4,6,8-tetraenoic acid, 6-[3-(1-adamantyl)-4-methoxyphenyl]-2-napthoic acid, 4-[1-(3,5,5,8,8-pentamethyl-tetralin-2-yl)ethenyl]benzoic acid, retinobenzoic acid, ethyl 6-[2-(4,4-dimethylthiochroman-6-yl)ethynyl]pyridine-3-carboxylate, retinoyl t-butyrate, retinoyl pinacol, retinoyl cholesterol, an isomer thereof, a prodrug thereof for oral compositions, an ester thereof, a salt thereof, and/or, a solute thereof. Combinations of such active ingredients demonstrate synergistic efficacy.

  • Pub Date: 2007/28/12
  • Number: 08404667
  • Owner: Wisconsin Alumni Research Foundation
  • Location: Madison, US
  • Details: Visit USPTO

Visit USPTO Page


Billing, alarm, statistics and log information handling in multi-services gateway device at user premises

A gateway device for operation at a user premises having at least one endpoint device associated with the gateway device, the gateway device being in communication with a remote service manager comprises an application service module having at least one application, the application service module being remotely managed by a remote service manager via a connection, the application service module residing on a user premises side of a network service provider demarcation, a user module having a user interface that is associated with the at least one application, wherein the user module enables bi-directional communications with the at least one endpoint device, a network module having the connection that enables bi-directional communications with the remote service manager, a processor coupled to the user module, application service module, and network module, and a storage device coupled to the processor operable to store operational information generated by and related to the gateway device, and having a management module operable to generate, collect, process, and provide access to the operational information under the control of the remote service manager.

  • Pub Date: 2007/28/12
  • Number: 08031726
  • Owner: Prodea Systems, Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Arrangement and methods for performing malicious data detection and information leakage prevention

An integrated secured open database connectivity (ODBC) application programming interface (API) arrangement is provided. The arrangement includes a driver manager, which is configured for at least handling a function call from an application program. The arrangement also includes a set of drivers, which is configured for at least accessing a data source and applying the function call to the data source. The arrangement further includes a security module, which is configured for performing at least one of scanning the function call for malicious content and preventing an unauthorized user from accessing the data source.

  • Pub Date: 2007/28/12
  • Number: 08844028
  • Owner: Trend Micro Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of identifying potentially similar content for data reduction

Apparatus and methods of identifying potentially similar content include utilizing workflow metadata to identify potential similarities in content to be processed, or between content to be processed and known content. As a result, a subset of potentially similar content is identified, and the subset can be used in data reduction operations to reduce data in the content to be processed.

  • Pub Date: 2007/28/12
  • Number: 07836053
  • Owner: Group Logic, Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive communication application programming interface

An apparatus and method for maintaining data for multi-channel communication queuing associated with different media formats such as telephone, email, and fax. A list of agent data includes information related to types of communication media an agent can access. The data can further include information related to an agent's skills, a list of media routes, statistics for communication channels of specified media types, statistics for an agent, and journals for work items. Priority values for the media routes, the maximum number of queued items for the media routes, and times for escalating a work item can also be included.

  • Pub Date: 2007/28/12
  • Number: 08045698
  • Owner: Siebel Systems, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Activation, initialization, authentication, and authorization for a multi-services gateway device at user premises

A method of putting a first gateway device into service, the first gateway device having an application service module and a network module enabling communications between the first gateway device and the activation manager, the application service module residing on a user premises side of a network service provider demarcation. The method comprises identifying, at the first gateway device disposed at a user premises, an activation manager in communication with the first gateway device, transmitting, from the first gateway device, an activation certificate to the activation manager for verification and authentication, generating a service authentication key associated with the first gateway device, storing the service authentication key and an indication that the associated gateway device status is activated in a database, determining the services available to the first gateway device, and transmitting the service authentication key and an identification of the available services to the first gateway device.

  • Pub Date: 2007/28/12
  • Number: 08205240
  • Owner: Prodea Systems, Inc
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Micro-electromechanical nozzle arrangement with non-wicking roof structure for an inkjet printhead

The invention relates to a micro-electromechanical nozzle arrangement for an inkjet printhead. The nozzle arrangement includes a substrate defining an inverted pyramidal ink chamber with an ink supply channel leading through the substrate, the substrate having a layer of drive circuitry. The arrangement also includes a roof structure connected to the drive circuitry layer and covering the ink chamber, the roof structure defining a fluid ejection nozzle rim above said chamber in addition to ink flow guide rails to minimize wicking along the nozzle rim according to surface tension effects of ink in the chamber. Also included is a plurality of actuators displaceable with respect to, and radially spaced about, the nozzle rim, and in between, the guide rails, each actuator having a serpentine heater element configured to thermally expand upon receiving current from the drive circuitry thereby moving said actuators into the chamber operatively increasing a fluid pressure inside the chamber to eject a drop of ink via the ejection nozzle.

  • Pub Date: 2007/27/12
  • Number: 07438391
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Knowledge management tool

A system, method and article of manufacture are provided for managing data across an enterprise. A request for information is received from a user. Data relating to the user request is searched for in at least two geographically separated information repositories. The results of the search are presented to the user. The user is allowed to browse through additional data of the information repositories. Links between data items and other data entries in the information repositories are created according to relationships the data items have to the other data entries.

  • Pub Date: 2007/27/12
  • Number: 08938435
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Graphic system comprising a fragment graphic module and relative rendering method

A graphic system having a central processing unit; a system memory coupled to the central processing unit; a display unit provided with a corresponding screen; a graphic module coupled to and controlled by the central processing unit to render an image on the screen of the display unit, the graphic module including a fragment graphic module having a depth test buffer for storing a current depth value; a depth test stage coupled to the depth test buffer for comparing the current depth value with a depth coordinate associated with an incoming fragment and defining a resulting fragment; a test stage for testing the resulting fragment and defining a retained fragment; a buffer writing stage operatively associated with the test stage for receiving the retained fragment, the buffer writing stage coupled to the depth test buffer for updating the current depth value with a depth value of the retained fragment.

  • Pub Date: 2007/27/12
  • Number: 08169442
  • Owner: STMicroelectronics S.r.l.
  • Location: Agrate Brianza, IT
  • Details: Visit USPTO

Visit USPTO Page


Delivering secured media using a portable memory device

In some embodiments an interface of a portable memory device is used to store content information in a hidden memory region of the portable memory device. The interface is also used to store information in a visible memory region of the portable memory device. The information stored in the visible memory region allows the content information stored in the hidden memory region to be accessed. Other embodiments are described and claimed.

  • Pub Date: 2007/27/12
  • Number: 08683159
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Creating and using deltas to modify existing computer code

Aspects of the subject matter described herein relate to creating and using deltas to modify existing computer code. In aspects, computer code may be translated into a higher level language to make it easier for a software developer to modify the computer code. The translated computer code may be presented by an editing tool that presents a user interface that allows changes to be made to the translated computer code. A delta engine may then determine a delta that indicates the changes to perform on the existing computer code to create computer code that would result from compiling the translated computer code as changed via the editing tool. Later, this delta may be used to change the existing computer code after it has been loaded to add or change debugging hooks or other features of the computer code.

  • Pub Date: 2007/27/12
  • Number: 08584102
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Conversion of over-the-counter swaps to standardized forward swaps

Systems, processes and methods are described for converting over-the-counter derivative products such as interest rate swaps (IRSs) to standardized forward swaps, such as centrally cleared interest rate swaps. The value of each leg of the over-the counter swap may be determined and compared to a value of a corresponding leg of the forward swap. A mark-to-market value may be determined as the difference between the values.

  • Pub Date: 2007/27/12
  • Number: 08117110
  • Owner: Chicago Mercantile Exchange Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing information tagging in a networked system

A computer-implemented system and method for providing information tagging in a networked system is disclosed. The apparatus in an example embodiment includes a tag engine configured to process a database of categorized product listings; to receive a user-provided tag associated with at least one of the product listings; to retain the user-provided tag; and to serve the user-provided tag to a user viewing at least one of the product listings.

  • Pub Date: 2007/26/12
  • Number: 09324082
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Polarization control using diffraction gratings in VCSEL waveguide grating couplers

A VCSEL waveguide grating coupler is provided such that a first and second mirror are positioned to define a resonant cavity between them. The waveguide grating coupler further includes a waveguide having a first grating formed as a part of the waveguide to couple light of a first polarization mode into the waveguide. A second grating is formed on the waveguide grating coupler and is orthogonal to the first grating. The second grating is operative to enhance the light coupled to the waveguide by creating a loss difference between light of the first polarization mode and light of a second polarization mode, so that light of the first polarization mode lases preferentially within the VCSEL.

  • Pub Date: 2007/26/12
  • Number: 07627018
  • Owner: Opticomp Corporation
  • Location: Zephyr Cove, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for monitoring and analyzing of IP networks elements

Exemplary embodiments include methods and systems for monitoring, analyzing, and troubleshooting of control plane dynamics of a network including collecting state data from the one or more routers of one or more protocols at discrete time intervals, the state data being associated with one or more routers of a network, analyzing corresponding state data collected at two or more discrete time intervals, and outputting a result of the analysis of the state data collected from the one or more routers of the network.

  • Pub Date: 2007/26/12
  • Number: 07975045
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for internet video and rich media behavioral measurement

This disclosure describes methods and systems to quantify and understand the behavior and consumption patterns of audiences with respect to Internet video and rich media applications. In operation, an end user video player or a rich media application (such as an interactive advertisement built with Flash or other method) is instrumented to capture data. The data is collected by a service provider and made available for viewing by customers of a video experience and rich media behavior measurement service.

  • Pub Date: 2007/26/12
  • Number: 08745647
  • Owner: Visible Measures Corp.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Fast triangle reordering for vertex locality and reduced overdraw

Presented are systems and methods that change the order in which triangles are rendered, to improve post-transform vertex cache efficiency and reduce view-independent overdraw. The resulting triangle orders are orders magnitude faster to compute compared to previous methods. The improvements in processing speed allow such methods to be performed on a model after it is loaded (i.e., when more information on the host hardware is available). Also, such methods can be executed interactively, allowing for re-optimization in case of changes to geometry or topology, which happen often in CAD/CAM applications.

  • Pub Date: 2007/26/12
  • Number: 08379019
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Providing transparent CDMA short message service using non-CDMA mobile devices, smart cards and networks

Methods and systems for sending, receiving, storing, and reading CDMA type SMS messages on wireless non-CDMA or multimode mobile devices include embedding a CDMA SMS message in a non-CDMA SMS host message. Such a host message may be created, transmitted, received, or otherwise processed by a mobile device, such as one operating in a GSM or UMTS mode. Similarly a CDMA SMS message may be stored in a SIM/USIM module using similar techniques. An embodiment provides a software application programming interface (API) which transparently processes SMS messages regardless of whether they are CDMA or non-CDMA and regardless of the operating mode of the mobile device.

  • Pub Date: 2007/24/12
  • Number: 08249629
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems and apparatus for integrated wireless device location determination

Methods, devices, and systems are presented for integrated wireless device location determination. A method for determining location on a wireless device includes receiving a request for wireless device location and receiving a plurality of wireless network messages. Each message is transmitted from a wireless network edge device associated with one of a plurality of wireless networks. Further included is obtaining location measurement information from the received wireless network messages and obtaining location determining assistance information for each of the wireless networks associated with the received wireless network messages. The method further includes determining more than one wireless device location based on the location measurement information and the location determining assistance information, determining an integrated wireless device location based on the more than one wireless device location, validating and storing the integrated wireless device location. A method for determining wireless device location at a network device is also provided.

  • Pub Date: 2007/24/12
  • Number: 07595754
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods for retrieving/ downloading content on a communication device

Apparatus, methods, processors, and computer readable media for receiving or transmitting content based on a presentation area size of a communication device are provided. In one aspect, the method includes obtaining a presentation area size of a display on a first communication device, and obtaining a first portion of content from a second communication device located across a communications network. The first portion of content is based on the presentation area size. The method further includes storing the first portion of content in a memory of the first communication device.

  • Pub Date: 2007/24/12
  • Number: 08943164
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive streaming for on demand wireless services

An adaptive media distribution system provides an on demand user experience across a limited throughput wireless network by selectively utilizing available storage on a handheld communication device, taking advantage of increased availability of extended memory solutions. Creation of an adaptable user interface (UI) widget (e.g., Trig) serves as a near real-time mechanism for delivery of media content, overcoming the over-the-air latency and difficulties with streaming interoperability. Yet, for handheld communication devices with limited storage, the adaptive media distribution system further allows legacy devices to receive on demand services via streaming, albeit with the requisite relatively long latency associated with cellular multimedia services.

  • Pub Date: 2007/24/12
  • Number: 09313245
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques to manage power based on motion detection

Techniques to manage power based on motion detection are described. For example, a mobile computing device may include a radio module having a communications failure event detector operative to detect a communications failure event, a motion detector operative to detect motion, and a processor coupled to the radio module and the motion detector. The processor operative to execute a scan control module to determine the mobile computing device is moving or stationary, and control scanning operations by the radio module in accordance with the determination. Other embodiments are described and claimed.

  • Pub Date: 2007/21/12
  • Number: 08254858
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for differencing binary installation packages

Techniques for differencing binary installation packages are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for performing differencing binary installation packages. The method may comprise populating at least one data structure using information from different builds of a binary installation package, comparing information in the at least one data structure, and generating a result of the comparison.

  • Pub Date: 2007/21/12
  • Number: 08630981
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Technique for finding rest resources using an n-ary tree structure navigated using a collision free progressive hash

The present invention discloses a data structure which, given an identifier for a Representational State Transfer (REST) resource, can rapidly yield a configured target and simultaneously yield all configured pattern based rules and constraints for the target. The disclosed data structure is a tree structure including nodes for URL portions. Each node is associated with a hash tree specifically grown in a manner that ensures collision occurrences are non-existent. The tree structure is effectively two or more superimposed trees; one for URL pattern matching to determine a target, another for determining constraints. A single tree traversal, which can be based on a progressive hash, can be used to concurrently determine a target and a set of constraints, which represents improved performance over conventional implementations that require multiple, distinct query/response operations to produce equivalent results.

  • Pub Date: 2007/21/12
  • Number: 07774380
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for transmitting and receiving large objects via digital radio broadcast

Methods and systems for transmitting and receiving large objects via digital radio broadcast involve retrieving an object and an object description; assigning a unique identifier to the object; segmenting the object into a plurality of fragments; generating at least one long message having selected ones of the fragments and a long header including the unique identifier and the object description; generating at least one short message having selected ones of the fragments and a short header including the unique identifier; and communicating the at least the long message or the short message to a digital radio broadcast transmitter. In accordance with certain embodiments, reassembly of the object can begin with either a long message or a short message.

  • Pub Date: 2007/21/12
  • Number: 08595748
  • Owner: iBiquity Digital Corporation
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for targeted advertising on wireless devices based on device location and current user interests

Aspects provide for systems, methods, apparatus and computer program products for selecting advertisements for presentation on wireless device applications based on the current device location and the current interests of the device user. The current interests of the device user are defined by the application currently being executed on the device and/or current user inputted requests for content. In this regard, present aspects provide for highly targeted advertising that serves to provide advertisements to users based on their current needs, which are defined in terms of their current interests and current location.

  • Pub Date: 2007/21/12
  • Number: 08588816
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for communicating and rendering electronic program guide information via digital radio broadcast transmission

Methods and systems for preparing data for broadcast via digital radio broadcast transmission is disclosed comprising the steps of receiving a plurality of content files corresponding to programming information for program content to be broadcast; receiving an index file having a pointer for each of the plurality of content files, wherein the index file is associated with a first logical address; storing the index file and the plurality of content files; scheduling a broadcast rotation of the index file and the plurality of content files (wherein the index file is scheduled for repeated transmission intermittently relative to selected ones of the content files); and transmitting the index file and the plurality of content files to an importer in accordance with the broadcast rotation.

  • Pub Date: 2007/21/12
  • Number: 08983365
  • Owner: iBiquity Digital Corporation
  • Location: Columbia, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for unstable-resonator optically pumped semiconductor lasers

Apparatus and method for designing and operating a solid-state laser that compensates for thermal lensing such that lasing instability is maintained at high pumping power. In some embodiments, the laser is an optically pumped semiconductor laser (OPSL). In some embodiments, a concave end facet is formed on the OPSL that at least compensates for thermal lensing at high pump power. In some embodiments, an external mirror is used for at least one end of the OPSL, wherein the external mirror at least compensates for thermal lensing at high pump power.

  • Pub Date: 2007/21/12
  • Number: 08027818
  • Owner: Lockheed Martin Corporation
  • Location: Bethesda, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing distributed objects as a single representation

An architecture and method for managing at least two distinct machines (or objects) in which resources are shared as a single entity (or object) in an agent-based system. The agent-based system comprising a controller, a local agent coupled to the controller, and at least one clustered machine. The at least one clustered machine includes at least two individual agents, the at least two individual agents sharing at least one shared resource/service. The system also includes a virtual non-persistent connection for coupling the at least two individual agents to the local agent. The at least one shared resource/service is accessed by the local agent through the virtual non-persistent connection using a virtual IP address to enable the at least two individual agents of the at least one clustered machine to be represented as a single object.

  • Pub Date: 2007/21/12
  • Number: 08271605
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Selecting a data protection strategy for a content unit on a storage system

Some embodiments of the invention relate to selecting a data protection scheme, such as, for example, mirroring or RAID, for a content unit based on power-related metadata associated with the content unit. The data protection strategy selected for a content unit may impact the amount of power that a storage system consumes.

  • Pub Date: 2007/21/12
  • Number: 09619162
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Selecting a data protection strategy for a content unit on a storage system

Some embodiments of the invention relate to selecting a data protection scheme, such as, for example, mirroring or RAID, for a content unit based on power-related metadata associated with the content unit. The data protection strategy selected for a content unit may impact the amount of power that a storage system consumes.

  • Pub Date: 2007/21/12
  • Number: 09619162
  • Owner: EMC IP Holding Company LLC
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Query response service for business objects

Methods and apparatus, including computer program products, for a query response service for business objects. In general, data characterizing a request to perform a query on multiple instances of a business object may be received, where the query includes selection criteria for multiple attributes across multiple nodes for each of the instances of the business object. The query may be initiated on the instances of the business object. Results including values from the attributes across the nodes of the business objects may be returned. The query may be assigned to a node of the business object, which may be a query response transformation node. The node may include a combination of attributes associated with the attributes across the nodes of the business object. Results may be sorted on a server, sent as pages to a client, or both.

  • Pub Date: 2007/21/12
  • Number: 07953722
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Presenting differences in a file system

An embodiment of the invention provides an apparatus and method for presenting differences in a file system. In an embodiment, an application programming interface receives a request from a host, where the request is for a listing of changes in the file system within a time interval. A comparison unit determines each metadata container that has changed in the file system within the time interval. The application programming interface buffers at least one identifier that corresponds to a metadata container that has changed in the file system within the time interval. The application programming interface packages and transmits the at least one identifier to the host. The at least one identifier is readable on the host.

  • Pub Date: 2007/21/12
  • Number: 07904466
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for module initialization

A method for initializing a module that includes identifying a module for initialization and performing a plurality of processing phases on the module and all modules in a dependency graph of the module. Performing the processing phases includes, for each module, executing a processing phase of the plurality of processing phases on the module, determining whether the processing phase has been executed on all modules in a dependency graph of the module, and when the processing phase has been executed for all modules in the dependency graph of the module, executing a subsequent processing phase of the plurality of processing phases on the module, wherein at least one processing phase of the plurality of processing phases includes executing custom initialization code.

  • Pub Date: 2007/21/12
  • Number: 08099735
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for module initialization with an arbitrary number of phases

A method for initializing a module that includes identifying a first module for initialization, and performing a plurality of processing phases on the first module and all modules in a dependency graph of the first module. Performing the plurality of processing phases includes, for each module, executing a processing phase of the plurality of processing phases on the module, determining whether the processing phase has been executed on all modules in a dependency graph of the module, and when the processing phase has been executed for all modules in the dependency graph of the module, executing a subsequent processing phase of the plurality of processing phases on the module.

  • Pub Date: 2007/21/12
  • Number: 07934084
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus to establish a communication connection

Various embodiments are directed to a mobile computing device having a communication management module. The communication management module receives connection information from a destination device, the connection information representing at least one communication mode accepted by the destination device. Other embodiments are described and claimed.

  • Pub Date: 2007/21/12
  • Number: 09641661
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus to establish a communication connection

Various embodiments are directed to a mobile computing device having a communication management module. The communication management module receives connection information from a destination device, the connection information representing at least one communication mode accepted by the destination device. Other embodiments are described and claimed.

  • Pub Date: 2007/21/12
  • Number: 09641661
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing authentication and encryption services by a software as a service platform

An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services hosting platform. The services hosting platform comprises a services hosting framework capable of hosting multiple service applications, each of which may be shared by multiple tenants that each customize their use of a particular application service by extending the application service to exploit run time platform services within a service execution pipeline. The services hosting framework may easily be leveraged by applications to decrease the time associated with developing, deploying and maintaining high quality services in a cost effective manner.

  • Pub Date: 2007/21/12
  • Number: 08336089
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Managing power consumption of a storage system

Some embodiments of the invention relate to selecting a data protection scheme, such as, for example, mirroring or RAID, for a content unit based on power-related metadata associated with the content unit. The data protection strategy selected for a content unit may impact the amount of power that a storage system consumes.

  • Pub Date: 2007/21/12
  • Number: 08539169
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Maintaining state transition data for a plurality of users, modeling, detecting, and predicting user states and behavior

Mechanisms model, detect, and predict user behavior as a user navigates the Web. In one embodiment, mechanisms model user behavior using predictive models, such as discrete Markov processes, where the user's behavior transitions between a finite number of states. The user's behavior state may not be directly observable (e.g., a user does not proactively indicate what behavior state he is in). Thus, the behavior state of a user is usually only indirectly observable. Mechanisms use predictive models, such as hidden Markov models, to predict the transitions in the user's behavior states.

  • Pub Date: 2007/21/12
  • Number: 07941383
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Image forming apparatus and process cartridge

An image forming apparatus includes an image carrier, a toner image forming unit configured to form a toner image having a predetermined polarity on the image carrier, an intermediate transfer body facing the image carrier, a primary transfer member configured to transfer the toner image on the image carrier onto the intermediate transfer body, a secondary transfer member configured to transfer the toner image on the intermediate transfer body onto a recording medium, and a contacting member in contact with the image carrier and configured to remove residual toner remaining on the image carrier after the toner image is transferred by the primary transfer member onto the intermediate transfer body and to pass the removed residual toner to the intermediate transfer body. A bias voltage with the same polarity as the predetermined polarity of the toner image is applied to the contacting member.

  • Pub Date: 2007/21/12
  • Number: 07778573
  • Owner: Ricoh Company, Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Data commit on multicycle pass complete without error

A system and methodology that can prevent errors during data commit on multicycle pass complete associated with a memory is provided. The system employs a transaction buffer component in the memory that receives and temporarily stores information associated with a transaction. A controller component programs subsets of data to respective memory locations once the entire transaction is completed based on the information stored in the transaction buffer component. Thus, if the transaction is interrupted during the transfer of the user data into the buffer, the data stored in the memory is not affected and can still contain the original data when power is regained. If the data transfer between the transaction buffer component and memory array is interrupted, the controller component can complete the transfer from the point of interruption on regaining power and can avoid partial storage of data.

  • Pub Date: 2007/21/12
  • Number: 08788740
  • Owner: Spansion LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Contract programming for code error reduction

In one embodiment, a computer system provides an application programming interface (API) for augmenting an application API. A computer system receives software code written in a second programming language indicating a user's intention to augment an application API with contracts from a contract API written in a first programming language. The software code includes a reference to the contract API. The contracts include assertions indicating appropriate use of the application API. The computer system accesses portions of the contract API according to the reference in the software code and compiles the received software code and the referenced portions of the contract API into an intermediate language (IL) version of the software code. The IL version is in an intermediate language common to both the first programming language and the second programming language. The IL version includes the assertions indicating appropriate use of the application API.

  • Pub Date: 2007/21/12
  • Number: 08250524
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Client device systems and methods for providing secure access to application services and associated client data hosted by an internet coupled platform

An extensible servicing hosting platform is provided that supports the design, build and concurrent deployment of multiple web accessible services on a services hosting platform. The services hosting platform comprises a services hosting framework capable of hosting multiple service applications, each of which may be shared by multiple tenants that each customize their use of a particular application service by extending the application service to exploit run time platform services within a service execution pipeline. The services hosting framework may easily be leveraged by applications to decrease the time associated with developing, deploying and maintaining high quality services in a cost effective manner.

  • Pub Date: 2007/21/12
  • Number: 08706800
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Automated forensic document signatures

Methods and systems are provided for a proactive approach for computer forensic investigations. The invention allows organizations anticipating the need for forensic analysis to prepare in advance. Digital signatures are generated proactively for a specified target. The digital signature represents a digest of the content of the target, and can be readily stored. Searching and comparing digital signatures allows quick and accurate identification of targets having identical or similar content. Computational and storage costs are expended in advance, which allow more efficient computer forensic investigations. The present invention can be applied to numerous applications, such as computer forensic evidence gathering, misuse detection, network intrusion detection, and unauthorized network traffic detection and prevention.

  • Pub Date: 2007/21/12
  • Number: 08280905
  • Owner: Georgetown University
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Asynchrony debugging using web services interface

A system and method for debugging a running process of an application or component is disclosed. A debugging client has a user interface for receiving user commands to configure and control a debugging program. A debugging agent is resident in a local network area with the running process and has a direct connection with the running process. The debugging agent is configured to execute the debugging program to obtain debugging information on the running process, and to send the debugging information to the debugging client. A Web services communication link is established between the debugging client and the debugging agent for communicating signals to the debugging agent from the debugging client representing the user commands to configure and control the debugging program.

  • Pub Date: 2007/21/12
  • Number: 08239839
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Antibacterial compounds and methods of using same

Embodiments of the present invention provide novel antibacterials that target penicillin-binding proteins or other important cellular targets. Methods for inhibiting growth (reproduction, etc.) of bacteria using compounds described herein are also provided. Various embodiments exhibit activity against gram positive bacteria, such as certain strains of and

  • Pub Date: 2007/21/12
  • Number: 09045442
  • Owner: University of Notre Dame du Lac
  • Location: Notre Dame, US
  • Details: Visit USPTO

Visit USPTO Page


Upgrading digital media servers

A system and method are disclosed for upgrading both hardware and software components of a digital media server without disrupting media delivery services. In a preferred embodiment, the present system and method employ an object-oriented model that allows system servers to remain fully operational while software upgrades at both the operating system and application levels are installed. Additionally, the system and method use redundant or partitionable programmable logic devices to perform firmware upgrades without disrupting media delivery services.

  • Pub Date: 2007/20/12
  • Number: RE042685
  • Details: Visit USPTO

Visit USPTO Page


Unit cell of a printhead for an inkjet printer

The invention provides for a unit cell of a printhead for an inkjet printer. The unit cell includes a wafer substrate, a layer of micro-electromechanical drive circuitry deposited on the wafer substrate, and an interlayer dielectric deposited on the drive circuitry layer. The unit cell also includes a passivation layer deposited on the dielectric layer, the passivation layer defining a plurality of vias therethrough. Side walls are deposited on the heater element. A nozzle plate is positioned on the side walls so that the nozzle plate and the side walls form an ink chamber. A heater element is suspended from the sidewalls in said ink chamber. The heater element is connected to the drive circuitry layer through the vias. The unit cell has an ink channel defined through the wafer substrate and ends in an ejection nozzle in the nozzle plate.

  • Pub Date: 2007/20/12
  • Number: 07441879
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


System for providing a configurable adaptor for mediating systems

A system is described for providing a configurable adaptor for mediating systems. The system may include a memory, an interface, and a processor. The memory may store an interaction item, a data mapping, data schemas and binary representations of the data schemas. The interface may communicate with a first system, a second system, and a device. The processor may identify the interaction item describing an interaction between the systems. The processor may generate and process a first and second data schema to generate binary representations of the schemas. The processor may generate a data mapping referencing the binary representations to describe a data transformation between the data formats of the first and second systems. The processor may deploy the binary representations, the data mapping, and the interaction item to a device to enable the device to maintain interaction state, and communicate properly formatted messages between the first and second systems.

  • Pub Date: 2007/20/12
  • Number: 08606768
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating topic neighborhoods in a networked system

A computer-implemented system and method for creating topic neighborhoods and a visualization for related topic neighborhoods in a networked system are disclosed. The apparatus in an example embodiment includes a neighborhood generator configured to receive an explicit identification of a topic for association with a neighborhood; create a neighborhood in association with the explicitly identified topic; gather neighborhood information related to the neighborhood from sources related to the topic; and provide access to the neighborhood via a neighborhood link on a webpage.

  • Pub Date: 2007/20/12
  • Number: 08352549
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for creating topic neighborhood visualizations in a networked system

A computer-implemented system and method for creating topic neighborhoods and a visualization for related topic neighborhoods in a networked system are disclosed. The apparatus in an example embodiment includes a neighborhood generator configured to receive an explicit identification of a topic for association with a neighborhood; create a neighborhood in association with the explicitly identified topic; gather neighborhood information related to the neighborhood from sources related to the topic; and provide access to the neighborhood via a neighborhood visualization on a webpage.

  • Pub Date: 2007/20/12
  • Number: 08862690
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Software transactional memory for dynamically sizable shared data structures

We propose a new form of software transactional memory (STM) designed to support dynamic-sized data structures, and we describe a novel non-blocking implementation. The non-blocking property we consider is obstruction-freedom. Obstruction-freedom is weaker than lock-freedom; as a result, it admits substantially simpler and more efficient implementations. An interesting feature of our obstruction-free STM implementation is its ability to use of modular contention managers to ensure progress in practice.

  • Pub Date: 2007/20/12
  • Number: 07895401
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Software framework to build an executable scheme in a GUI environment

A software framework comprises at least one software tool and at least one parameter associated with each tool. The framework is arranged to (i) allow the selection of at least one software tool from a plurality of tools, (ii) allow the selection of at least one parameter from a parameter set, (iii) associate the parameter with a selected tool, and (iv) associate the selected tools and parameters together in a scheme such that they can be executed as a batch.

  • Pub Date: 2007/20/12
  • Number: 08484615
  • Owner: NCR Corporation
  • Location: Duluth, US
  • Details: Visit USPTO

Visit USPTO Page


Monitoring of services

Various systems, methods, and programs embodied on a computer readable medium that facilitate monitoring of services and servers. In one embodiment, an amount of data is stored in at least one storage device, the data being generated by a plurality of services executed on a plurality of servers, and by the servers upon which the services are executed. A plurality of monitoring applications are executed in a monitoring server, the monitoring applications being configured to perform a plurality of monitoring functions with respect to at least a portion of the data to facilitate an assessment of an operating condition of the services and the servers. An interface layer surrounds the monitoring applications in the monitoring server. The interface layer defines a messaging format that is used by devices external to the interface layer to interact with the monitoring applications.

  • Pub Date: 2007/20/12
  • Number: 09054942
  • Owner: Amazon Technologies, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for inducing behavior in a population cohort

Avatars, methods, apparatuses, computer program products, devices and systems are described that carry out identifying a member of a population cohort; and inducing at least one behavior in the member of the population cohort based on an association between the population cohort and at least one cohort-linked avatar.

  • Pub Date: 2007/20/12
  • Number: 08150796
  • Owner: The Invention Science Fund I
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for indicating behavior in a population cohort

Avatars, methods, apparatuses, computer program products, devices and systems are described that carry out identifying a member of a population cohort; and indicating at least one behavior in the member of the population cohort based on an association between the population cohort and at least one cohort-linked avatar.

  • Pub Date: 2007/20/12
  • Number: 08195593
  • Owner: The Invention Science Fund I
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for monitoring rest web services

Generally, the present invention provides a method and computerized system for monitoring REST web services including generating a REST based web service client call operative to be used for monitoring web service activities. The web service client call is then deployed. The method and computerized system further includes monitoring the web service activities via the call invocation and a response analysis. The method and computerized system further includes receiving a plurality of feedback results from the monitoring of the web service functionality and thereupon adjusting the web service parameters based on the aggregated feedback.

  • Pub Date: 2007/20/12
  • Number: 08275855
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent leading indicator display

According to typical inventive practice, a baseline describing a statistical distribution is established for a set of historical occurrences of an event. Comparison is made between the baseline and at least one current occurrence of the same event. Any current occurrence that is anomalous vis-à-vis the baseline is considered a possible leading indicator. According to some inventive embodiments of graphical presentation of such comparison, at least one graphical baseline comparative display component is rendered that includes a “bar” (describing a historical statistical distribution with respect to a criterion pertaining to occurrence of an event) and a “slider” (describing one or more current occurrences of the event). The bar includes at least one band representing a statistical mean range, and at least one band representing a statistical outlier range. Situation of the slider along the bar indicates whether and to what extent the current occurrence(s) is/are anomalous vis-à-vis the baseline.

  • Pub Date: 2007/20/12
  • Number: 08094154
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Hydroxy methyl phenyl pyrazolyl urea compounds useful in the treatment of cancer

The compound 4-{4-[({3-tert-Butyl-1-[3-(hydroxymethyl)phenyl]-1H-pyrazol-5-yl}carbamoyl)amino]-3-fluorophenoxy}-N-methylpyridine-2-carboxamide and alternative forms thereof (e.g., salts, solvates, hydrates, prodrugs, polymorphs and metabolites); pharmaceutical compositions which contain them; and methods for treating cancer using them.

  • Pub Date: 2007/20/12
  • Number: 08101773
  • Owner: Bayer Healthcare LLC
  • Location: Tarrytown, US
  • Details: Visit USPTO

Visit USPTO Page


Browser-based user interface and control architecture with priority attributes

A browser-enabled device includes a browser-based user interface and control architecture, which has a browser core, a browser framework, and a user interface. The user interface is written using a markup language. In processing event registrations, the browser framework receives an event registration. The received event registration having a response unique resource identifier (URI) content and a priority field. The priority field of the received event registration is examined to determine priority of the received event registration. If the browser core is loading the response URI content of a prior event registration and if the priority of the received event registration is higher than the priority of the prior event registration, then the loading of the response URI content of the prior event registration is halted, and loading of the response URI content of the received event registration is begun.

  • Pub Date: 2007/20/12
  • Number: 08266635
  • Owner: Access Co., Ltd.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Baseline comparative leading indicator analysis

According to typical inventive practice, a baseline describing a statistical distribution is established for a set of historical occurrences of an event. Comparison is made between the baseline and at least one current occurrence of the same event. Any current occurrence that is anomalous vis-à-vis the baseline is considered a possible leading indicator. According to some inventive embodiments of graphical presentation of such comparison, at least one graphical baseline comparative display component is rendered that includes a “bar” (describing a historical statistical distribution with respect to a criterion pertaining to occurrence of an event) and a “slider” (describing one or more current occurrences of the event). The bar includes at least one band representing a statistical mean range, and at least one band representing a statistical outlier range. Situation of the slider along the bar indicates whether and to what extent the current occurrence(s) is/are anomalous vis-à-vis the baseline.

  • Pub Date: 2007/20/12
  • Number: 07797130
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Application logging interface for a mobile device

A mobile device, and particularly a wireless device, provides a computing platform upon which third-party (e.g., accessory) applications can execute, increasing features/functions desirable to a user. In order to better serve users of wireless devices, third-party developers of such applications would benefit from information about how their fielded applications are being used. However, creating log packets that can ultimately reach the developers is generally not permissible or enabled by wireless devices due to privacy concerns, safeguards against malicious applications, the environment generally afforded to accessory applications, the limited communication channel (e.g., bandwidth, duration, user expense, etc.), and difficulty in integrating such applications to chipsets tailored for mobile devices, such as cell phones. Authentication of the application and a defined log header prior to deployment coupled a confirming unlock feature on the device allows for log packets of increasing complexity that can be selectively allowed, filtered, and reported by a device.

  • Pub Date: 2007/20/12
  • Number: 09137664
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for recovery of application level objects

Techniques for recovery of application level objects are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for restoration of one or more application level objects. The method may comprise obtaining application metadata of an application containing objects to be restored, storing one or more data files containing application data, utilizing the application metadata to provide a user interface for the restoration of one or more application objects, accepting input from a user via the user interface specifying one or more application objects to restore, and restoring the one or more specified application objects.

  • Pub Date: 2007/19/12
  • Number: 08266112
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System for digitally notifying customers of a utility

A digital notification and response system for digitally notifying customers of an utility. The system includes a plurality of user contact devices, an application programming interface, and a dynamic information database. Real time digital user data comprising bank identified grouping information for forming user groups, user contact device information for each contact device, and utility provided user contact device priority information is received by the application programming interface and stored in the dynamic information database. The user contact device priority information is used to form a first and second group of user contact devices. Messages are transmitted through at least two industry standard gateways to the user contact devices, wherein the messages are simultaneously transmitted to the first group of user contact devices before the second group of user contact devices. Responses from the contact devices are received by the application programming interface and stored in the dynamic information database.

  • Pub Date: 2007/19/12
  • Number: 08165274
  • Details: Visit USPTO

Visit USPTO Page


System and method for versioning data in a distributed data store

A system and method for versioning of atomic units of data (such as XML fragments) in a distributed data store are disclosed. The distributed data store may maintain a linear version history for each fragment, such that each has no more than one successor and one predecessor, with no implicit branching. An application programming interface may provide an explicit branching request (indicating an intent to merge modified data in a child branch into its parent branch), along with read, create, create-merge, and/or integrate requests. A reconciliation policy may be specified on a per-application basis, and may include automatic reconciliation using a callback function or interactive reconciliation, with inputs returned to the application. Writes to a minority side of a network partition may be refused unless an explicit branch is requested. Transactions may not be supported in client applications or may be supported through explicit branching. Transactions may be used internally.

  • Pub Date: 2007/19/12
  • Number: 08266122
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing access to an application through a common interface for application extensions

A method and system to permit externally created business objects to access a business management application database without using direct database language statements. An add-on framework includes an add-on extension manager to start an add-on application, register a form from the add-on application, and receive and route an event from the business management application to the add-on application through a user interface application programming interface component object model interface. A persistency layer provides a set of programming language classes and interface definitions to develop a persistent business object in the add-on extension, and connect the persistent business object to a database through a data interface application programming interface component object model interface to read and write data from the database associated with the business management application.

  • Pub Date: 2007/19/12
  • Number: 07860890
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


System and method for extracting text captions from video and generating video summaries

Caption boxes which are embedded in video content can be located and the text within the caption boxes decoded. Real time processing is enhanced by locating caption box regions in the compressed video domain and performing pixel based processing operations within the region of the video frame in which a caption box is located. The captions boxes are further refined by identifying word regions within the caption boxes and then applying character and word recognition processing to the identified word regions. Domain based models are used to improve text recognition results. The extracted caption box text can be used to detect events of interest in the video content and a semantic model applied to extract a segment of video of the event of interest.

  • Pub Date: 2007/19/12
  • Number: 08488682
  • Owner: The Trustees of Columbia University in the City of New York
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Small debug print

A network interface includes a firmware module that generates a first message based on a first print macro call and a memory module that stores the first message. The first message comprises a subset of data indicative of the first print macro call.

  • Pub Date: 2007/19/12
  • Number: 08863148
  • Owner: Marvell International Ltd.
  • Location: Hamilton, BM
  • Details: Visit USPTO

Visit USPTO Page


Selective thread spawning within a multi-threaded processing system

One embodiment of the present invention sets forth a technique for selectively spawning threads within a multiprocessing system. A computation work distributor (CWD), within the system, is responsible for performing the detailed work needed to spawn a thread grid. A request to the CWD to spawn a thread grid includes a predicate table, which includes an array of flags used to indicate which thread indices should have an associated thread block spawned and which should not. Greater efficiency is achieved by only spawning thread blocks that should perform useful computation.

  • Pub Date: 2007/19/12
  • Number: 08413151
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Programming library usage capturing and representation

A computer system may provide various resources to users through one or more programming libraries, such as application programming interfaces (APIs), in order to standardize access to such resources through various general-purpose mechanisms. These programming libraries may be operated by other programs, such as task-specific user interfaces, through which a user may utilize the programming library without having to understand its structure and functions. However, in many scenarios, a user may wish to know the manner of invoking a programming library to achieve an invoked behavior, or may wish to reproduce the behavior without having to utilize the user interface. A user may therefore capture an invocation of the programming library, and may generate an instruction set representing the captured invocation that may be studied, copied, modified, subsequently performed, etc.

  • Pub Date: 2007/19/12
  • Number: 08719772
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Open model ingestion for master data management

A method, apparatus, and article of manufacture provide the ability to import a first data model into a meta-data representation in one or more computers. An import wizard or graphical user interface is invoked and guides a user through a process of importing the first data model into the meta-data representation. A source is selected that specifies database connectivity information of a source database containing the first data model. A schema is selected from the selected source, from which tables will be imported into the meta-data representation. A list of all table names within the selected schema is retrieved and displayed. Tables are selected from the list of all table names to import into the meta-data representation. Table information, for all of the selected tables, is populated into the meta-data representation.

  • Pub Date: 2007/19/12
  • Number: 08010905
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Mirrored storage system and methods for operating a mirrored storage system

A mirrored storage system for applications is provided, which enables and supports the variation and dynamic adaptation of the Recovery Point Objectives (RPO) based on policies. Furthermore, methods are provided for running such a mirrored storage system. Said mirrored storage system comprises a first storage system and at least one further storage system, wherein said first and said further storage system are connected via at least one mirror link. An application accesses said mirrored storage system via a network. Therewith, the data to be stored as response to a write command of said application can be mirrored according to a configurable time-varying RPO requirement of the application transmitting the corresponding write command.

  • Pub Date: 2007/19/12
  • Number: 08055866
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method for digitally notifying customers of a utility

A method for digitally notifying customers of a utility. The method includes receiving real time digital user data from a utility using an application programming interface in communication with a processor and a network, and storing the real time digital user data in a dynamic information database in communication with the processor. At least one message is transmit from the utility through the application programming interface to a first group of user contact devices before transmitting the message to a second group of user contact devices. Response information is received from each user contact device.

  • Pub Date: 2007/19/12
  • Number: 2041977
  • Owner: Techradium, Inc.
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Macromolecular conjugates of cystic fibrosis transmembrane conductance regulator protein inhibitors and uses therefor

Provided herein are bioactive agents comprising a compound that inhibits the ion transport activity of a cystic fibrosis transmembrane conductance regulator (CFTR) and that is linked to a macromolecule that interacts with a cell that expresses CFTR. The bioactive agents described herein are useful for treating diseases, disorders, and sequelae of diseases, disorders, and conditions that are associated with aberrantly increased CFTR activity, for example, secretory diarrhea.

  • Pub Date: 2007/19/12
  • Number: 08552067
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Generic archiving of enterprise service oriented architecture data

Methods and apparatus, including computer program products, for generic archiving of enterprise service oriented architecture data. In general, an identification of an instance of a business object to archive is received. Information defining the business object is retrieved. A schema for the type definition and a definition of the instances of the business object in accordance with the schema is generated. The schema may be in accordance with a platform-independent file format including information reflecting the hierarchy of the business object. The schema may include hierarchy levels that reflect each hierarchy level of the business object. Each hierarchy level, with the exception of hierarchy levels including references to stand-alone business objects, may have the respective attributes of the hierarchy level of the business object. Instance data may be generated to reflect the instance of the business object, the instance data being in accordance with the schema.

  • Pub Date: 2007/19/12
  • Number: 07937410
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Digital notification and response system

A digital notification and response system utilizing an administrator interface to transmit a message from an administrator to a user contact device. The system comprises a dynamic information database that includes user contact data, priority information, and response data. The administrator initiates distribution of the message based upon grouping information, priority information, and the priority order. The message is transmitted through at least two industry standard gateways simultaneously to groups of user contact devices based upon priority information. Once the message is received by the user contact device, the user contact device transmits a response through the industry standard gateways back to the dynamic information database.

  • Pub Date: 2007/19/12
  • Number: 07685245
  • Owner: Techradium, Inc.
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of window replacement by a malicious software program

Various embodiments of a system and method for providing protection against malicious software programs are disclosed. The system and method may be operable to detect that a first window of a legitimate software program has been replaced by a second window of a malicious software program, e.g., where the second window includes features to mimic the first window in an effort to fool the user into inputting sensitive information into the second window. The method may operate to alert the user when the window replacement is detected.

  • Pub Date: 2007/19/12
  • Number: 08205260
  • Owner: Symantec Operating Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Controlling access of concurrent users of computer resources in a distributed system using an improved semaphore counting approach

A method of controlling concurrent users of a distributed resource on a network is disclosed. In one aspect, there are one or more local lock managers executing on corresponding hosts and cooperating as a distributed lock manager. The resource is limited to a maximum number of concurrent users. A user identification for each user is associated with one host. In response to a request associated with a particular user associated with a first host, a lock is requested from a first local lock manager process executing on the first host. A related method of handling a request for a count-limited resource includes receiving a request from a client process for the computer resource. If it is determined that the request exceeds a maximum count for the resource, then it is determined whether a current time is within a retry time period of the client's first request. If it is determined the current time is within the retry time period, then it is automatically determined again whether the request exceeds the maximum count for the resource. If it is determined that the request does not exceed the maximum count, then the resource is provided to the client process.

  • Pub Date: 2007/19/12
  • Number: 2082406
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Catalytic microchannel reformer

An apparatus and method for enhancing the yield and purity of hydrogen when reforming hydrocarbons is disclosed in one embodiment of the invention as including receiving a hydrocarbon feedstock fuel (e.g., methane, vaporized methanol, natural gas, vaporized diesel, etc.) and steam at a reaction zone and reacting the hydrocarbon feedstock fuel and steam in the presence of a catalyst to produce hydrogen gas. The hydrogen gas is selectively removed from the reaction zone while the reaction is occurring by selectively diffusing the hydrogen gas through a porous ceramic membrane. The selective removal of hydrogen changes the equilibrium of the reaction and increases the amount of hydrogen that is extracted from the hydrocarbon feedstock fuel.

  • Pub Date: 2007/19/12
  • Number: 08961625
  • Owner: Ceramatec, Inc.
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for remotely controlling a camera

A system and method for remotely controlling a camera may include a telephony device communicatively coupled to a data network. The telephony device comprises at least one module adapted to generate a control signal in response to receiving a user command associated with dialing of an emergency telephone number. A camera may be adapted to start capturing images in response of receiving the control signal.

  • Pub Date: 2007/18/12
  • Number: 07916174
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for capturing and storing quality feedback information in a relational database system

A computer implemented method of and system for capturing, storing and organizing quality feedback information associated with products sold by a retail enterprise. The quality feedback information is stored and organized within a relational database in accordance with a logical data model comprising a plurality of entities and relationships defining the manner in which quality feedback information is stored and organized within the relational database. The relational database, populated with quality feedback information, provides the retail enterprise with the means to analyze and improve retail operations, to better manage store inventory, and more efficiently manage product sales and returns.

  • Pub Date: 2007/18/12
  • Number: 08131577
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Network connection failover during application service interruption

A system, method and computer program product for implementing network connection failover during application service interruption. While the application is quiesced, a network socket that terminates a network connection to a network peer is maintained on behalf of the application. The socket's network connection state information is sustained by providing acknowledgements of incoming network traffic to the network peer that prevent the peer from terminating the connection. Upon restart, the application is brought up with a blocked socket. The state of the blocked socket is conformed to a current network connection state of the original socket and the blocked socket is unblocked.

  • Pub Date: 2007/18/12
  • Number: 09473598
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Muscle derived cells for the treatment of gastro-esophageal pathologies and methods of making and using the same

The present invention provides muscle-derived progenitor cells that show long-term survival following transplantation into body tissues and which can augment soft tissue following introduction (e.g. via injection, transplantation, or implantation) into a site of soft tissue. Also provided are methods of isolating muscle-derived progenitor cells, and methods of genetically modifying the cells for gene transfer therapy. The invention further provides methods of using compositions comprising muscle-derived progenitor cells for the augmentation and bulking of mammalian, including human, soft tissues in the treatment of various cosmetic or functional conditions, including malformation, injury, weakness, disease, or dysfunction. In particular, the present invention provides treatments and amelioration of symptoms for gastro-esophageal pathologies like gastro-esophageal reflux.

  • Pub Date: 2007/18/12
  • Number: 09121009
  • Owner: University of Pittsburgh—Of the Commonweath System of Higher Education
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer program products for implementing a reusable new product planning model

A system for implementing a reusable new product planning model includes a processor executing a new product forecast application. The new product forecast application implements a method. The method includes gathering historical demand data for products in a product set and determining a launch period for the products, the historical demand data broken down by time periods. For each of the time periods, the method includes determining a transition percentage for each of the products, grouping the percentages by respective launch-based time periods, and averaging the percentages, resulting in an averaged transition range. The method further includes calculating fast and slow transition ranges for each of the launch-based time periods and developing a production plan for a new product by applying one of the transition ranges to the new product before product launch, and allocating a remaining demand percentage to existing products in the product set using the selected transition range.

  • Pub Date: 2007/18/12
  • Number: 08504398
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for registration of fulfillment services

Various embodiments of a method and apparatus whereby a single action may control fulfillment services are described. Various embodiments may include an inventory management system associated with a fulfillment services provider. The inventory management system may be configured to implement a fulfillment services management interface configured to generate a user interface providing an indication of item(s) listed for sale by a merchant. In various embodiments, order fulfillment services for such items may not be provided by a fulfillment services provider. Additionally, the user interface may provide a single action user interface element for the merchant to register the one or more items for fulfillment by a fulfillment services provider. The inventory management system may, in response to receiving an indication of activation of the single action user interface element, register the item(s) for fulfillment by the fulfillment services provider.

  • Pub Date: 2007/18/12
  • Number: 08407110
  • Owner: Amazon Technologies, Inc.
  • Location: Reno, US
  • Details: Visit USPTO

Visit USPTO Page


Distribution of information protection policies to client machines

One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining policy information defining restrictions on resources distributed in the computing environment. The method includes sending a request to a server for metadata about one or more resource protection policies at the server. In response to the request, metadata about one or more resource protection polices at the server is received from the server. The metadata from the server is analyzed. Based on analyzing the metadata, one or more resource protection policies stored at the client are updated.

  • Pub Date: 2007/18/12
  • Number: 08156538
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Uses of known good code for implementing processor architectural modifications

In one embodiment, a processor comprises a programmable map and a circuit. The programmable map is configured to store data that identifies at least one instruction for which an architectural modification of an instruction set architecture implemented by the processor has been defined, wherein the processor does not implement the modification. The circuitry is configured to detect the instruction or its memory operands and cause a transition to Known Good Code (KGC), wherein the KGC is protected from unauthorized modification and is provided from an authenticated entity. The KGC comprises code that, when executed, emulates the modification. In another embodiment, an integrated circuit comprises at least one processor core; at least one other circuit; and a KGC source configured to supply KGC to the processor core for execution. The KGC comprises interface code for the other circuit whereby an application executing on the processor core interfaces to the other circuit through the KGC.

  • Pub Date: 2007/17/12
  • Number: 07831813
  • Owner: GLOBALFOUNDRIES Inc.
  • Location: Grand Cayman, KY
  • Details: Visit USPTO

Visit USPTO Page


Multi-label active learning

Multi-label active learning may entail training a classifier with a set of training samples having multiple labels per sample. In an example embodiment, a method includes accepting a set of training samples, with the set of training samples having multiple respective samples that are each respectively associated with multiple labels. The set of training samples is analyzed to select a sample-label pair responsive to at least one error parameter. The selected sample-label pair is then submitted to an oracle for labeling.

  • Pub Date: 2007/17/12
  • Number: 08086549
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Known good code for on-chip device management

In one embodiment, a processor comprises a programmable map and a circuit. The programmable map is configured to store data that identifies at least one instruction for which an architectural modification of an instruction set architecture implemented by the processor has been defined, wherein the processor does not implement the modification. The circuitry is configured to detect the instruction or its memory operands and cause a transition to Known Good Code (KGC), wherein the KGC is protected from unauthorized modification and is provided from an authenticated entity. The KGC comprises code that, when executed, emulates the modification. In another embodiment, an integrated circuit comprises at least one processor core; at least one other circuit; and a KGC source configured to supply KGC to the processor core for execution. The KGC comprises interface code for the other circuit whereby an application executing on the processor core interfaces to the other circuit through the KGC.

  • Pub Date: 2007/17/12
  • Number: 08612729
  • Owner: Advanced Micro Devices, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Generating a management pack at program build time

Technologies are described herein for generating a management pack at program build time. Data is received that defines one or more events generated by the application program. Data is also received that defines one or more management classes for the application program. When a request to build the program is received, the data defining the events generated by the program and the data defining the management classes is utilized to generate a management pack for the program in an automated fashion. Once the management pack has been generated, it may be provided to an operations manager application program for use in monitoring the operation of the application program.

  • Pub Date: 2007/17/12
  • Number: 08438542
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced sampling device

The present invention is directed to an enhanced sampling device, herein referred to as an ESD, for enhancing the collection efficiency of the SPME method by enhancing the flow of the analytes onto the sampling fiber. The ESD includes a tubular main body, used for a sampling shroud, which directs a flow of analytes to contact the fiber during collection. One end of the main body is open and faces the sample, allowing analytes to flow into the ESD and contact the fiber. A second piece of tubing branches from the other end of the main body and becomes an outlet port, possibly leading to a pump. The ESD permits more rapid transport and absorption of the analytes to the fiber for collection.

  • Pub Date: 2007/17/12
  • Number: 07749443
  • Owner: The Johns Hopkins University
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


DHCP-based security policy enforcement system

A plug-in module of a DHCP server enforces a security policy of a computer network. The module receives a request to provide an IP address for an end-user computer. A blacklist database is consulted to determine if the computer is not in compliance with the policy. If not compliant, the module returns to the computer a special IP address, a special default gateway and a lease time; the special IP address places the computer in a restricted network segment of the network where it cannot send network packets to other computers. If compliant, the computer receives an IP address and a lease time. The first time an IP address is requested a probe is triggered to determine if the computer is compliant using software not present on the computer. A cleanup service located in the restricted segment remove malware and updates software. Lease times increase after each successful request of an IP address.

  • Pub Date: 2007/17/12
  • Number: 08312270
  • Owner: Trend Micro, Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Card activated cash dispensing automated banking machine firmware authentication system

A card activated cash dispensing automated banking machine is provided which is operative to authenticate firmware in at least one hardware device of the machine. The hardware device is operative to generate through operation of at least one processor in the at least one hardware device a firmware certificate responsive to the at least one measurement request message and the firmware content. The automated banking machine is operative to send a message from the automated banking machine to a host banking system responsive to the firmware certificate. The host banking machine may authenticate the message and send the automated banking machine an authorization message for performing a transaction function with the automated banking machine. Such a transaction function may include dispensing cash with a cash dispenser of the automated banking machine.

  • Pub Date: 2007/17/12
  • Number: 07988039
  • Owner: Diebold Self-Service Systems division of Diebold, Incorporated
  • Location: North Canton, US
  • Details: Visit USPTO

Visit USPTO Page


Adhesive composition for hard tissue

An adhesive composition including an etchant for a hard tissue surface, at least one multifunctional crosslinkable (meth)acrylate monomer with a functionality greater than 4, and water. The adhesive composition is a water-in-oil emulsion.

  • Pub Date: 2007/17/12
  • Number: 08076389
  • Owner: 3M Innovative Properties Company
  • Location: Saint Paul, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed adaptive network memory engine

Memory demands of large-memory applications continue to remain one step ahead of the improvements in DRAM capacities of commodity systems. Performance of such applications degrades rapidly once the system hits the physical memory limit and starts paging to the local disk. A distributed network-based virtual memory scheme is provided which treats remote memory as another level in the memory hierarchy between very fast local memory and very slow local disks. Performance over gigabit Ethernet shows significant performance gains over local disk. Large memory applications may access potentially unlimited network memory resources without requiring any application or operating system code modifications, relinkling or recompilation. A preferred embodiment employs kernel-level driver software.

  • Pub Date: 2007/15/12
  • Number: 07917599
  • Owner: The Research Foundation of State University of New York
  • Location: Binghamton, US
  • Details: Visit USPTO

Visit USPTO Page


Centralized adaptive network memory engine

There is a constant battle to break even between continuing improvements in DRAM capacities and the growing memory demands of large-memory high-performance applications. Performance of such applications degrades quickly once the system hits the physical memory limit and starts swapping to the local disk. We present the design, implementation and evaluation of Anemone—an Adaptive Network Memory Engine—that virtualizes the collective unused memory of multiple machines across a gigabit Ethernet LAN, without requiring any modifications to the either the large memory applications or the Linux kernel. We have implemented a working prototype of Anemone and evaluated it using real-world unmodified applications such as ray-tracing and large in-memory sorting. Our results with the Anemone prototype show that unmodified single-process applications execute 2 to 3 times faster and multiple concurrent processes execute 6 to 7.7 times faster, when compared to disk based paging. The Anemone prototype reduces page-fault latencies by a factor of 19.6—from an average of 9.8 ms with disk based paging to 500 μs with Anemone. Most importantly, Anemone provides a virtualized low-latency access to potentially “unlimited” network memory resources.

  • Pub Date: 2007/15/12
  • Number: 07925711
  • Owner: The Research Foundation of State University of New York
  • Location: Binghamton, US
  • Details: Visit USPTO

Visit USPTO Page


User-centric widgets and dashboards

User-centric widgets and dashboards are automatically modified to reflect a user's goals and needs.

  • Pub Date: 2007/14/12
  • Number: 08954871
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing of multimedia and relevance measure based on hop distance in a social network

A method, system, and apparatus are directed to sharing information over a network. A request to share a multimedia object may be received. A relevance measure may be retrieved based on an identity of the multimedia object. Sharing the network of the multimedia object between an originating sharing member and a plurality of members of a social network may be enabled. A combination of the relevance measure and a hop distance for the shared multimedia object may be provided.

  • Pub Date: 2007/14/12
  • Number: 08260882
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Sharing of content and hop distance over a social network

A method, system, and apparatus are directed to sharing information over a network. A drag-and-drop of a selection of a portion of content may be received at a sharing area. A sharing message may be generated based on a type of the portion. If the type of the portion indicates storage, the sharing message may comprise a hyperlink to a storage. The sharing message may be useable for providing the portion on at least one client device associated with at least one of a plurality of members of a social network. Sharing over the network of the portion between an originating sharing member and the plurality of members of the social network may be enabled. The portion may be shared for a customizable project. A hop distance may be provided for the shared portion.

  • Pub Date: 2007/14/12
  • Number: 07954058
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and computer readable media for controlling presentation and selection of objects that are digital images depicting subjects

The subject matter described herein includes methods, systems, and computer readable media for controlling presentation and selection of objects that are digital images depicting subjects. According to one aspect, a plurality of objects arranged in a plurality of vectors is presented via a presentation device. Each object in a second vector is associated with an object in a first vector. Each of the objects is a digital image depicting a subject. A first object presented in a first vector is selected in response to a first selection event associated with the first object. A second object non-adjacent to the first object is determined based on a predefined relationship associating the first object with the second object. The second object in the second vector adjacent to the first object in the first vector is presented via the presentation device in response to the determination.

  • Pub Date: 2007/14/12
  • Number: 08037425
  • Owner: Scenera Technologies, LLC
  • Location: Portsmouth, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and apparatus for multi-purpose metering

Methods and apparatus for multi-purpose metering are disclosed. An example method includes acquiring a rate of data transfer to/from the monitored location and comparing the acquired rate of data transfer to a threshold. The example method also includes setting at least one media monitoring device in a first bandwidth mode when the acquired rate of data transfer exceeds the threshold, and setting the at least one media monitoring device in a second bandwidth mode when the acquired rate of data transfer is below the threshold.

  • Pub Date: 2007/14/12
  • Number: 08327396
  • Owner: The Nielsen Company (US), LLC
  • Location: Schaumburg, US
  • Details: Visit USPTO

Visit USPTO Page


Methods of making proteins and peptides containing a single free cysteine

Disclosed is a method for refolding a protein or peptide that does not contain essential disulfides and that contains at least one free cysteine residue. Also disclosed are polymer IFN-γ conjugates that have been created by the chemical coupling of polymers such as polyethylene glycol moieties to IFN-γ, particularly via a free cysteine in the protein. Also disclosed are analogs of bioactive peptides that may be used to create longer acting versions of the peptides, including analogs of glucagon, glucagon-like peptide-1 (GLP-1), GLP-2, Gastric inhibitory peptide (GIP), PYY, exendin, ghrelin, gastrin, amylin, and oxyntomodulin.

  • Pub Date: 2007/14/12
  • Number: 08617531
  • Owner: Bolder Biotechnology, Inc.
  • Location: Boulder, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for processing fraud notifications

Methods and systems for processing fraud notifications allow an organization to classify, monitor, and shut down fraudulent websites. A system may receive reports of suspicious network sites via electronic mail, and parse such reports in order to obtain one or more attributes (e.g., an address) corresponding to the suspicious network sites. In addition, information related to these suspicious network sites may be stored in a database, and algorithms may be used in order to classify, monitor, and respond to a particular suspicious network site. Before responding to a suspicious network site, such a website may first be classified as legitimate, fraudulent or ignore. If the suspicious network site is classified as legitimate or ignore, further action might not be needed. If, however, the suspicious network site is classified as fraudulent, the fraudulent website may be monitored and further action may be taken.

  • Pub Date: 2007/14/12
  • Number: 08131742
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for filtering video data using a programmable graphics processor

Video filtering using a programmable graphics processor is described. The programmable graphics processor may be programmed to complete a plurality of video filtering operations in a single pass through a fragment-processing pipeline within the programmable graphics processor. Video filtering functions such as deinterlacing, chroma up-sampling, scaling, and deblocking may be performed by the fragment-processing pipeline. The fragment-processing pipeline may be programmed to perform motion adaptive deinterlacing, wherein a spatially variant filter determines, on a pixel basis, whether a “bob”, a “blend”, or a “weave” operation should be used to process an interlaced image.

  • Pub Date: 2007/14/12
  • Number: 07876378
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Managing icon integrity

Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon.

  • Pub Date: 2007/14/12
  • Number: 08250475
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Framework for dynamic configuration of hardware resources

Among other things, dynamically selecting or configuring one or more hardware resources to render a particular display data includes obtaining a request for rendering display data. The request includes a specification describing a desired rendering process. Based on the specification and the display data, hardware is selected or configured. The display data is rendered using the selected or configured hardware.

  • Pub Date: 2007/14/12
  • Number: 08610725
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Computer-implemented method of releasing battery state estimation software

A computer implemented method of facilely releasing a BSE software module adapted for execution by an electronic control unit having an update model of the BSE software and a controller having an embedded desktop model of the BSE software, includes a plurality of autonomously performed steps resulting in the compiling of a plurality of c-files into a library file. A single keyword activated preferred embodiment is disclosed in a MatLab®/Simulink®/Real-Time Workshop® environment.

  • Pub Date: 2007/14/12
  • Number: 08239850
  • Owner: GM Global Technology Operations LLC
  • Location: Detroit, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods of using (R)-pramipexole

Pharmaceutical compositions of (R)-pramipexole and methods and kits of using such compositions for the treatment of neurodegenerative diseases, or those related to mitochondrial dysfunction or increased oxidative stress are disclosed.

  • Pub Date: 2007/14/12
  • Number: 08518926
  • Owner: Knopp Neurosciences, Inc.
  • Location: Pittsburgh, US
  • Details: Visit USPTO

Visit USPTO Page


Cognitive function index

Methods, systems, and apparatus, including medium-encoded computer program products, for creating a cognitive function index. In one aspect, a method includes receiving first information concerning a person, the first information specifying the person's responses, and lack thereof, for components of a cognitive test administered to the person; generating a cognitive function score for the person by comparing the first information with second information concerning a group of people to whom the cognitive test has been administered; converting the cognitive function score to a value in an index comprising a range of values, wherein a first portion of the range corresponds to a cognitively impaired zone, a second portion of the range corresponds to a cognitively normal zone, and a third portion of the range corresponds to a zone of uncertainty defined by a confidence interval centered on a mid-point of the index; and providing the indexed value for the person.

  • Pub Date: 2007/14/12
  • Number: 08202095
  • Owner: Medical Care Corporation
  • Location: Newport Beach, US
  • Details: Visit USPTO

Visit USPTO Page


Backlight dimming and LCD amplitude boost

Embodiments of the present invention generally provide m Methods and apparatus for reducing power consumption of backlit displays are described. Power consumption is reduced by dimming backlighting by a first scale factor and boosting pixel values by a second scale factor to compensate for the dimming. The scale factors may be constant values. Alternately, one or both of the scale factors may be determined based on pixel values for one or more frames to be displayed and/or one or more frames that have been displayed. For example, scale factors may be calculated based on an average linear amplitude of one or more frames of pixel values or from a maximum pixel value of one or more frames of pixel values. A graphical processing system is described including an integrated circuit capable of transforming a pixel value from a gamma-compensated space to a linear space.

  • Pub Date: 2007/14/12
  • Number: 08059086
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for protecting against failure through geo-redundancy in a SIP server

The SIP server deployment can be comprised of an engine tier that provides high throughput processing and a state tier that maintains SIP state data in a set of partitions and replicas. Two sites of SIP server deployments can be configured, each being remotely located with respect to the other. A primary site can process various SIP transactions and communications and upon determining a transaction boundary, replicate the state data associated with the transaction being processed, to a secondary site. Engines in the primary site can generate hints for the state replicas which can be in turn responsible for replicating the SIP session state. The replicas can choose to follow or disregard the generated hints. Upon failure of the primary site, calls can be routed from the failed primary site to the secondary site for processing. Similarly, upon recovery, the calls can be re-routed back to the primary site.

  • Pub Date: 2007/13/12
  • Number: 07844851
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for efficient storage of long-lived session state in a SIP server

A SIP server can be deployed in a two-tier architecture, including an engine tier for processing of SIP communications and a state tier for maintaining the state associated with these communications. The state tier can include RAM-based replicas that provide data to the engines. Some of the SIP session state can be moved to the database in order to reduce the memory requirements of the state tier. Upon determining that a transaction boundary has been reached where the session state is steady, the state replica can save the data to the database. A hint can be received from the engine tier by the state replica indicating that the state data is ready to be saved. Subsequently, the data can be removed from the state tier by nulling out the bytes of actual data, while preserving the primary key, locking and timer information so as not to impact latency.

  • Pub Date: 2007/13/12
  • Number: 08078737
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Superconductor analog-to-digital converter

A superconducting Analog-to-Digital Converter (ADC) employing rapid-single-flux-quantum (RSFQ) logic is disclosed. The ADC has only superconductor active components, and is characterized as being an N-order bandpass sigma-delta ADC, with the order “N” being at least 2. The ADC includes a sequence of stages, which stages include feedback loops and resonators. The ADC further includes active superconducting components which directionally couple resonator pairs of adjacent stages. The active superconducting components electrically shield the higher order resonator from the lower order resonator. These active superconductor components include a superconducting quantum interference device (SQUID) amplifier, which is inductively coupled to the higher order resonator, and may include a Josephson transmission line (JTL), which is configured to electrically connect the SQUID amplifier to the lower order resonator. The first stage of ADC may employ an implicit feedback loop.

  • Pub Date: 2007/13/12
  • Number: 07598897
  • Owner: HYPRES, Inc.
  • Location: Elmsford, US
  • Details: Visit USPTO

Visit USPTO Page


Seamlessly switching among unicast, multicast, and broadcast mobile media content

In embodiments, the present invention provides a method and system for switching between broadcast and unicast content on a mobile device. The method and system involves making unicast content available to the mobile device, making broadcast content available to the mobile device; and providing an application on the mobile device which allows for switching between the unicast and broadcast content.

  • Pub Date: 2007/13/12
  • Number: 08219134
  • Owner: Quickplay Media Inc.
  • Location: Toronto, CA
  • Details: Visit USPTO

Visit USPTO Page


Responding to detected application vulnerability exploits

A security module detects attempted exploitations of vulnerabilities of an application executing on a computer. A robust function of the application having native error handling functionality is identified. The security module wraps the robust function with an exception handler that catches a “security violation” exception. The exception handler returns an error code of a type that is handled by the application's native error handling functionality. The security module also hooks the application. When a hook is followed, the security module determines whether a vulnerability in the application is being exploited. If an attempted exploit is detected, the security module throws the security violation exception. The application's native error handling functionality unwinds the call stack for the application until it reaches the exception handler wrapping the robust function. The exception handler catches the security violation exception and returns the error code to the application's native error handling functionality.

  • Pub Date: 2007/13/12
  • Number: 07962961
  • Owner: Symantec Corporation
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Mobile media pause and resume

In embodiments, the present invention provides a method and system for managing playback of content delivered to a mobile device with a pause and resume functionality. The method and system including receiving delivered content on a mobile device, initiating playback of the delivered content, pausing playback of the content being delivered to the mobile device in response to an action and resuming delivery of the content upon a request.

  • Pub Date: 2007/13/12
  • Number: 08995815
  • Owner: Quickplay Media Inc.
  • Location: Toronto, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for storage

A method and system for storage is provided that in one embodiment includes a store process that continually appends data to the end of a data file and without deleting the data file. Additions, changes and deletions to data are managed by adding new data to the file and changing appropriate pointers in the data file to reflect the new data. Various application programming interfaces are also provided so that the store process can operate transparently to higher level applications. Various plug-ins are also provided so that the store process can utilize different types, configurations and numbers of storage devices.

  • Pub Date: 2007/13/12
  • Number: 08805897
  • Owner: Redknee Inc.
  • Location: Mississauga, CA
  • Details: Visit USPTO

Visit USPTO Page


Method and system for protocol embedded automated test control

A method and system of an embodiment may include designing two or more test cases for a network, creating one or more test records comprising data and configuration data for the two or more test cases, provisioning a user record on the network, running a first test case using the user record provisioned on the network, the first test case comprising, transmitting at least a first portion of the data to a network element being tested, and receiving a response from the network element based at least in part on the configuration data for the first test case contained in the data transmitted, running a second test case using the user record provisioned on the network, the second test case comprising, transmitting at least a second portion of the data to a network element being tested, and receiving a response from a network element based at least in part on configuration data for the second test case contained in the data transmitted.

  • Pub Date: 2007/13/12
  • Number: 07787599
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Low complexity echo compensation system

An echo reduction system includes a signal analysis filter that converts an input into sub-band signals. A signal down-sampling circuit down-samples the sub-band signals at a first down-sampling rate. An echo analysis filter converts a loudspeaker signal into echo sub-band signal that are further processed by an echo down-sampling circuit. The circuit down-samples the echo sub-band signals at a second down-sampling rate to generate down-sampled echo sub-band signals. An echo compensation filter folds the down-sampled echo sub-band signals with an estimated impulse response of a loudspeaker-room-input system. A second echo down-sampling circuit down-samples the folded down-sampled echo sub-band signals at a third down-sampling rate to generate estimated echo sub-band signals. The first down-sampling rate is equal to the product of the second and third down-sampling rates.

  • Pub Date: 2007/13/12
  • Number: 08194852
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Integration of secure data transfer applications for generic IO devices

Techniques are presented for sending an application instruction from a hosting digital appliance to a portable medium, where the instruction is structured as one or more units whose size is a first size, or number of bytes. After flushing the contents of a cache, the instruction is written to the cache, where the cache is structured as logical blocks having a size that is a second size that is larger (in terms of number of bytes) than the first size. In writing the instruction (having a command part and, possibly, a data part), the start of the instruction is aligned with one of the logical block boundaries in the cache and the instruction is padded out with dummy data so that it fills an integral number of the cache blocks. When a response from a portable device to an instruction is received at a hosting digital appliance, the cache is similarly flushed prior to receiving the response. The response is then stored to align with a logical block boundary of the cache.

  • Pub Date: 2007/13/12
  • Number: 09032154
  • Owner: SanDisk Technologies Inc.
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Encoding and transcoding for mobile media

In embodiments, the present invention provides a method and system for encoding content for mobile media distribution determining an encoding format based on one or more of a consumption profile, a content profile, an ingestion profile, a network profile, a mobile device profile, a delivery profile, and a user profile, encoding content to provide an encoded content consistent with the determined encoding format, and providing the encoded content to one or more of a content host, a content cache, a distribution portal, a mobile carrier, and a mobile device.

  • Pub Date: 2007/13/12
  • Number: 09064010
  • Owner: QUICKPLAY MEDIA INC.
  • Location: Toronto, CA
  • Details: Visit USPTO

Visit USPTO Page


Consumption profile for mobile media

In embodiments, the present invention provides a method and system for delivery of content on a mobile media platform, providing a consumption profile, and delivering content to a mobile device, wherein content delivery is based at least in part on the consumption profile. Further, in embodiments, the present invention provides a consumption profile for a mobile media platform comprising a device profile, a user profile, a network profile, an encoding profile, and a content profile.

  • Pub Date: 2007/13/12
  • Number: 08671021
  • Owner: QuickPlay Media Inc.
  • Location: Toronto, CA
  • Details: Visit USPTO

Visit USPTO Page


Common payload rail for unmanned vehicles

A common payload rail externally supports a submerged payload from an unmanned marine vehicle. A vehicle interface module has a conforming surface rigidly secured to the unmanned vehicle and feed-through conduits. A functionality module is secured to the vehicle interface module and contains internal interfacing components to minimize or eliminate any modifications to the payload and vehicle. A payload interface module having feed-through conduits is secured to the functionality module and has longitudinally extending rail structures sized to engage correspondingly shaped longitudinally extending receiving means on the payload. The longitudinally extending rail structures are shaped to extend into longitudinally extending receiving means on the payload to arrest lateral displacement between the payload interface module and the payload and at least one securing mechanism on the payload interface module is disposed to engage the payload to arrest longitudinal displacement between the payload interface module and the payload.

  • Pub Date: 2007/13/12
  • Number: 07721669
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Business context data companion tool

Methods and apparatuses enable rendering business context data in a desktop widget. The business context data describes a resource, a view, and actionable context data that relate to a business scenario. The business context data is processed to determine a UI component to generate to represent the business context data. The component is then generated and rendered in a desktop widget to provide access to the actionable context data on a client device via the desktop widget. An active business client receives and processes the business context data. The active business client can operate as a widget engine for the business context data to enable the rendering of the business context data on the client device.

  • Pub Date: 2007/13/12
  • Number: 08250169
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Use of the endoglycosidase endos for treating immunoglobulin G mediated diseases

The invention provides use of an EndoS polypeptide, or a polynucleotide encoding an EndoS polypeptide, in the manufacture of a medicament for the treatment or prevention of a disease or condition mediated by IgG antibodies.

  • Pub Date: 2007/12/12
  • Number: 08889128
  • Owner: Hansa Medical AB
  • Location: Lund, SE
  • Details: Visit USPTO

Visit USPTO Page


Triangle setup and attribute setup integration with programmable execution unit

A system for integrating triangle setup and attribute setup operations into a programmable execution unit of a graphics processing unit is disclosed. A method for integrating triangle setup and attribute setup operations into a programmable execution unit graphics processing unit is also disclosed. In one embodiment, at least one execution unit is configured for multi-threaded operation. The at least one execution unit is configured to execute at least one thread for triangle setup operations and attribute setup operations as well as threads for pixel shader, geometry shader and vertex shader operations.

  • Pub Date: 2007/12/12
  • Number: 08963930
  • Owner: Via Technologies, Inc.
  • Location: Hsin-Tien, Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for graphics hardware design debugging and verification

Disclosed are systems and methods for debugging and analyzing graphics hardware designs. Hardware designs are represented by a software model implemented in a programming language. Graphics operations can be executed in the software model as well as in reference software models to allow a user to analyze the accuracy of a graphics hardware design and/or a device driver implementation.

  • Pub Date: 2007/12/12
  • Number: 08146061
  • Owner: Via Technologies, Inc.
  • Location: Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhancing a seismic data image

Systems and methods for enhancing the resolution of a seismic data image displayed on a face of a sampling probe. The enhanced image represents a maximum resolution of at least a portion of the seismic data image. The seismic data image is enhanced by extracting seismic data that are perpendicular to a reflection surface that is closest to a center of the sampling probe and positioning the extracted seismic data in a visible planar face of the sampling probe.

  • Pub Date: 2007/12/12
  • Number: 2065715
  • Owner: Landmark Graphics Corporation, a Halliburton Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Set top terminal performing service group number autodiscovery during initialization or boot-up process

A set top terminal is provided that includes a receiver having at least one tuner for receiving programming content over a content delivery system and a processor operatively associated with the receiver. The set top terminal also includes a switched digital video (SDV) application module operatively associated with the processor. The SDV application module is configured to perform an autodiscovery process by tuning to prescribed autodiscovery frequencies received by the tuner while the SDV application module is being initialized.

  • Pub Date: 2007/12/12
  • Number: 08499327
  • Owner: General Instrument Corporation
  • Location: Horsham, US
  • Details: Visit USPTO

Visit USPTO Page


Ripple reduction in electromagnetic launcher current from pulsed alternators

Systems and methods for improving the current pulse from multiple pairs of pulsed alternators used for driving large loads such as an electromagnetic launcher (i.e., “rail gun”) load. Conventional current pulse ripples are reduced by interleaving pulses from multiple pairs of contra-rotating pulsed alternators. Current pulses supplied by different pairs of pulsed alternators are timed so that they are interspersed between one another to provide more pulses for a given launch time. The interleaved current pulses increase the frequency and reduce the magnitude of the ripple on the average load current.

  • Pub Date: 2007/12/12
  • Number: 07832385
  • Owner: Curtiss-Wright Electro-Mechanical Corporation
  • Location: Cheswick, US
  • Details: Visit USPTO

Visit USPTO Page


Printhead integrated circuit with an ink ejecting surface

Provided is a printhead integrated circuit defining an external surface having a number of ink ejection ports operatively directed at a printing medium. The surface includes a plurality of petal formations radially positioned about each ink ejection port, and a plurality of actuators, each located behind a petal formation distal from said port. The surface also includes a plurality of heater structures each connected to an actuator, so that heating of the structures via an electrical current produces expansion in said actuators which urges the formations into a chamber below the surface.

  • Pub Date: 2007/12/12
  • Number: 07568790
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Faster clears for three-dimensional modeling applications

A graphics processing subsystem defines a bounding area as the portion of the display buffer and other memory buffers occupied by one or more rendered objects. When clearing the memory buffers, only the portions of the buffers corresponding to the bounding area need to be cleared. A graphics pipeline includes a bounding area memory to store bounding area values. The bounding area values are modified during rendering so that each rendered primitive falls within the bounding area values. The graphics processing subsystem clears a portion of the memory buffer in response to a clear command specifying a bounding area. The clear command may include a set of bounding area values defining the bounding area, or alternatively a reference to the bounding area memory. For applications that draw objects in isolation, the bounding area will be smaller than the window, resulting in a decreased time requirement for clearing the memory buffer.

  • Pub Date: 2007/12/12
  • Number: 07898549
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Cross channel optimization systems and methods

The inventive subject matter is generally directed to a cross channel optimization system, methods, and related software which provide for the conducting of experiments and/or optimization of digital content across a plurality of external content systems to user of the external content systems.

  • Pub Date: 2007/12/12
  • Number: 08392345
  • Owner: Accenture Global Services Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Communications device and related method with reduced false detects during start of message bit correlation

A communications device includes a signal input for receiving signals such as a binary phase shift keyed (BPSK) communications signal having a repeated preamble bit or symbol pattern. A modem processes the communications signal and includes a demodulator and processor that generates an initial frequency offset estimate and phase error estimate by processing a Fast Fourier Transform (FFT) that detects the repeated preamble pattern for a block of samples within the communications signal, correlates within a start of message correlator to search for a start of message sequence and correlates different phases of the repeated preamble pattern within training correlators for reducing false detections of the start of message. Radio circuitry is operative with the modem for processing communications data obtained from the communications signal.

  • Pub Date: 2007/12/12
  • Number: 08059766
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Communications device and related method with improved acquisition estimates of frequency offset and phase error

A repeated preamble bit or symbol pattern such as for a binary phase shift keyed (BPSK) communications signal is received within a modem. An initial frequency offset and phase error estimate is generated by processing a Fast Fourier Transform (FFT) that detects the repeated preamble pattern for a block of samples within the communications signal. Two halves of the block of samples are correlated with a plurality of different BPSK shifted sequences to obtain a symbol timing alignment based on the shifted sequence providing the maximum correlation value. A frequency offset estimate is iteratively updated an N number of times using the shifted sequence providing the maximum correlation value to refine an acquisition estimate of the frequency offset and phase error of the received communications signal.

  • Pub Date: 2007/12/12
  • Number: 08054920
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Communications device and related method that detects symbol timing

A communications device includes a signal input for receiving signals such as a binary phase shift keyed (BPSK) communications signal having a repeated preamble bit or symbol pattern. A modem processes the communications signal and includes a demodulator and processor that generates an initial frequency offset estimate and phase error estimate by processing such as with a Fast Fourier Transform (FFT), that detects the repeated preamble pattern for a block of samples within the communications signal, correlates two halves of the block of samples with a plurality of different shifted sequences and determines a maximum correlation value for the shifted sequence that provides the maximum correlation value to establish a symbol timing estimate based on the known timing alignment of this shifted sequence. Radio circuitry is operative with the modem for processing communications data obtained from the communications signal.

  • Pub Date: 2007/12/12
  • Number: 08059767
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Coated-poly containers

A container for facilitating bulk storage and transport of goods, which includes a top portion, a base portion, and a sidewall portion which define an interior cavity, and a polyurea layer of sufficient thickness adhering to and coating at least the exterior areas of the top, base and sidewall portions. The top, base, and sidewall portions are preferably composed of polystyrene. The sidewall portion further includes a plurality of panels, wherein each of the plurality of panels includes end portions configured for interlocking engagement with one another to form a rigid joint exhibiting tensile strength.

  • Pub Date: 2007/12/12
  • Number: 07896182
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Backlight dimming and LCD amplitude boost

Embodiments of the present invention generally provide m Methods and apparatus for reducing power consumption of backlit displays are described. Power consumption is reduced by dimming backlighting by a first scale factor and boosting pixel values by a second scale factor to compensate for the dimming. The scale factors may be constant values. Alternately, one or both of the scale factors may be determined based on pixel values for one or more frames to be displayed and/or one or more frames that have been displayed. For example, scale factors may be calculated based on an average linear amplitude of one or more frames of pixel values or from a maximum pixel value of one or more frames of pixel values. A graphical processing system is described including an integrated circuit capable of transforming a pixel value from a gamma-compensated space to a linear space.

  • Pub Date: 2007/12/12
  • Number: 08284152
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Returning a personalized advertisement

Provided embodiments include a device, apparatus, system, computer program product, and method. A provided method includes receiving from a requestor device a marketing impact information indicative of a physiological response by a person to a general advertisement. The method also includes acquiring an indication of a characteristic of the general advertisement. The method further includes initiating a selection of a targeted-advertisement by an advertising rule responsive to at least the characteristic of the general advertisement and the marketing impact information. The method also includes returning an indication of the targeted-advertisement. The method may include analyzing the marketing impact information for an indication of a reaction by the person to the general advertisement.

  • Pub Date: 2007/11/12
  • Number: 09582805
  • Owner: Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Returning a personalized advertisement

Provided embodiments include a device, apparatus, system, computer program product, and method. A provided method includes receiving from a requestor device a marketing impact information indicative of a physiological response by a person to a general advertisement. The method also includes acquiring an indication of a characteristic of the general advertisement. The method further includes initiating a selection of a targeted-advertisement by an advertising rule responsive to at least the characteristic of the general advertisement and the marketing impact information. The method also includes returning an indication of the targeted-advertisement. The method may include analyzing the marketing impact information for an indication of a reaction by the person to the general advertisement.

  • Pub Date: 2007/11/12
  • Number: 09582805
  • Owner: Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Ranking of geographic information

Providing information includes identifying documents that are responsive to a query, some of the documents each being associated with a geographic feature, and providing a list of the documents in a sequence that is determined based on rank scores derived from one or more properties of the geographic features associated with the documents.

  • Pub Date: 2007/11/12
  • Number: 08745041
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Presenting items based on activity rates

Apparatus, systems, and methods may operate to monitor an activity level associated with queries made in an online marketplace over a monitoring time period to provide an activity rate, and to determine that the activity rate has crossed a merchandising threshold rate. In response, a cluster of items or item groups associated with the queries may be presented on a display, perhaps in conjunction with a landing page merchandising promotion. Additional apparatus, system, and methods are disclosed.

  • Pub Date: 2007/11/12
  • Number: 08271357
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site

Rather than downloading each content document on demand from the publisher location to the user site, at the publisher location, each content document is encrypted and then multiple encrypted documents are assembled into a distribution archive that is itself encrypted with a scheduled key. The distribution archive is then downloaded into a content server at the user site. When the content server receives the distribution archive, it decrypts the archive file and unpacks the encrypted documents. The scheduled key used to decrypt an archive file is included with an archive file that was sent previously to the user site in accordance with the subscription service. The scheduled key to decrypt the first archive file sent to the user is sent from the publisher to the user over a communication channel different from the communication channel used to send the archive file from the publisher to the user.

  • Pub Date: 2007/11/12
  • Number: 08130963
  • Owner: Imophaze Research Co., L.L.C.
  • Location: Dover, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated computer security management system and method

The present invention is generally directed to a computer security management system that integrates a firewall with an intrusion detection system (IDS). In other words, the firewall and IDS of the present invention can be designed to communicate process or status information and packets with one another. The present invention can facilitate centralized control of the firewall and the IDS and can increase the speed at which packets are passed between a secured computer network and an external network. Increased packet processing speed can be achieved in several ways. For example, the firewall and IDS can process packets in series, in parallel, and sometimes singularly when one of the components is not permitted to process a packet. Alternatively, singular processing can also be performed when one component is permitted to pass a packet to the secured computer network without checking with the other component.

  • Pub Date: 2007/11/12
  • Number: 08122495
  • Owner: Dell Products, LP
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Fast port failover in a network switch

A network switch comprises a port that includes a redirect circuit and a loopback circuit that selectively redirects an egress frame to the redirect circuit when the port is non-operational. The redirect circuit replaces a destination port identifier associated with the egress frame to create a modified frame. The loopback circuit loops back the modified frame in an ingress direction. A transfer circuit transfers the modified frame to another port identified by the destination port identifier.

  • Pub Date: 2007/11/12
  • Number: 07818628
  • Owner: Marvell International Ltd.
  • Location: Hamilton, BM
  • Details: Visit USPTO

Visit USPTO Page


4-phenyl-6-(2,2,2-trifluoro-1-phenylethoxy)pyrimidine-based compounds and methods of their use

  • Pub Date: 2007/11/12
  • Number: 07553840
  • Owner: Lexicon Pharmaceuticals, Inc.
  • Location: The Woodlands, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device

Systems and methods for location, motion, and contact detection and tracking in a portable networked device are disclosed. A portable device may include a motion detection unit including an accelerometer for detecting accelerations in one or more axes. Signals associated with the detected motion are processed to generate estimates of device acceleration, velocity, and relative and absolute locations. Additional processing may be performed to detect user gestures or other user input relevant to portable device control. Particular motion or vibrational characteristics may be also be detected and used by other processes in the portable device.

  • Pub Date: 2007/10/12
  • Number: 07778792
  • Owner: Chumby Industries, Inc.
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system with embedded virtual router

The invention relates to a network system of at least two appliances, each appliance configured to perform a cycle of operation on an article, and each appliance having its own software architecture. An embedded virtual router enables communication among appliance components independent of the architecture of the software.

  • Pub Date: 2007/10/12
  • Number: 08621049
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Object deallocation system and method

A method, apparatus and program product deallocate an object from a memory heap in a virtual machine environment by, in part, determining that the object is replaceable using an object reference associated with the object. The object may additionally be automatically determined as being properly removable by using a value indicative of a number of object references associated with the object. Where these conditions are met, the object may be removed from the memory heap. Where a new object can fit into a space within the memory from which the object was removed, the new object may be automatically allocated into the space. The object may be designated as being replaceable using automated or manual processes. A garbage collector algorithm may additionally execute, as needed.

  • Pub Date: 2007/10/12
  • Number: 08478738
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


E-services translation utilizing machine translation and translation memory

A system and method for translating data from a source language to a target language is provided wherein machine generated target translation of a source sentence is compared to a database of human generated target sentences. If a matching human generated target sentence is found, the human generated target sentence may be used instead of the machine generated sentence, since the human generated target sentence is more likely to be a well-formed sentence than the machine generated sentence. The system and method does not rely on a translation memory containing pairs of sentences in both source and target languages, and minimizes the reliance on a human translator to correct a translation generated by machine translation.

  • Pub Date: 2007/10/12
  • Number: 07925494
  • Owner: Trados, Incorporated
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed object-oriented appliance control system

The invention relates to an object-oriented control system for an appliance, configurable by a configuration mechanism in selective operable communication with a plurality of object oriented control systems using a packet protocol for constructing messages comprising identifiers from a plurality of namespaces associated with the building blocks of object-oriented systems. The meaning of each unique identifier within class library namespace is uniquely meaningful throughout a universe of appliances.

  • Pub Date: 2007/10/12
  • Number: 08533253
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Delegation of data entry tasks

To avoid the need for off-line collaboration, a primary user who is attempting to enter data required for computer-based process may, as part of the data entry process, delegate data entry tasks for specific input fields to designated delegate users who are more likely to be knowledgeable about the data to be entered. Data entry operations performed by the primary user are recorded and used to build a transaction model which will enable a server to provide required data input screens to delegate users. Data entered by the delegate users is merged with data entered by the primary user to meet the requirements of the computer-based process.

  • Pub Date: 2007/10/12
  • Number: 09299055
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Conversion of two dimensional image data into three dimensional spatial data for use in a virtual universe

Arrangements are disclosed herein that can capture image data reflecting real world objects and/or interactions and convert this data into a format that is usable in a virtual universe (VU). In one embodiment, a method can include receiving sets of image data that capture an object or a setting from different viewing angles. The image can be in multiple data sets where the sets have at least one common feature. The image data can be analyzed using the common features in the image data and a spatial map can be created. The spatial map can be modified (if required) such that a VU engine can use the modified data to provide a VU that has a representation of the real world object and/or interaction. This allows a participant to customize objects and/or activities in the VU, and provide a unique “persona” for their avatar and their VU.

  • Pub Date: 2007/10/12
  • Number: 08379968
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing communication ports on a computer device

There is provided a system and method for managing communication ports on a computer device. The method comprises the steps of scanning the system file structure, determining port assignments for active devices from a known location in the system file structure, scanning additional locations in the system file structure, determining port assignments for dynamic devices from the additional locations in the system file structure, and displaying the active devices, dynamic devices and the corresponding determined port assignments. The system comprises a memory for storing instructions, and a processor for executing the instructions stored in the memory. The executed instructions generate a system file structure scanner component for scanning the system file structure and generating device data based on the scanned system file structure, a device data structure for storing the device data received from the computer system file structure scanner component, and a port assigner component for assigning communication ports based on the device data structure.

  • Pub Date: 2007/07/12
  • Number: 08145810
  • Owner: Psion Teklogix Inc.
  • Location: Mississauga, CA
  • Details: Visit USPTO

Visit USPTO Page


Rotary positive displacement combustor engine

The present invention relates to the field of combustion engines and more specifically to a rotary positive displacement combustor engine. The device employs a scroll compressor and a scroll expander with an orbital shaft displaced between the compressor and expander supplying a means and link for compressing fluids within the scroll compressor and disposing the fluid within the scroll expander within which an ignition source is placed at strategic points within a pair of first isolated zones of the orbiting scroll expander generating a highly efficient process for capturing mechanical and thermal energy from combustion.

  • Pub Date: 2007/07/12
  • Number: 07958862
  • Owner: SECCO2 Engines, Inc.
  • Location: Pleasanton, US
  • Details: Visit USPTO

Visit USPTO Page


Performance software instrumentation and analysis for electronic design automation

Various methods and apparatuses are described that provide instrumentation and analysis of an electronic design. A method for providing performance instrumentation and analysis of the electronic design includes defining a first and second set of intended software instrumentation test points and an associated first and second set of performance analysis units. The method further includes instrumenting the first and second sets of software instrumentation test points and the associated first and second sets of performance analysis units to a first model and a second model, respectively. The method further includes creating a first and a second set of software instances associated with the first and second sets of intended software instrumentation test points and associated sets of performance analysis units during run time of a first simulation and a second simulation of the electronic design associated with the first model and second model, respectively.

  • Pub Date: 2007/07/12
  • Number: 08229723
  • Owner: Sonics, Inc.
  • Location: Milpitas, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for the treatment of disease using immunoglobulins having Fc regions with altered affinities for FcγRand FcγR

The present invention relates to methods of treating or preventing cancer and other diseases using molecules, particularly polypeptides, more particularly immunoglobulins (e.g., antibodies), comprising a variant Fc region, wherein said variant Fc region comprises at least one amino acid modification relative to a wild-type Fc region, which variant Fc region binds an FcγR that activates a cellular effector (“FcγR,” such as FcγRIIA or FcγRIIIA) and an FcγR that inhibits a cellular effector (“FcγR,” such as FcγRIIA) with an altered Ratio of Affinities relative to the respective binding affinities of such FcγR for the Fc region of the wild-type immunoglobulin. The methods of the invention are particularly useful in preventing, treating, or ameliorating one or more symptoms associated with a disease, disorder, or infection where either an enhanced efficacy of effector cell function mediated by FcγR is desired (e.g., cancer, infectious disease) or an inhibited effector cell response mediated by FcγR is desired (e.g., inflammation, autoimmune disease).

  • Pub Date: 2007/07/12
  • Number: 08652466
  • Owner: MacroGenics, Inc.
  • Location: Rockville, US
  • Details: Visit USPTO

Visit USPTO Page


Method of indicating connectivity of peripheral device to computer operating system

This invention provides a method of connecting a network-connected image input device, to which a plug-and-play function cannot be applied to a computer installed with an OS (operating system) and using the image input device. To this end, when a control program of the image input device is activated, the program notifies the OS of information indicating that the peripheral device is connected, irrespective of connection/non-connection between the peripheral device and the computer. Upon reception of a command for activating the peripheral device, the control program confirms the connection/non-connection between the peripheral device and the computer. When the connection is confirmed, the control program controls the peripheral device to activate.

  • Pub Date: 2007/07/12
  • Number: 08171182
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Method and system for multi-device communication

A medical data system including a plurality of receivers configured to wirelessly receive medical data via a signal.

  • Pub Date: 2007/07/12
  • Number: 07979136
  • Owner: Roche Diagnostics Operation, Inc
  • Location: Indianapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Managing relationships of heterogeneous objects

Software for managing relationships between heterogeneous objects is operable to identify a target object. The software automatically determines related objects using at least one object type application programming interface (API) for an object type associated with the target object. The software is further operable to populate a relationship data structure based on the determined relationships. The software can then provide the relationship data structure to a requesting module.

  • Pub Date: 2007/07/12
  • Number: 08090754
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Integrating web services with a content item

Methods, systems, and apparatus, including computer program products, for integrating web services into a content item are disclosed. In one aspect, a method includes the actions of receiving a request for web services from a publisher, retrieving the web services file that corresponds to the web services requested from the location provided, identifying the web services contained in the web services file, retrieving a content item from the publisher, integrating the content item and the web services defined by the web services file to create augmented content, receiving a request for augmented content, and providing the augmented content. Other implementations of this aspect include corresponding systems, apparatus, and computer program products.

  • Pub Date: 2007/07/12
  • Number: 08504711
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic schema content server

A method to develop a game using a networked content server includes an efficient method to add or modify a new object into the game environment. The method includes the generation of an XML input file describing the new object. The XML new object definition file is uploaded from a game developer client device to a content server. The content server automatically examines the XML input file and converts the definition file to an object type graph and then into a set of SQL instructions as well as a set of web methods. The content server automatically executes the SQL instructions to enter the new object into a database. Web methods corresponding to the new object and are provided to the client device for access to the new object. The game developer thus has nearly immediate access to the new object.

  • Pub Date: 2007/07/12
  • Number: 09256654
  • Owner: Microsoft Technology Licensing, LLC
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Common handler framework

A common handler framework can allow handlers for multiple different types of web services programming models to be used in a single handler chain.

  • Pub Date: 2007/07/12
  • Number: 08024746
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus, method and computer program product for providing automated backup to TDM network connections over an IP network

An automated telecommunications backup system includes a first system operable to monitor a primary time division multiplexing (TDM) link on a TDM network for a failure condition and a second system operable to back up at least a portion of the telecommunications traffic of the TDM link over a backup network. The backup network may be a packet based network, an Internet protocol (IP) based network, a satellite based network, or an IP based system over a satellite network. The first system may continuously monitor the primary TDM link and switch the functionality thereof into circuit with the TDM link upon the detection of the failure condition. The second system may compress the telecommunications traffic of the TDM link to transmit a pre-designated number of time slots thereof.

  • Pub Date: 2007/07/12
  • Number: 08094679
  • Owner: NSGDatacom, Inc.
  • Location: Chantilly, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for setting a data rate in TDMA communications

A mobile ad-hoc network includes a plurality of N mobile nodes and wireless communication links connecting the mobile nodes, which each include a communications device for transmitting and routing data packets wirelessly to other mobile nodes via the wireless communication links in accordance with a time division multiple access (TDMA) data transmission protocol using a TDMA epoch that is divided into a beacon interval, digital voice interval and digital data interval. The mobile nodes monitor channel conditions using the beacon, digital voice and digital data intervals and provide a network conductivity performance as valid receptions occur within mobile nodes. A data rate is calculated and set for other N−1 mobile nodes using monitored channel conditions for the beacon, digital voice and digital data intervals.

  • Pub Date: 2007/06/12
  • Number: 08054819
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for rendering and displaying high-resolution images

One embodiment of the present invention sets forth a technique for displaying high-resolution images using multiple graphics processing units (GPUs). The graphics driver is configured to present one virtual display device, simulating a high-resolution mosaic display surface, to the operating system and the application programs. The graphics driver is also configured to partition the display surface amongst the GPUs and transmit commands and data to the local memory associated with the first GPU. A video bridge automatically broadcasts this information to the local memories associated with the remaining GPUs. Each GPU renders and displays only the partition of the display surface assigned to that particular GPU, and the GPUs are synchronized to ensure the continuity of the displayed images. This technique allows the system to display higher resolution images than the system hardware would otherwise support, transparently to the operating system and the application programs.

  • Pub Date: 2007/06/12
  • Number: 08537166
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Signature search architecture for programmable intelligent search memory

Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content search rules which are used by the memory to evaluate presented content for matching with the programmed rules. Content search rules include of regular expressions which are compiled to finite state automata (FSA) and further include of patterns of strings a first set of which are compiled to a compressed signature database and a second set of which are compiled into FSAs. The finite state automata are then programmed in Programmable Intelligent Search Memory (PRISM) programmable FSA rule blocks and the compressed signature database is programmed in the PRISM signature search engines for evaluating content with the content search rules. A compiler compiles the content search rules for evaluation by PRISM memory. When the content being searched matches any of the rules programmed in the Programmable Intelligent Search Memory (PRISM), action(s) associated with the matched rule(s) are taken.

  • Pub Date: 2007/06/12
  • Number: 07831606
  • Details: Visit USPTO

Visit USPTO Page


Shader processing systems and methods

Various embodiments of shader processing systems and methods are disclosed. One method embodiment, among others, comprises a dependent texture read method executed using a multi-threaded, parallel computational core of a graphics processing unit (GPU). Such a method includes generating a dependent texture read request at logic configured to perform shader computations corresponding to a first thread, and sending shader-calculated, texture-sampling related parameters corresponding to the first thread to a texture pipeline while retaining at the logic all other shader processing related information corresponding to the first thread.

  • Pub Date: 2007/06/12
  • Number: 08174534
  • Owner: Via Technologies, Inc.
  • Location: Hsin-Tien, Taipei, TW
  • Details: Visit USPTO

Visit USPTO Page


Programmable intelligent search memory

Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content search rules which are used by the memory to evaluate presented content for matching with the programmed rules. When the content being searched matches any of the rules programmed in the Programmable Intelligent Search Memory (PRISM) action(s) associated with the matched rule(s) are taken. Content search rules comprise of regular expressions which are converted to finite state automata and then programmed in PRISM for evaluating content with the search rules.

  • Pub Date: 2007/06/12
  • Number: 07899977
  • Details: Visit USPTO

Visit USPTO Page


Photographic prints having magnetically recordable media

A camera provides a photo printed on print media via printer device under the control of a central processor . The photo is a print of an image provided by a CCD sensor . The photo includes print media having, in addition, a magnetically recordable medium whereby sound processed by sound chip received from sound microphone and/or processed by central processor can be recorded with magnetic recording head on the photo . The photo is printed using an ink jet printer on suitable ink jet compatible print media preferably with the magnetically recordable medium on the rear of the photo and the image on the front surface of the photo

  • Pub Date: 2007/06/12
  • Number: 07590347
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Dynamic programmable intelligent search memory

Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory derived using randomly accessible dynamic memory circuits that can be programmed with content search rules which are used by the memory to evaluate presented content for matching with the programmed rules. When the content being searched matches any of the rules programmed in the dynamic Programmable Intelligent Search Memory (PRISM) action(s) associated with the matched rule(s) are taken. Content search rules comprise of regular expressions which are converted to finite state automata and then programmed in dynamic PRISM for evaluating content with the search rules.

  • Pub Date: 2007/06/12
  • Number: 07899978
  • Details: Visit USPTO

Visit USPTO Page


Dynamic logical data channel assignment using time-grouped allocations

A method, system and program are provided for dynamically allocating DMA channel identifiers to multiple DMA transfer requests that are grouped in time by virtualizing DMA transfer requests into an available DMA channel identifier using a channel bitmap listing of available DMA channels to select and set an allocated DMA channel identifier. Once the input values associated with the DMA transfer requests are mapped to the selected DMA channel identifier, the DMA transfers are performed using the selected DMA channel identifier, which is then deallocated in the channel bitmap upon completion of the DMA transfers. When there is a request to wait for completion of the data transfers, the same input values are used with the mapping to wait on the appropriate logical channel. With this method, all available logical channels can be utilized with reduced instances of false-sharing.

  • Pub Date: 2007/06/12
  • Number: 07865631
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Device and method for adjusting a converged device having barcode reading and RFID functionalities

A method adjusts a computing device. The method receives configuration data relating to at least two functionalities of the device. The method adjusts configurations of components of the device as a function of the configuration data so that the device performs as if a first functionality of the at least two functionalities is a primary functionality of the device. The components are at least partially capable of the at least two functionalities.

  • Pub Date: 2007/06/12
  • Number: 08122237
  • Owner: Symbol Technologies, Inc.
  • Location: Holtsville, US
  • Details: Visit USPTO

Visit USPTO Page


Airtight canister lid with flexible seal-breaking bulb

A canister comprises a vessel defining a volume and an opening having a rim and a lid. The lid comprises a flexible bulb and a conformal outer edge configured to create an airtight vacuum seal with the rim to close the opening. The flexible bulb is configured to release pressure from the vessel and break the airtight vacuum seal in response to compression of the bulb. The lid can be configured to be completely contained within the rim.

  • Pub Date: 2007/06/12
  • Number: 09517865
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for performing recovery of directory data

Systems and methods are disclosed for recovering data following a directory service malfunction, such as a forest-wide disaster in Microsoft® Active Directory. In certain examples, a single management console can be used for remotely recovering selected domain controllers in the forest without necessitating direct operator intervention. Multiple domain controllers can be concurrently restored from one or more backup files. Configurations of the system can advantageously eliminate manual intervention with each domain controller, thereby saving significant amounts of recovery time and effort. Also, certain systems and methods can be used to automatically and remotely quarantine corrupt domain controllers so that those individual domain controllers do not replicate with the newly restored environment, while allowing the domain controllers to remain online and in communication with the attached network. Certain disclosed methods further modify recovery procedures based at least in part on the type, and availability of, one or more DNS servers.

  • Pub Date: 2007/05/12
  • Number: 08234253
  • Owner: Quest Software, Inc.
  • Location: Aliso Viejo, US
  • Details: Visit USPTO

Visit USPTO Page


Stat3 inhibitor having anti-cancer activity and methods

A small-molecule Stat3 dimerization inhibitor, S3I-M2001, is described and the dynamics of intracellular processing of activated Stat3 within the context of the biochemical and biological effects of the Stat3 chemical probe inhibitor are elucidated. S3I-M2001 is a newly-identified oxazole-based peptidomimetic of the Stat3 Src Homology (SH) 2 domain-binding phosphotyrosine peptide that selectively disrupts active Stat3:Stat3 dimers. Stat3-dependent malignant transformation, survival, and migration and invasion of mouse and human cancer cells harboring persistently-activated Stat3 were inhibited by S3I-M2001. S3I-M2001 inhibited Stat3-dependent transcriptional regulation of tumor survival genes, such as Bcl-xL. The disclosed compound is useful as a new potential treatment for certain cancers.

  • Pub Date: 2007/05/12
  • Number: 08609639
  • Owner: University of Central Florida Research Foundation, Inc.
  • Location: Orlando, US
  • Details: Visit USPTO

Visit USPTO Page


Reconfigurable antenna pattern verification

A method of verifying programmable antenna configurations is disclosed. The method comprises selecting a desired antenna configuration from a plurality of antenna configuration patterns, with the selected antenna configuration forming at least one reconfigurable antenna from reconfigurable antenna array elements. The method validates the formation of the selected antenna configuration to determine antenna performance of the at least one reconfigurable antenna.

  • Pub Date: 2007/05/12
  • Number: 08373608
  • Owner: Honeywell International Inc.
  • Location: Morristown, US
  • Details: Visit USPTO

Visit USPTO Page


Print system including image-forming apparatus for providing workflow

An image-forming apparatus is capable of communicating with a server apparatus for performing a workflow. The image-forming apparatus includes a receiving unit configured to receive definition information of a flow defined in a workflow from the server apparatus and a control unit configured to control display of a screen of the image-forming apparatus based on the flow definition information received by the receiving unit. The image-forming apparatus further includes a notification unit configured to notify the server apparatus of a completion of the flow by the image-forming apparatus.

  • Pub Date: 2007/05/12
  • Number: 08441665
  • Owner: Canon Kabushiki Kaisha
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Phosphoinositide 3-kinase inhibitor compounds and methods of use

  • Pub Date: 2007/05/12
  • Number: 09487533
  • Owner: F. Hoffmann-La Roche AG
  • Location: Basel, CH
  • Details: Visit USPTO

Visit USPTO Page


Multimedia spam determination using speech conversion

Determining unwanted multimedia message originated from a multimedia call. An interface receives a multimedia message from a telecommunication service operator, and multimedia message is stored on a storage area. A unified communication system manages communication message delivery to at least one of the following access points for the recipient, and the unified communication system includes a processor configured to execute computer-executable instructions for identifying a voice portion from content of the received multimedia message. An anti-spam engine is applied to analyze a textual representation of the identified voice portion, and a confidence ranking of the representation is generated in response to the analyzed representation. It is determined whether the multimedia message is an unwanted multimedia message as a function of the confidence ranking and the analyzed representation.

  • Pub Date: 2007/05/12
  • Number: 08144841
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-dimensional dynamic visual browsing

Apparatus, systems, and methods may operate to present a first plurality of visible images indicating a corresponding group of visible element navigation pathways associated with a first level of an online marketplace, receive a selection of one of the first plurality of visual images to provide a selected image, and navigate to a second level of the online marketplace along the visible element navigation pathways by presenting a second plurality of visible images representing one of a super-category including the selected image and a sub-category included in the selected image, wherein the first and second levels form part of at least three levels of visual navigation. Selections may be saved for future manipulation, review, and navigation as a collection of thumbtacked images. Additional apparatus, systems, and methods are disclosed.

  • Pub Date: 2007/05/12
  • Number: 08549407
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for providing one or more topic specific portals

A methods and systems are provided for presenting one or more topic specific portals. A portal may present various content relating to a common topic. The content may be episodes of a television show, movies, products, games, songs, images, and general information about the topic. The topic may be the television show, a movie studio, an actor, a company, or a particular genre or theme. A service provider may deliver the portal in an interactive programming guide sent to the set top boxes of its subscribers. The portal may be interactive such that subscribers may order or watch the content presented on the portal. A content provider may create or edit the portals and send the portals to the service provider. The delivery of the portal to the service provider by the content provider may be through an application programming interface.

  • Pub Date: 2007/05/12
  • Number: 08954874
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for video upscaling

Upscaling video data for presentation on a relatively high resolution display device is described. Supplemental video data corresponding to video data is accessed and acquired in response to a request to upscale the video data. The video data and the supplemental video data are combined to produce a combined video data for displaying particular video content on a destination display device at a resolution that is high relative to the local display device. Digital rights management information may be verified prior to producing the combined video data, and additional digital rights information may be applied prior to transmitting the combined video data to the destination display device. A device registration database may also be used to control production and transmission of the upscaled video to other devices.

  • Pub Date: 2007/05/12
  • Number: 08165197
  • Owner: Sony Corporation of America
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using a preprocessor to determine dependencies between J2EE components

A system and method for using a preprocessor to determine dependencies between J2EE components. The preprocessor can analyze a running J2EE application, and look at the deployment descriptor information associated with that application. The levels of indirection within the deployed application are followed to determine the actual configuration information used to deploy the application on a first application server. This configuration information can then be parsed, communicated, or otherwise output to a system administrator or software developer, or in some embodiments directly to a second application server, and used to deploy the application on that second application server.

  • Pub Date: 2007/04/12
  • Number: 08185873
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for structuring an A-buffer

One embodiment of the present invention sets forth a technique for efficiently creating and accessing an A-Buffer with a GPU. The A-Buffer is organized in arrays of uniformly-sized tiles. Each array represents a group of pixels, and each tile within an array includes the set of fragments at a specific depth complexity that are associated with the pixels in the pixel group represented by the array. The size of the tiles may be selected to be the minimum necessary for efficient memory access. The GPU determines the number of tiles in each array by calculating the maximum of the depth complexity associated with the pixels in the pixel group represented by the array and creates a corresponding prefix sum image to allow the GPU to efficiently locate the array associated with a given pixel group in the A-Buffer for addressing purposes. Advantageously, structuring the A-Buffer by both pixel proximity and depth complexity improves memory locality, thereby improving the overall rendering performance of the graphics pipeline.

  • Pub Date: 2007/04/12
  • Number: 08040349
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for managing distributed objects as a single representation

An architecture and method for managing at least two distinct machines (or objects) in which resources are shared as a single entity (or object) in an agent-based system. The agent-based system comprising a controller, a local agent coupled to the controller, and at least one clustered machine. The at least one clustered machine includes at least two individual agents, the at least two individual agents sharing at least one shared resource/service. The system also includes a virtual non-persistent connection for coupling the at least two individual agents to the local agent. The at least one shared resource/service is accessed by the local agent through the virtual non-persistent connection using a virtual IP address to enable the at least two individual agents of the at least one clustered machine to be represented as a single object.

  • Pub Date: 2007/04/12
  • Number: 07831713
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for fast, reliable byte stream transport

Reliable byte stream transfer protocols play an important role in modern networks. The present invention implements such a protocol using credits for flow control and negative acknowledgements for reliable delivery. The credit mechanism uses credit transfer in installments and is immune to the losses or corruptions of intermediate credit installments. Negative acknowledgements are used to solicit the retransmission of data stream component. The present invention provides full compatibility at the programming interface with reliable byte transfer protocols, such as TCP, and also allows full interoperability among hosts running the aforesaid standard protocol or the protocol of the present invention.

  • Pub Date: 2007/04/12
  • Number: 07899925
  • Details: Visit USPTO

Visit USPTO Page


Location-based services that choose location algorithms based on number of detected wireless signal stations within range of user device

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database.

  • Pub Date: 2007/04/12
  • Number: 07818017
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Location-based services that choose location algorithms based on number of detected access points within range of user device

A location beacon database and server, method of building location beacon database, and location based service using same. Wi-Fi access points are located in a target geographical area to build a reference database of locations of Wi-Fi access points. At least one vehicle is deployed including at least one scanning device having a GPS device and a Wi-Fi radio device and including a Wi-Fi antenna system. The target area is traversed in a programmatic route to avoid arterial bias. The programmatic route includes substantially all drivable streets in the target geographical area and solves an Eulerian cycle problem of a graph represented by said drivable streets. While traversing the target area, periodically receive the GPS coordinates of the GPS device. While traversing the target area, detecting Wi-Fi signals from Wi-Fi access points in range of the Wi-Fi device and recording identity information of the detected Wi-Fi access point in conjunction with GPS location information of the vehicle when the detection of the Wi-Fi access point was made. The location information is used to reverse triangulate the position of the detected Wi-Fi access point; and the position of the detected access point is recorded in a reference database.

  • Pub Date: 2007/04/12
  • Number: 07769396
  • Owner: Skyhook Wireless, Inc.
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated collision avoidance system for air vehicle

Collision with ground/water/terrain and midair obstacles is one of the common causes of severe aircraft accidents. The various data from the coremicro AHRS/INS/GPS Integration Unit, terrain data base, and object detection sensors are processed to produce collision warning audio/visual messages and collision detection and avoidance of terrain and obstacles through generation of guidance commands in a closed-loop system. The vision sensors provide more information for the Integrated System, such as, terrain recognition and ranging of terrain and obstacles, which plays an important role to the improvement of the Integrated Collision Avoidance System.

  • Pub Date: 2007/04/12
  • Number: 08509965
  • Owner: American GNC Corporation
  • Location: Simi Valley, US
  • Details: Visit USPTO

Visit USPTO Page


Data entry commentary and sheet reconstruction for multidimensional enterprise system

A computing device is described that includes a user interface to receive contribution data of an enterprise and to display a sheet of the contribution data, an annotation interface module to receive one or more annotations for objects of the contribution data, a planning application to retrieve a context definition defining a context in which each of the annotations was received, and an annotation table to store each of the annotations and the context definition corresponding to each of the annotations. The user interface may be configured to output the annotations. The computing device may improve the collaborative process of developing multidimensional data. Users of the computing device may quickly and easily share their thoughts, questions, and comments about the data through annotations. Recreating an annotated sheet may be done efficiently by storing relevant coordinates.

  • Pub Date: 2007/04/12
  • Number: 09268837
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic discovery of the java classloader delegation hierarchy

A computer implemented method, data processing system, and computer program product for automatic discovery of the Java classloader delegation hierarchy. One or more classloaders are instrumented with byte code instrumentation code such that a delegation event is received each time a classloader delegates a resource finding method to a parent classloader of the classloader. From each delegation event received, the classloader that generated the delegation event and a parent classloader to which the classloader directly delegates the resource finding method is determined. Based on the delegation events received, the classloaders to which a current classloader in the one or more classloaders can directly delegate are determined. The order of delegation to the classloaders may then be determined.

  • Pub Date: 2007/04/12
  • Number: 08276125
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic deployment of Java classes using byte code instrumentation

A computer implemented method, data processing system, and computer program product for Java class automatic deployment using byte code instrumentation technology. One or more classloaders are instrumented with byte code instrumentation code such that a class loading event is received when a class is loaded. If a determination is made that new byte code instrumentation code needs to be loaded with the loaded class, candidate classloaders that load import classes of the new byte code instrumentation code are determined. A correct classloader from the candidate classloaders to load the new byte code instrumentation code is calculated. The correct classloader is instrumented to have an extended classpath, wherein the new byte code instrumentation code is inserted into the extended classpath of the correct classloader. The class is loaded from the extended classpath and original classpath of the correct classloader.

  • Pub Date: 2007/04/12
  • Number: 08397227
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Techniques for versioning file systems

Techniques are presented for versioning file systems. Files and directories are versioned in a manner that permits the versions to be mounted on a device of a user. The original security restrictions that existed with the versions when they were versioned are retained with the mount. Moreover, the user can browse and access the versions via the mount using an existing file system of the user's device. Further, names for each of the versions include detailed information that reveals the relationship of each particular version to its parent version.

  • Pub Date: 2007/03/12
  • Number: 08447733
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for stage rendering in a software authoring tool

Systems and methods are provided for rendering a stage in a software authoring tool. A run-time player component is employed for rendering the stage for presenting a preview of output of a software application being authored in the software authoring tool. Thus, a software authoring tool outputs a stage which presents a preview of the output of an application being authored, such as a multimedia application. The output presentation of a multimedia application being authored in the authoring tool is rendered to the stage by a run-time player component. Thus, rather than employing code integrated within the authoring tool for mimicking a run-time player in order to generate a preview of output on the stage, embodiments of the present invention utilize a run-time player component to generate such a preview of output on the stage.

  • Pub Date: 2007/03/12
  • Number: 08739120
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communication agent within a fully distributed network

A computer-enabled agent and method to support the communication within a fully distributed network comprises an agent core with an agent facade, wherein the agent facade enables the agent to communicate with other applications without predetermined programming and the agent core enables the agent to operate without a central message broker for communication across a network; and a network layer that handles low-level network operations and is capable of finding the least expensive way to send a message to one or more destinations.

  • Pub Date: 2007/03/12
  • Number: 08549122
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Short gate high power MOSFET and method of manufacture

A short gate high power metal oxide semiconductor field effect transistor formed in a trench includes a short gate having gate length defined by spacers within the trench. The transistor further includes a buried region that extends beneath the trench and beyond a corner of the trench, that effectively shields the gate from high drain voltage, to prevent short channel effects and resultantly improve device performance and reliability.

  • Pub Date: 2007/03/12
  • Number: 08084813
  • Owner: Cree, Inc.
  • Location: Durham, US
  • Details: Visit USPTO

Visit USPTO Page


Restoration of high-order Mel frequency cepstral coefficients

A method for estimating high-order Mel Frequency Cepstral Coefficients, the method comprising initializing any of N−L high-order coefficients (HOC) of an MFCC vector of length N having L low-order coefficients (LOC) to a predetermined value, thereby forming a candidate MFCC vector, synthesizing a speech signal frame from the candidate MFCC vector and a pitch value, and computing an N-dimensional MFCC vector from the synthesized frame, thereby producing an output MFCC vector.

  • Pub Date: 2007/03/12
  • Number: 08412526
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Method for enhanced image decoding

A method of processing an image includes the steps of receiving selection of the first region of interest (ROI) of an image, processing the first image data related to the first ROI, displaying the first image ROI based on the first image data, receiving selection of the second ROI of the image, which at least partially overlapping the first ROI, processing the second image data related to a portion of the second ROI that does not overlap the first ROI, combining the processed second image data with the processed first image data that overlaps the second ROI, and displaying the second image ROI based on the combined processed second image data and the processed first data.

  • Pub Date: 2007/03/12
  • Number: 08144997
  • Owner: Marvell International Ltd.
  • Location: , BM
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for the delivery of digital data

A method and apparatus for the delivery of digital data to an end user () from a network () comprising at least two different data sources () is disclosed. Each of the at least two different data sources () can deliver the digital data to the end network at at least one parameter and the data sources () have substantially identical copies of the digital data comprising portions and are connected to the end user (). The method comprises receiving () a list of a subset of the at least two data sources () and selecting () on the basis of the list one or more of the subset of at least two data sources (). At least a portion of the digital data from the selected ones of the at least two data sources () is delivered to the end user (). The parameter for the delivery of the digital data to the end user () is monitored and the configuration () of the selected ones of the at least two data sources () is adjusted () on the basis of the monitored parameter such that a combined configuration of the configurations () of the selected ones of the at least two data sources () matches the specification ().

  • Pub Date: 2007/03/12
  • Number: 07908362
  • Owner: Velocix Ltd.
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Low power active matrix display

Described herein are systems and methods for stress avoidance and stress compensation in low power Liquid Crystal Displays (LCDs). In an exemplary embodiment, two or more transistors in series are used to hold charge on an LCD pixel. To avoid negative stress on the transistors, the transistors are alternately driven to an “off” state so that no one transistor sees a long “off” time. In another embodiment, stress on transistors of a display circuit are measured and controlled negative stress is applied to the transistors to compensate for the measured stress.

  • Pub Date: 2007/03/12
  • Number: 08477092
  • Owner: Store Electronic Systems SA
  • Location: Argenteuil, FR
  • Details: Visit USPTO

Visit USPTO Page


Ferroelectric ultrathin perovskite films

Disclosed herein are perovskite ferroelectric thin-film. Also disclosed are methods of controlling the properties of ferroelectric thin films. These films can be used in a variety materials and devices, such as catalysts and storage media, respectively.

  • Pub Date: 2007/03/12
  • Number: 08603573
  • Owner: The Trustees of the University of Pennsylvania
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Clipboard for application sharing

A software application can be shared by multiple users. A system clipboard of a first computing system is synchronized with a system clipboard of a second computing system when the user of the second computing system is in control of the shared software application. Information contained in the system clipboard of the first computing system is copied to a state buffer and associated with the user who copied the information. The information is returned to the system clipboard when the associated user regains control of the software application.

  • Pub Date: 2007/03/12
  • Number: 07818458
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless remote firmware debugging for embedded wireless device

A method for debugging a read only memory (ROM) in a wireless target device is disclosed. A wireless communication link is established between the target device and a host computer. A debug mode change command is received from the host computer by the application program running on the target device via a wireless communication interface in the target device. The wireless communication interface is parsed with the monitor program. A debug instruction is received by the monitor program from a debugger in the host computer where the debug instruction includes an entry address and a jump address. The application program jumps to the received jump address upon reaching the entry address location. An acknowledgement is transmitted from the target device to the debugger in the host computer, and, in response to the acknowledgement, a second debug instruction is received from the debugger in the host computer.

  • Pub Date: 2007/30/11
  • Number: 07913121
  • Owner: Broadcom Corporation
  • Location: Irvine, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for using a secondary processor in a graphics system

A system, method and apparatus are disclosed, in which a processing unit is configured to perform secondary processing on graphics pipeline data outside the graphics pipeline, with the output from the secondary processing being integrated into the graphics pipeline so that it is made available to the graphics pipeline. A determination is made whether to use secondary processing, and in a case that secondary processing is to be used, a command stream, which can comprise one or more commands, is provided to the secondary processing unit, so that the unit can locate and operate on buffered graphics pipeline data. Secondary processing is managed and monitored so as to synchronize data access by the secondary processing unit with the graphics pipeline processing modules.

  • Pub Date: 2007/30/11
  • Number: 08922565
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for supporting change notify watches for virtualized storage systems

A technique supports Change Notify watches in virtualized storage systems. In particular, techniques of the present invention advantageously emulate Change Notify features (e.g., as documented by the CIFS protocol) on virtualized storage systems by leveraging virtualization mapping information (e.g., an inode-to-path or “IP” mapping) to walk a file system tree backwards from the data blocks to their ancestors to determine whether there are applicable watches on ancestor directories, and to obtain a pathname (e.g., relative) of the watched (changed) data. In particular, changes to data received from different protocols (e.g., CIFS, NFS, HTTP, etc.) can trigger watches to clients on the virtualized storage system. Also, performance may be enhanced using various caching techniques, and watch state may be retained while moving watched data across volumes of the virtualized storage system.

  • Pub Date: 2007/30/11
  • Number: 07809776
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Softstart valve means

A softstart valve means comprises a main valve member which is only switched over after a certain time from a closed position into an open position. The opening force required for switch over of the main valve member can be produced selectively in a manner dependent from pressure obtaining in a secondary duct or in a time dependent fashion. The respective operational mode can be selected by actuation of switch over means.

  • Pub Date: 2007/30/11
  • Number: 07891375
  • Owner: Festo AG & Co. KG
  • Location: Esslingen, DE
  • Details: Visit USPTO

Visit USPTO Page


One-pass sampling of hierarchically organized sensors

One-pass sampling is employed within a hierarchically organized structure to efficiently and expeditiously respond to sensor inquires. Identification of relevant sensors and sampling of those sensors is combined and performed in a single pass. Oversampling can also be employed to ensure a target sample size is met where some sensors fail or are otherwise unavailable. Further yet, sensor data can be cached and utilized to hasten processing as well as compensate for occasional sensor unavailability.

  • Pub Date: 2007/30/11
  • Number: 07933919
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Motion controller that supports standard and custom axes

System and method for developing a motion application. A motion manager component implementing a supervisory control function and at least one trajectory generation algorithm is stored on a motion controller. A first application programming interface (API) for interfacing the motion manager component to a user developed motion control application is displayed. A second API for interfacing the motion manager component to a user developed communication interface component is displayed. A user application executable for sequencing motion operations in the motion system is created using the first API is created in response to user input. A first communication interface component is created using the second API in response to user input, where the communication interface component is operable to interface with the motion manager component using the second API, and where the user developed communication interface component is executable to communicate with a motion element, e.g., a drive or simulation.

  • Pub Date: 2007/30/11
  • Number: 08082515
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Intrusion detection system alerts mechanism

A system and method for analyzing Intrusion Detection System (IDS) alert data associated with a computer network is described. The method includes applying first association rules to obtained IDS alert data associated with a computer network and processing the obtained IDS alert data with the first association rules. Analyst feedback data associated with the processed obtained IDS alert data is received, and a training data set from the analyst feedback data is received. New association rules are determined based upon the training data set, and the new association rules are outputted to a display of a computing device. Outputting the new association rules may include outputting patterns within the IDS alert data of false positive alerts. The new association rules may be applied back to the obtained IDS alert data.

  • Pub Date: 2007/30/11
  • Number: 07991726
  • Owner: Bank of America Corporation
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic updateable web toolbar

A toolbar that persists in a browser window across multiple Web pages during a browsing session is displayed. This toolbar includes multiple toolbar buttons. An updated toolbar is automatically received from a remote toolbar source that is independent of the multiple Web pages, and this updated toolbar includes a change to the toolbar buttons. The toolbar in the browser is replaced, during the browsing session, with this updated toolbar. The toolbar can also include one or more buttons based at least in part on customization information regarding a user of the browser.

  • Pub Date: 2007/30/11
  • Number: 08234575
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Consensus based vehicle detector verification system

A method, system and computer program product are provided for automating the task of data collection and reduction for highway vehicle detector testing. To evaluate the performance of each detector under test, a set of detection data is accumulated concurrently from each of the detectors. This data consists, at a minimum, of the time of arrival of each vehicle as reported by each detector and a digitized video image of the vehicle at the position-compensated time of detection. The data reduction process allows for applying weighting coefficients to each detection result in the formation of a consensus. These coefficients may be either fixed or adaptively adjusted based upon the learned accuracy of each detector under test. A ground truth reference data set is then generated using the weighted consensus determined from the data generated by all detectors under test. The accuracy of each detector under test is then ascertained by comparison with the ground truth data set, and these comparison results are automatically reported as indications of the accuracy of each detector under test.

  • Pub Date: 2007/30/11
  • Number: 08179282
  • Owner: Cal Poly Corporation
  • Location: San Luis Obispo, US
  • Details: Visit USPTO

Visit USPTO Page


Channel selection techniques for wireless networks

Channel selection techniques for a wireless network are described. An apparatus may comprise a device to communicate information over a common wireless communication link. The device may include a channel selection module to select a channel pair comprising a high rate physical channel and a low rate physical channel based on energy measurements for the channels. Other embodiments are described and claimed.

  • Pub Date: 2007/30/11
  • Number: 08681707
  • Owner: Intel Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic data patch generation for unknown vulnerabilities

The claimed subject matter provides a system and/or method that generates data patches for vulnerabilities. The system can include devices and components that examine exploits received or obtained from data streams, constructs probes and determines whether the probes take advantage of vulnerabilities. Based at least in part on such determinations data patches are dynamically generated to remedy the hitherto vulnerabilities.

  • Pub Date: 2007/30/11
  • Number: 08613096
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


3:2 pulldown detection

Field-based detection of 3:2 pulldown in a sequence of digital video fields using a programmable graphics processor is described. The detection is performed using a threshold value to determine equivalence between a pair of fields of digital video data. Furthermore, additional threshold values may be used to control switching into a mode where duplicated fields of digital video data are identified and not displayed and out of the mode where duplicated fields of digital video data are identified and not displayed. Look ahead can be used to detect when to switch into or out of the mode where duplicated fields of digital video data are identified and not displayed, reducing the occurrence of visual artifacts.

  • Pub Date: 2007/30/11
  • Number: 08094239
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for noise filtering data compression

Noise filtering data compression removes noise differences from successive frames in a video signal. This is accommodated by accessing successive frames corresponding to a video signal. Frequency domain representations, for example first row and first column coefficients in the quantized DCT result matrix, are used to determine whether the block in the current frame should be considered identical to the corresponding block in the previous frame. If such is the case, the block data is rendered identical such as by overwriting one for the other. This removes any noise differential between the corresponding blocks from the successive frames.

  • Pub Date: 2007/29/11
  • Number: 08243811
  • Owner: Takashi Kosaka
  • Location: San Carlos, US
  • Details: Visit USPTO

Visit USPTO Page


Prioritizing quality improvements to source code

An exemplary method includes receiving source code having a plurality of code segments, providing a desired level of quality for the source code, analyzing the source code to assign a complexity measure to each of the plurality of code segments and assigning a level of code coverage to each of the plurality of code segments based at least in part on the desired level of quality and the complexity measures. An exemplary system prioritizes quality improvements to source code based, in part, on a quality assessment. Such a system can improve code quality by assigning higher test coverage levels to modules with higher complexity.

  • Pub Date: 2007/29/11
  • Number: 08627287
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for preparing software offerings having software application code and post-install configuration information

Embodiments relate generally to a method of generating a post-installation configuration for a software application offering. The method includes receiving a request for a post-installation configuration for a software application and determining a software distribution in which the software application will operate. The method also includes determining a set of inter-dependencies between the software application and the software distribution and retrieving a set of templates for post-installation configuration of the software application. The method further includes generating a post-installation configuration file that customizes the software application for operation with the software distribution and packaging the software application into an offering that comprises the post-installation configuration file and the software application.

  • Pub Date: 2007/29/11
  • Number: 08612966
  • Owner: Red Hat, Inc.
  • Location: Raleigh, US
  • Details: Visit USPTO

Visit USPTO Page


Aza-indolyl compounds and methods of use

The invention relates to azaindolyl compounds of Formula I with anti-cancer and/or anti-inflammatory activity and more specifically to azaindolyl compounds which inhibit MEK kinase activity. The invention provides compositions and methods useful for inhibiting abnormal cell growth or treating a hyperproliferative disorder, or treating an inflammatory disease in a mammal. The invention also relates to methods of using the compounds for in vitro, in situ, and in vivo diagnosis or treatment of mammalian cells, or associated pathological conditions.

  • Pub Date: 2007/29/11
  • Number: 07855216
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for service oriented email client application

A system to facilitate a service oriented email client application. The system includes a service registry, a service address book coupled to an email client, and an email composer coupled to the service address book. The service registry includes service information. The service information describes how to invoke a web service. The service address book includes a web service entry linked to the service information for the web service in the service registry. The email composer generates a user input form with a custom input field corresponding to the service information for the web service.

  • Pub Date: 2007/28/11
  • Number: 08676902
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communicating data using weighted bit soft decisions for differentially encoded phase shift keying

A receiver includes a signal input for receiving a differentially-encoded quadrature phase-shift keyed (DEQPSK) communication signal. A demodulator performs bit decisions on a received coherent symbol and bit decisions on a received differential symbol. A processor is operative with the demodulator and scales a soft decision by a factor from 0 to 1 when the results of the bit decisions on the received coherent branch and differential branch are different.

  • Pub Date: 2007/28/11
  • Number: 07995678
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Selection of real time collaboration tools

A computer-implemented method of selecting a real time collaboration application can include associating each of a plurality of real time collaboration applications with a plurality of performance statistics, receiving a request for a real time collaboration session from a personal productivity application, and identifying a data type to be shared through one of the plurality of real time collaboration applications. One of the plurality of real time collaboration applications can be selected according to the data type to be shared and the plurality of performance statistics. The selected real time collaboration application can be output.

  • Pub Date: 2007/28/11
  • Number: 08688783
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing a computing system with real-time capabilities

A computing system is provided with real-time capabilities so that the system is capable of running applications such that one or more real-time criteria are satisfied. An interrupt architecture of the computing system is disabled. The interrupt architecture generates interrupts sent to a firmware of the computing system in response to events. A different architecture is substituted within the computing system for the interrupt architecture. The different architecture is responsive to the events without violating the real-time criteria. In response to the events occurring, the different architecture causes one or more corrective actions to be performed.

  • Pub Date: 2007/28/11
  • Number: 08230446
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Piezoelectric microcantilevers and uses in atomic force microscopy

The invention is direct to a piezoelectric microcantilever for static contact and dynamic noncontact atomic force microscopy which may be carried out in solution. The piezoelectric microcantilever, which includes a piezoelectric layer and a non-piezoelectric layer is capable of self actuation and detection. The piezoelectric layer may be constructed from a lead magnesium niobate-lead titanate (Pb(MgNb)O)—(PbTiO)(PMN-PT)(PMN-PT), zirconate titanate (PZT)/SiOor from any lead-free piezoelectric materials such as doped sodium-potassium niobate-lithium niobate. The piezoelectric layers of the microcantilevers may have dielectric constants of from 1600-3000 and thicknesses below 10 μm. Also disclosed are methods for fabricating microcantilever sensors and methods for atomic force microscopy employing the microcantilevers.

  • Pub Date: 2007/28/11
  • Number: 07992431
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Piezoelectric microcantilever sensors for biosensing

A piezoelectric microcantilever for sensing compounds or molecules. The piezoelectric microcantilever, may include at least one electrode, an insulation layer, a receptor, an immobilization layer, a non-piezoelectric layer and a piezoelectric layer. The sensor is capable of self actuation and detection. The piezoelectric layer may be constructed from a highly piezoelectric thin lead magnesium niobate-lead titanate film, a highly piezoelectric thin zirconate titanate film, a highly piezoelectric lead-free film. Methods of using the sensors and flow cells and arrays including the sensors are also described.

  • Pub Date: 2007/28/11
  • Number: 08927259
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for providing an interface to a processing engine that utilizes intelligent audio mixing techniques

A method for providing an interface to a processing engine that utilizes intelligent audio mixing techniques may include receiving a request to change a perceptual location of an audio source within an audio mixture from a current perceptual location relative to a listener to a new perceptual location relative to the listener. The audio mixture may include at least two audio sources. The method may also include generating one or more control signals that are configured to cause the processing engine to change the perceptual location of the audio source from the current perceptual location to the new perceptual location via separate foreground processing and background processing. The method may also include providing the one or more control signals to the processing engine.

  • Pub Date: 2007/28/11
  • Number: 08515106
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for providing a distinct perceptual location for an audio source within an audio mixture

In accordance with a method for providing a distinct perceptual location for an audio source within an audio mixture, a foreground signal may be processed to provide a foreground perceptual angle for the foreground signal. The foreground signal may also be processed to provide a desired attenuation level for the foreground signal. A background signal may be processed to provide a background perceptual angle for the background signal. The background signal may also be processed to provide a desired attenuation level for the background signal. The foreground signal and the background signal may be combined into an output audio source.

  • Pub Date: 2007/28/11
  • Number: 08660280
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Fast depth of field simulation

A method, system, and computer-readable storage medium are disclosed for rendering a scene with a simulated depth of field blur. In one embodiment, the scene comprises a plurality of polygons, each polygon comprises a respective plurality of vertices, and each of the vertices has a respective depth. A respective blur radius may be determined for each vertex of each polygon as a function of the depth of the vertex. A respective blur radius may be determined for each pixel in each polygon based on the blur radii for the vertices of the polygon. Each pixel in each polygon may be rendered using the respective blur radius determined for the pixel.

  • Pub Date: 2007/28/11
  • Number: 08035641
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamical routing for text messaging

Routing text messages. A mobile message (MM) is received from an application program or other message source, and includes a destination identifier, such as a phone number. Based on the destination identifier, a routing server determines whether the MM is to be locally routed to a destination carrier, or forwarded to a remote server that provides access to the destination carrier. For local routing, the routing server determines a channel to the carrier based on predefined carrier information, the destination user information, and the carrier gateway dynamic information. The predefined carrier information indicates predicted availability or reliability of each of a plurality of channels to the carrier. The destination user information indicates availability of the destination user to receive messages, and includes a destination user criterion for determining one of the channels. The carrier gateway dynamic information indicates current and statistical traffic information for each of the channels.

  • Pub Date: 2007/28/11
  • Number: 07941557
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Carboxymethylcellulose polyethylene glycol compositions for medical uses

Compositions comprising carboxypolysaccharides (CPS) including carboxymethyl cellulose (CMC) and polyethylene glycols (PEGs) are provided where the PEG is a PEG-epoxide covalently linked to the CPS via an addition reaction. In certain embodiments, the PEG attaches to only one CPS, forming a decorated CPS. In other embodiments, bi-functional PEG molecules are attached to adjacent CPSs, thereby forming a covalently cross-linked composition. In certain of these embodiments, a PEG is linked to the CPS by way of an ether linkage, and in other embodiments, a PEG is linked to the CPS by way of an ester linkage, and in still further embodiments, PEG molecule(s) can be attached to CPS molecule(s) by way of both ether and ester linkages. Additional embodiments include PEG/CMC compositions where the PEG is a multi-branch PEG and/or a multi-arm PEG. PEG/CMC compositions can be made with desired viscoelastic properties, and such compositions can be used as space-filling materials, load-bearing materials, anti-adhesion compositions, for drug delivery vehicles or for lubrication of tissues and medical instruments.

  • Pub Date: 2007/28/11
  • Number: 09345809
  • Owner: FZIOMED, Inc.
  • Location: San Luis Obispo, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of a zero single point of failure load balancer

Apparatus and methods in a load balancer computing apparatus include, in aspects, determining if a master is functioning, and if the master is not functioning, then attempting to become the master by setting a master network identification in a master database table to a self network identification before at least one other slave sets a corresponding other slave network identification as the master network identification in the master database table. In other aspects, the apparatus and methods include assigning each of a group of commands to one of a plurality of slaves, storing the commands and a corresponding assignment in a database table, checking a command status in the database table for each of the group of commands, wherein the command status indicates whether or not the respective command has been executed; and executing a callback function when all the commands are executed.

  • Pub Date: 2007/28/11
  • Number: 08732261
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for geometry shading

One embodiment of the present invention sets forth a technique for more effectively utilizing graphics hardware by allowing the developer to exploit parallelism at the primitive-level. In this technique, an algorithm is analyzed to break the total work associated with processing one primitive into discrete portions of work. The results of this analysis are used to program a geometry shader group that includes multiple geometry shaders. Upon receiving a single input primitive, the geometry shader group launches multiple parallel threads, one thread in each geometry shader in the group corresponding to each discrete portion of work. As each thread completes, the output of the thread is stored in on-chip GPU memory for processing by the next stage in the graphics pipeline. Since the overall work associated with a given input primitive is distributed across multiple threads, the output of each thread is smaller and, thus, the total memory required to implement the algorithm is reduced.

  • Pub Date: 2007/27/11
  • Number: 08212825
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Sampling based runtime optimizer for efficient debugging of applications

A method of reproducing runtime environment for debugging an application includes reading an optimizer file from a non-volatile storage medium. The optimizer file includes a runtime environment, application definition information, and a log. The log includes summaries of events, actions, and a time mark of occurrence for each of the actions. A runtime environment for debugging the application is then defined and the application runtime is set up using the application definition information in the optimizer file. Further, the method includes running the application, attaching an optimizer, and triggering each of the actions to occur at a time mark of occurrence associated with each of the actions. Then, each of the actions and associated events is analyzed by comparing the events produced by running the application with the events in the optimizer file. If a fault is produced by the triggering, a debugger is invoked to analyze the fault.

  • Pub Date: 2007/27/11
  • Number: 08627302
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices

A system and a method for charging for directed provisioning and using of dynamic content to limited resource devices, through an integrated platform which handles all aspects of aggregation and management of such dynamic content. The integrated platform features a billing system for performing billing actions. The billing system of the present invention interacts with other components of the integrated platform in order to be able to determine the charge for particular triggering events, such as downloading dynamic content, and/or events which are actually triggered by the application itself. The charge is preferably determined according to one of a plurality of rules, as applied by a rules engine of the billing system. These rules are part of a charging policy, which may optionally be determined by the content provider.

  • Pub Date: 2007/27/11
  • Number: 08270951
  • Owner: Alcatel Lucent
  • Location: Paris, FR
  • Details: Visit USPTO

Visit USPTO Page


Real-time asynchronous event aggregation systems

A real-time asynchronous event aggregation system, method, and network device are configured to capture real-time asynchronous events, and to pass them as input to one or more aggregation engines to determine a reputation for a target. The aggregation engine(s) may then send out notifications where a reputation category changes for a target, indicating that an action may be taken to inhibit spam messages from the target, highlight a display of content from the target, or the like. As such, the event-driven aggregation engines may be designed to capture real-time asynchronous events, such as reputation reports for a wide variety of activities, including, but not limited to spam and/or not-spam messages, determining a reputation on a posting of comments to a movie, a blog posting, a play list posting, or the like. In one embodiment, a reputation of the sender of the reputation event may also be determined.

  • Pub Date: 2007/27/11
  • Number: 08849909
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Message preview control

Embodiments of the invention relate generally to computing devices and systems, as well as software, computer programs, applications, and user interfaces, and more particularly, to systems, devices and methods to facilitate message preview control. For example, the method may include generating representations for messages to present on an interface, and detecting selection of the representation for the message. Further, the method can include presenting preview information for the message, which can be an electronic facsimile. The representations for the messages can include a representation for an electronic facsimile, as well as a voice message and an email.

  • Pub Date: 2007/27/11
  • Number: 08134727
  • Owner: RingCentral, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Automatic accompaniment for vocal melodies

A method for generating an accompaniment for a recorded audio melody includes providing a recorded audio melody that includes segments; performing a frequency analysis of the recorded audio melody; summing the total duration of each fundamental frequency within a segment of the melody; based on the summing, computing a probability for each possible chord for each segment; based on the computed probabilities, selecting a set of chords for the segments; and outputting the set of chords as an accompaniment for the recorded audio melody. Various other methods, devices, systems, etc. are also disclosed.

  • Pub Date: 2007/27/11
  • Number: 2067097
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine device access

The present disclosure includes, among other things, systems, methods and program products for virtual machine device access. A first asynchronous request from a virtual machine executing on a device is identified, where the first asynchronous request is for accessing one or more of the device's information or services. The first asynchronous request is retrieved from the virtual machine. The first asynchronous request is scheduled to be provided as a second request to a service provider on the device, where the service provider is operable to handle the second request. The second request is provided to the service provider and a first response is received from the service provider to be provided to the virtual machine as a second response. First code is selected in the virtual machine from a plurality of code to receive the second response and providing the second response to the selected code.

  • Pub Date: 2007/26/11
  • Number: 08209685
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine communication

The present disclosure includes, among other things, systems, methods and program products for virtual machine communication. For example, one or more aspects of the subject matter described in this disclosure can be embodied in one or more methods that include constructing a first message on behalf of a first program executing in a first virtual machine. A second virtual machine is selected from one or more virtual machines. Security information for the first program is communicated to the second virtual machine. The first message is communicated from the first virtual machine to the second virtual machine, the first message to be processed by the second virtual machine with regard to the security information.

  • Pub Date: 2007/26/11
  • Number: 08505029
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Updating data on a remote device

Systems and methods, including computer software products, for updating data on a remote device involve defining multiple channels on a remote device, where each channel is associated with a predetermined type of content. Content updates for the channels are automatically delivered to the remote device, and an update frequency is identified for each channel. A most frequent update frequency among the multiple channels defined on the remote device is determined, and updates to the channels are requested according to the most frequent update frequency.

  • Pub Date: 2007/26/11
  • Number: 08868613
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Selecting data in a mobile information system

Systems and methods, including computer software products, can be implemented for selecting data on a mobile device on which multiple channels are defined. Each channel can be adapted to receive a predetermined type of content for access on the mobile device. Multiple languages may also be defined on the device, and multiple data sets for at least one of the channels are received, wherein each data set is configured for presentation in a different one of the languages. One of the data sets may be selected based on a current location.

  • Pub Date: 2007/26/11
  • Number: 08041372
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Remotely defining security data for authorization of local application activity

Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device. Permission indicators are associated with a sequence of instructions, and a protected activity is associated with one or more of the permission indicators and with an instruction within the sequence of instructions. The one or more permission indicators and the sequence of instructions are provided to a remote device. The remote device determines whether execution of the instruction is permitted based, at least in part, on the one or more permission indicators, and the remote device performs the protected activity if execution of the instruction is permitted.

  • Pub Date: 2007/26/11
  • Number: 08281390
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


RDF store database design for faster triplet access

RDF store database designs and efficient techniques for converting SPARQL queries to SQL queries are described that provide faster triplet access, and which can reduce the computational overhead and cost associated with storing large volumes of RDF metadata. In various embodiments RDF data can be stored in de-normalized tables tailored to provide efficient query and storage performance. The provided query conversion techniques provide reliable and efficient query performance.

  • Pub Date: 2007/26/11
  • Number: 07979455
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Providing remotely defined security data to a local application extension

Systems and methods, including computer software adapted to perform certain operations, can be implemented for providing remotely defined security data to an application extension on a client device. A sequence of instructions and at least one permission indicator associated with the sequence of instructions are received. A first permission indicator is associated with a code extension to a software application adapted to execute at least a portion of the sequence of instructions. The code extension is adapted to perform one or more operations that supplement the operations supported by the software application. An instruction within the sequence of instructions associated with adapted for execution by the code extension and with an activity is identified. The first permission indicator is provided to the code extension. The code extension determines whether performance of the activity is permitted based, at least in part, on the first permission indicator.

  • Pub Date: 2007/26/11
  • Number: 08677476
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Playback of content on portable devices

A computer-implemented method includes identifying encoded content to be presented. The method also includes loading the content into a content player. The content player is configured to dynamically identify a local decoder that is operable to decode the content. The method further includes providing the identified content to the local decoder during playback of the content; and presenting the decoded content.

  • Pub Date: 2007/26/11
  • Number: 2089858
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple network connections

The invention provides a method, an apparatus, and a computer program for supporting multiple connections to a network or a plurality of networks. Support for multiple connections is enabled by establishing a connection of a first type to a network, receiving a request for a connection of the first type, registering a virtual connection as a response to receiving said request, receiving a request for establishing a connection of a second type through the virtual connection, associating the virtual connection with the connection of the first type, and establishing the connection of the second type through the connection of the first type.

  • Pub Date: 2007/26/11
  • Number: 08422466
  • Owner: Nokia Corporation
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Model augmentation in a model-driven application development environment

Augmenting a model in a model-driven application development architecture, including defining a task to be performed on at least one model item of a principal model, where the principal model is configured to facilitate the automatic generation of at least one resource for use by a computer-executable application, identifying at least one model item required for use the task that is absent from the principal model, defining the absent model item in a decoration model, mapping the decoration model to the principal model, and storing both of the models on a computer-readable medium.

  • Pub Date: 2007/26/11
  • Number: 08671121
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Memory allocation in a mobile device

Systems and methods, including computer software stored on a machine-readable medium for performing operations, can be implemented for allocating memory. Multiple channels are defined on a mobile device. Each channel can be adapted to receive a predetermined type of content for access on the mobile device. An amount of memory allocated to each channel for storing data is defined. Data identifying a new amount of memory allocated to one of the channels is received, and the amount of memory allocated to the channel is adjusted based on the data identifying the new amount of memory.

  • Pub Date: 2007/26/11
  • Number: 08214619
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Decorated model architecture for efficient model-driven application development

A method for implementing a model-driven architecture, including defining a principal model having a plurality of classes, references, attributes, and associations between any of the classes, the model configured to facilitate the automatic generation of at least one resource for use by a computer-executable application, where a change to the principal model subsequent to performing the automatic generation requires the automatic generation be performed again in order to effect the change for use by the application, defining a decoration model having a class, reference, and attribute for any corresponding one of the primary model classes, references, and attributes, where a change to the decoration model subsequent to performing the automatic generation does not require the automatic generation be performed again in order to effect the change for use by the application, mapping the decoration model to the principal model, and storing both of the models on a computer-readable medium.

  • Pub Date: 2007/26/11
  • Number: 08095570
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Converting SPARQL queries to SQL queries

RDF store database designs and efficient techniques for converting SPARQL queries to SQL queries are described that provide faster triplet access, and which can reduce the computational overhead and cost associated with storing large volumes of RDF metadata. In various embodiments RDF data can be stored in de-normalized tables tailored to provide efficient query and storage performance. The provided query conversion techniques provide reliable and efficient query performance.

  • Pub Date: 2007/26/11
  • Number: 07818352
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Authorizing local application activity using remotely defined security data

Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted.

  • Pub Date: 2007/26/11
  • Number: 08413233
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical events

Systems and methods for the organization of hierarchical events are disclosed. A parent event in a first calendar application workspace classifies a hierarchy of events. A child event child event corresponds to a hierarchy of events. Identification of the parent event and a new child event results in the display of the new child event in a second calendar application workspace, the new child event being a scheduled event in the hierarchy of events that does not indicate a calendaring conflict with the parent event. A collaborative organization environment for discussion concerning the new child event may be provided.

  • Pub Date: 2007/23/11
  • Number: 08578301
  • Owner: Skadool, Inc.
  • Location: Los Gatos, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual machine location system, virtual machine location method, program, virtual machine manager, and server

A virtual machine location system includes a resource conflict detection unit for detecting a resource conflict using measurement data regarding a resource usage state of the entirety of a single server and a resource usage state of virtual machines running on the server, and a virtual machine relocation determination unit for transferring the virtual machine on the server for which a resource conflict has been detected to another server having a lower resource usage rate are included.

  • Pub Date: 2007/22/11
  • Number: 08346933
  • Owner: NEC Corporation
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Split user-mode/kernel-mode device driver architecture

A device driver includes a kernel stub and a user-mode module. The device driver may access device registers while operating in user-mode to promote system stability while providing a low-latency software response from the system upon interrupts. Upon receipt of an interrupt, the kernel stub may run an interrupt service routine and write information to shared memory. Control is passed to the user-mode module by a reflector. The user-mode module may then read the information from the shared memory to continue servicing the interrupt.

  • Pub Date: 2007/22/11
  • Number: 08185783
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing an instrumentation service using dye injection and filtering in a SIP application server environment

An instrumentation service is described that uses dye injection and filtering in a Session Initiation Protocol (SIP) application server environment. The instrumentation service can provide a flexible mechanism for selectively adding diagnostic code to the SIP application server and the various applications running on it. It can allow flexible selection of locations in the server and application code, at which instrumentation code can be added. The process of adding diagnostic code can be deferred to the time of running the server at the deployment site. The instrumentation service further allows flexible selection of diagnostic actions, which can be executed at selected locations. In various embodiments, the execution of diagnostic code can be dynamically enabled or disabled while the server is running. Also, the behavior of diagnostic code executed at such locations can be dynamically changed while the server is running.

  • Pub Date: 2007/21/11
  • Number: 07895475
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


System and computer program product for creating a telecommunications application

Techniques for using a proxy model to encapsulate one or more telecommunications (telecom) functionalities are provided. The techniques include generating a proxy model, wherein the proxy model comprises at least one of a representation module, an implementation module, a metadata module, one or more utility snippet modules, one or more unit test code modules and a module linking to one or more blogs, and using the proxy model to encapsulate one or more telecom functionalities. Techniques are also provided for creating a telecom service using the proxy model.

  • Pub Date: 2007/21/11
  • Number: 09158510
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Synthesis of water soluble non-toxic nanocrystalline quantum dots and uses thereof

An economic, direct synthetic method for producing water soluble ZnS QDs that are ready for bioconjugation is provided. The method can produce aqueous ZnS QDs with emission wavelengths varying from 400 nm to 700 nm. Highly luminescent metal sulfide (MS) QDs are produced via an aqueous synthesis route. MS QDs are capped with thiol-containing charged molecules in a single step. The resultant MS QDs exhibit the distinctive excitonic photoluminescence desired of QDs and can be fabricated to avoid undesirable broadband emissions at higher wavelengths. The aqueous ZnS QDs are stable in biological fluids over a long period of time. In addition, non-toxic ZnS QDs have been produced with good photoluminescence properties.

  • Pub Date: 2007/21/11
  • Number: 08491818
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless network camera systems

Apparatus, systems and techniques associated with battery powered wireless camera systems. One aspect of the subject matter described in this specification can be embodied in a system that includes a battery powered wireless camera including an internal battery to provide energy and a burst transmission unit to transmit information during burst periods. The system includes a base station, separated from the battery powered wireless camera, in wireless communication with the battery powered wireless camera to receive information from the battery powered wireless camera. The base station is configured to process the received information and includes a web server to transmit the processed information to a client. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products.

  • Pub Date: 2007/20/11
  • Number: 08050206
  • Owner: Micropower Technologies, Inc.
  • Location: Rancho Sante Fe, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods of efficient library characterization for integrated circuit cell libraries

A method of efficient library characterization of a circuit of a logic gate having a plurality of transistors and a plurality of nodes defining interconnection points in the circuit is disclosed. The method includes determining a plurality of vectors for a plurality of arcs. Each of the plurality of vectors represents possible data bits to inputs and nodes of the logic gate. The method selects a plurality of substantially distinct vectors from the plurality of vectors for each of the plurality of arcs, and performs circuit pruning for each of the plurality of substantially distinct vectors, taking each one substantially distinct vector at a time. The circuit pruning includes identifying an active circuit for each vector. The active circuit is identified by determining which circuit features are activated when applying a particular one of the substantially distinct vectors. Then, the circuit simulations limited to a plurality of transistors in the active circuit are performed. The circuit pruning and circuit simulations are repeated for remaining ones of the plurality of substantially distinct vectors. The results of the circuit simulations are then stored on a non-volatile compute readable media, for each active circuit corresponding to each of the plurality of substantially distinct vectors.

  • Pub Date: 2007/20/11
  • Number: 07937256
  • Owner: Altos Design Automation, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Model-based design verification

An analog design-rule-check tool analyzes a microdevice design, such as an integrated circuit design, to identify occurrences of geometric elements that share a specified relationship. When the tool identifies such an occurrence of these geometric elements, it will associate or “cluster” these geometric elements together into an identifiable unit. For specified “clusters” of geometric elements, the analog design-rule-check tool will then determine the value of a measurement or measurements required by a user. Once the analog design-rule-check tool has determined the necessary measurement values, it will use those values to evaluate the function describing a model.

  • Pub Date: 2007/20/11
  • Number: 08612919
  • Owner: Mentor Graphics Corporation
  • Location: Wilsonville, US
  • Details: Visit USPTO

Visit USPTO Page


Locally providing globally consistent information to communications layers

Globally consistent information is locally provided to communications layers. Globally consistent information is stored in a Network Availability Matrix, which is locally accessible by a communications layer. If an event is detected, the communications layer is automatically notified by the Network Availability Matrix, and is able to use the information in the Network Availability Matrix to quickly take action.

  • Pub Date: 2007/20/11
  • Number: 07996851
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical grouping columns

A system and process that automatically responds to changes in displayed table data to determine and reestablish a hierarchy for the table. A column hierarchy order component checks each column of a table to determine the number of groupings of entries and reorders the columns based on the number of groupings. A column order at the time a table is loaded is saved and can be used to restore that original order.

  • Pub Date: 2007/20/11
  • Number: 09558169
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Hierarchical grouping columns

A system and process that automatically responds to changes in displayed table data to determine and reestablish a hierarchy for the table. A column hierarchy order component checks each column of a table to determine the number of groupings of entries and reorders the columns based on the number of groupings. A column order at the time a table is loaded is saved and can be used to restore that original order.

  • Pub Date: 2007/20/11
  • Number: 09558169
  • Owner: SAP SE
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Generic table grouper

A system and process that groups identical values that are adjacent to one another within a column of a table. The system provides this functionality through an application and backend implementation independent module. Custom grouping information for a table or columns within a table can be stored for retrieval each time a table is open or displayed. A user can manage the customizations through a centralized portal.

  • Pub Date: 2007/20/11
  • Number: 08204880
  • Owner: SAP Aktiengeselleschaft
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Fixed-income system for managing pre-trade activity

Methods and apparatus, including computer program products, for managing pre-trade activity. In general, a distribution of information about what traders and customers want to do may be known. Users may be made aware of trade ideas that can be proposed to a trading desk's buy-side clients. Relevant information on the trading desk may be brought together, and the information may be processed through a set of rules that extract trading opportunities. On the buy side, trade ideas may be extracted without having to have the intervention of a sell-side salesforce.

  • Pub Date: 2007/20/11
  • Number: 08027907
  • Owner: Codestreet LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Creating multiple MBeans from a factory MBean

Provided is a method for creating a unique class of Mbean in which a “parent” Mbean generates and manages multiple “child” Mbeans. When a user requests the functionality of a particular Mbean, a specific type of Mbean, or parent Mbean, is called. The parent Mbean is a factory method that, rather than executing the request, generates a child Mbean to execute the request. The child Mbean is assigned a name that distinguishes the child from other children of the same parent and the process that called the parent is provided with the name. In this manner, the calling process may use the assigned name to access the specific child Mbean for future requests and the child Mbean is employed to store client state information.

  • Pub Date: 2007/20/11
  • Number: 07958145
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Cooperatively multitasking in an interrupt free computing environment

Multitasking in a hardware interrupt free environment. Event indicators are employed to multitask between processes of the environment. Processes to be multitasked register with one another, and then during processing, one of the processes toggles an event indicator to allow another process to execute. The toggling allows the processes to share resources in an interrupt free environment.

  • Pub Date: 2007/20/11
  • Number: 08056078
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Constrained line search optimization for discriminative training of HMMS

An exemplary method for optimizing a continuous density hidden Markov model (CDHMM) includes imposing a constraint for discriminative training, approximating an objective function as a smooth function of CDHMM parameters and performing a constrained line search on the smoothed function to optimize values of the CDHMM parameters. Various other methods, devices and systems are disclosed.

  • Pub Date: 2007/20/11
  • Number: 08239332
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner

Multiple applications request data from multiple storage units over a computer network. The data is divided into segments and each segment is distributed randomly on one of several storage units, independent of the storage units on which other segments of the media data are stored. At least one additional copy of each segment also is distributed randomly over the storage units, such that each segment is stored on at least two storage units. This random distribution of multiple copies of segments of data improves both scalability and reliability. When an application requests a selected segment of data, the request is processed by the storage unit with the shortest queue of requests. Random fluctuations in the load applied by multiple applications on multiple storage units are balanced nearly equally over all of the storage units. This combination of techniques results in a system which can transfer multiple, independent high-bandwidth streams of data in a scalable manner in both directions between multiple applications and multiple storage units.

  • Pub Date: 2007/20/11
  • Number: 07660947
  • Owner: Avid Technology, Inc.
  • Location: Tewksbury, US
  • Details: Visit USPTO

Visit USPTO Page


Virtual data maintenance

A computer-implemented apparatus, method, and article of manufacture manage a plurality of database systems and perform data maintenance tasks in a data warehouse system. A domain includes a plurality of database systems. A virtual regulator manages the domain, detects a request to invoke a data maintenance task on a first system in the domain, routes the data maintenance task, for execution, to a second system in the domain, and applies results from the data maintenance task (executed by the second system) to the first system.

  • Pub Date: 2007/19/11
  • Number: 08392461
  • Owner: Teradota US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Universal gates for ising TQFT via time-tilted interferometry

Experiments suggest that the mathematically weakest non-abelian TQFT may be physically the most robust. Such TQFT's—the v=5/2 FQHE state in particular—have discrete braid group representations, so one cannot build a universal quantum computer from these alone. Time tilted interferometry provides an extension of the computational power (to universal) within the context of topological protection. A known set of universal gates has been realized by topologically protected methods using “time-tilted interferometry” as an adjunct to the more familiar method of braiding quasi-particles. The method is “time-tilted interferometry by quasi-particles.” The system is its use to construct the gates {g1, g2, g3}.

  • Pub Date: 2007/19/11
  • Number: 1978361
  • Owner: Mircosoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System, method, and computer-readable medium for schedule-based telecommunication policies

A system, method and computer-readable medium for enforcing user telecommunication privileges on a per-schedule basis are provided. Enterprise members may have a schedule associated therewith that defines scheduled locations of the users. Telecommunication service privileges may be coordinated with the users' schedules such that communication services are disabled at particular times based on the users' schedules. In other implementations, particular users may have telecommunication services disabled by an administrator in the event of a catastrophe or emergency. By this mechanism, users that are not proximate to a particular catastrophe or emergency area according to the users' schedule may have services disabled while other users that are located more proximate to the emergency may have their telecommunication services enabled. In this manner, the demand on a cellular network may be alleviated thereby increasing the likelihood that users directly impacted by the emergency may receive and place calls or access data services.

  • Pub Date: 2007/19/11
  • Number: 08983506
  • Owner: Tango Networks, Inc.
  • Location: Richardson, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for secure configuration of network attached devices

A system and method for supplying, to a provider of the device, requirements for information to be stored on a device, obtaining device data for provisioning the device on a network, storing device configuration information on storage associated with the network, receiving a service request from a user of the device, detecting attachment of the device to the network, authenticating the device utilizing a device identifier and shared credentials to enable the device to be configured without storing a network address for configuration in the device, providing network information to the device, and providing configuration information to the device.

  • Pub Date: 2007/19/11
  • Number: 09178857
  • Owner: VERIZON PATENT AND LICENSING INC.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Network fault isolation

A computer implemented method, apparatus, and computer usable program code for network fault isolation. A plurality of real-time path traces is performed between the sender and the receiver to form a plurality of trace paths in response to receiving a request for the network fault isolation between a sender and a receiver. A determination is made as to whether an asymmetry is present between the sender and the receiver from the plurality of trace paths. A set of routers is identified with each trace path in the plurality of trace paths to form a plurality of identified routers. Each event stored is identified for the plurality of identified routers to form a set of identified events.

  • Pub Date: 2007/19/11
  • Number: 08195977
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Multimodal access of meeting recordings

A meeting recorder captures multimodal information of a meeting. Subsequent analysis of the information produces scores indicative of visually and aurally significant events that can help identify significant segments of the meeting recording. Textual analysis can enhance searching for significant meeting segments and otherwise enhance the presentation of the meeting segments.

  • Pub Date: 2007/19/11
  • Number: 2034980
  • Owner: Ricoh Company, Ltd.
  • Location: , JP
  • Details: Visit USPTO

Visit USPTO Page


Method and system for managing tables that are used by network processors to control traffic through a network

A method for managing tables that are used by network processors to control network traffic through a network. The method comprises including a first table management software application in a first network processor, in which the first table management software is dedicated to managing only tables associated with the first network processor; including a second table management software application in a second network processor, in which the second table management software application is dedicated to managing only tables associated with the second network processor; and including a table management control application in a host processor, in which the table management control application is configured to respectively manage the tables associated with the first network processor and the tables associated with the second network processor through the first table management software application and the second table management software application through a plurality of generic application programming interfaces (APIs).

  • Pub Date: 2007/19/11
  • Number: 07865912
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for developing and applying market data scenarios

A method and system for developing and applying market data scenarios in which market data is received from a market data distribution platform, stored, changed with respect to a specific asset included in the market data and the altered market data transmitted to a client application that processes the altered market data as if it were transmitted directly from the platform. The system may include a recording module for receiving a stream of market data from the platform, an interface module for specifying changes to the replayed stream to form a stream of altered market data and a client application interface for transmitting a stream of altered market data to a client application. The stream of altered market data mimics the market data stream such that the stream of altered market data can be processed as if it were market data from the market data distribution platform.

  • Pub Date: 2007/19/11
  • Number: 08175941
  • Owner: Codestreet, LLC
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic query and step routing between systems tuned for different objectives

A virtual regulator monitors and manages a plurality of database systems in a domain. Each of the database systems is tuned for a particular type of workload, and the virtual regulator or multiple virtual regulators running in parallel routes a set of one or more queries to a particular database system within the domain based on a cost function for each database system.

  • Pub Date: 2007/19/11
  • Number: 08392404
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Dynamic control and regulation of critical database resources using a virtual memory table interface

A computer-implemented apparatus, method, and article of manufacture provide the ability to manage a plurality of database systems. A domain contains the database systems, and a database in one of the systems has segmented global memory partitions. A virtual monitor partition provides logon access to the segmented global memory partitions in a form of a virtual database. Open application programming interfaces (API) enable logon access to the virtual monitor partition to access data in the virtual database. A multi-system regulator manages the domain and utilizes the open APIs to access data in the virtual data base.

  • Pub Date: 2007/19/11
  • Number: 08082273
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Data referencing system

This application describes a method of referencing content in an application. The method comprises, for a content element, creating a reference to the content element and associating that reference with the content element. This enables the content element (for example, text or images) to be dissociated from other features related to content; for example, its presentation on the screen. In this way, control over presentation may be achieved separately from control of the content itself. In an example, a Content Provider provides referenced content to an Operator. A Program Provider sends referenced scenarios to the Operator. The Operator resolves the reference and sends data for broadcast by the Broadcaster.

  • Pub Date: 2007/19/11
  • Number: 08347338
  • Owner: Thomson Licensing S.A.
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Closed-loop system management method and process capable of managing workloads in a multi-system database environment

A computer-implemented apparatus, method, and article of manufacture provide the ability to manage a plurality of database systems. A domain contains a plurality of database systems. A system event monitor, on each of the database systems, monitors the database systems' system conditions and operating environment events within the domain. A multi-system regulator manages the domain, communicates with the system event monitor, and creates a dynamic event on one of the database systems based on the system conditions and operating environment events. The dynamic event causes an adjustment to a state of the database system.

  • Pub Date: 2007/19/11
  • Number: 08082234
  • Owner: Teradata US, Inc.
  • Location: Dayton, US
  • Details: Visit USPTO

Visit USPTO Page


Automated provisioning system

A computer system comprising a number of components which make up an infrastructure with the system having a Directory and an APS which is adapted to centralize and automate information management for online service systems.

  • Pub Date: 2007/19/11
  • Number: 07962596
  • Owner: Jacobs Rimell Limited
  • Location: London, GB
  • Details: Visit USPTO

Visit USPTO Page


Active signal processing personal health signal receivers

The invention provides a receiver associated with a body, e.g., located inside or within close proximity to a body, configured to receive and decode a signal from an in vivo transmitter which located inside the body. Signal receivers of the invention provide for accurate signal decoding of a low-level signal, even in the presence of significant noise, using a small-scale chip, e.g., where the chip consumes very low power. Also provided are systems that include the receivers, as well as methods of using the same.

  • Pub Date: 2007/19/11
  • Number: 08718193
  • Owner: Proteus Digital Health, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and methods of linking to an application on a wireless device

The described apparatus and methods define a predetermined scheme or syntax for an application-specific Universal Resource Identifier (URI) operable to deep link to a specified point, portion, or view of a target client application executable on a wireless device. Accordingly, the described application-specific URI can be used to deep link from one point to another in the same client application, or to deep link from one client application to another client application.

  • Pub Date: 2007/18/11
  • Number: 08209615
  • Owner: Qualcomm Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Phenylsulfoxyoxazole compound inhibitors of urea transporters

Provided herein are small molecule compounds that alter the transport activity of solute transporters, particularly urea transporters. The compounds described herein belong to the phenylsulfoxyoxazole, phenylsulfoxyimidazole, phenylsulfoxythiazole class of compounds. The compounds described herein are useful for increasing solute clearance in states of fluid overload and for treating cardiovascular, renal, and metabolic diseases, disorders, and conditions. Methods for identifying and using these agents that inhibit urea transporters are described herein.

  • Pub Date: 2007/16/11
  • Number: 08394788
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for identifying inhibitors of solute transporters

Provided herein are methods for identifying and characterizing agents that alter the volume of a cell. Methods are provided for rapid screening and identification of an agent that alters the capability of a small, neutrally charged solute transporter to transport the solute across a cell membrane. The methods described herein may be used to identify and characterize inhibitors of urea transporters, to identify and characterize inhibitors of aquaporins, and to identify and characterize inhibitors of other small, neutrally charged solutes such as glucose.

  • Pub Date: 2007/16/11
  • Number: 09316633
  • Owner: The Regents of the University of California
  • Location: Oakland, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method of using lighting systems to enhance brand recognition

The present solution described herein provides systems and methods to coordinate and control the lighting of areas of a display unit in manner desired based on the type, brand and other characteristics of the product presented for display via the display unit. A lighting control system may control the characteristics of light emanating from one or more light sources to cause a reaction or visual effect from light reactive material of the product or display unit. In some cases, the lighting control system may control the characteristics of light emanating from one or more light sources based on signals from detectors, such as sensing any state or condition of the ambient environment.

  • Pub Date: 2007/16/11
  • Number: 07729941
  • Owner: Integrated Illumination Systems, Inc.
  • Location: Morris, US
  • Details: Visit USPTO

Visit USPTO Page


System, and computer program product for on demand enablement of dormant computing resources

A system and program product for enabling dormant computer hardware resources in a computer system having a set of dormant computer hardware resources. The method includes accepting a customer request to enable a set of dormant hardware resources, and providing computer readable instructions to a customer accessible console in communication with the computer system. The instructions are installable by the customer, and are capable of enabling dormant computer hardware resources upon installation. An order process establishes prerequisites, facilitates customer order placement, and provides rapid order fulfillment. Prerequisites include contract terms, information describing the computer system configuration, access to provider systems, and customer system setup. Ordering is facilitated through information management, configuration rules, and an interactive interface, presenting valid configuration options to the customer. Fulfillment is facilitated through parallel processing, providing computer readable upgrade instructions nearly concurrently with provider's internal order approval. An alternative embodiment provides upgrade instructions before provider's internal order approval.

  • Pub Date: 2007/15/11
  • Number: 08056074
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Sensitive information handling on a collaboration system

On a document collaboration system, such as a wiki, the content of postings to the collaboration system is monitored for sensitive information. Under some embodiments, when instances of such sensitive information are detected, an e-mail is sent to the user that posted the collaboration page posting. In other embodiments, a message is then sent to a person associated with the entity that indicates that the information placed on the collaboration page is confidential information or is related to an asset of the entity. In further embodiments, individual people are assigned responsibility for monitoring the use of certain instances of sensitive information on the collaboration system. Each user is only notified when the instances they are responsible for appear on a collaboration page. In other embodiments, if a collaboration page includes an instance of sensitive information, access to the collaboration page is changed such that fewer people can access the collaboration page.

  • Pub Date: 2007/15/11
  • Number: 08151200
  • Owner: Target Brands, Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Haptic feedback for touchpads and other touch controls

A haptic feedback planar touch control used to provide input to a computer. A touch input device includes a planar touch surface that inputs a position signal to a processor of the computer based on a location of user contact on the touch surface. The computer can position a cursor in a displayed graphical environment based at least in part on the position signal, or perform a different function. At least one actuator is also coupled to the touch input device and outputs a force to provide a haptic sensation to the user contacting the touch surface. The touch input device can be a touchpad separate from the computer's display screen, or can be a touch screen. Output haptic sensations on the touch input device can include pulses, vibrations, and spatial textures. The touch input device can include multiple different regions to control different computer functions.

  • Pub Date: 2007/15/11
  • Number: 08063893
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Haptic feedback for touchpads and other touch control

A haptic feedback planar touch control used to provide input to a computer. A touch input device includes a planar touch surface that inputs a position signal to a processor of the computer based on a location of user contact on the touch surface. The computer can position a cursor in a displayed graphical environment based at least in part on the position signal, or perform a different function. At least one actuator is also coupled to the touch input device and outputs a force to provide a haptic sensation to the user contacting the touch surface. The touch input device can be a touchpad separate from the computer's display screen, or can be a touch screen. Output haptic sensations on the touch input device can include pulses, vibrations, and spatial textures. The touch input device can include multiple different regions to control different computer functions.

  • Pub Date: 2007/15/11
  • Number: 08049734
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Client apparatus for updating data

A client apparatus receives first data from a server and later receives second data from the same server in response to a refresh invocation. The client apparatus parses the received data to generate logical structures representing the data and then compares the logical structures using a tree walking algorithm. Where a difference is found between the first data and second data, the first data is updated using the second data and rendered at the client apparatus.

  • Pub Date: 2007/15/11
  • Number: 08312077
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for transferring advertising content to a mobile telephone

A mobile telephone obtains (or is supplied) advertising content from a remote server and locally stores that advertising content. The advertising content is then automatically shown in association with a running, in use (e.g. in foreground) application that generates a screen that an end-user interacts with (‘an end-user application’). The content is shown ‘automatically’ in the sense that the advertising content is displayed without the end-user explicitly requesting any specific item of content, (although he may opt-in to the general approach of having advertising content displayed on his mobile telephone). The telephone itself determines which adverts etc. it should display, depending on which application is currently being used (i.e. is currently displayed on screen).

  • Pub Date: 2007/15/11
  • Number: 09094511
  • Owner: CRITICAL PATH DATA CENTRE LIMITED
  • Location: Cheshire, GB
  • Details: Visit USPTO

Visit USPTO Page


Apparatus for determining availability of a user of an instant messaging application

An instant messaging application intelligently infers a user's unavailability from one or more indicia which include the user's electronic calendar. Preferably, the instant messaging application may report not only that a user is unavailable, but also give a reason for inferring unavailability, in order to provide other users with additional potentially useful information. Preferably, the user may specify which indicia and which parameters may be used to infer his unavailability in an editable profile. When another user requests status, this value is returned by the server. An intelligent instant messaging application as described herein provides other users with more accurate and complete availability information.

  • Pub Date: 2007/15/11
  • Number: 2024526
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for facilitating a ready social network

The invention provides system and method wherein the system collects user activity data including call log information from network equipment, handset and other context specific user activity data including time of call and location information to enable various applications to use the information collected and build social network. In accordance with the method of the invention, the user activity data collected is used to form individual social networks. The networks are formed based on clusters identified by mining the data collected. Furthermore, various applications are provided access to the clustered data to assist in individual social networking. The system of the invention comprises of an application server comprising a centralized data center providing social networking services through a plurality of networks, the networks in-turn connecting a plurality of users through their individual network terminal stations to the application server.

  • Pub Date: 2007/14/11
  • Number: 08005909
  • Owner: Onmobile Global Limited
  • Location: Bangalore, IN
  • Details: Visit USPTO

Visit USPTO Page


Stabilized glycosaminoglycan preparations and related methods

Compositions comprising a glycosaminoglycan (e.g., a hyaluronan, hyaluronic acid, hyaluronate, sodium hyaluronate, dermatan sulfate, karatan sulfate, chondroitin 6-sulfate, heparin, etc.) in combination with at least one component selected from; i) polyglycols (e.g., polyethylene glycol), ii) long chain hydroxy polyanionic polysaccharides (e.g., dextran, sodium alginate, alginic acid, propylene glycol alginate, carboxymethyl cellulose and carboxyethyl cellulose, hydroxyl ethyl starch, hydroxyl propyl methyl cellulose, hydroxy propyl ethyl cellulose, hydroxy propyl cellulose, methyl cellulose, polylysine, polyhistidine, polyhydroxy proline, poly ornithine, polyvinyl pyrolidone, polyvinyl alcohol, chitosan, etc.) and iii) long chain Nitrogen containing polymers (e.g., Polylysine, Polyvinylpyrrolidone, and polyvinyl alcohol). The invention also includes methods for using such compositions (e.g., as substance delivery materials, tissue fillers or bulking agents, as moistening or hydrating agents, etc.).

  • Pub Date: 2007/14/11
  • Number: 08288362
  • Owner: S.K. Pharmaceuticals, Inc.
  • Location: San Juan Capistrano, US
  • Details: Visit USPTO

Visit USPTO Page


Spectrum and medium access allocation for fairness

Each node or link of an ad hoc network assists in the distributed allocation of a data channel to increase fairness, even in a multi-hop network, by tracking a measure of link weight for itself and sharing this information over a control channel with neighboring nodes. The metric can be provided over a dedicated control channel, added as a header to data communication on a data channel, or inferred by monitoring data traffic from the neighboring node. The link weight can be adjusted by a link quality factor based on provided or inferred metrics such as transmission rates, ratio of transmission errors, idle time, etc. For multiple flow queues at a subject node, one with a higher transmission rate can be selected for increased fairness. When a packet is received, medium access includes allocating bandwidth, including bonding multiple frequencies that are determined to be available to both nodes.

  • Pub Date: 2007/14/11
  • Number: 07778170
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Performing actions for users based on spoken information

Techniques are described for performing actions for users based at least in part on spoken information, such as spoken voice-based information received from the users during telephone calls. The described techniques include categorizing spoken information obtained from a user in one or more ways, and performing actions on behalf of the user related to the categorized information. For example, in some situations, spoken information obtained from a user is analyzed to identify one or more spoken information items (e.g., words, phrases, sentences, etc.) supplied by the user, and to generate corresponding textual representations (e.g., via automated speech-to-text techniques). One or more actions may then be taken regarding the identified information items, including to categorize the items by adding textual representations of the spoken information items to one or more of multiple predefined lists or other collections of information that are specific to or otherwise available to the user.

  • Pub Date: 2007/14/11
  • Number: 08254535
  • Owner: Nuance Communications, Inc.
  • Location: Burlington, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for function-specific time-configurable replication of data

The system and method of the invention provides for function-specific replication of digital data, such as files or objects, with a configurable time delay for each function to be replicated. The system includes a source storage system from which digital data is to be replicated, a destination storage system(s) to which the digital data is being replicated, a replication management module for managing the function specific replication delay and the data replication between the source storage systems and the destination storage system(s).

  • Pub Date: 2007/14/11
  • Number: 07921268
  • Details: Visit USPTO

Visit USPTO Page


Uniform modular framework for a host computer system

A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.

  • Pub Date: 2007/13/11
  • Number: 07921298
  • Owner: Activcard Ireland, Limited
  • Location: Dublin, IE
  • Details: Visit USPTO

Visit USPTO Page


Service subscription associated with real time composition of services

Real-time service composition is provided by a Session Initiation Protocol (SIP) transport binding for Simple Object Access Protocol (SOAP) messages. A SOAPAction header and SOAP envelope can be included in a SIP message to identify a requested service. The SIP message recipient can parse out the SOAP envelope and forward same to a corresponding Web Service. An intermediary node, including a SIP Proxy, can evaluate incoming SIP/SOAP messages and provide requested services to which they have access. Service discovery and subscription are facilitated by adding Universal Description, Discovery and Integration (UDDI) services requests and responses.

  • Pub Date: 2007/13/11
  • Number: 09112902
  • Owner: Optis Wireless Technology, LLC
  • Location: Plano, US
  • Details: Visit USPTO

Visit USPTO Page


Ranker selection for statistical natural language processing

Systems and methods for selecting a ranker for statistical natural language processing are provided. One disclosed system includes a computer program configured to be executed on a computing device, the computer program comprising a data store including reference performance data for a plurality of candidate rankers, the reference performance data being calculated based on a processing of test data by each of the plurality of candidate rankers. The system may further include a ranker selector configured to receive a statistical natural language processing task and a performance target, and determine a selected ranker from the plurality of candidate rankers based on the statistical natural language processing task, the performance target, and the reference performance data.

  • Pub Date: 2007/13/11
  • Number: 07844555
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Negotiating reinsurance for a risk

System, methods, and computer program products for facilitating negotiations for reinsurance of a risk. The negotiations for reinsurance of a risk are conducted between a cedent and one to many assumers. An interface is provided for allowing submissions of risk for reinsurance, responses from selected assumers, and replies to the responses as necessary to continue or conclude the negotiation. The interface also allows users to view information exchanged during various stages of the negotiation. Additional functionality including categorizing risk, categorizing reinsurance, required distribution, distribution preferences, and endorsement agreements are also provided.

  • Pub Date: 2007/13/11
  • Number: 2026178
  • Owner: Ereinsure.Com, Inc.
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Interprocessor direct cache writes

In a multiprocessor system level 2 caches are positioned on the memory side of a routing crossbar rather than on the processor side of the routing crossbar. This configuration permits the processors to store messages directly into each other's caches rather than into system memory or their own coherent caches. Therefore, inter-processor communication latency is reduced.

  • Pub Date: 2007/13/11
  • Number: 08327071
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Cardiac pacing using the inferior nodal extension

A device and method for providing stimulation to an inferior nodal extension of a heart. The method includes providing a lead comprising an electrode, positioning the electrode proximate an inferior nodal extension of a heart, and effecting at least one of activation, deactivation, or modulation of the electrode to provide stimulation to the inferior nodal extension.

  • Pub Date: 2007/13/11
  • Number: 08391995
  • Owner: The Washington University
  • Location: St. Louis, US
  • Details: Visit USPTO

Visit USPTO Page


Application security model

Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.

  • Pub Date: 2007/13/11
  • Number: 08011008
  • Owner: Microsoft Corporation
  • Location: Remond, US
  • Details: Visit USPTO

Visit USPTO Page


Apparatus and method of detecting errors in embedded software

A method and apparatus for detecting errors in an application software of an embedded system are provided. The method of detecting errors in an application software includes determining a development language of the application software and an operating system on which the application software is executed; replacing an error detection syntax inserted in order to examine an error in a predetermined function of the application software, with an error detection syntax according to the result of the determination; and performing exception handling for an error occurring in the function according to the result of the replacement, and logging error information according to the exception handling. According to the method and apparatus, an error can be automatically detected and logged irrespective of a development language and an operating system.

  • Pub Date: 2007/13/11
  • Number: 08589889
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-Si, KR
  • Details: Visit USPTO

Visit USPTO Page


Methods and compositions to treat myocardial conditions

Methods, devices, kits and compositions to treat a myocardial infarction. In one embodiment, the method includes the prevention of remodeling of the infarct zone of the ventricle using a combination of therapies. The method may include the introduction of structurally reinforcing agents. In other embodiments, agents may be introduced into a ventricle to increase compliance of the ventricle. The prevention of remodeling may include the prevention of thinning of the ventricular infarct zone. Another embodiment includes the reversing or prevention of ventricular remodeling with electro-stimulatory therapy. The unloading of the stressed myocardium over time effects reversal of undesirable ventricular remodeling. These therapies may be combined with structurally reinforcing therapies. In other embodiments, the structurally reinforcing component may be accompanied by other therapeutic agents. These agents may include but are not limited to pro-fibroblastic and angiogenic agents.

  • Pub Date: 2007/12/11
  • Number: 08795652
  • Owner: Abbott Cardiovascular Systems Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Memory system and related method using software-defined radio with write-protected, non-volatile memory

A software-defined radio includes a radio circuit and an executable radio software system operable with the radio circuit and conforming to the software communications architecture (SCA) specification and defining an operating environment that allows a waveform application to operate with the radio circuit for transmitting and receiving voice and data. A write-protected non-volatile memory is operable with the radio circuit and executable radio software system. The non-volatile memory has a write enable controlled by a non-driver program for deferring a wear leveling correction sequence.

  • Pub Date: 2007/12/11
  • Number: 08074145
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for providing controllable texture sampling

Systems and methods are provided for controlling texture sampling in connection with computer graphics in a computer system. In various embodiments, improved mechanisms for controlling texture sampling are provided that enable 3-D accelerator hardware to greatly increase the level of realism in rendering, including improved mechanisms for (1) motion blur; (2) generating anisotropic surface reflections (3) generating surface self-shadowing (4) ray-cast volumetric sampling (4) self-shadowed volumetric rendering and (5) self-shadowed volumetric ray-casting. In supplementing existing texture sampling techniques, parameters for texture sampling may be replaced and/or modified.

  • Pub Date: 2007/09/11
  • Number: 07719544
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for rapidly locating historical performance data

A method is described for providing performance metrics stored in an array of at least three-dimensions. The method includes receiving at least one metric criteria associated with a performance metric. The method also includes determining a list of array elements. The list represents a portion of the array including the at least one metric criteria. The method further includes sorting the list of array elements according to predetermined ordering criteria to identify a best match of the at least one metric criteria. A system and article of manufacture are also described for providing performance metrics stored in an array of at least three dimensions.

  • Pub Date: 2007/09/11
  • Number: 08676539
  • Owner: CA, Inc.
  • Location: Islandia, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for preventing security breaches

A security payload is attached to a received binary executable file. The security payload is adapted to intercept application programming interface (API) calls to system resources from the binary executable file via export address redirection back to the security payload. Upon execution of the binary executable file, the security payload replaces system library export addresses within a process address space for the binary executable file with security monitoring stub addresses to the security payload. Upon the binary executable computer file issuing a call to a given API, the process address space directs the call to the given API back to the security payload via one of the security monitoring stub addresses that is associated with the given API. The security payload then can assess whether the call to the given API is a security breach.

  • Pub Date: 2007/09/11
  • Number: 08245289
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Intelligent configurable graphics bandwidth modulator

An apparatus and method to dynamically regulate system bandwidth in a graphics system includes receiving vertex data from an application by way of an application programming interface. The rate that the vertex data is received from the application is then determined. In the event the rate is greater than a selected threshold, the graphics system is configured to operate in immediate mode, wherein vertex data is rendered immediately upon reception. In the event the rate is less than the selected threshold, the graphics system is configured to operate in retained mode, wherein vertex data is stored prior to being rendered. The apparatus and method switches between each of the modes on-the-fly in a manner that is transparent to the application.

  • Pub Date: 2007/09/11
  • Number: 08031194
  • Owner: Vivante Corporation
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Detection of electrophilic and nucleophilic chemical agents

A “real time” method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

  • Pub Date: 2007/09/11
  • Number: 08247554
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Capillary interconnect device

An interconnecting device for connecting a plurality of first fluid-bearing conduits to a corresponding plurality of second fluid-bearing conduits thereby providing fluid communication between the first fluid-bearing conduits and the second fluid-bearing conduits. The device includes a manifold and one or two ferrule plates that are held by compressive axial forces.

  • Pub Date: 2007/09/11
  • Number: 08585986
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for flexible and deferred service configuration

A method, system and computer program product for flexible service configuration. In one embodiment, the method includes receiving a procedure request to perform a procedure at a target server, detecting by the target server at least one deficient parameter in the procedure request, suspending processing of the procedure request, sending a request by the target server for additional information from a middleware system to correct the at least one deficient parameter in the procedure request, and resuming the procedure request upon receiving the additional information.

  • Pub Date: 2007/08/11
  • Number: 08561089
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for enhanced messaging including a displayable status indicator relating to another user and an associated playlist or webpage

A system and method for enhancing the experience of a user using a communication program over the Internet or other network. The system and method according to one embodiment utilizes a user's status indicator in a communication program to share content such as music or videos among users, and provides access to an electronic commerce application through which content may be obtained. One system and method according to the present invention allows a user to display an indicator and to set an actionable status message which indicates to other users the media content that the first user is experiencing. In another embodiment, a user is given the ability to access content that other users are listening to or viewing at that time. The system and method in an alternate embodiment broadcast metadata about the user's content to other users and the other users are able to utilize that metadata to receive and experience the same or similar content that the first user is experiencing. Access to an electronic commerce application through which content may be obtained is also facilitated.

  • Pub Date: 2007/08/11
  • Number: 2075483
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for checking security of PC

Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.

  • Pub Date: 2007/08/11
  • Number: 07937765
  • Owner: Electronics and Telecommunications Research Institute
  • Location: Daejeon, KR
  • Details: Visit USPTO

Visit USPTO Page


Nanoparticle based thermal history indicators

An indicator composition for determining a thermal or chronological history during shipping or storage of a product. The composition includes a plurality of nanoparticles dispersed throughout a matrix. The nanoparticles turn color while dispersed in the matrix as a function at least one of time and temperature.

  • Pub Date: 2007/08/11
  • Number: 08033715
  • Owner: Illinois Institute of Technology
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Multiple hearth furnace for reducing iron oxide

A multiple moving hearth furnace () having a furnace housing () with at least two moving hearths () positioned laterally within the furnace housing, the hearths moving in opposite directions and each moving hearth () capable of being charged with at least one layer of iron oxide and carbon bearing material at one end, and being capable of discharging reduced material at the other end. A heat insulating partition () is positioned between adjacent moving hearths of at least portions of the conversion zones (), and is capable of communicating gases between the atmospheres of the conversion zones of adjacent moving hearths. A drying/preheat zone (), a conversion zone (), and optionally a cooling zone () are sequentially positioned along each moving hearth () in the furnace housing ().

  • Pub Date: 2007/08/11
  • Number: 08133299
  • Owner: Nu-Iron Technology, LLC
  • Location: Charlotte, US
  • Details: Visit USPTO

Visit USPTO Page


Method for restoring a service booking system in a network after failure

A method for restoring a service reservation booking system in a network after a failure, that comprises a first step of invalidating at least a portion of the bookings which cannot be seen anymore by the service booking system due to the failure, a second step of recalculating the bookings which cannot be seen anymore by the service booking system by validating the bookings which are valid in the network topology after the failure and by cancelling the bookings which are invalid in the network topology after the failure. Advantageously, the method of the present invention further includes a third step during which the nodes of the network disappear from the service booking system. The present invention also includes to a service booking system in a network.

  • Pub Date: 2007/08/11
  • Number: 09544246
  • Owner: THOMSON LICENSING
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Method for restoring a service booking system in a network after failure

A method for restoring a service reservation booking system in a network after a failure, that comprises a first step of invalidating at least a portion of the bookings which cannot be seen anymore by the service booking system due to the failure, a second step of recalculating the bookings which cannot be seen anymore by the service booking system by validating the bookings which are valid in the network topology after the failure and by cancelling the bookings which are invalid in the network topology after the failure. Advantageously, the method of the present invention further includes a third step during which the nodes of the network disappear from the service booking system. The present invention also includes to a service booking system in a network.

  • Pub Date: 2007/08/11
  • Number: 09544246
  • Owner: THOMSON LICENSING
  • Location: Boulogne-Billancourt, FR
  • Details: Visit USPTO

Visit USPTO Page


Method and system for splitting virtual universes into distinct entities

Systems and methods for allowing an administrator or program to select a region or set of avatars in a virtual universe grid for splitting into another, separate and distinct virtual universe grid. If a region is selected, all of the avatars and virtual universe resources associated with the region are locked, their data is retrieved, and another separate virtual universe grid is commanded to create and insert the avatars and resources in it. If avatars are selected, all of the resources, scripts, histories, and information regarding the selected avatars are retrieved, and the avatars are locked in the source universe. Then, another, separate virtual universe grid is commanded to create universe user identifiers for the avatars, and they are inserted into the separate VU grid. Cleanup includes deleting the region and/or avatars from the first (source) virtual universe grid.

  • Pub Date: 2007/08/11
  • Number: 08140982
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for enhancing digital video effects (DVE)

A method and apparatus for enhancing digital video effects (DVE) operates to embed DVE functionality within a graphics modeling system and provides the user with an interface configured to present model elements to a user as controllable parameters. In order to embed DVE functionality, a dynamic data structure is introduced as a scene to allow the addition of user defined model elements. The user interface enables the identification of, and access to the newly introduced model elements.

  • Pub Date: 2007/08/11
  • Number: 08914725
  • Owner: GVBB Holdings S.A.R.L.
  • Location: Luxembourg, LU
  • Details: Visit USPTO

Visit USPTO Page


Lighting control framework

A lighting control framework is provided. The lighting control framework receives an implicit request from an application. The implicit request is converted into a converted explicit request which is processed to utilize a light of a lighting device.

  • Pub Date: 2007/08/11
  • Number: 07772987
  • Owner: Dell Products L.P.
  • Location: Round Rock, US
  • Details: Visit USPTO

Visit USPTO Page


Configuration domains for the configuration of web services and consumer proxies

Methods and apparatus, including computer program products, for configuration domains for the configuration of web services and consumer proxies. In general, data characterizing one or more web services to activate is received and run-time configurations are caused to be generated for each of the web services and each of consumer proxies for the web services. The web services are from a provider system in a group of systems having a profile having one or more policies to be adhered to by the systems. The systems may include a consumer system and the provider system. The consumer system may have one or more consumer proxies to call the web services. The run-time configurations may include one or more settings derived from the policies of the profile.

  • Pub Date: 2007/08/11
  • Number: 09148488
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Ultrahard diamonds and method of making thereof

A single crystal diamond grown by microwave plasma chemical vapor deposition annealed at pressures in excess of 4.0 GPa and heated to temperature in excess of 1500 degrees C. that has a hardness of greater than 120 GPa. A method for manufacture a hard single crystal diamond includes growing a single crystal diamond and annealing the single crystal diamond at pressures in excess of 4.0 GPa and a temperature in excess of 1500 degrees C. to have a hardness in excess of 120 GPa.

  • Pub Date: 2007/07/11
  • Number: 07754180
  • Owner: Carnegie Institution of Washington
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Transmitting and receiving method and apparatus in real-time system

A method and apparatus transmitting and receiving in a real-time system are disclosed. The method of transmitting in a real-time system includes scheduling a task included in a socket based on a predetermined transmission option designated to the socket, and transmitting a packet generated by the scheduled task based on the predetermined transmission option, so that real-time communications of a network communication can be secured and resources of the system can be efficiently used, thereby, transmitting and receiving data according to the required characteristics of transmission and reception.

  • Pub Date: 2007/07/11
  • Number: 08194658
  • Owner: Samsung Electronics Co., Ltd.
  • Location: Suwon-Si, KR
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for controlling portfolios

Systems and methods are disclosed which relate to the management of asset invested in a fund. The system includes a computer connected to a network which has constantly updated fund data available to compare a current fund with a plurality of possible new funds. The system automatically transfers from one fund to another according to user predetermined criteria.

  • Pub Date: 2007/07/11
  • Number: 08095446
  • Details: Visit USPTO

Visit USPTO Page


Semantic level gesture tool tracking and positioning

Various embodiments described herein include one or more of systems, methods, and software operable to identify a location of or position a gesture tool, such as a mouse pointer or cursor, within a web conference display. Some embodiments may communicate an identified location of a gesture tool within a user interface control of a web conference presenter to web conference participants. The communicated location of the gesture tool may cause the gesture tool to be displayed in a corresponding location within a display of a web conference participant despite differences between a view of the presenter and participant. The gesture tool may include a pointer under the control of a mouse, a cursor, or other gesturing tool. Some embodiments include a web conference recording module operable to record data associated with a web conference, including gesture tool positioning data.

  • Pub Date: 2007/07/11
  • Number: 08990706
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Returning a new content based on a person's reaction to at least two instances of previously displayed content

Embodiments provide a device, apparatus, system, computer program product, and method. A provided method includes receiving information that is indicative of respective responses by a person to each of at least two instances of electronically displayed content. The received information is derived from data acquired by a sensor coupled to the person and sent by a requestor electronic device. The method also includes selecting a particular content from the at least two instances of electronically displayed content. The selecting is based at least in part on the received information. The method further includes facilitating a search for a new content using a search parameter corresponding to a content attribute of the particular content. The method also includes returning an indication of the new content to the requestor electronic device.

  • Pub Date: 2007/07/11
  • Number: 08001108
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Recovering resource connections

Illustrative embodiments provide a computer implemented method, data processing system, and computer program product for recovering resource connections using persistent subscriptions. In one illustrative embodiment, the method comprises subscribing to an event of a predefined resource to create a persistent subscription, wherein upon receiving notification of the event indicating the predefined resource is unavailable, and responsive to receiving the notification, reconnecting to the predefined resource. The method further comprises creating a new listener for receiving event notifications from the predefined resource, obtaining subscription information related to the predefined resource from the persistent subscription, and re-subscribing to the event of the predefined resource.

  • Pub Date: 2007/07/11
  • Number: 09178960
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Enriched stem cell and progenitor cell populations, and methods of producing and using such populations

The present invention provides a novel method to isolate and expand pure progenitor/stem cells from a primary tissue explant, which produces a population enriched in multipotent functional progenitor/stem cells free of contaminating fibroblasts and other cell types. Cardiac progenitor/stem cells isolated by this method maintain their self-renewal and clonogenic character in vitro and differentiate into normal cells in myocardium, including cardiomyocytes, endothelial cells, and smooth muscle cells, after transplantation into ischemic hearts. The present invention also includes substantially pure populations of multipotent progenitor/stem cells, e.g., cardiac progenitor/stem cells, and their use to treat and prevent diseases and injuries, including those resulting from myocardial infarction.

  • Pub Date: 2007/07/11
  • Number: 08017389
  • Owner: Keck Graduate Institute
  • Location: Claremont, US
  • Details: Visit USPTO

Visit USPTO Page


Electronic system for selecting the best card from a collection of consumer credit, debit, and discount cards

A method, system and computer program product for enabling completion of purchase transactions by retrieving purchase card information from an electronic database of consumer cards and applying the appropriate card to the transaction. The database, managed by a central card authority, stores client account information for cards such as debit, credit, phone, and discount cards, which are accessible via a unique, secure login/access credential, such as a username and password combination. During registration with the central card authority, a client classifies key/important factors to consider when performing purchases. The central card authority is accessed by the client during purchases from a retail facility and/or other purchasing environment. The central card authority automatically selects the best card to utilize during a purchase, after weighing the important purchasing factors related to the credit, debit, phone, and discount cards registered with the central card authority.

  • Pub Date: 2007/07/11
  • Number: 08615467
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Cardholder localization based on transaction data

Methods and apparatus, including computer program products, for cardholder localization based on transaction data. In general, a determination of one or more possible base locations of a cardholder of a payment card may be initiated. Transactions of the cardholder may be associated with merchant customer base location profiles, where each of the merchant customer base location profiles models a distribution of base locations of customers with which a merchant has had a transaction. The one or more possible cardholder base locations may be derived from the merchant customer base location profiles. The one or more possible cardholder base locations may be used to determine a home or office location of a cardholder where such information is not otherwise available, to determine whether a cardholder has moved from a stated address, to determine if a cardholder has multiple residences, to detect fraud, and the like.

  • Pub Date: 2007/07/11
  • Number: 08025220
  • Owner: Fair Isaac Corporation
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Application-controlled network packet classification

Embodiments of the present invention provide a system, method, and computer program product that enables applications transferring data packets over a network to a multi-processing system to choose how the data packets are going to be processed by, e.g., allowing the applications to pre-assign connections to a particular network thread and migrate a connection from one network thread to another network thread without putting the connection into an inconsistent state.

  • Pub Date: 2007/07/11
  • Number: 08838817
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Anchor tag indexing in a web crawler system

Provided is a method and system for indexing documents in a collection of linked documents. A link log, including one or more pairings of source documents and target documents is accessed. A sorted anchor map, containing one or more target document to source document pairings, is generated. The pairings in the sorted anchor map are ordered based on target document identifiers.

  • Pub Date: 2007/07/11
  • Number: 08484548
  • Owner: Google Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Visualization of access permission status

Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables.

  • Pub Date: 2007/06/11
  • Number: 08438612
  • Owner: Varonis Systems Inc.
  • Location: Saddle Brook, US
  • Details: Visit USPTO

Visit USPTO Page


Trade strategy monitor platform

Described are methods and systems, including computer program products, for trade strategy monitoring. A back-end server can receive a first input from a first client device indicative of a first trade strategy and a first test parameter. The back-end server can obtain historical data associated with the first trade strategy, execute the first trade strategy on the historical data in accordance with the first test parameter, and transmit the results in a normalized format to the first client device. The back-end server can receive a second input from a second client device indicative of a second trade strategy and a second test parameter. The back-end server can obtain historical data associated with the second trade strategy, execute the second trade strategy on the historical data in accordance with the second test parameter, and transmits the results in a normalized format to the second client device.

  • Pub Date: 2007/06/11
  • Number: 08051000
  • Owner: FMR LLC
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for integrating a business process management system with an enterprise service bus

A system and method are described for integrating a business process management (BPM) system with an enterprise service bus. The BPM system is used to model business processes which contain a set of activities linked by transitions. The BPM system is used to define, publish, deploy and execute the processes in a distributed computing environment. The service bus is used to manage web services and perform routing and transformation of messages between the web services. A transport is used to describe each process defined by the BPM system as a web service on the service bus and provide the ability to connect the BPM component to the enterprise service bus. This allows each of the processes to be exposed as a web service by injecting data retrieved from the process definition into the enterprise service bus. Furthermore, the processes defined in BPM can consume web services from the service bus.

  • Pub Date: 2007/06/11
  • Number: 08185916
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Sol-gel precursors and methods for making lead-based perovskite films

A simple, economical sol-gel method was invented to produce thick and dense lead zirconate titanate (PZT) thin films that exhibit the stoichiometric chemical composition and unprecedented electrical and dielectric properties. The PZT films are the foundation of many microelectromechanical systems (MEMS) and nanoelectromechanical systems (NEMS) for micro/nano sensors and actuators applications.

  • Pub Date: 2007/06/11
  • Number: 09431598
  • Owner: Drexel University
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Resorbable pouches for implantable medical devices

Biodegradable and resorbable polymer pouches are described for use with cardiac rhythm mamagent devices (CRMs) and other implantable medical devices (IMDs), i.e., a pouch, covering, or other receptacle capable of encasing, surrounding and/or holding the CRM or other IMD for the purpose of securing it in position, inhibiting or reducing bacterial growth, providing pain relief and/or inhibiting scarring or fibrosis on or around the CRM or other IMD. Optionally, the biodegradable and resorbable pouches of the invention include one or more drugs in the polymer matrix to provide prophylactic effects and alleviate side effects or complications associated with the surgery or implantation of the CRM or other IMD.

  • Pub Date: 2007/06/11
  • Number: 09023114
  • Owner: Tyrx, Inc.
  • Location: Monmouth Junction, US
  • Details: Visit USPTO

Visit USPTO Page


Relevance-weighted navigation in information access, search and retrieval

In a method for information access, search, and retrieval over a data communication system generally, wherein a query is applied to a set of documents, a result set of the matching documents and query-dependent subsections of the matching documents are identified. The method comprises computing summary information on document scopes, values and associated weights across the result sets and weighting the values with a summary value metric which provides a measure of the probability of a value. In a search engine () capable of supporting and implementing the above method, the search engine comprises as per se known subsystems for performing search and retrieval in the form of one or more core search engines (), a content application programming interface (), a content analysis stage () and a client application programming interface () connected to the core search engine () via query analysis and result analysis stages (). In addition the search engine () for supporting the above method comprises a first module () for specifying summary value metrics (SVMs), second and third modules () for creating scopes and for assigning summary value metrics (SVMs) to the created scopes, and a fourth module () for indexing scopes, values and SVMs.

  • Pub Date: 2007/06/11
  • Number: 07966305
  • Owner: Microsoft International Holdings B.V.
  • Location: Amsterdam, NL
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for power allocation and/or rate selection for UL MIMO/SIMO operations with PAR considerations

A method for a wireless communication includes receiving or storing a peak to average (PAR) back off value; and applying the PAR back off value to determine the transmission power and rate for SIMO and MIMO transmissions. In one aspect, the PAR back off value is at least partially based on modulation type. In another aspect, the PAR back off value is more for higher order QAM than for QPSK. The power allocation algorithm for different UL MIMO schemes is described as follows. For MIMO without antenna permutation (e.g. per antenna rate control), different PAR back off values are considered for different data streams. For MIMO with antenna permutation or other unitary transformation such as virtual antenna mapping or precoding, the PAR back off are determined based on combined channel. The transmission data rate depends on power and also the receiver algorithms such as a MMSE receiver or MMSE-SIC receiver.

  • Pub Date: 2007/06/11
  • Number: 08655396
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Method for deferred deletion of entries for a directory service backing store

A method for deleting entries from a directory in which directory information is stored in a set of database tables begins upon a request to delete a directory entry. In response, the directory entry is tagged, preferably by setting the entry's creation time to a null value. If a search query is received thereafter, the routine excludes tagged entries from search results that would otherwise satisfy the search query. Periodically, the routine searches for tagged entries, and references to the tagged entries are then deleted throughout the set of database tables. Thus, the inventive method defers entry deletions to enable directory queries to be processed even if deleted entries have not yet been fully expunged from the directory.

  • Pub Date: 2007/06/11
  • Number: 07895203
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for selecting a software architecture for implementing service integration

A method and system for selecting a technology to implement a service integration. Functional and non-functional service requirements are received. Technology preference relative weights for a pre-defined set of technologies and requirement relative weights for the requirements are received. Responses are received. The responses are associated with the requirements and with the requirement relative weights in a one-to-one correspondence. The responses are associated with the technology relative weights in a many-to-one correspondence. Each response indicates a characteristic that satisfies a requirement. A technology for implementing the service integration is selected from the pre-defined set of technologies based on the technology preference relative weights and the requirement relative weights.

  • Pub Date: 2007/06/11
  • Number: 08316346
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for reinforcement of broadcast transmissions in MBSFN inactive areas

A method for a wireless communication system includes broadcasting that a first service is available in a first MBSFN and a second service is available in a second MBSFN. The method includes supporting a service not broadcasted as available. For example, supporting the first service with the second MBSFN and/or supporting the second service with the first MBSFN. The supporting or reinforcing can be done by echoing. The echoing is scheduled along with the owned service.

  • Pub Date: 2007/06/11
  • Number: 08391878
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Mesh pouches for implantable medical devices

Biodegradable polymer-coated surgical meshes formed into pouches are described for use with cardiac rhythm management devices (CRMs) and other implantable medical devices. Such meshes are formed into a receptacle, e.g., a pouch or other covering, capable of encasing, surrounding and/or holding the cardiac rhythm management device or other implantable medical device for the purpose of securing it in position, inhibiting or reducing bacterial growth, providing pain relief and/or inhibiting scarring or fibrosis on or around the CRM or other implantable medical device. Preferred embodiments include surgical mesh pouches coated with one or more biodegradable polymers that can act as a stiffening agent by coating the filaments or fibers of the mesh to temporarily immobilize the contact points of those filaments or fibers and/or by increasing the stiffness of the mesh by at least 1.1 times its original stiffness. The pouches of the invention can also provide relief from various post-operative complications associated with their implantation, insertion or surgical use, and, optionally, include one or more drugs in the polymer matrix of the coating to provide prophylactic effects and/or alleviate side effects or complications associated with the surgery or implantation of the CRM or other implantable medical device.

  • Pub Date: 2007/06/11
  • Number: 08591531
  • Owner: TYRX, Inc.
  • Location: Monmouth Junction, US
  • Details: Visit USPTO

Visit USPTO Page


Digital media organization and access

Methods and apparatus, including computer program products, implementing and using techniques for accessing and organizing data items, including items of digital media, such as digital images, video stream, audio stream, text documents and the like. An object model defines a plurality of data object classes, including a media object class for representing items of digital media and a tag object class for representing categories of digital media. A request for one or more data items specifies a search condition. A collection of one or more data objects instantiated from the data object classes is generated, whereby the data objects in the collection represent data items satisfying the search condition. An iterator configured to sequentially access the data items represented by the data objects in the collection of data objects is generated and used to sequentially access the data items.

  • Pub Date: 2007/06/11
  • Number: 07921111
  • Owner: Fotiva, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Water purification method using plant molecules

Arsenic is a poisonous metalloid which, because of its hydroscopic nature, is primarily transported through water. Most plant species, including the nopal cactus, produce a sticky substance called mucilage. Mucilage swells in water but is insoluble and can precipitate ions, bacteria and particles from aqueous solutions. The invention includes a method of separating particulates and heavy metals such as arsenic (As) from drinking water using natural flocculants obtained from cactus mucilage. The extraction techniques and the methodology for using the cactus mucilage obtain higher As removal than conventional methods, like aluminum sulfate precipitation.

  • Pub Date: 2007/05/11
  • Number: 07943049
  • Owner: University of South Florida
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Wagering game with 3D gaming environment using dynamic camera

A gaming system for playing a wagering game includes an input device for receiving a wager to play a wagering game, a display, and a controller. The controller is configured to display a three-dimensional view of at least a portion of a gaming environment and one or more movable visual elements disposed within the gaming environment. The controller is further configured to dynamically retain within the field of view a center point of a selected set of the movable visual elements.

  • Pub Date: 2007/05/11
  • Number: 08628415
  • Owner: WMS Gaming Inc.
  • Location: Waukegan, US
  • Details: Visit USPTO

Visit USPTO Page


Vertex cache map mode for per-vertex state changes

A vertex cache within a graphics processor is configured to operate as a conventional round-robin streaming cache when per-vertex state changes are not used and is configured to operate as a random access storage buffer when per-vertex state changes are used. Batches of vertices that define primitives and state changes are output to parallel processing units for processing according to vertex shader program. In addition to allowing per-vertex state changes, the vertex cache is configured to store vertices for primitive topologies that use anchor points, such as triangle strips, line loops, and polygons.

  • Pub Date: 2007/05/11
  • Number: 08237725
  • Owner: NVIDA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Saving and restarting discrete event simulations

Method, system, and computer program product for saving and restarting discrete event simulations are provided. A discrete event simulation of a scenario is performed via a process executing on a system. The process includes one or more application threads. A checkpoint of the process is created at a point in time when a command to save the discrete event simulation of the scenario is received. The checkpoint includes data elements of the process and the one or more application threads of the process that are stored in components of the system at the point in time. These data elements reflect a state of the process and the one or more application threads of the process at the point in time. The checkpoint is saved to one or more files in the system that are usable to later restart the discrete event simulation of the scenario from the point in time.

  • Pub Date: 2007/05/11
  • Number: 08296119
  • Owner: Cadence Design Systems, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Quasi-compact range

An antenna method and system to implement a quasi-compact range technique/technology in which a reflector antenna is used to produce a test field within a test region at a quasi-compact range, which is within a near-field of the reflector antenna but further from the reflector antenna than a compact range of the reflector antenna.

  • Pub Date: 2007/05/11
  • Number: 07965228
  • Owner: The Aerospace Corporation
  • Location: El Segundo, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for providing auto-completion of information

An approach is provided for auto-completion functions. Textual input is received from a user via an application, a profile metadata is retrieved based on the textual input, a script is generated based on the profile metadata, and the script is transmitted to the application, wherein the script provides auto-completion of information corresponding to the textual input using the profile metadata.

  • Pub Date: 2007/05/11
  • Number: 08713029
  • Owner: Verizon Patent and Licensing Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Integrated underwater surface cleaning and effluent treatment system

A method and apparatus for the cleaning of an underwater surface, such as a ship hull. The method and apparatus enables cleaning to be conducted while mitigating the release of removed material into surrounding waters. The integrated apparatus includes a cleaning vehicle for removing fouling from the underwater hull surface, and a land treatment unit for treating liquid waste that is conveyed to the land treatment unit from the cleaning vehicle. The cleaning vehicle may include a pre-processing unit that pre-treats substances removed during the cleaning process.

  • Pub Date: 2007/05/11
  • Number: 07905192
  • Owner: The United States of America as represented by the Secretary of the Navy
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Granules, tablets and granulation

The invention provides, inter alia, a method for producing granules from a powder, characterized in that a low compaction force is applied to the powder to produce a compacted mass comprising a mixture of fine particles and granules and separating fine particles from the granules by entraining the fine particles in a gas stream. Also provided are apparatus for use in the process and tablets formed by compression of the resultant granules.

  • Pub Date: 2007/05/11
  • Number: 08052999
  • Owner: Atacama Labs
  • Location: Espoo, FI
  • Details: Visit USPTO

Visit USPTO Page


Extensible framework for managing UI state in a composite AJAX application

A method, system and computer-usable medium are disclosed for managing the user interface (UI) state of an AJAX application by automatically binding a uniform resource locator (URL) to an application code component. The metadata for controller functions contained in an AJAX Web page are read as it is loaded. Once loaded, the URL of the page is monitored for changes in its value. If the URL's value changes, then the value of the ‘action’ property of the changed URL is compared to the application metadata for validation. If the ‘action’ property of the changed URL does not exist in the application metadata, then the changed URL is considered invalid and its associated actions are ignored. If the ‘action’ property is valid, the function specified by the ‘action’ request parameter is called. A single object parameter is sent, with the properties of the single object parameter derived from the request parameters other than ‘action’. The function is executed and the page is updated to display the value of the object property.

  • Pub Date: 2007/05/11
  • Number: 08250585
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Extensibility application programming interface and framework for meta-model objects

The present invention relates to a system and methodology providing an Application Programming Interface (API) and framework that supports a meta-object model for application design and operating system interactions. The API includes an input component that receives data and/or instructions. The input component processes a meta-data model that interrelates data via a class hierarchy, wherein the class hierarchy includes relationship descriptions between class objects, attributes, rules, and/or behavioral descriptions. Another aspect includes a data management system that includes a component to receive an item having meta-data annotations. An analysis component determines at runtime a structure for the item via deployment of the meta-data annotations. The system can also include a framework component that defines meta-data class derivations, meta-data classes, meta-data integrity rules, and/or meta-data class behavior.

  • Pub Date: 2007/05/11
  • Number: 07979842
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Biochip microsystem for bioinformatics recognition and analysis

A system with applications in pattern recognition, or classification, of DNA assay samples. Because DNA reference and sample material in wells of an assay may be caused to fluoresce depending upon dye added to the material, the resulting light may be imaged onto an embodiment comprising an array of photodetectors and an adaptive neural network, with applications to DNA analysis. Other embodiments are described and claimed.

  • Pub Date: 2007/05/11
  • Number: 07910873
  • Owner: California Institute of Technology
  • Location: Pasadena, US
  • Details: Visit USPTO

Visit USPTO Page


Reducing mobile-terminated call set up by identifying and mitigating overlap between paging and system information broadcast

In a Universal Mobile Telecommunications (UMTS) system, a mobile device reads scheduling information for uplink interference (SIB7) from a Master Information Block, broadcasted on the Broadcast Channel (BCCH). The UE wakes up from the sleep during its periodic paging occasions and reads the paging indicator channel (PICH). If the UE needs to read the PCH, then the UE computes the timing of the next broadcast of SIB7 using the scheduling information broadcast in the MIB on BCCH. Knowing the timing of the next SIB7, the UE can determine if there is an overlap. If overlap is detected, the mobile device demodulates both the paging channel carried by the Secondary Common Control Physical Channel (S-CCPCH) and the broadcast channel carried by the Primary CCPCH, avoiding a mobile-terminated (MT) call setup delay by waiting for the next SIB7 broadcast, which depending upon a SIB7 repetition ranges from 360 msec to 2.56 seconds.

  • Pub Date: 2007/02/11
  • Number: 07974643
  • Owner: Qualcomm Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Rapid acquisition shooting system

The invention is directed towards an elevation adjustment mechanism which has a mechanism for coarsely adjusting the pitch rotation comprising a lever actuated clamping assembly and a mechanism for finely adjusting the pitch rotation comprising a threaded rod mechanism.

  • Pub Date: 2007/02/11
  • Number: 08123180
  • Owner: Alliant Techsystems Inc.
  • Location: Minneapolis, US
  • Details: Visit USPTO

Visit USPTO Page


Object synchronization in shared object space

A system for synchronizing shared objects among multiple applications includes a shared object space in which the shared objects are stored and accessible to the multiple applications. In order to properly control access to shared objects, each shared object includes a header that is capable of storing an identification of a sole application that is the only application currently accessing the shared object or a reference into a lock table that stores lock nodes corresponding to a number of applications that are currently seeking access to the shared object.

  • Pub Date: 2007/02/11
  • Number: 08171491
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Object monitoring system in shared object space

The present invention relates to a system for monitoring an object space shared among plural applications. Objects stored in the shared space are registered for monitoring and the system receives data related to the registered objects that can be utilized to perform statistical analysis, for example, relating to the overall health of the applications.

  • Pub Date: 2007/02/11
  • Number: 08201187
  • Owner: VMware, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for policy enabled programming

A system and method for allowing external execution-time adaptation of application behavior of an application in a telecommunication system without modification to the application code comprises an application having at least one break point and residing on an application server, at least one identifiable decision engine, and a listing of break points that has for each break point at least one identifier of the decision engine, such that at one of the break points, the application accesses the listing of break points, invokes the listed instances of the decision engine corresponding to the break point, and adapts application behavior based on the decision engine. In addition, each entry in the listing of break points can have a sequence number so that if two entries for the same break point have equal sequence numbers, the decision engines identified in these entries can be invoked in parallel.

  • Pub Date: 2007/02/11
  • Number: 08448159
  • Owner: TTI Inventions C LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Message addressing techniques for a mobile computing device

Various embodiments are directed to improved message addressing techniques. In one embodiment, a computing device may comprise a messaging client arranged to receive an input sequence of alphabetic or alphanumeric characters as a destination of an outbound message. The messaging client may recognize that the input sequence represents a mnemonic short code and may automatically generate a common short code comprising a sequence of numeric digits associated with the mnemonic short code. The messaging client may display both the input sequence comprising the mnemonic short code and the common short code and enable the outbound message to be sent using the common short code as the destination. Other embodiments are described and claimed.

  • Pub Date: 2007/02/11
  • Number: 08275398
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Gantry robotics system and related material transport for contour crafting

Apparatus and methods are disclosed that are useful for robotic gantry systems that are lightweight while at the same time offering rigidity or stiffness for implementation in Contour Crafting construction and material delivery techniques. The present disclosure is directed to robotic gantry system and material transport apparatus that use of very light structural members that have sufficient compressive strength, but which may otherwise be weak in the presence of bending forces, in conjunction with cables that provide stiffness against bending. Use of such cables provides needed tension while at the same time allowing the robotic gantry system to be very light compared to solid structures, e.g., those with I-beams, etc. Material delivery systems including passive articulated arms are also disclosed.

  • Pub Date: 2007/02/11
  • Number: 08029710
  • Owner: University of Southern California
  • Location: Los Angeles, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of restricting access to media content

A method of restricting access to content delivered via a video distribution network is disclosed and includes receiving a control stream at a service delivery platform. The control stream is related to media content delivered via a video distribution network. The method also includes parsing the control stream and determining, from the parsed control stream, at least one geographical area in which access to programming associated with the video content channel is to be restricted. The method also includes automatically scheduling a conditional access event associated with the media content at least one video head-end of the video distribution network, the at least one video head-end serving the at least one geographical area. In a particular embodiment, the video distribution network can be an Internet Protocol Television (IPTV) network.

  • Pub Date: 2007/01/11
  • Number: 08924997
  • Owner: AT&T Intellectual Property, I, L.P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Speech recognition for determining if a user has correctly read a target sentence string

Systems and methods for processing a user speech input to determine whether the user has correctly read a target sentence string are provided. One disclosed method may include receiving a sentence array including component words of the target sentence string and processing the sentence array to generate a symbolic representation of the target sentence string. The symbolic representation may include a subset of words selected from the component words of the target sentence string, having fewer words than the sentence array. The method may include processing user speech input to recognize in the user speech input each of the words in the subset of words in the symbolic representation of the target sentence string. The method may further include, upon recognizing the subset of words, making a determination that the user has correctly read the target sentence string.

  • Pub Date: 2007/01/11
  • Number: 08103503
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Processing efficiency on secure systems having a host processor and smart card

A smart card comprising a data store and a processor, said smart card being operable to connect with a host data processing apparatus, said smart card comprising authentication logic operable when connected to said host data processing apparatus to identify a secure data processing domain having predetermined properties within said host data processing apparatus and in response to identify said secure data processing domain, said smart card is operable to delegate at least some data processing operations to be processed within said secure data processing domain of said host data processing apparatus.

  • Pub Date: 2007/01/11
  • Number: 09256732
  • Owner: ARM Limited
  • Location: Cambridge, GB
  • Details: Visit USPTO

Visit USPTO Page


Oilfield operational system and method

Techniques relating to an oilfield application for performing at least one oilfield operation are provided. The oilfield application is provided with a plurality of oilfield application modules, an application shell for defining an oilfield application, an adapter for encapsulating at least one of the oilfield application modules for compatibility with the application shell, and integration services for integrating the application modules into the application shell. Each of the oilfield application modules performs at least one task of an oilfield operation. The application shell is adapted to selectively receive the oilfield application modules. The loading services load the application modules into the application shell, the loading services initializing the application modules. The integrating services integrate the application modules for operability with the application shell whereby the at least one oilfield operation is enabled.

  • Pub Date: 2007/01/11
  • Number: 08145464
  • Owner: Schlumberger Technology Corporation
  • Location: Sugar Land, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-pane display capture, aggregation, and sharing

Various embodiments herein include one or more of systems, methods, and software for multi-pane display capture, aggregation, and sharing. Some such embodiments include generating an image on a computing device to share with participants in a web conference meeting by capturing a first image of a first graphic display output layer and a second graphic display output layer and removing a portion of the first image. Some embodiments may also include capturing a second image of the second graphic display output layer and combining the first and second images to form a third image. The third image may then be sent to one or more participants of the web conference meeting. The first graphic display output layer may include an overlay pane graphical output of a computing device and the second graphic display output layer may include a standard pane graphical output of the computing device.

  • Pub Date: 2007/01/11
  • Number: 09600221
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Multi-pane display capture, aggregation, and sharing

Various embodiments herein include one or more of systems, methods, and software for multi-pane display capture, aggregation, and sharing. Some such embodiments include generating an image on a computing device to share with participants in a web conference meeting by capturing a first image of a first graphic display output layer and a second graphic display output layer and removing a portion of the first image. Some embodiments may also include capturing a second image of the second graphic display output layer and combining the first and second images to form a third image. The third image may then be sent to one or more participants of the web conference meeting. The first graphic display output layer may include an overlay pane graphical output of a computing device and the second graphic display output layer may include a standard pane graphical output of the computing device.

  • Pub Date: 2007/01/11
  • Number: 09600221
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Methods, systems, and products for locating files

Methods, systems, and products are disclosed for locating files. Upon receipt of caller identification information, a search is performed to identify all files associated with the caller identification information. A presentation of the caller identification information is caused.

  • Pub Date: 2007/01/11
  • Number: 08280019
  • Owner: AT&T Intellectual Property I, L. P.
  • Location: Atlanta, US
  • Details: Visit USPTO

Visit USPTO Page


Decontamination of chemical warfare agents using benign household chemicals

A decontamination composition and method for detoxifying chemical warfare agents on surfaces, wherein said composition comprises mixtures of household cleaners and chemicals such as ammonia, hydrogen peroxide, isopropyl alcohol, baking soda and washing soda.

  • Pub Date: 2007/01/11
  • Number: 07829519
  • Owner: The United States of America as represented by the Secretary of the Army
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless device, program products and methods of using a wireless device to deliver services

In at least one embodiment, a mobile device receives previous route traversal information for a route from a server. During a subsequent traversal of the route, the mobile device determines comparative split information for the subsequent traversal by reference to the previous route traversal information and presents the comparative split information during traversal of the route.

  • Pub Date: 2007/31/10
  • Number: 07953549
  • Owner: adidas AG
  • Location: Herzogenaurach, DE
  • Details: Visit USPTO

Visit USPTO Page


Tracking and tracing user activity with application media packages

A software component for tracking and tracing the access and display of Internet content employs an Application Media Package. That package includes a definition for rendering a graphical user interface and a URL pointing to Internet content that may be presented within said user interface. An application media viewer manages the collection, organization, sharing, and rendering of a plurality of such software components. Because Application Media Packages are used in groups and often for relatively long periods of time, the present invention may collect real-time multidimensional use statistics that over time becomes a valuable multi-dimensional user behavior profiling database. A server collects use statistics from its Application Media Viewer that runs on client computers or cell phones for example, and manages and tracks Application Media Package and Viewer downloads, access to an Application Media Package library, etc.

  • Pub Date: 2007/31/10
  • Number: 08346887
  • Owner: Mainstream Scientific, LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Three-dimensional localization, display, recording, and analysis of electrical activity in the cerebral cortex

The present invention describes a method and apparatus to localize the electrical signals measured from a subject's scalp surface, preferably in near-real time, and to generate dynamic three-dimensional information of the electrical activity occurring within the cerebral cortex of the brain. In the preferred embodiment, it can produce images that can be immediately inspected and analyzed by an operator in near-real time, resulting in a powerful new cortical imaging modality, which we denote as Dynamic Electrocortical Imaging (DECI). The present invention involves the use of a computer, an electroencephalographic (EEG) amplifier, EEG electrodes, and custom software. It can measure healthy and diseased cortical events and states in both conscious and unconscious subjects. This is useful, as it allows for the diagnosis, monitoring and treatment of cortical disorders, while also furthering the understanding of the human brain and lending use to additional non-medical applications such as in entertainment, education, lie-detection and industry. The invention in one embodiment is implemented using software in conjunction with readily available EEG hardware. Furthermore, this same method can be applied to pre-existing data and when doing so, EEG hardware is not required. Having a practical near-real time 3D imaging system brings a far more accessible technology to doctors, researchers, individuals, and private clinics to better diagnose, monitor, treat and understand many of the conditions and abnormalities of the brain.

  • Pub Date: 2007/31/10
  • Number: 09179854
  • Details: Visit USPTO

Visit USPTO Page


Techniques for producing a consistent copy of source data at a target

Described area system and computer program product for producing a point in time copy of source data. A set of records corresponding to a time ordered series of recorded file operations as applied to said source data is received. The set of records includes one or more consistency point markers, each consistency point marker indicating a point in time at which said source data is in a consistent state when a portion of said recorded file operations occurring up to said point in time is applied to said source data. The recorded file operations corresponding to said set of records are applied to said copy of the source data until a marker record corresponding to a consistency point marker is determined. Also described is a target system for producing a point in time copy of source data including a data storage device including said copy of source data and a replication service.

  • Pub Date: 2007/31/10
  • Number: 08024535
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Taxonomy engine and dataset for operating an appliance

A taxonomy engine in a software architecture generates a taxonomy dataset establishing the group of well formed commands, and at least one command generator of the system is adapted to generate a well formed command using the taxonomy dataset. The taxonomy engine is configured to deliver the taxonomy dataset to the command generator, and the command generator is configured to deliver the well formed command to the controller.

  • Pub Date: 2007/31/10
  • Number: 07908019
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


System and methods for creating and authoring internet content using application media packages

An Application Media Package is a software component for accessing and displaying Internet content which includes a definition for rendering a graphical user interface and a URL pointing to Internet content to be downloaded and presented within said user interface. An Application Media Viewer may be used in association with an Application Media Package to manage the collection, organization, sharing, and rendering of a plurality of such Packages. A development server supports the community of Application Media Package developers, providing developer tools, including Package templates which provide an expedient method of re-purposing existing internet media into a new presentation package by choosing from existing examples. Access to tools and information may be controlled at the development server. The development server may also provide a development and test zone for Package verification, authentication and acceptance before posting.

  • Pub Date: 2007/31/10
  • Number: 08020083
  • Owner: Mainstream Scientific, LLC
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


System and method of delivering audio communications

A method of delivering an audio communication is disclosed and includes selectively delivering an audio message including a content portion and an advertising portion to a voice communication device. The audio message has a first available delivery format for live communication with a user of the voice communication device and a second available delivery format for communication with a voice mail system associated with the voice communication device.

  • Pub Date: 2007/31/10
  • Number: 08768756
  • Owner: Unwired Nation, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for implementing a dynamic cache for a data storage system

A dynamic cache system is configured to flexibly respond to changes in operating parameters of a data storage and retrieval system. A cache controller in the system implements a caching policy describing how and what data should be cached. The policy can provide different caching behavior based on exemplary parameters such as a user ID, a specified application or a given workload. The cache controller is coupled to the data path for a data storage system and can be implemented as a filter in a filter framework. The cache memory for storing cached data can be local or remote from the cache controller. The policies implemented in the cache controller permit an application to control caching of data to permit optimization of data flow for the particular application.

  • Pub Date: 2007/31/10
  • Number: 07856530
  • Owner: Network Appliance, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Superfinishing large planetary gear systems

A method of superfinishing a large hollow wheel gear in a vibratory bowl having a center hub comprises at least partially filling the vibratory bowl with an amount of finishing media, laying the gear horizontally into the bowl over the center hub, supplying a quantity of an active chemistry into the bowl and agitating the vibratory bowl at a frequency such that the gear settles into and is fully supported by the media. By controlling the process parameters, the hollow wheel gear may be caused to rotate in the media and can be made to float at a desired level. The method is particularly suitable for hollow wheel gears for large wind turbines.

  • Pub Date: 2007/31/10
  • Number: 08858734
  • Owner: REM Technologies, Inc.
  • Location: Brenham, US
  • Details: Visit USPTO

Visit USPTO Page


Statistical language model trained with semantic variants

An intelligent query system for processing voiced-based queries is disclosed, which uses a combination of both statistical and semantic based processing to identify the question posed by the user by understanding the meaning of the user's utterance. Based on identifying the meaning of the utterance, the system selects a single answer that best matches the user's query. The answer that is paired to this single question is then retrieved and presented to the user. The system, as implemented, accepts environmental variables selected by the user and is scalable to provide answers to a variety and quantity of user-initiated queries.

  • Pub Date: 2007/31/10
  • Number: 07912702
  • Owner: Phoenix Solutions, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Processor for executing switch and translate instructions requiring wide operands

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07932911
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Processor for executing multiply matrix instructions requiring wide operands

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07843459
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Processor for executing extract controlled by a register instruction

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07940277
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Processor architecture with wide operand cache

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07948496
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Processor architecture for executing wide transform slice instructions

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07889204
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Processor and method for executing instructions requiring wide operands for multiply matrix operations

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 07952587
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Power management techniques for a universal serial bus

Power management techniques for a universal serial bus are described. For example, a mobile computing device may include an interface having a universal serial bus, a host processor to couple to the interface, and a radio module to couple to the interface. The radio module may have a radio processor and a detector, the detector operative to detect temporary block flow from radio signals communicated over wireless shared media, the radio processor to enable the universal serial bus when the detector detects the temporary block flow and disable the universal serial bus when the detector does not detect the temporary block flow for a guard interval. Other embodiments are described and claimed.

  • Pub Date: 2007/31/10
  • Number: 08359071
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Overlay network node

There is disclosed a technology which improves scalability in an overlay network system and which efficiently supplies a service with respect to a user, and according to the technology, for example, in a case where a mobile node () transmits an update message including a specific flow filtering rule to an HA () in order to receive a service concerning functions of multiple interfaces, the HA () interprets the flow filtering rule, specifies an HA to transfer a data packet from CNs (), an HA () to transfer a data packet from the CN () and an HA () to transfer a data packet from a CN (), and selectively transmits to each HA a message including information useful for the respective HA.

  • Pub Date: 2007/31/10
  • Number: 08861382
  • Owner: Panasonic Intellectual Property Corporation of America
  • Location: Torrance, US
  • Details: Visit USPTO

Visit USPTO Page


Open API video system and method of making and using same

A video player unit, system and method, and a video hierarchy. Included are at least one memory device, a plurality of communication access points for receiving at least one program play, an open application programming interface associated with the at least one memory device, wherein a plurality of applications correspondent to the open application programming interface allow a user to manipulate metadata associated with ones of the programs plays, wherein the metadata relates to interframe interactivity with detailed aspects of the ones of the program plays, and at least one correlation engine in communication with the open application programming interface, wherein the at least one correlation engine provides for correlation among at least the interframes of the program play to ones of the interframes of other ones of the program plays.

  • Pub Date: 2007/31/10
  • Number: 08122467
  • Details: Visit USPTO

Visit USPTO Page


Network system with electronic credentials and authentication for appliances

An appliance has a communication network with a plurality of nodes for executing commands to enable operation by components. A firewall is provided to restrict access to the commands by the nodes without a password.

  • Pub Date: 2007/31/10
  • Number: 09009811
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Natural language speech lattice containing semantic variants

An intelligent query system for processing voiced-based queries is disclosed, which uses a combination of both statistical and semantic based processing to identify the question posed by the user by understanding the meaning of the user's utterance. Based on identifying the meaning of the utterance, the system selects a single answer that best matches the user's query. The answer that is paired to this single question is then retrieved and presented to the user. The system, as implemented, accepts environmental variables selected by the user and is scalable to provide answers to a variety and quantity of user-initiated queries.

  • Pub Date: 2007/31/10
  • Number: 07873519
  • Owner: Phoenix Solutions, Inc.
  • Location: Palo Alto, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for making single molecule arrays

Random arrays of single molecules are provided for carrying out large scale analyses, particularly of biomolecules, such as genomic DNA, cDNAs, proteins, and the like. In one aspect, arrays of the invention comprise concatemers of DNA fragments that are randomly disposed on a regular array of discrete spaced apart regions, such that substantially all such regions contain no more than a single concatemer. Preferably, such regions have areas substantially less than 1 μmand have nearest neighbor distances that permit optical resolution of on the order of 10single molecules per cm. Many analytical chemistries can be applied to random arrays of the invention, including sequencing by hybridization chemistries, sequencing by synthesis chemistries, SNP detection chemistries, and the like, to greatly expand the scale and potential applications of such techniques.

  • Pub Date: 2007/31/10
  • Number: 08133719
  • Owner: Callida Genomics, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method of making arrays of thin sheet microdischarge devices

The cavity defines an empty volume formed in the insulator has its walls defined by the insulator and may extend through either (or both) the first electrode or the second electrode , in which case the first electrode and/or second electrode also define the walls of the cavity . The cavity is preferably cylindrical and has a diameter of 0.1 μm-1 mm. More preferably, the diameter ranges from 0.1 μm-500 μm, 1 μm-100 μm, or 100 μm-500 μm. The cavity will be filled with a gas that contacts the cavity walls, fills the entire cavity and is selected for its breakdown voltage or light emission properties at breakdown. Light is produced when the voltage difference between the first electrode and the second electrode creates an electric field sufficiently large to electrically break down the gas (nominally about 10V-cm). This light escapes from the microcavity through at least one end of the cavity

  • Pub Date: 2007/31/10
  • Number: 08221179
  • Owner: The Board of Trustees of the University of Illinois
  • Location: Urbana, US
  • Details: Visit USPTO

Visit USPTO Page


Method of facilitating servicing an appliance

A method of facilitating servicing an appliance includes establishing two way communications between an appliance and a remote client, and monitoring and communicating to the remote client operational data associated with the appliance. In this way, the remote client can use the operational data to service the appliance.

  • Pub Date: 2007/31/10
  • Number: 09124444
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Method for the electro-addressable functionalization of electrode arrays

A method for preparing an electrochemical biosensor uses bias-assisted assembly of unreactive -onium molecules on an electrode array followed by post-assembly electro-addressable conversion of the unreactive group to a chemical or biological recognition group. Electro-addressable functionalization of electrode arrays enables the multi-target electrochemical sensing of biological and chemical analytes.

  • Pub Date: 2007/31/10
  • Number: 09212430
  • Owner: Sandia Corporation
  • Location: Albuquerque, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for server support of pluggable authorization systems

A method, system, apparatus, and computer program product is presented for plugging in a standard authorization system in a manner such that legacy applications can use the authorization APIs and backend remote interfaces of a legacy authorization system. When a legacy application makes a call intended for a routine within the legacy authorization system, the call is redirected to make the appropriate calls to the APIs of the standard authorization system.

  • Pub Date: 2007/31/10
  • Number: 2086321
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for performing I/O operations using a hypervisor

A method for installing a device driver for a device in a guest domain, that includes obtaining a first device driver for the device by a hypervisor, installing, by the hypervisor, the first device driver into memory allocated to the guest domain, and notifying an operating system in the guest domain of the first device driver after installing the device driver, wherein the operating system communicates with the device using the first device driver.

  • Pub Date: 2007/31/10
  • Number: 07979869
  • Owner: Oracle America, Inc.
  • Location: Redwood City, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for minimizing or eliminating downtime when updating a website

Websites, including supporting databases, are updated with little or no downtime. In one aspect, a database is replicated prior to updating, so that updates can be performed on one copy while the other remains operational. In another aspect, the data remains in one location while an application programming interface for interacting with the data using new software code is introduced. Another application programming interface remains operational while the update is taking place. Public and private synonyms are used to direct web traffic to the appropriate application programming interface during the update process.

  • Pub Date: 2007/31/10
  • Number: 08701103
  • Owner: Wal-Mart Stores, Inc.
  • Location: Bentonville, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for creating reusable software components through a uniform interface

A method for designing software components for integration into any system without additional coding is provided. The method includes adopting a uniform application programming interface that breaks down external objects to include the characteristics of object, attribute, and method. Ideally, the characteristics include create object, delete object, read attributes, write attributes, and invoke behavior. A software tool is provided for communication between an API and a data source, the tool including a join engine adapted to provide communication between at least one view and at least one base source associated with the data source, the join engine further adapted to update the at least one base source in response to updates to the view. Ideally, the tool is further configured to support on the at least one base source operations of create object and delete object on the at least one view. The software tool is also configured to map events in the at least one base source to the at least one view, and can be configured to create virtual attributes based on the view through operations or expressions performed on the view, including, but not limited to algebraic expressions, names, strings, and functions.

  • Pub Date: 2007/31/10
  • Number: 08185867
  • Details: Visit USPTO

Visit USPTO Page


Method and system for code generation

A method and system for providing target code to various computer systems. The target code is provided by a service. The service provides a mechanism for third-party developers to submit initial or base code for distribution to end-user computers as target code. The service converts the initial code to target code that is suitable for execution on the end-user computers. When the service receives the request for target code that matches certain requester-specified characteristics, it selects the intermediate code that best matches the requester-specified characteristics. The service then sends the target code to the requester.

  • Pub Date: 2007/31/10
  • Number: 08990787
  • Owner: Implicit Networks, Inc.
  • Location: Seattle, US
  • Details: Visit USPTO

Visit USPTO Page


Method and system for adaptive disk management

Provided herein are at least one embodiment of systems and methods of adaptive disk management for a recording device employing a memory storage device such as hard disk storage so that memory storage device usage is tracked in the recording device and the memory storage device is controlled based on time-based patterns of user behavior.

  • Pub Date: 2007/31/10
  • Number: 08474002
  • Owner: Cisco Technology, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus to display signal strength

Various embodiments are directed to a status indicator module to display a first signal strength and a second signal strength for different radio transmission signals using a single status indicator. Other embodiments are described and claimed.

  • Pub Date: 2007/31/10
  • Number: 09288297
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Managing file objects in a data storage system

Managing file objects in a data storage system includes providing a plurality of metadata servers, each metadata server having information for only a subset of file objects in the storage system, each subset for each of the metadata servers being less than a total number of file objects for the system and includes providing at least one metadata location server, where an entity accessing a specific file object of the system determines which of the metadata servers contains data for the specific file object by first accessing the at least one metadata location server. Information for the subset of file objects may include a table having file identifiers and metadata location information. The metadata location information may point to data storage for a metadata object for a file.

  • Pub Date: 2007/31/10
  • Number: 09413825
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Location-aware fitness training device, methods, and program products that support real-time interactive communication and automated route generation

In at least one embodiment, a server receives user input describing a route of an activity. A graphical representation of the route is served to a user device in association with a toolset including at least one of a set including an annotation tool, a rating tool, and a review tool. The server receives route-related information including at least one of a set including a user annotation, a user rating and a user review of the route entered utilizing the toolset. The route and the route-related information is stored on the server, and the server permits access to the route and the route-related information by a plurality of users.

  • Pub Date: 2007/31/10
  • Number: 07957752
  • Owner: Adidas International, Inc.
  • Location: Herzogenaurach, DE
  • Details: Visit USPTO

Visit USPTO Page


Indexing, sorting, and categorizing application media packages

An Application Media Package for accessing and displaying Internet content includes a definition for rendering a graphical user interface and a URL pointing to the Internet Content to be downloaded and presented within said user interface. An Application Media viewer may be used in association with the Application Media Package to manage the collection, organization, sharing, and rendering of a plurality of such Packages. A user is provided with the option of arranging multiple Application Media Packages, such as in groups, and such as vertically, horizontally, etc. By selecting, dragging and dropping, Packages are snapped or docked together such that they may be move individually or in mass on the client display. The organization and groupings may be shared with others.

  • Pub Date: 2007/31/10
  • Number: 08621034
  • Details: Visit USPTO

Visit USPTO Page


Highly componentized system architecture with loadable virtual memory manager

The present invention is directed to a loadable virtual memory manager, and generally to a computer operating system capable of supporting application programs running in a computer having a working memory, the computer operating system including a kernel resident in the working memory at run time, and a loadable virtual memory manager resident at link time outside of the working memory and dynamically loadable into the working memory at run time upon demand of one of the application programs. The kernel includes a loader for loading the virtual memory manager into the working memory in response to a demand from one of the application programs. The computer is able to access a storage memory separate from the working memory, the loadable virtual memory manager residing at link time in the storage memory. The loader loads the virtual memory manager from the storage memory to the working memory. The loadable virtual memory manager is removable from the working memory upon lack of demand therefor by the application programs.

  • Pub Date: 2007/31/10
  • Number: 07584473
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


High bandwidth data transport system

A device for sending and receiving ultra wideband communications over a guided medium includes a line interface configured for electrical communication to the guided medium and adapted for interfacing with the guided medium, an ultra wideband impulse transmitter electrically connected to the line interface for transmitting amplitude modulated ultra wideband impulses over the guided medium, and an ultra wideband receiver electrically connected to the line interface for receiving amplitude modulated ultra wideband impulses over the guided medium.

  • Pub Date: 2007/31/10
  • Number: 08451879
  • Owner: Lightwaves Systems, Inc.
  • Location: Cedar Rapids, US
  • Details: Visit USPTO

Visit USPTO Page


Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data

A computer system is disclosed that contains cryptographic keys and cryptographic key identifiers. The system has a repository cryptographic engine that communicates securely with a remote cryptographic engine, and the repository cryptographic engine is associated with a user data store. The user data store includes a hidden link including a session key identifier encrypted with a protection key. The hidden link is associated with a remote data entity. A key data store associated with the repository server includes a session key encrypted with a session-key-protection key. The session key is used to encrypt and decrypt the remote data entity. The system also includes a repository key exchange module operable to exchange the session key with a remote key exchange module.

  • Pub Date: 2007/31/10
  • Number: 07885413
  • Owner: Eruces, Inc.
  • Location: Lenexa, US
  • Details: Visit USPTO

Visit USPTO Page


Graphical automated machine control and metrology

A graphical programming system allows a user to place geometric shapes onto a scaled image, the shape having associated behavior that operates on the image or on the object of which the image is formed. In a preferred embodiment, the shapes are objects in the Visio program by Microsoft Corporation. The shapes are dragged from a stencil onto an image provided by ion beam or electron microscope image. The shape invokes software or hardware to locate and measure features on the image or to perform operations, such as ion beam milling, on the object that is imaged.

  • Pub Date: 2007/31/10
  • Number: 2058614
  • Owner: FEI Company
  • Location: Hillsboro, US
  • Details: Visit USPTO

Visit USPTO Page


Enhanced communication platform and related communication method using the platform

Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the user's authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided.

  • Pub Date: 2007/31/10
  • Number: 08976947
  • Owner: Upaid Systems, Ltd.
  • Location: Road Town, VG
  • Details: Visit USPTO

Visit USPTO Page


Data communication protocol in an automatic meter reading system

Automatic meter reading (AMR) systems and methods in which readers communicate with endpoints interfaced to utility meters. In operation, the reader and the endpoint communicate with one another via radio frequency (RF) communication according to a communication protocol. Aspects of the invention are directed to packetization, command and control, and messaging arrangements.

  • Pub Date: 2007/31/10
  • Number: 08164479
  • Owner: Itron, Inc.
  • Location: Liberty Lake, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized medical diagnostic and treatment advice system including network access

A system and method for providing computerized, knowledge-based medical diagnostic and treatment advice. The medical advice is provided to the general public over networks, such as a telephone network or a computer network. The invention also includes a stand-alone embodiment that may utilize occasional connectivity to a central computer by use of a network, such as the Internet. New authoring languages, interactive voice response and speech recognition are used to enable expert and general practitioner knowledge to be encoded for access by the public. “Meta” functions for time-density analysis of a number of factors regarding the number of medical complaints per unit of time are an integral part of the system. A re-enter feature monitors the user's changing condition over time. A symptom severity analysis helps to respond to the changing conditions. System sensitivity factors may be changed at a global level or other levels to adjust the system advice as necessary.

  • Pub Date: 2007/31/10
  • Number: 09005119
  • Owner: Clinical Decision Support, LLC
  • Location: Nashville, US
  • Details: Visit USPTO

Visit USPTO Page


Computer system for executing switch and table translate instructions requiring wide operands

A programmable processor and method for improving the performance of processors by expanding at least two source operands, or a source and a result operand, to a width greater than the width of either the general purpose register or the data path width. The present invention provides operands which are substantially larger than the data path width of the processor by using the contents of a general purpose register to specify a memory address at which a plurality of data path widths of data can be read or written, as well as the size and shape of the operand. In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.

  • Pub Date: 2007/31/10
  • Number: 08018464
  • Owner: MicroUnity Systems Engineering, Inc.
  • Location: Los Altos, US
  • Details: Visit USPTO

Visit USPTO Page


Computational user-health testing responsive to a user interaction with advertiser-configured content

Methods, apparatuses, computer program products, devices and systems are described that carry out specifying at least one of a plurality of user-health test functions responsive to an interaction between a user and at least one advertiser-specified attribute; and transmitting at least one output of the at least one user-health test function related to the at least one advertiser-specified attribute.

  • Pub Date: 2007/31/10
  • Number: 08065240
  • Owner: The Invention Science Fund I
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for removing urushiol and treating the resulting skin condition

The present application is directed to various compositions to treat the itching and conditions that result from contracting poison ivy, poison oak, and poison sumac, as well as other plant and substances that contain substances that lead to a skin reaction but that upon removal alleviate the symptoms of the condition. In particular, the compositions described herein are useful for removing urushiol after it has contacted the skin. The compositions include granules or other scrubbing means to reach the urushiol in the skin, a mixture of surfactants to form a complex with the urushiol, counter-irritants to provide a soothing sensation to the irritated skin, and other functional ingredients to provide additional benefits to the individual who has contacted urushiol.

  • Pub Date: 2007/31/10
  • Number: 07858570
  • Details: Visit USPTO

Visit USPTO Page


Communications processor

A communication processor of a class, such as an Internet tuner, provides such desirable features (FIG. ) as LAN support, an SPI interface (), a dedicated port (), and ADPCM () for audio applications. The invention provides a low-cost, low-power, easily manufactured, small form-actor network access module which has a low memory demand and provides a highly efficient protocol decode. The invention comprises a hardware-integrated system that both decodes multiple network protocols in a streaming manner concurrently and processes packet data in one pass, thereby reducing system memory and form factor requirements, while also eliminating software CPU overhead.

  • Pub Date: 2007/31/10
  • Number: 07646790
  • Owner: NVIDIA Corporation
  • Location: Santa Clara, US
  • Details: Visit USPTO

Visit USPTO Page


Coated potato substrates having reduced fat content

A food product including a potato substrate having less than about 6% moisture content that is at least partially coated with a coating composition having a food starch component is provided. The at least partially coated potato substrate contains at least about 20% less fat content (adjusted to an about 1% product moisture basis) after thermal processing as compared to a substantially similar thermal processed uncoated potato substrate.

  • Pub Date: 2007/31/10
  • Number: 08163321
  • Owner: Advanced Food Technologies, Inc.
  • Location: Grand Rapids, US
  • Details: Visit USPTO

Visit USPTO Page


Automatically generating a second graphical program based on a first graphical program

System and method for programmatically generating a second graphical program associated with a second programming development environment based on a first graphical program associated with a first programming development environment. The second graphical program may be generated programmatically, without relying on user input, or may prompt for user input to determine various options to use in generating the second graphical program. The second graphical program may implement the functionality of, or a portion of the functionality of, the first graphical program. The method preferably generates the second graphical program such that the second programming development environment is operable to treat the second graphical program identically to a graphical program interactively developed by a user using the second programming development environment. Thus, once the second graphical program has been generated, the user may use the second programming development environment to edit the second graphical program, execute the second graphical program, etc.

  • Pub Date: 2007/31/10
  • Number: 08205188
  • Owner: National Instruments Corporation
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Authoring tool sharable file format

Systems and methods which provide a markup language based file format for storing authoring tool content are shown. The markup language based file format of embodiments provides an aggregated content object containing various assets. A container structure is preferably provided for a plurality of assets comprising the aggregated content object. The assets of embodiments of the present invention include different types of assets, including content assets which contain content and packaging assets which contain aggregated content object information. Content assets may comprise various types or forms of media, such as graphics, video, audio, text, etc. Packaging assets may be in a markup language format, such as may be utilized to provide robust information regarding the aggregated content object and assets thereof. The markup language based file format of embodiments of the invention facilitates access to all or portions of the aggregated content by various authoring tools.

  • Pub Date: 2007/31/10
  • Number: 08161389
  • Owner: Adobe Systems Incorporated
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Application interface for global mobile message delivery

A device, system, and method are directed towards communicating mobile information over a network. A mobile message (MM) is generated by an Internet Protocol (IP) enabled application interface. The MM may include advertising information. The MM is received at a routing server and comprises a destination phone number and/or advertising information. If the MM is determined to be locally processed, the routing server selectively routes the MM to a destination carrier associated with the destination phone number. If the MM is determined to be remotely processed, the MM is recursively forwarded until the MM reaches another routing server associated with the destination phone number. The other routing server is configured to selectively route the MM to the destination carrier. A response MM may be received at a boundary routing server. The response MM may be sent to the API if at least a portion of the response MM matches information associated with the MM.

  • Pub Date: 2007/31/10
  • Number: 08107470
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Analyzing video game performance using non-intrusive capture and storage of run-time game data

The performance of a video game is analyzed using non-intrusive capture and storage of game data. A non-linear capture format is used for capturing run-time game data. The run-time game data includes run-time parameters associated with execution of an application code as well as run-time parameters associated with hardware of a game platform upon which the application code is being executed. The captured data is stored in a storage medium using a non-contiguous storage format.

  • Pub Date: 2007/31/10
  • Number: 08667473
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Adaptive content platform and method of using same

An adaptive content platform includes one or more content-enabled, dependent applications, each of which includes a user interface and business logic. A services layer, which is interfaced with the dependent applications and a software infrastructure, provides one or more services that are usable by the dependent applications.

  • Pub Date: 2007/31/10
  • Number: 07971144
  • Owner: OpenPages
  • Location: Waltham, US
  • Details: Visit USPTO

Visit USPTO Page


Ultrasonic rotary-hammer drill

A mechanism for drilling or coring by a combination of sonic hammering and rotation. The drill includes a hammering section with a set of preload weights mounted atop a hammering actuator and an axial passage through the hammering section. In addition, a rotary section includes a motor coupled to a drive shaft that traverses the axial passage through the hammering section. A drill bit is coupled to the drive shaft for drilling by a combination of sonic hammering and rotation. The drill bit includes a fluted shaft leading to a distal crown cutter with teeth. The bit penetrates sampled media by repeated hammering action. In addition, the bit is rotated. As it rotates the fluted bit carries powdered cuttings helically upward along the side of the bit to the surface.

  • Pub Date: 2007/30/10
  • Number: 07740088
  • Owner: The United States of America as represented by the Administrator of the National Aeronautics and Space Administration
  • Location: Washington, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for providing requested quality of service in a hybrid network

Telephone calls, data and other multimedia information is routed through a hybrid network which includes transfer of information across the internet. A media order entry captures complete user profile information for a user. This profile information is utilized by the system throughout the media experience for routing, billing, monitoring, reporting and other media control functions. Users can manage more aspects of a network than previously possible, and control network activities from a central site. The hybrid network also contains logic for responding to requests for quality of service and reserving the resources to provide the requested services.

  • Pub Date: 2007/30/10
  • Number: 08194646
  • Owner: Verizon Communications Inc.
  • Location: New York, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for optimizing order placement in an order queue in an electronic trading environment

Systems and methods for optimizing order placement in an electronic trading environment are provided. Global queue holder orders are placed in a tradeable object to reserve quantity for traders. Traders may submit order requests for quantity at price levels at which a global queue holder order is holding quantity. When a trader submits an order for a quantity at a price level at which quantity is being held, a gateway compares the order to the global queue holder order information stored in a database. If the trader's order coincides with a price level at which quantity is held, then the gateway virtually transfers ownership of that quantity to the trader, who then assumes the advantageous queue position. When the quantity associated with the order is filled, the fill information is sent to the gateway, which to the database to determine which trader is associated with the filled order quantity.

  • Pub Date: 2007/30/10
  • Number: 08249976
  • Owner: Trading Technologies International Inc.
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Synthesizing information-bearing content from multiple channels

A computing system and method receive a query; separate a plurality of information sources into individual elements of content (EOC); tag each EOC with metadata that indicate source, date, and other relevant information; pattern match each EOC; calculate the respective distance function from every EOC to every other EOC; and output EOC to a set of virtual buffers () containing appropriately related EOC less than a given distance value. The method further creates virtual summary buffers (); then concatenates the EOC in each virtual buffer (); applies a comparative analysis filter () to remove redundant sub-elements; and presents the results as summary digests ().

  • Pub Date: 2007/30/10
  • Number: 2069465
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Software and method that enables selection of one of a plurality of online service providers

A novel electronic information transport component can be incorporated in a wide range of electronic information products, for example magazine collections, to automate the mass distribution of updates, such as current issues, from a remote server to a wide user base having a diversity of computer stations. Advantages of economy, immediacy and ease of use are provided. Extensions of the invention permit automated electronic catalog shopping with order placement and, optionally, order confirmation. A server-based update distribution service is also provided. In addition, an offline web browser system, with hyperlink redirection capabilities, a novel recorded music product with automated update capabilities and an Internet charging mechanism are provided.

  • Pub Date: 2007/30/10
  • Number: 08812620
  • Owner: Intellectual Property I LLC
  • Location: Wilmington, US
  • Details: Visit USPTO

Visit USPTO Page


Sales force automation and method

A salesforce automation system which integrates computerized, intelligent automated salesperson support for multiple phases of the sales process. Various subsystems may be provided to facilitate the sales process which may include pre-sales lead generation, maximize time spent with the customer, effectively manage an order, ensure customer satisfaction and retain the customer for future sales. Also provided to support the phases of the sales process are additional tools, integrated in the system. The additional tools may include self management subsystems, sales management subsystems and training subsystems.

  • Pub Date: 2007/30/10
  • Number: 07949578
  • Owner: SFA Systems, LLC
  • Location: Marshall, US
  • Details: Visit USPTO

Visit USPTO Page


Remote feature activator feature extraction

A database record controls a license to use a computational component. An input receives an order identifier associated with an order related to a computational component and an interface retrieves order information associated with the identifier. The order information comprises at least one material code. A material code mapping agent compares the material code with at least one material code mapping table to identify corresponding computational component information associated with the material code. In another configuration, a transaction record includes first information associated with the order, the order relates to at least a first computational component and/or feature thereof, a configuration file includes second information different from the first information, the configuration file relates to at least one telecommunication switch/server, and a configuration file processing agent compares some of the first information with some of the second information to form a system record having both first and second information.

  • Pub Date: 2007/30/10
  • Number: 07844572
  • Owner: Avaya Inc.
  • Location: Basking Ridge, US
  • Details: Visit USPTO

Visit USPTO Page


Polymorphs of suberoylanilide hydroxamic acid

The present invention provides methods of selectively inducing terminal differentiation, cell growth arrest and/or apoptosis of neoplastic cells, and/or inhibiting histone deacetylase (HDAC) by administration of pharmaceutical compositions comprising potent HDAC inhibitors. The oral bioavailability of the active compounds in the pharmaceutical compositions of the present invention is surprisingly high. Moreover, the pharmaceutical compositions unexpectedly give rise to high, therapeutically effective blood levels of the active compounds over an extended period of time. The present invention further provides a safe, daily dosing regimen of these pharmaceutical compositions, which is easy to follow, and which results in a therapeutically effective amount of the HDAC inhibitors in vivo. The present invention also provides a novel Form I polymorph of SAHA, characterized by a unique X-ray diffraction pattern and Differential Scanning Calorimetry profile, as well a unique crystalline structure.

  • Pub Date: 2007/30/10
  • Number: 07652069
  • Owner: Merck HDAC Research, LLC
  • Location: Boston, US
  • Details: Visit USPTO

Visit USPTO Page


Multimedia transactional services

The present invention provides a method and apparatus for providing real-time, two-way transactional capabilities on the Web. Specifically, one embodiment of the present invention discloses a method for enabling object routing, the method comprising the steps of creating a virtual information store containing information entries and attributes associating each of the information entries and the attributes with an object identity, and assigning a unique network address to each of the object identities. A method is also disclosed for enabling service management of the value-added network service, to perform OAM&P functions on the services network.

  • Pub Date: 2007/30/10
  • Number: 08037158
  • Details: Visit USPTO

Visit USPTO Page


Model train control system

A system which operates a digitally controlled model railroad transmitting a first command from a first client program to a resident external controlling interface through a first communications transport. A second command is transmitted from a second client program to the resident external controlling interface through a second communications transport. The first command and the second command are received by the resident external controlling interface which queues the first and second commands. The resident external controlling interface sends third and fourth commands representative of the first and second commands, respectively, to a digital command station for execution on the digitally controlled model railroad.

  • Pub Date: 2007/30/10
  • Number: 07970504
  • Details: Visit USPTO

Visit USPTO Page


Matching session records of network users with corresponding transaction data

A system for collecting data regarding network behaviors of users is disclosed. In one embodiment, the system combines session records of users with corresponding transaction records reflective of e-commerce transactions. The session records may, for example, be generated by one or more collection engines deployed by one or more Internet Service Providers. The transaction records may, for example, be obtained through interactions with one or more merchant web sites. By combining these two types of information, the system can, for example, identify a set of user actions that led to a particular purchase transaction.

  • Pub Date: 2007/30/10
  • Number: 07725944
  • Owner: Hitwise Pty. Ltd.
  • Location: Melbourne Victoria, AU
  • Details: Visit USPTO

Visit USPTO Page


Mapping schemas using a naming rule

Among other disclosed subject matter, a computer-implemented method for creating a mapping includes obtaining a definition relating to a first schema, the definition comprising a first plurality of nodes to be mapped to a second schema comprising a second plurality of nodes. The method includes receiving at least one context value for the received definition, the context value being associated with at least one context category defined for the second schema. The method includes generating names corresponding to each of the nodes in the first plurality, the generated names being consistent with a naming rule for the second schema. The method includes mapping each of the nodes in the first plurality to a respective one of the nodes in the second plurality, wherein the context value and at least one of the generated names are taken into account in the mapping.

  • Pub Date: 2007/30/10
  • Number: 08041746
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Haptic interface for touch screen embodiments

A haptic feedback touch control used to provide input to a computer. A touch input device includes a planar touch surface that provides position information to a computer based on a location of user contact. The computer can position a cursor in a displayed graphical environment based at least in part on the position information, or perform a different function. At least one actuator is also coupled to the touch input device and outputs a force to provide a haptic sensation to the user. The actuator can move the touchpad laterally, or a separate surface member can be actuated. A flat E-core actuator, piezoelectric actuator, or other types of actuators can be used to provide forces. The touch input device can include multiple different regions to control different computer functions.

  • Pub Date: 2007/30/10
  • Number: 08188981
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Haptic feedback for touchpads and other touch controls

A haptic feedback planar touch control used to provide input to a computer. A touch input device includes a planar touch surface that inputs a position signal to a processor of the computer based on a location of user contact on the touch surface. The computer can position a cursor in a displayed graphical environment based at least in part on the position signal, or perform a different function. At least one actuator is also coupled to the touch input device and outputs a force to provide a haptic sensation to the user contacting the touch surface. The touch input device can be a touchpad separate from the computer's display screen, or can be a touch screen. Output haptic sensations on the touch input device can include pulses, vibrations, and spatial textures. The touch input device can include multiple different regions to control different computer functions.

  • Pub Date: 2007/30/10
  • Number: 08031181
  • Owner: Immersion Corporation
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Functionalities for local number portability in a telecommunications network

According to various embodiments of the present invention, systems and methods for local number portability in a telecommunication network are disclosed. An embodiment of a method includes requesting a real-time (RT) customer service record (CSR) request for a telephone number (TN) associated with a local number portability (LNP) order, the requesting occurring prior to a second CSR request that occurs as part of a submit process for the LNP order; receiving, in response to the request for the RT CSR request, a RT CSR response from a telecommunications carrier that the TN is to be transferred from as part of the LNP order; and validating data in the RT CSR response in order to prevent rejections of the data in the second CSR during the LNP process. Other embodiments are also disclosed.

  • Pub Date: 2007/30/10
  • Number: 08761371
  • Owner: Level 3 Communications, LLC
  • Location: Broomfield, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing universal access control in an information management system

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2007/30/10
  • Number: 07877781
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing policy-based application and access control in an information management system

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2007/30/10
  • Number: 08595788
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing control policies in an information management system with two or more interactive enforcement points

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2007/30/10
  • Number: 09497219
  • Owner: NextLas, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing application and access control policies in an information management system with two or more interactive enforcement points

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2007/30/10
  • Number: 08407345
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Enforcing access control policies on servers in an information management system

A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.

  • Pub Date: 2007/30/10
  • Number: 08677499
  • Owner: NextLabs, Inc.
  • Location: San Mateo, US
  • Details: Visit USPTO

Visit USPTO Page


Call transfer using session initiation protocol (SIP)

A system is provided for providing communication event routing and transfer capability in a multi-site communication-center environment. The system utilizes a presence protocol application and a routing application for determining availability of an agent or system and for setting up the transfer from a point of transfer on a network to a destination of transfer on the same or connected network. In a preferred use the presence protocol application is shared by communication-center sites cooperating in the transfer and routing of events and the presence protocol enables at least one event-handling process normally performed by the routing application.

  • Pub Date: 2007/30/10
  • Number: 09042372
  • Owner: GENESYS TELECOMMUNICATIONS LABORATORIES, INC.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Address translation through an intermediate address space

In a data processing system capable of concurrently executing multiple hardware threads of execution, an intermediate address translation unit in a processing unit translates an effective address for a memory access into an intermediate address. A cache memory is accessed utilizing the intermediate address. In response to a miss in cache memory, the intermediate address is translated into a real address by a real address translation unit that performs address translation for multiple hardware threads of execution. The system memory is accessed with the real address.

  • Pub Date: 2007/30/10
  • Number: 08966219
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Spatially enabled content management, discovery and distribution system for unstructured information management

What is provided is a spatially-enabled content management system in which unstructured information is data mined for location or spatial references, with the search query including not only the spatial reference that has been provided by the data mining but also other search query terms, thus to provide an analyst with rapid geo-searching for unstructured information management.

  • Pub Date: 2007/29/10
  • Number: 08195630
  • Owner: BAE Systems Information Solutions Inc.
  • Location: Arlington, US
  • Details: Visit USPTO

Visit USPTO Page


Software architecture system with embedded virtual router

The invention relates to a network system of at least two appliances, each appliance configured to perform a cycle of operation on an article, and each appliance having its own software architecture. An embedded virtual router enables communication among appliance components independent of the architecture of the software.

  • Pub Date: 2007/29/10
  • Number: 08028302
  • Owner: Whirlpool Corporation
  • Location: Benton Harbor, US
  • Details: Visit USPTO

Visit USPTO Page


Provisioning an operating environment of a remote computer

Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.

  • Pub Date: 2007/29/10
  • Number: 07779469
  • Owner: Aventail LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Methods relating to hypoglycemic unawareness

Provided are methods of administering glucagon so as to reduce the risk of hypoglycemic unawareness. Also provided are methods of returning hypoglycemic awareness to a subject.

  • Pub Date: 2007/29/10
  • Number: 07683027
  • Owner: DiObex, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for reducing the risk of hypoglycemia

Pharmaceutical compositions comprising glucagon can be administered to control and treat diabetes while reducing or eliminating the risk of insulin-induced hypoglycemia. Also provided are methods of administering glucagon so as to reduce the risk of hypoglycemia.

  • Pub Date: 2007/29/10
  • Number: 07678762
  • Owner: DiObex, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and apparatus for querying a relational data store using schema-less queries

The invention provides, in one aspect, a method of searching an RDF triples data store of the type in which the triples are maintained in accord with a first storage schema. The method includes inputting a first query specifying RDF triples that are to be identified in the data store. That first query assumes either (i) that the triples are stored in a schema-less manner (i.e., with no storage schema) or (ii) that the triples are maintained in accord with a second storage schema that differs from the first. The method further includes generating, from the first query, a second query that specifies those same RDF triples, yet, that reflects the first storage schema. That second query can be applied to the RDF triples data store in order to identify and/or retrieve the desired data.

  • Pub Date: 2007/29/10
  • Number: 08412720
  • Details: Visit USPTO

Visit USPTO Page


Method of selecting a second content based on a user's reaction to a first content of at least two instances of displayed content

Embodiments provide a device, a system, a computer program product, and a method. A provided method embodiment may be implemented in an environment that includes a person viewing at least two instances of content having a common contextual attribute and displayed by an electronic device. The method includes detecting a reaction by a person to a displayed first content of the at least two instances of displayed content having a common contextual attribute. The method also includes determining a content attribute of the displayed first content. The method further includes initiating a search for a second content using a search parameter corresponding to the detected reaction and to the determined content attribute.

  • Pub Date: 2007/29/10
  • Number: 08234262
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing improved group instructions

Systems and apparatuses are presented relating a programmable processor comprising an execution unit that is operable to decode and execute instructions received from an instruction path and partition data stored in registers in the register file into multiple data elements, the execution unit capable of executing a plurality of different group floating-point and group integer arithmetic operations that each arithmetically operates on multiple data elements stored registers in a register file to produce a catenated result that is returned to a register in the register file, wherein the catenated result comprises a plurality of individual results, wherein the execution unit is capable of executing group data handling operations that re-arrange data elements in different ways in response to data handling instructions.

  • Pub Date: 2007/29/10
  • Number: 07849291
  • Owner: Microunity Systems Engineering, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for performing improved group floating-point operations

Systems and apparatuses are presented relating a programmable processor comprising an execution unit that is operable to decode and execute instructions received from an instruction path and partition data stored in registers in the register file into multiple data elements, the execution unit capable of executing a plurality of different group floating-point and group integer arithmetic operations that each arithmetically operates on multiple data elements stored registers in a register file to produce a catenated result that is returned to a register in the register file, wherein the catenated result comprises a plurality of individual results, wherein the execution unit is capable of executing group data handling operations that re-arrange data elements in different ways in response to data handling instructions.

  • Pub Date: 2007/29/10
  • Number: 07653806
  • Owner: Microunity Systems Engineering, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Distributed cache for state transfer operations

A network arrangement that employs a cache having copies distributed among a plurality of different locations. The cache stores state information for a session with any of the server devices so that it is accessible to at least one other server device. Using this arrangement, when a client device switches from a connection with a first server device to a connection with a second server device, the second server device can retrieve state information from the cache corresponding to the session between the client device and the first server device. The second server device can then use the retrieved state information to accept a session with the client device.

  • Pub Date: 2007/29/10
  • Number: 07720975
  • Owner: Aventail LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Deep-UV led and laser fluorescence apparatus for monitoring water quality

A method for detecting trace levels of dissolved organic compounds and leached plastic compounds in drinking water includes the steps of employing deep ultraviolet light-emitting diode induced fluorescence at sensitivity levels of several parts per trillion in real time so that a more compact and inexpensive excitation source, relative to a deep UV laser-induced fluorescence, for fluorescence detection of dissolved organic compounds in water is provided. The deep UV light-emitting diode is operated at an excitation near 265 nm and the laser induced fluorescence is detected at an emission near 450 nm to 500 nm for the dissolved organic compounds and near 310 nm for leached plastic compounds. Optical absorption filters and optical bandpass filters are employed to reduce out-of-band light emitting diode emissions and to eliminate second order optical interference signals for the detection of a fluorescence signal near 450 nm to near 500 nm. The system can measure water contained within a quartz optical cell, within bottled water containers, or in a flowing stream of water.

  • Pub Date: 2007/29/10
  • Number: 07812946
  • Owner: University of South Florida
  • Location: Tampa, US
  • Details: Visit USPTO

Visit USPTO Page


Creating an interrogation manifest request

Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.

  • Pub Date: 2007/29/10
  • Number: 2093202
  • Owner: Aventail LLC
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Computerized medical self-diagnostic and treatment advice system

A system and method for providing computerized, knowledge-based medical diagnostic and treatment advice. The medical advice is provided to the general public over a telephone network. Two new authoring languages, interactive voice response and speech recognition are used to enable expert and general practitioner knowledge to be encoded for access by the public. “Meta” functions for time-density analysis of a number of factors regarding the number of medical complaints per unit of time are an integral part of the system. A semantic discrepancy evaluator routine along with a mental status examination are used to detect the consciousness level of a user of the system. A re-enter feature monitors the user's changing condition over time. A symptom severity analysis helps to respond to the changing conditions. System sensitivity factors may be changed at a global level or other levels to adjust the system advice as necessary.

  • Pub Date: 2007/29/10
  • Number: 08015138
  • Owner: Clinical Decision Support, LLC
  • Location: Nashville, US
  • Details: Visit USPTO

Visit USPTO Page


Compositions and methods for the prevention and control of insulin-induced hypoglycemia

Pharmaceutical compositions comprising glucagon can be administered to control and treat diabetes while reducing or eliminating the risk of insulin-induced hypoglycemia. Also provided are methods of administering glucagon so as to reduce the risk of inducing hypoglycemia.

  • Pub Date: 2007/29/10
  • Number: 07678763
  • Owner: Diobex, Inc.
  • Location: San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Printhead including a looped heater element

An ink jet printhead that has a plurality of nozzles, a bubble forming chamber corresponding to each of the nozzles respectively, the bubble forming chambers adapted to contain a bubble forming liquid; and at least one looped heater element disposed in each of the bubble forming chambers respectively, the heater elements configured for thermal contact with the bubble forming liquid; wherein heating of the looped heater element to a temperature above the boiling point of the bubble forming liquid forms a gas bubble that causes the ejection of a drop of an ejectable liquid through the nozzle corresponding to that heater element.

  • Pub Date: 2007/28/10
  • Number: 2072419
  • Owner: Silverbrook Research Pty Ltd
  • Location: Balmain, New South Wales, AU
  • Details: Visit USPTO

Visit USPTO Page


Returning a second content based on a user's reaction to a first content

Embodiments include a device, a system, a computer program product, and a method. A method embodiment includes receiving from a requester sensor data indicative of a response by a person to a first content displayed to the person. The method also includes analyzing the received sensor data for an indication of an expression by the person corresponding to the first content. The method further includes facilitating a search for a second content using a search parameter corresponding to the indication of an expression by the person and to a content attribute of the displayed first content. The method also includes returning to the requester an indication of the second content.

  • Pub Date: 2007/27/10
  • Number: 08126867
  • Owner: The Invention Science Fund I, LLC
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Mechanism for executing nested transactions in an execution environment supporting flat transactions only

Disclosed is a means and a method for executing a nested transaction in an execution environment supporting flat transactions only. To process a StartTransaction operation within a nested transaction it is suggested to check whether the StartTransaction operation is on the first nesting level of the nested transactions. An actual transaction within the execution environment by issuing a corresponding StartTransaction is started only in the affirmative case but not otherwise. To process a CommitTransaction operation within a nested transaction to successfully terminate a transaction it is suggested to check whether the CommitTransaction operation is on the first nesting level of the nested transaction. An actual transaction within the execution environment will be terminated only by issuing a corresponding CommitTransaction operation in the affirmative case but not otherwise. To process a RollbackTransaction operation within a nested transaction aborting a transaction as unsuccessful, it is suggested to issue a corresponding RollbackTransaction operation within the execution environment independent from the nesting level of said RollbackTransaction operation.

  • Pub Date: 2007/27/10
  • Number: 08090697
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Toolbar signature

A method and system are provided for a web browser toolbar signature. In one example, the method includes receiving a submission of user content from a source webpage, receiving a producer identity of a producer who submitted the user content, receiving identifying information about the destination webpage, coding signed content using the user content and the producer identity, wherein the signed content includes a signature, and submitting the signed content to a server hosting the destination webpage.

  • Pub Date: 2007/26/10
  • Number: 07958363
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


Text enhancement mechanism

Media enhancing services for pages containing text is described. Text is analyzed to determine related additional media available on the network, and the page description is augmented with metadata to identify the additional media in an enhanced page description. When the enhanced page is rendered, the metadata facilitates incorporation of additional media in the displayed page.

  • Pub Date: 2007/26/10
  • Number: 07899808
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for utilizing a virtualized compute cluster as an execution engine for a virtual machine of a storage system cluster

A system and method employs one or more clients of a virtualized compute cluster as an execution engine for a portion of a storage operating system implemented as a virtual machine on a storage system node of a storage system cluster. If there is processing bandwidth of a client that is not fully utilized and the load on the storage system node is high, the portion of the storage operating system is ported to the client of the compute cluster in a manner that externally distributes the storage architecture from the storage system cluster. Advantageously, the processing performance of the storage system cluster is improved by, among other things, offloading some of the network processing load from the storage system node.

  • Pub Date: 2007/26/10
  • Number: 08468521
  • Owner: NetApp, Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for television-based services

Methods, systems, and apparatus, including computer program products, for executing an interactive game in a television distribution system. In one aspect, a method includes receiving input over the television distribution system from a game client indicating an action associated with a game instance, wherein the game client is hosted on a set-top box; determining an updated status of the game instance based on the action; generating a game status message identifying the updated status of the game instance; and transmitting the game status message to the game client. Further, the game status message can be transmitted to a plurality of game clients participating in the game instance. Additionally, input can be received over the television distribution system from another game client indicating a second action associated with the game instance and an updated status of the game instance can be determined based on the second action.

  • Pub Date: 2007/26/10
  • Number: 08562438
  • Owner: NTN Buzztime, Inc.
  • Location: Carlsbad, US
  • Details: Visit USPTO

Visit USPTO Page


Server-based code compilation

A server is disclosed that includes an interface to a data communication network, a compiler library that stores a plurality of different compilers, and compiler selection logic responsive to data received at the interface and including logic. The compiler selection logic is configured to select one of the plurality of different compilers based on an evaluation of the received data. The selected compiler generates compiled output data and the compiled output data is communicated over the data communication network to a client.

  • Pub Date: 2007/26/10
  • Number: 08365153
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Role tailored portal solution integrating near real-time metrics, business logic, online collaboration, and web 2.0 content

The disclosed solution provides a tailored user experience available through a Web portal that addresses the multiple-view, multiple-data needs of operations, supervisory, policy making, and executive personnel of an organization. These various roles can all be concerned with measurement/assessment of an organization's compliance with performance targets, for which real-time, near real-time or other metrics are gathered. The metrics can be presented in a role tailored fashion to the portal users in near real-time along with federation of analysis and trend calculation output. Business logic can be applied to the federated data and near real-time metrics to automatically effectuate actions and/or to suggest responses when received metrics exceed previously established boundaries. Collaboration tools and Web 2.0 information sharing technologies can be integrated in the portal to facilitate rapid coordinated responses and to share information across the organization.

  • Pub Date: 2007/26/10
  • Number: 08185827
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Providing contextually sensitive tools and help content in computer-generated documents

A method and system are provided for creation, implementation, and use of computer-generated “smart” documents to which functionality is attached for providing contextually sensitive tools, controls and help content to users of those documents. Portions of documents are annotated with Extensible Markup Language (XML) tags and structure so that when a user enters those portions, such as by placing a computer cursor in those portions, the user is provided contextually sensitive tools, controls and/or help content. A document tools pane may open on the user's computer screen adjacent to the document being edited for providing the document tools, controls or help content related to the context of the text or data in which the cursor is located. If the user moves the cursor to another portion of the document, the user may obtain information associated with the context of the new portion of the document in which the cursor is located.

  • Pub Date: 2007/26/10
  • Number: 08706708
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for automated searching

The present invention provides systems and methods for automating a search over a network such as the Internet. A user selects data such as text from within an application. The selected data is activated and a search is performed without the user having to leave the application. The search is performed while the user is continuing within the application. When the search is complete, the search results are made available to the user within the application from which the search was initiated. In one embodiment, the data is pre-searched and the results are cached such that the results are already available should the user desire. The present invention is particularly suited to integration with an operating system such that the methods of the present invention are thereby available to all applications. Alternatively, the present invention can be specific to a particular application.

  • Pub Date: 2007/26/10
  • Number: 07797301
  • Owner: Hyperthink LLC
  • Location: Salt Lake City, US
  • Details: Visit USPTO

Visit USPTO Page


Media enhancement mechanism using embed code

A method to provide additional media objects for data objects containing one or more existing media objects is described. The existing media object is analyzed to determine additional related media available on the network, and the data object description is augmented with metadata to identify the additional media in an enhanced data object description. When the enhanced data object is rendered, the metadata facilitates incorporation of additional media objects in the displayed page.

  • Pub Date: 2007/26/10
  • Number: 08290929
  • Owner: Yahoo! Inc.
  • Location: Sunnyvale, US
  • Details: Visit USPTO

Visit USPTO Page


E-bazaar featuring personal information security

Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational assets in a networked computer environment. The concerns of informational privacy and informational self-determination are addressed squarely by the invention affording persons and entities a trusted means to author, secure, search, process, and exchange personal and/or confidential information in a networked computer environment. The formation of trusted electronic communities wherein members command and control their digital persona, exchanging or brokering for value the trusted utility of their informational assets is made possible by the invention. The present invention provides for the trusted utilization of personal data in electronic markets, providing both communities and individuals aggregate and individual rule-based control of the processing of their personal data.

  • Pub Date: 2007/26/10
  • Number: 08195569
  • Owner: CYVA Research Corporation
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Easy-to-use data report specification

A method and system for the graphical specification and modification of reports is disclosed which enables data reports to be easily created via a report design dialogue. The report design dialogue includes a group-level outline panel containing controls for grouping, as well as other report controls such as those for sorting and aggregating. A method and system for creating a group-level outline panel using an existing database report is also disclosed. Finally, a computer-readable medium storing a computer-interpretable data structure that stores one or more report specifications is disclosed.

  • Pub Date: 2007/26/10
  • Number: 07788257
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Client-side selection of a server

A method, system, and computer program product for performing network device management and client load distribution to a number of the Common Information Model Object Manager (CIMOM) servers via a network path. A client-side server selection (CSS) utility allows a client to choose the ideal server to fulfill a CIM request message. The client transmits the CIM request message to the CIMOM server based on service response time information utilized by the CSS utility. The CIM request message is forwarded to a CIM provider for processing. The provider returns a CIM response message to the CIMOM and a service response time is generated. Thereafter, the CIMOM returns the CIM response message to the client. At a preset time period, a Service Location Protocol (SLP) advertise generation facility initiates a multicast of the service response time information (from all network CIMOM servers) to the CSS utility.

  • Pub Date: 2007/26/10
  • Number: 08037197
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Calculating and storing data structures including using calculated columns associated with a database system

Embodiments are provided to calculate and provide information based in part on a defined expression. In an embodiment, a database system can be configured to include a number of calculated columns as part of a database table structure. The database system can be configured to present a calculated result based in part on a determined result type. In one embodiment, a database system can be configured to enable calculated columns to be defined on a table of a database, wherein a component can be used to evaluate an expression associated with a column calculation to determine a proper result type. The proper result type can be stored and used when presenting a result of the calculation. Other embodiments are available.

  • Pub Date: 2007/26/10
  • Number: 07836100
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Ad hoc wireless networking

A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as ultra wideband (UWB) devices operating according to the WiMedia Logical Link Control Protocol (WLP) communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks.

  • Pub Date: 2007/26/10
  • Number: 07911990
  • Owner: Microsoft Corporation
  • Location: Redmond, US
  • Details: Visit USPTO

Visit USPTO Page


Processing event notifications with an event sink

Applications generating events, and system facilities generating events, send notifications of the events to a system event sink. The event sink is preferably associated with an operating system, and provides an application programming interface for registering listeners. (In one alternative approach, the event sink operates as a centrally-accessible or network-accessible entity, where it may concurrently interact with more than one client.) Upon receiving a notification of an event, the event sink forwards the notification to any registered listeners. Optionally, filters may be used to specify criteria to be met before a notification is forwarded to the listener. An event does not rely on a particular application for displaying the event to an end user. As one example, notification of a newly-arrived e-mail message might be presented in a chat window of an instant messaging client.

  • Pub Date: 2007/25/10
  • Number: 08117304
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Prioritization of third party access to an online commerce site

Providing prioritization of user online access to an online commerce site. Third party applications using API function calls to access an online commerce site are restricted to specific services by an access rule. An access rule defines which API server on the online commerce site a specific third party application may access when using a specific API function call. In this way, the operator of the online commerce site may prioritize server access per service level agreements based on a specific third party application and API function call.

  • Pub Date: 2007/25/10
  • Number: 08108518
  • Owner: eBay Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Oil consumption monitoring for aircraft engine

A system and method for accurately calculating the oil quantity and oil consumption rate of an aircraft engine detects the level of oil in an oil tank, calculates the oil quantity in the oil tank by compensating for the acceleration of the aircraft, as well as changes in the pitch, yaw and roll of the aircraft. The oil consumption rate of the aircraft is also calculated by calculating the oil quantity at different times, and dividing the difference in oil quantity by the difference in times. The percentage change in oil consumption of the aircraft engine is also calculated. The oil quantity and oil consumption rate can be reported during and after the aircraft's flight.

  • Pub Date: 2007/25/10
  • Number: 08103462
  • Owner: United Technologies Corporation
  • Location: Hartford, US
  • Details: Visit USPTO

Visit USPTO Page


Methods for an alternative payment platform

Methods and systems are provided for providing an alternative payment platform, including method and systems for providing a platform for presenting an alternate offer to a user who is engaged with a primary offer and receiving an indication of the user's engagement with the alternate offer, wherein the user's engagement with the alternate offer serves as an alternative form of payment for an item associated with the primary offer. Such methods and systems may further include methods and systems for selecting one or more alternate offers engagement with which serves as an alternative form of payment for an item associated with a primary offer, presenting the selected alternate payment offers to a user, receiving an indication of engagement with at least one of the alternate offers, receiving payment in exchange for presenting the accepted offer and providing payment to the offeror of the primary offer.

  • Pub Date: 2007/25/10
  • Number: 07848960
  • Owner: TrialPay, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for an alternative payment platform

Methods and systems are provided for providing an alternative payment platform, including method and systems for providing a platform for presenting an alternate offer to a user who is engaged with a primary offer and receiving an indication of the user's engagement with the alternate offer, wherein the user's engagement with the alternate offer serves as an alternative form of payment for an item associated with the primary offer. Such methods and systems may further include methods and systems for selecting one or more alternate offers engagement with which serves as an alternative form of payment for an item associated with a primary offer, presenting the selected alternate payment offers to a user, receiving an indication of engagement with at least one of the alternate offers, receiving payment in exchange for presenting the accepted offer and providing payment to the offeror of the primary offer.

  • Pub Date: 2007/25/10
  • Number: 07788139
  • Owner: TrailPay, Inc.
  • Location: Mountain View, US
  • Details: Visit USPTO

Visit USPTO Page


Method of developing specific content and creating standardized content from the specific content

Techniques for providing software as a service for enterprise entities are described herein. In one embodiment, a first interface is provided to allow a client to browse over a network a plurality of standard content to be selected to use in one or more software applications used by the client, where the standard content is listed in one or more catalog and each catalog corresponding to a particular industrial usage. A second interface is provided to allow the client to subscribe a service of one or more specific categories selected from the standard content available via the first interface for a predetermined period of time, wherein during the predetermined period of time, the client can select one or more standard content from the subscribed categories and deploy the selected standard content in a system of the client without additional cost. Other methods and apparatuses are also described.

  • Pub Date: 2007/25/10
  • Number: 07788138
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for composite part data extraction

A computer implemented method, apparatus, and computer usable program code for providing ply lay-up data for a composite part. A designation of a location is received for the composite part in a three dimensional object from a requester. A three dimensional model is opened in which the composite part is located. The ply lay-up data is extracted for a section within the composite part within the three dimensional model to form extracted ply lay-up data for the section. An output file is created containing a two dimensional drawing for the section with the ply lay-up data identifying a ply stacking sequence, an orientation of each ply in the ply stacking sequence, and a material for the each ply in the ply stacking sequence. The output file is returned to the requester.

  • Pub Date: 2007/25/10
  • Number: 08321180
  • Owner: The Boeing Company
  • Location: Chicago, US
  • Details: Visit USPTO

Visit USPTO Page


Digital media organization and access

Methods and apparatus, including computer program products, implementing and using techniques for accessing and organizing data items, including items of digital media, such as digital images, video stream, audio stream, text documents and the like. An object model defines a plurality of data object classes, including a media object class for representing items of digital media and a tag object class for representing categories of digital media. A request for one or more data items specifies a search condition. A collection of one or more data objects instantiated from the data object classes is generated, whereby the data objects in the collection represent data items satisfying the search condition. An iterator configured to sequentially access the data items represented by the data objects in the collection of data objects is generated and used to sequentially access the data items.

  • Pub Date: 2007/25/10
  • Number: 08010548
  • Owner: Fotiva, Inc.
  • Location: San Jose, US
  • Details: Visit USPTO

Visit USPTO Page


Determining presence for interaction routing

An Internet Protocol Network Telephony call center having a plurality of agents for serving clients also processes e-mails addresses to the call center, but not to specific agents. An e-mail server receives and routes the e-mail, and includes a router and a database storing skill set information regarding agents. The router extracts information from the e-mails, matches key words in the extracted information with key words from the skill sets, and routes the e-mails to appropriate agents having the necessary skills to respond to the service requirements in the e-mails.

  • Pub Date: 2007/25/10
  • Number: 2071258
  • Owner: Genesys Telecommunications Laboratories, Inc.
  • Location: Daly City, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for a real-time synchronized electrical power system simulator for “what-if” analysis and prediction over electrical power networks

A system for real-time modeling of electrical system performance is disclosed. The system includes a data acquisition component, a power analytics server and a client terminal. The power analytics server is comprised of a virtual system modeling engine, an analytics engine and a power system simulation engine. The virtual system modeling engine is configured to generate predicted data output utilizing a first virtual system model. The analytics engine is configured to synchronize the first virtual system model when a difference between the real-time data output and the predicted data output exceeds a threshold. The power system simulation engine is configured to store and process patterns and facilitate modification of parameters on the first virtual system model to create a second virtual system model; and forecast an aspect of the electrical system operating under parameters of the second virtual system model. The client terminal displays the forecasted aspects.

  • Pub Date: 2007/24/10
  • Number: 08180622
  • Owner: Power Analytics Corporation
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Simultaneously accessing file objects through web services and file services

Accessing data file objects includes providing a file system interface on a client, where the file system interface allows an application running on the client to make file system calls to access the data file objects. A Web Services interface may also be provided on the client, where the Web Services interface allows an application to access file objects using the Web Services at the same time that file objects are being accessed through the file system interface. The Web Services interface may be a SOAP interface and/or a REST interface. Accessing data file objects may also include providing a direct file object interface on the client, where the direct file object interface allows an application to directly access file objects at the same time that file objects are being accessed using the Web Services interface and using the file system interface.

  • Pub Date: 2007/24/10
  • Number: 07836018
  • Owner: EMC Corporation
  • Location: Hopkinton, US
  • Details: Visit USPTO

Visit USPTO Page


Method of selecting a second content based on a user's reaction to a first content

Embodiments include an apparatus, a system, a device, a computer program product, and a method. A method embodiment includes a method implemented in an environment that includes a person interacting with an electronic device via a user device. The method includes detecting a reaction by the person to a displayed first content. The method also includes determining a content attribute of the displayed first content. The method further includes facilitating a search for a second content based on the detected reaction and on the determined content attribute. The method includes displaying the second content in a manner perceivable by the person.

  • Pub Date: 2007/24/10
  • Number: 09513699
  • Owner: Invention Science Fund I, LL
  • Location: Bellevue, US
  • Details: Visit USPTO

Visit USPTO Page


Mapping deep structured data structures

Methods and apparatus, including computer program products, for mapping deep structured data structures. Statements defining a mapping of source elements formatted in accordance with a first hierarchical structure to a target formatted in accordance with a second hierarchical structure are received. The first and second hierarchical structures may be different. A mapping of the source elements to the target in accordance with the statements may be performed, where the statement may be defined in accordance with a mapping language. The mapping language may define that a single statement may represent an iterative approach to mapping elements from the source to the target. The mapping language may support selection of source elements using a format that allows for navigation through a hierarchy of the source. The mapping language may also support nested statements which may allow for nested iterations in which to perform mappings.

  • Pub Date: 2007/24/10
  • Number: 08046383
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Genetic variations associated with tumors

Nucleotide and amino acid variations associated with tumors are provided. Methods for detecting variations and for diagnosing and treating tumors are provided.

  • Pub Date: 2007/24/10
  • Number: 08680041
  • Owner: Genentech, Inc.
  • Location: South San Francisco, US
  • Details: Visit USPTO

Visit USPTO Page


Automated real-time data stream switching in a shared virtual area communication environment

In one aspect, one or more real-time data stream connections that deliver a set of real-time data streams to a given network node are determined based at least in part on bandwidth capabilities of the given network node. In another aspect, for each of one or more recipient network nodes, a respective link over which to transmit a respective transmission set of one or more real-time data streams is determined. For each of the links, the respective link bandwidth is apportioned between one or more channels that are respectively allocated to the one or more real-time data streams in the respective transmission set.

  • Pub Date: 2007/24/10
  • Number: 07844724
  • Owner: Social Communications Company
  • Location: Eugene, US
  • Details: Visit USPTO

Visit USPTO Page


Arrangements for enhancing multimedia features in a virtual universe

In one embodiment, a method for operating a virtual environment is disclosed. The method can include receiving an interactive virtual universe feed from a network in coordinate format. The method can also include displaying an interactive virtual universe and providing a trigger to a client application responsive to a user interaction. The trigger can change a mode of a user's computer where the computer receives and displays video data or pixel data. Thus, the client machine can display higher quality video. Other embodiments are also disclosed.

  • Pub Date: 2007/24/10
  • Number: 08441475
  • Owner: International Business Machines Corporation
  • Location: Armonk, US
  • Details: Visit USPTO

Visit USPTO Page


Wagering game system manager

Embodiments of a wagering game system manager are described herein. In one embodiment, a wagering game system includes a plurality of wagering game machines. The wagering game system can also include a plurality of wagering game managers, wherein each of the wagering game managers is configured to acquire a different set of manufacturer-specific wagering game information from ones of the wagering game machines. Additionally, the wagering game system can include a multi-system manager configured to generate an interface including a plurality of views, each view to presents one of the different sets of manufacturerspecific wagering game information.

  • Pub Date: 2007/23/10
  • Number: 09058721
  • Owner: WMS Gaming, Inc.
  • Location: Waukegan, US
  • Details: Visit USPTO

Visit USPTO Page


Server-side wireless communications link support for mobile handheld devices

A server-based method for implementing a communications link. The method includes receiving via a communications network a request for a communications link from a client communications component executing on a handheld device and establishing a wireless communications link with the handheld device by using a server communications interface executing on the server. An optimized protocol is automatically implemented between the client communications component and the server based on the wireless communications link type and the handheld device type, wherein the optimized protocol is implemented while maintaining a standardized application programming interface for the server communications interface, and wherein the communications link is established via the communications component functioning with a device API component to configure hardware of the handheld device.

  • Pub Date: 2007/23/10
  • Number: 08009619
  • Owner: Phunware, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


Process attachable virtual machines

Methods and apparatus, including computer program products, for using process attachable virtual machines to provide isolation between user sessions in a scalable manner, enabling a server to robustly process requests corresponding to a large number of user sessions. The methods and apparatus include initializing a process attachable virtual machine for a user session, receiving a request corresponding to the user session, and binding the process attachable virtual machine to an operating system process to process the request.

  • Pub Date: 2007/23/10
  • Number: 08505014
  • Owner: SAP AG
  • Location: Walldorf, DE
  • Details: Visit USPTO

Visit USPTO Page


Method and system for accessing wireless account information

A method for managing wireless account information. A list of applications is presented via a web interface on a computing device. The applications are operable to run on a wireless handheld device and a plurality of billing options are presented. In response to receiving a selection of an application, a wireless account is updated via a link between a web account and a wireless account according to the selected application, such that the selected application is available when a wireless account is accessed via a wireless handheld device.

  • Pub Date: 2007/23/10
  • Number: 07979350
  • Owner: GoTV Networks, Inc.
  • Location: Sherman Oaks, US
  • Details: Visit USPTO

Visit USPTO Page


GSH adducts and uses thereof

The invention relates to biomarkers of oxidative stress and their use. Specifically, the invention relates to thiadiazabicyclo-4-oxo-2(E)-nonenal-Glutathione adduct as a biomarker of oxidative stress and its diagnostic use.

  • Pub Date: 2007/23/10
  • Number: 08748121
  • Owner: The Trustees of the University of Pennsylvania
  • Location: Philadelphia, US
  • Details: Visit USPTO

Visit USPTO Page


Fielded device failure tracking and response

A fault remediation system for fielded wireless mobile devices addresses field failure data collection, consolidation of field failure data, and an information services platform so that the players in a wireless/mobile broadcast/broadband application/service value chain to respond to field failure problems in a consistent and automated manner from wireless/mobile devices over wireless multicast and or wireless broadband networks. An elegant and extremely flexible mechanism enables the failure data collection from a targeted set of wireless/mobile devices. In addition, sophisticated mechanisms identify targeted set of devices that should participate in field failure data collection based on user specified operational requirements (e.g., selected OEM, device configuration type, subscribers to a specific wireless broadband serve, failure occurrence certain time limits, etc.). The fault data logging on the mobile device is vertically integrated to allow diagnosis and assignment to a responsible party for fixing, testing, and release with subsequent certification and deployment.

  • Pub Date: 2007/23/10
  • Number: 08886179
  • Owner: QUALCOMM Incorporated
  • Location: San Diego, US
  • Details: Visit USPTO

Visit USPTO Page


Client-side wireless communications link support for mobile handheld devices

A client-based method for implementing a communications link. The method includes receiving a request for a communications link from an application executing on a handheld device and accessing a device API component to configure device hardware to implement the communications link. A wireless communications link is established with a server. In optimized protocol is automatically implemented between a client communications component and the server based on the wireless communications link type and the handheld device type, wherein the communications link is established via the communications component functioning with a device API component to configure hardware of the handheld device.

  • Pub Date: 2007/23/10
  • Number: 08060594
  • Owner: Phunware, Inc.
  • Location: Austin, US
  • Details: Visit USPTO

Visit USPTO Page


System and method for communicating data using waveform with extended preamble

A system communicates data and includes an encoder for encoding communications data. A modulator maps the communications data based on a specific mapping algorithm to form a communications signal over which the communications data can be transmitted. The communications signal includes a preamble that has set-up or transmission parameters used for acquiring the signal at a modem and at least one extended preamble for conveying additional set-up or transmission parameters. This extended preamble includes N extended preamble bits having at least one of information, transmission parameter and control bits and M map bits that identify a predetermined mapping for the N extended preamble bits.

  • Pub Date: 2007/22/10
  • Number: 07903756
  • Owner: Harris Corporation
  • Location: Melbourne, US
  • Details: Visit USPTO

Visit USPTO Page


Previewing user interfaces and other aspects

User interfaces for browsing, searching, and/or previewing are described. In one embodiment, a method includes call a preview generator to generate an initial preview in response to receiving an input, receiving a content to be displayed from the preview generator, displaying the content as the initial preview, and displaying and scrolling concurrently an enhanced preview to a next item in a representation of items in a search result in response to an input to directionally move. Other embodiments are also described, and computer readable media and apparatuses are also described.

  • Pub Date: 2007/22/10
  • Number: 09058337
  • Owner: Apple Inc.
  • Location: Cupertino, US
  • Details: Visit USPTO

Visit USPTO Page


Method and apparatus for controlling execution of a computer operation

Computer operations whose execution would increase usage costs may require use of authorization and notification to prevent unauthorized execution. The computer operations may be designed to execute only if a authorization and notification routines are properly registered. The computer system customer establishes the authorization and notification requirements based on standard application programming interfaces to suit the customer's business practices and links the requirements to the computer operation. The computer operation determines if the authorization and notification are proper. If authorization is granted, the computer operation checks to see that the notification is proper, executes the computer operation, and then executes a notification module to notify the necessary personnel. Both authorization and notification routines return errors that are passed to the user through the computer operation.

  • Pub Date: 2007/22/10
  • Number: 07926101
  • Owner: Hewlett-Packard Development Company, L.P.
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Decentralized media access control for ad-hoc mobile wireless network

A method of operating a decentralized ad-hoc wireless network including wireless stations, comprises establishing a common time reference which is used by the wireless stations to share access to a common wireless channel, the common time reference having a periodic superframe structure including a Scheduled Beacon Period, a Contended Beacon Period, Contention Periods (CPs) and Contention Free Periods (CFPs). The method further comprises time-scheduling, using wireless communication between the wireless stations, the CFPs in the SBTT interval to at least some of the wireless stations requesting access to the CFPs, and granting access to the CPs to at least some of the wireless stations requesting access to the CPs.

  • Pub Date: 2007/22/10
  • Number: 07881340
  • Owner: The Johns Hopkins University
  • Location: Baltimore, US
  • Details: Visit USPTO

Visit USPTO Page


Dropdown widget

A data processing system and method of presenting data on a graphical user interface. A dropdown widget with multiple lists is provided. According to an embodiment, items are grouped into multiple lists, and the lists are presented in an alternating or cyclic fashion in response to a user input. In a certain embodiment, a particular list may be selected for display by choosing the corresponding button on a widget. In some cases, multiple lists may be displayed at the same time. The present invention enables the user to select one or more items from mutually exclusive or hierarchically organized lists.

  • Pub Date: 2007/21/10
  • Number: 07971155
  • Details: Visit USPTO

Visit USPTO Page


Method and system for communicating between isolation environments

A method and system for associating installation scopes within an isolation environment, where the method includes defining an isolation environment for encompassing an aggregation of installation scopes. Associations are created between a first application and a first installation scope. When the first application requires the presence of a second application within the isolation environment for proper execution, an image of the required second application is mounted onto a second installation scope and an association between the second application and the second installation scope is created. Another association is created between the first installation scope and a second installation scope, and this third association is created within a third installation scope. Each of the first, second, and third installation scopes are stored and the first application is launched into the defined isolation environment.

  • Pub Date: 2007/20/10
  • Number: 08171483
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Wireless communication apparatus and wireless communication method

When a native application and a downloaded application installed on a mobile equipment are simultaneously executed by multitask and when these applications try to use short-range wireless communication simultaneously, the short-range wireless communication may be unavailable because of restrictions on communication resources. An object of the invention is to provide a wireless communication apparatus and wireless communication method capable of performing communication management to permit the applications to use the short-range wireless communication, without a need for a complicated operation of especially terminating an application to release a communication resource in the foregoing case. A communication profile storage stores combinations of communication profiles which can be simultaneously executed. A short-range wireless communication management unit determines whether a communication process according to an instruction from an external application can be executed, based on the communication profiles. When the short-range wireless communication process is determined not to be executed, a disconnection unit notifies the external application of unavailability of the communication.

  • Pub Date: 2007/19/10
  • Number: 07773989
  • Owner: NTT DoCoMo, Inc.
  • Location: Tokyo, JP
  • Details: Visit USPTO

Visit USPTO Page


Using geothermal energy to heat a portion of a formation for an in situ heat treatment process

Methods of using geothermal energy to treat subsurface formations are described herein. Methods for using geothermal energy to treat a subsurface treatment area containing or proximate to hydrocarbons may include producing geothermally heated fluid from at least one subsurface region. Heat from at least a portion of the geothermally heated fluid may be transferred to the subsurface treatment area to heat the subsurface treatment area. At least some hydrocarbon fluids may be produced from the formation.

  • Pub Date: 2007/19/10
  • Number: 07730945
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Treating tar sands formations with karsted zones

Methods for treating a tar sands formation are described herein. The tar sands formation may have one or more karsted zones. Methods may include providing heat from one or more heaters to one or more karsted zones of the tar sands formation to mobilize fluids in the formation. At least some of the mobilized fluids may be produced from the formation.

  • Pub Date: 2007/19/10
  • Number: 07673681
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for managing cookies via HTTP content layer

The cookie management system and methods of the present solution address issues with rewriting cookie headers by handling cookies in the content layer of HTTP instead of the HTTP transaction layer. The present solution maintains cookie information for a browser via an intermediary and installs the correct cookie parameters in the browser via the HTTP content layer. Instead of using the headers of the HTTP transaction layer which may cause issues due to rewriting, the present solution manages the cookies outside of this layer. This avoids the browser managing the cookies incorrectly. Set cookies headers served from a server in response to client HTTP requests are removed by the intermediary. Cookie information from the headers are stored in a cookie jar on the intermediary. The intermediary delivers instructions and scripts via the content layer of the HTTP response to set the cookie in the browser. The scripts detect browser changes to the cookie and communicates the changes to the intermediary to update the cookie jar. With the present solution, the domain and path names of a cookie are set correctly on the browser when delivering content via a reverse proxy.

  • Pub Date: 2007/19/10
  • Number: 07925694
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Systems and methods for enhancing security by selectively opening a listening port when an incoming connection is expected

The present solution reduces the attack surface of a server by selectively opening a server port for listening when a client has been authenticated/authorized via another machine or process, and directed to connect to the server in question. When not selectively listening on a port, the server does not listen or open ports for connections or otherwise minimizes the number of open ports. By selectively listening for connections, the server reduces the opportunity for hackers to attack the server process, and improves the security of the server. The ability to selectively listen on a port at specific times may be combined with additional meta information—like ticketing and prior authentication information to help further secure the server. The meta information may identify and ensure that only the correct remote endpoint is allowed to connect via the port. Instead of first listening for connections and then authenticate and authorize the received connection as with typical servers, the present solution first authenticates/authorizes a connection via another machine or process, then listens for an expected and authorized connection.

  • Pub Date: 2007/19/10
  • Number: 08266688
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


On-line transaction processing (OLTP) compression and re-compression of database data

A computer is programmed to compress data of a database in response to database modification language (DML) statements generated by on-line transaction processing (OLTP) systems. In several embodiments, data that is initially added to a database block is left uncompressed until a predetermined condition is satisfied, which happens infrequently (relative to OLTP transactions on the block). When satisfied, the computer automatically compresses all uncompressed data in the block, which increases the amount of unused space in the block. New data is thereafter added uncompressed to the partially compressed block, until satisfaction of a predetermined condition whereby the partially compressed block is again compressed, i.e. re-compressed. Adding of new data to a partially compressed block and its compression are repeated unless another predetermined condition is met, in response to which the block is not further re-compressed, thereby to recognize a limit on the benefit from compression.

  • Pub Date: 2007/19/10
  • Number: 08392382
  • Owner: Oracle International Corporation
  • Location: Redwood Shores, US
  • Details: Visit USPTO

Visit USPTO Page


Moving hydrocarbons through portions of tar sands formations with a fluid

A method for treating a tar sands formation is disclosed. The method includes heating a first portion of a hydrocarbon layer in the formation from one or more heaters located in the first portion. The heat is controlled to increase a fluid injectivity of the first portion. A drive fluid and/or an oxidizing fluid is injected and/or created in the first portion to cause at least some hydrocarbons to move from a second portion of the hydrocarbon layer to a third portion of the hydrocarbon layer. The second portion is between the first portion and the third portion. The first, second, and third portions are horizontally displaced from each other. The third portion is heated from one or more heaters located in the third portion. Hydrocarbons are produced from the third portion of the formation. The hydrocarbons include at least some hydrocarbons from the second portion of the formation.

  • Pub Date: 2007/19/10
  • Number: 2072185
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO

Visit USPTO Page


Methods and systems for accessing remote user files associated with local resources

A system for accessing, by a resource, a setting in a virtualized user profile includes an isolation environment, a resource, and a filter driver. The resource executes outside an isolation environment on a local machine and requests access to a setting in a user profile. The filter driver intercepts the request for access and identifies one of the isolation environment and a remote machine, responsive to an application of a rule to the request. The filter driver redirects the request to the one of the isolation environment and the remote machine. A method includes intercepting an instruction from a resource to modify a setting on a local machine, the resource provided by a local machine and executing outside of an isolation environment. The method includes identifying the isolation environment, responsive to an application of a rule to the instruction. The method includes redirecting the instruction to the isolation environment.

  • Pub Date: 2007/19/10
  • Number: 08452812
  • Owner: Citrix Systems, Inc.
  • Location: Fort Lauderdale, US
  • Details: Visit USPTO

Visit USPTO Page


Method of producing drive fluid in situ in tar sands formations

Methods of treating a tar sands formation are described herein. Methods for treating a tar sands may include providing heat to at least part of a hydrocarbon layer in the formation from one or more heaters located in the formation. The heat may be allowed to transfer from the heaters to at least a portion of the formation such that a drive fluid is produced in situ in the formation. The drive fluid may move at least some mobilized, visbroken, and/or pyrolyzed hydrocarbons from a first portion of the formation to a second portion of the formation. At least some of the mobilized, visbroken, and/or pyrolyzed hydrocarbons may be produced from the formation.

  • Pub Date: 2007/19/10
  • Number: 07681647
  • Owner: Shell Oil Company
  • Location: Houston, US
  • Details: Visit USPTO