15th week of 2016 patent applcation highlights part 33 |
Patent application number | Title | Published |
20160103727 | MANAGEMENT SYSTEM FOR MANAGING COMPUTER SYSTEM COMPRISING MULTIPLE MONITORING-TARGET DEVICES - A management system manages a computer system including multiple monitoring-target devices. A storage device of the management system stores a general rule, general plan information, unresolved information, and configuration information. A control device of the management system creates multiple expanded rules based on the general rule and the configuration information, and if an event related to any of the multiple monitoring-target devices has occurred, identifies, based on the multiple expanded rules, a first conclusion event constituting a candidate for the cause of the occurred event, creates, based on the general plan information, one or more expanded plans, which are recovery plans that can be implemented if the first conclusion event is a cause, identifies an unresolved event based on the unresolved information, identifies a risk site based on the identified unresolved event, and displays data showing the first conclusion event, expanded plan, and risk site. | 2016-04-14 |
20160103728 | Modular System Awareness in Virtualized Information Handling Systems - Methods and systems for modular system awareness in virtualized information handling systems (IHSs) include generating, by a chassis management controller (CMC), dependency information indicating which ones of modular IHSs included in a chassis are dependent on individual shared components in the chassis. When a fault occurs at one of the shared components, the CMC may determine, using the dependency information, which particular ones of the modular IHSs are operationally dependent on the fault. The CMC may send information indicative of the fault and of the dependent modular IHSs to a virtual machine manager, which may generate a ranking of virtual machines. The virtual machine manager may use the rankings to make migration decisions for virtual machines among modular IHSs. | 2016-04-14 |
20160103729 | Memory Fault Patching Using Pre-Existing Memory Structures - A computer architecture addresses intermittent memory faults by exploiting redundancy inherent in a hierarchical memory structure, for example, as data moves through various cache levels and registers before use by the processor. Accesses to data from faulted memory areas is diverted to a secondary memory structure holding that data and the secondary memory structure is flagged to increase the persistence of the stored data used for patching against normal updating policies. | 2016-04-14 |
20160103730 | NON-VOLATILE MEMORY DEVICES AND CONTROLLERS - For single-level cell flash memories and multi-level cell flash memories, different operations can be performed according to their stability when an abnormal status is terminated. Specifically, for the multi-level cell flash memories, when the abnormal status is terminated, a now physical block is used to proceed with write operation, and the previous physical block(s) would not be written any more. On the contrary, for the single-level cell flash memories, when the abnormal status is terminated, the controller needs to perform corresponding operations on the last physical page of the previous physical block(s). | 2016-04-14 |
20160103731 | SMART ERROR RECOVERY FOR DATABASE APPLICATIONS - A database server includes logic that is operable to monitor and analyze at least events occurring within an environment of the database server and/or execution errors generated by the database server in order to detect whether a problem condition exists. The database server further includes logic that is operable to send one or more commands to a database driver of a client that is communicatively connected to the database server, the one or more commands specifying one or more actions to be taken by the database driver in response to the existence of the problem condition. The database driver includes logic that is operable to receive the one or more commands from the database server and logic that is operable to cause the one or more commands to be executed. | 2016-04-14 |
20160103732 | Storage Module and Method for Datapath Bypass - A storage module and method for datapath bypass are disclosed. In one embodiment, a storage module begins to perform a read operation that reads a set of code words from the memory and attempts to perform an error detection and correction operation on one of the read code words. In response to determining that the code word has an uncorrectable error, the storage module reads the other code words in the set but bypasses the error detection and correction operation on those other code words. The code word that had the uncorrectable error and the other code words are re-read, wherein at least the code word with the uncorrectable error is re-read with a different read condition. The storage module then attempts to perform the error detection and correction operation on the re-read code words. Other embodiments are provided. | 2016-04-14 |
20160103733 | REDUCING ERROR CORRECTION LATENCY IN A DATA STORAGE SYSTEM HAVING LOSSY STORAGE MEDIA - In at least one embodiment, a read operation in a data storage system having lossy storage media includes fetching target data of the read operation from a lossy storage device into a buffer, transferring the target data from the buffer to an external controller external to the lossy storage device via a communication bus, performing error location processing on the target data during the transferring of the target data, communicating error location information regarding at least one error location to error repair logic via the communication bus, the error repair logic repairing the at least one error in the target data using the error location information, and the external controller causing the target data as repaired to be transmitted toward a destination. By deserializing the suboperations comprising the read operation, read latency can be reduced. | 2016-04-14 |
20160103734 | Data Storage Device and Data Maintenance Method Thereof - A data storage device including a flash memory and a controller. The flash memory includes a plurality of chips, each of the chips includes a plurality of pages, the pages are arranged to assemble into a super block, the pages of the super block are numbered 0˜X from top to bottom of the super block, the pages with number 0˜Y−1 constitute a data area, and the pages with numbers Y˜X constitute a RAID parity area. The controller corrects data of the data area according to data of the RAID parity area when the data in the data area cannot be successfully read. | 2016-04-14 |
20160103735 | ERROR CORRECTION DECODER AND OPERATION METHOD OF THE ERROR CORRECTION DECODER - The inventive concepts relate to an operation method of an error correction decoder correcting an error of data read from a nonvolatile memory. The operation method may include receiving the data from the nonvolatile memory, performing a first error correction with respect to the received data in a simplified mode, and performing, when the first error correction fails in the simplified mode, a second error correction with respect to the received data in a full mode. When the first error correction of the simplified mode is performed, a part of operations of the second error correction of the full mode may be omitted. | 2016-04-14 |
20160103736 | PROCESSOR REGISTER ERROR CORRECTION MANAGEMENT - Processor register protection management is disclosed. In embodiments, a method of processor register protection management can include determining a sensitive logical register for executable code generated by a compiler, generating an error-correction table identifying the sensitive logical register, and storing the error-correction table in a memory accessible by a processor. The processor can be configured to generate a duplicate register of the sensitive logical register identified by the error-correction table. | 2016-04-14 |
20160103737 | BUFFERED CLONED OPERATORS IN A STREAMING APPLICATION - A streams manager clones a portion of a primary flow graph to a virtual machine with a buffer to assure no data is lost if the corresponding portion of the primary flow graph fails. The buffer can be on the input of the cloned portion or on the output of the cloned portion. Cloning a portion of a primary flow graph with a buffer assures no data is lost when the corresponding portion of the primary flow graph fails. When the primary flow graph recovers from the failure, the processing may be switched back to the primary flow graph, which causes the buffer to begin buffering once again. | 2016-04-14 |
20160103738 | METHODS AND SYSTEMS FOR CONCURRENTLY TAKING SNAPSHOTS OF A PLURALITY OF VIRTUAL MACHINES - Techniques are described herein which minimize the impact of virtual machine snapshots on the performance of virtual machines and hypervisors. In the context of a volume snapshot which may involve (i) taking virtual machine snapshots of all virtual machines associated with the volume, (ii) taking the volume snapshot, and (iii) removing all the virtual machine snapshots, multiple virtual machine snapshots may be created in parallel. In the process of creating virtual machine snapshots, a storage system may determine which snapshots to create in parallel. The storage system may also prioritize snapshots from certain hypervisors in order to avoid the problem of “starvation”, in which busy hypervisors prevent less busy hypervisors from creating snapshots. The techniques described herein, while mainly described in the context of snapshot creation, are readily applied to snapshot removal. | 2016-04-14 |
20160103739 | O(1) VIRTUAL MACHINE (VM) SNAPSHOT MANAGEMENT - Managing a virtual machine snapshot in O(1) time by initially storing data from a virtual machine executing under a host operating system, to a first host operating system managed data block and creating a first pointer that points to the first host operating system managed data block and associates the virtual machine to the data stored in the first host operating system managed data block. A first value, associated with the first host operating system managed data block, is initialized indicating the number of pointers created to associate the virtual machine to the first host operating system managed data block. Receiving, by the computer host operating system, a request to create a snapshot of the virtual machine creates a second pointer replicating the first pointer, and increments, by the computer host operating system, the first value associated with the first host operating system managed data block. | 2016-04-14 |
20160103740 | HANDLING FAILED CLUSTER MEMBERS WHEN REPLICATING A DATABASE BETWEEN CLUSTERS - Data integrity is maintained during failed communications between a member node of a primary cluster and a backup cluster by assigning an assisting member node to run an assisting process that transmits data entered into the member node to the backup cluster. In this way, a replicated database is maintained during a partial communication failure between the primary cluster and the backup cluster. | 2016-04-14 |
20160103741 | TECHNIQUES FOR COMPUTER SYSTEM RECOVERY - Techniques for computer system recovery which remotely restore a default partition to a recent state even when an operating system is functioning abnormally. In an example embodiment, a service center computer establishes a first network connection to a monitored computer system. The service center computer configures the monitored computer system to boot from a bootable image file in the monitored computer system and reboots the monitored computer system into an alternate operating system environment of the bootable image file. The service center computer establishes a second network connection to the monitored computer system to restore a recent backup image of the default partition from a diagnostic partition to a default partition. The service center computer establishes a third network connection to the monitored computer system and reboots the monitored computer system to the default partition. | 2016-04-14 |
20160103742 | BUFFERED CLONED OPERATORS IN A STREAMING APPLICATION - A streams manager clones a portion of a primary flow graph to a virtual machine with a buffer to assure no data is lost if the corresponding portion of the primary flow graph fails. The buffer can be on the input of the cloned portion or on the output of the cloned portion. Cloning a portion of a primary flow graph with a buffer assures no data is lost when the corresponding portion of the primary flow graph fails. When the primary flow graph recovers from the failure, the processing may be switched back to the primary flow graph, which causes the buffer to begin buffering once again. | 2016-04-14 |
20160103743 | METHODS AND APPARATUS FOR RECOVERING ERRORS WITH AN INTER-PROCESSOR COMMUNICATION LINK BETWEEN INDEPENDENTLY OPERABLE PROCESSORS - Methods and apparatus for an inter-processor communication (IPC) link between two (or more) independently operable processors. In one aspect, the IPC protocol is based on a “shared” memory interface for run-time processing (i.e., the independently operable processors each share (either virtually or physically) a common memory interface). In another aspect, the IPC communication link is configured to support a host driven boot protocol used during a boot sequence to establish a basic communication path between the peripheral and the host processors. Various other embodiments described herein include sleep procedures (as defined separately for the host and peripheral processors), and error handling. | 2016-04-14 |
20160103744 | SYSTEM AND METHOD FOR SELECTIVELY UTILIZING MEMORY AVAILABLE IN A REDUNDANT HOST IN A CLUSTER FOR VIRTUAL MACHINES - Techniques for selectively utilizing memory available in a redundant host system of a cluster are described. In one embodiment, a cluster of host systems, with at least one redundant host system, with each host system having a plurality of virtual machines with associated virtual machine (VM) reservation memory is provided. A portion of a data store is used to store a base file, the base file accessed by all the plurality of virtual machines. A portion of the memory available in the redundant host system is assigned as spare VM reservation memory. A copy of the base file is selectively stored in the spare VM reservation memory for access by all the plurality of virtual machines. | 2016-04-14 |
20160103745 | BIASING ACTIVE-STANDBY DETERMINATION - In computing systems that provide multiple computing domains configured to operate according to an active-standby model, techniques are provided for intentionally biasing the race to gain mastership between competing computing domains, which determines which computing domain operates in the active mode, in favor of a particular computer domain. The race to gain mastership may be biased in favor of a computing domain operating in a particular mode prior to the occurrence of the event that triggered the race to gain mastership. For example, in certain embodiments, the race to mastership may be biased in favor of the computing domain that was operating in the active mode prior to the occurrence of an event that triggered the race to gain mastership. | 2016-04-14 |
20160103746 | RECOVERY OF STORAGE DEVICE IN A REDUNDANT ARRAY OF INDEPENDENT DISK (RAID) OR RAID-LIKE ARRAY - A computer-implemented method for managing storage devices in a storage subsystem having an array of storage devices, according to one embodiment, includes determining that at least one storage device in the array of storage devices has failed. Storage device characteristics of the failed storage device are compared with storage device characteristics of each of a plurality of candidate devices, and an attempt is made to identify a first candidate storage device having storage device characteristics that match the storage device characteristics of the failed storage device. A second candidate storage device having storage device characteristics most similar to the storage device characteristics of the failed storage device is identified in response to not identifying a candidate device that matches the failed storage device. | 2016-04-14 |
20160103747 | POST (POWER-ON-SELF-TEST) DEBUGGING METHOD AND APPARATUSES USING THE SAME - The invention introduces a POST (power-On-Self-Test) debugging method, executed by a processing unit, which contains at least the following steps. A phase number indicative of a current POST phase is set. A driver is selected from a scheduled queue. A GUID (Globally Unique Identifier) of the driver is obtained. The phase number and the GUID are stored or output, so as to recognize the phase of the driver being interrupted upon a break point of the driver. After that, the driver is executed. | 2016-04-14 |
20160103748 | Test Case Execution - Systems, methods, computer readable media and apparatuses for executing one or more test cases associated with verifying a functionality of a computer system, software application, or the like are presented. The test cases may be received by a system and may be prioritized and integrated into an existing queue of test cases based on the determined priority. In some examples, a configuration for a computing device to execute the test cases may be identified and transmitted to one or more computing devices available to or scheduled to execute the test cases. Accordingly, the test cases may be dynamically allocated to available computing devices for execution. In some arrangements, one or more reports may be generated and/or transmitted reporting the results of the execution of the test cases. The reports may be accessible via the system and/or may be transmitted to a user via, for example, an email message. | 2016-04-14 |
20160103749 | SYSTEM AND METHOD FOR COMPREHENSIVE PERFORMANCE AND AVAILABILITY TRACKING USING PASSIVE MONITORING AND INTELLIGENT SYNTHETIC ACTIVITY GENERATION FOR MONITORING A SYSTEM - One or more passive collectors watch a system's real activity confirming normal responses to requests. This passive monitor may have other purposes such as measuring real performance, and determining normal completion of requests which provides complete and accurate performance and availability of the monitored system. When the passive monitoring no longer detects actual activity, the preferred embodiment automatically triggers the execution of synthetic activity which simulates the real usage of the system. This active monitoring determines the state of the usage of the system. If the simulated use of the system results in an abnormal completion of the activity, an outage is recorded. The simulation occurs on a regular interval until the passive monitor sees real normal activity. | 2016-04-14 |
20160103750 | APPLICATION PROGRAMMING INTERFACE MONITORING TOOL NOTIFICATION AND ESCALATION METHOD AND SYSTEM - Methods and systems for reporting performance data for application programming interfaces (APIs) are provided. A method includes receiving a subscription request from a subscriber for a particular API of a plurality of APIs, and monitoring performance of the particular API for a predetermined event that includes a change in at least one of performance status for the particular API and one or more various measurements of performance of the particular API. The method further includes comparing the predetermined event to a table or database of information that includes notification and alert rules for the particular API that specify notification policies for various predetermined events, and when the predetermined event matches at least one of the notification and alert rules, sending, by the computer system, a notification or alert to the subscriber based on the notification policy for the at least one of the notification and alert rules. | 2016-04-14 |
20160103751 | ENHANCING WEAK CONSISTENCY - Systems, methods, and computer program products to discover weak consistency errors in an application, by executing, by a debugger, a first thread of the application, by, determining that a first instruction in the first thread specifies to store a first value at a first memory address, setting a current value stored in the first memory address as an old value for the first memory address in a container for the first thread, executing the first instruction to store the first value at the first memory address, and setting the first value as a new value for the first memory address in the container for the first thread. The debugger then executes a second thread of the application, by restoring old values in the containers for all other threads and restoring a new value for each memory address specified in a container for the second thread to its respective memory address. | 2016-04-14 |
20160103752 | ENHANCING WEAK CONSISTENCY - Methods to discover weak consistency errors in an application, by executing, by a debugger, a first thread of the application, by, determining that a first instruction in the first thread specifies to store a first value at a first memory address, setting a current value stored in the first memory address as an old value for the first memory address in a container for the first thread, executing the first instruction to store the first value at the first memory address, and setting the first value as a new value for the first memory address in the container for the first thread. The debugger then executes a second thread of the application, by restoring old values in the containers for all other threads and restoring a new value for each memory address specified in a container for the second thread to its respective memory address. | 2016-04-14 |
20160103753 | PATH-SPECIFIC BREAK POINTS FOR STREAM COMPUTING - A plurality of processing elements having stream operators and operating on one or more computer processors receive a stream of tuples. A first stream operator adds a first attribute to a tuple received on a first port of the first stream operator. The first attribute indicates the first port and the first stream operator. A second stream operator adds a second attribute to a tuple received on a first port of the second stream operator. The second attribute indicates the first port of the second stream operator and the second stream operator. It is determined whether a debug tuple has been received by a third stream operator. A debug tuple is a tuple that includes the first and second attributes. An operation, such as halting execution or incrementing a count of debug tuples, is performed when it is determined that a debug tuple has been received. | 2016-04-14 |
20160103754 | METHOD AND SYSTEM FOR GRADING A COMPUTER PROGRAM - The system includes a receiving module configured to receive a first set of data and a second set of data, wherein the first set of data comprises one or more high quality objects, and one or more ungraded objects, wherein the second set of data comprises one or more ungraded objects, an identification module configured to identify the one or more high quality objects, an extraction module is configured to extract one or more features from each high quality object of the one or more high quality objects, a building module is configured to build a predictive model based on the one or more features extracted for the each high quality object, a comparison module configured to compares the one or more ungraded objects and the one or more high quality objects, and an assessment module configured to score the one or more ungraded objects. | 2016-04-14 |
20160103755 | Sequentially Constructive Model of Computation - System and method for validating a program under a specified model of computation. The model of computation may be related to the synchronous statechart model of computation. A program may be received that specifies a plurality of operations using a variable within a logical tick such that the variable has multiple values within the logical tick. The program may be statically analyzed according to a specified model of computation that specifies program execution based on logical ticks, which may include determining that the program has deterministic semantics that specify deterministic results for each logical tick during execution of the program, including specifying deterministic results of the plurality of operations performed within the logical tick. The program may be validated in accordance with the specified model of computation in response to the determining. Such techniques may allow validation of a larger set of programs than conventional models while maintaining deterministic results. | 2016-04-14 |
20160103756 | APPLICATION ARCHITECTURE ASSESSMENT SYSTEM - A system stores a plurality of chapters, a plurality of sections each associated with a chapter, a plurality of control points each associated with a section, a plurality of assessment points each associated with a control point, and a plurality of attributes each associated with an assessment point. The system retrieves application information corresponding to an application. The system determines that one of the plurality of stored attributes applies to the application and assigns an attribute score to the application based on the determination. The system calculates various scores based on the attribute score and other scores including, an assessment point score, a control point score, a section score, and a chapter score. Based at least in part upon at least one of these scores, the system determines a strength of the application. | 2016-04-14 |
20160103757 | Quantization of Data Streams of Instrumented Software - A data analysis system processes data generated by instrumented software. The data analysis system receives data streams generated by instances of instrumented software executing on systems. The data analysis system also receives metadata describing data streams. The data analysis system receives an expression based on the metadata. The data analysis system receives data of data streams for each time interval and computes the result of the expression based on the received data values. The data analysis system repeats these steps for each time interval. The data analysis system may quantize data values of data streams for each time interval by generating an aggregate value for the time interval based on data received for each data stream for that time interval. The data analysis system evaluates the expression using the quantized data for the time interval. | 2016-04-14 |
20160103758 | ONLINE PRODUCT TESTING USING BUCKET TESTS - The technologies described herein use a statistical test to determine whether differences between data sets of buckets in a bucket test, such as differences between averages of two buckets (e.g., differences between means of two buckets), are directionally larger than a predetermined or preset minimum threshold value. The statistical test may also provide an extension to specify the minimum threshold value as a percentage. Also, described herein are techniques for estimating different control variables of a bucket test, such as estimating minimum bucket size to provide sufficient statistical power with use of the minimum threshold value. | 2016-04-14 |
20160103759 | USER INTERFACE TESTING ABSTRACTION - Interactions with a particular graphical user interface (GUI) of a software system are caused to be recorded and a particular one of the interactions is identified as an interaction with a particular GUI element of the GUI. A particular type of GUI element corresponding to the particular GUI element is determined and at least a portion of an instruction is generated for inclusion in a test of the software system, the instruction referencing the particular GUI element as an instance of the particular type of GUI element. | 2016-04-14 |
20160103760 | Sequentially Constructive Model of Computation - System and method for validating a program under a specified model of computation. The model of computation may be related to the synchronous statechart model of computation. A program may be received that specifies a plurality of operations using a variable within a logical tick such that the variable has multiple values within the logical tick. The program may be statically analyzed according to a specified model of computation that specifies program execution based on logical ticks, which may include determining that the program has deterministic semantics that specify deterministic results for each logical tick during execution of the program, including specifying deterministic results of the plurality of operations performed within the logical tick. The program may be validated in accordance with the specified model of computation in response to the determining. Such techniques may allow validation of a larger set of programs than conventional models while maintaining deterministic results. | 2016-04-14 |
20160103761 | SYSTEMS AND METHODS FOR PREPARING AN APPLICATION TESTING ENVIRONMENT AND FOR EXECUTING AN AUTOMATED TEST SCRIPT IN AN APPLICATION TESTING ENVIRONMENT - Systems and methods for preparing an application testing environment and for executing an automated test script in an application testing environment are disclosed. According to an aspect, a method includes providing graphical user interface (GUI) test automation objects. The method also includes classifying each of the GUI test automation objects as one of a test essential object and a test navigation object. Further, the method includes serializing the GUI test automation objects classified as a test navigation object for subsequent testing in a testing environment. | 2016-04-14 |
20160103762 | APPARATUS, SYSTEMS, AND METHODS FOR PROVIDING WEAR LEVELING IN SOLID STATE DEVICES - Embodiments of the present disclosure provides a memory-efficient mechanism for identifying memory blocks with a low wear count. More particularly, embodiments of the present disclosure provides a mechanism for identifying a memory block whose wear count is within the bottom p % of all wear counts associated with memory blocks in a storage system. If a memory controller always performs the garbage collection operation on a memory block whose wear count is within the bottom p % of all wear counts, then the memory controller is expected to utilize the remaining memory blocks (e.g., memory blocks whose wear count is within the upper (100−p) % of all wear counts) efficiently and level the wear count of at least the remaining memory blocks. | 2016-04-14 |
20160103763 | MEMORY PAGE BUFFER - One aspect of the technology is a memory device, which comprises a plurality of page buffers and control circuitry. Different page buffer circuits in the plurality of page buffer circuits are coupled to different bit lines in a plurality of bit lines in a memory array. The control circuitry is responsive to a program command to program multiple cells in the memory array, by setting, via the plurality of page buffer circuits, different target voltages at a same time for the different bit lines coupled to the multiple cells. | 2016-04-14 |
20160103764 | METHODS AND SYSTEMS FOR CACHE MANAGEMENT IN STORAGE SYSTEMS - Methods and systems for managing caching mechanisms in storage systems are provided where a global cache management function manages multiple independent cache pools and a global cache pool. As an example, the method includes: splitting a cache storage into a plurality of independently operating cache pools, each cache pool comprising storage space for storing a plurality of cache blocks for storing data related to an input/output (“I/O”) request and metadata associated with each cache pool; receiving the I/O request for writing a data; operating a hash function on the I/O request to assign the I/O request to one of the plurality of cache pools; and writing the data of the I/O request to one or more of the cache blocks associated with the assigned cache pool. In an aspect, this allows efficient I/O processing across multiple processors simultaneously. | 2016-04-14 |
20160103765 | APPARATUS, SYSTEMS, AND METHODS FOR PROVIDING A MEMORY EFFICIENT CACHE - The present disclosure relates to apparatus, systems, and methods that implement a less-recently-used data eviction mechanism for identifying a memory block of a cache for eviction. The less-recently-used mechanism can achieve a similar functionality as the least-recently-used data eviction mechanism, but at a lower memory requirement. A memory controller can implement the less-recently-used data eviction mechanism by selecting a memory block and determining whether the memory block is one of the less-recently-used memory blocks. If so, the memory controller can evict data in the selected memory block; if not, the memory controller can continue to select other memory blocks until the memory controller selects one of the less-recently-used memory blocks. | 2016-04-14 |
20160103766 | LOOKUP OF A DATA STRUCTURE CONTAINING A MAPPING BETWEEN A VIRTUAL ADDRESS SPACE AND A PHYSICAL ADDRESS SPACE - A memory region stores a data structure that contains a mapping between a virtual address space and a physical address space of a memory. A portion of the mapping is cached in a cache memory. In response to a miss in the cache memory responsive to a lookup of a virtual address of a request, an indication is sent to the buffer device. In response to the indication, a hardware controller on the buffer device performs a lookup of the data structure in the memory region to find a physical address corresponding to the virtual address. | 2016-04-14 |
20160103767 | METHODS AND SYSTEMS FOR DYNAMIC HASHING IN CACHING SUB-SYSTEMS - Methods and systems for dynamic hashing in cache sub-systems are provided. The method includes analyzing a plurality of input/output (I/O) requests for determining a pattern indicating if the I/O requests are random or sequential; and using the pattern for dynamically changing a first input to a second input for computing a hash index value by a hashing function that is used to index into a hashing data structure to look up a cache block to cache an I/O request to read or write data, where for random I/O requests, a segment size is the first input to a hashing function to compute a first hash index value and for sequential I/O requests, a stripe size is used as the second input for computing a second hash index value. | 2016-04-14 |
20160103768 | TLB Management Method and Computer - A TLB management method and computer are provided. The method includes querying a TLB storage directory table using a VPID of a first VCPU as an index, to obtain an address of a TLB storage table corresponding to the first VCPU; then accessing, according to the address of the TLB storage table corresponding to the first VCPU, the TLB storage table corresponding to the first VCPU, and reading a valid TLB entry in the TLB storage table corresponding to the first VCPU into a physical TLB. | 2016-04-14 |
20160103769 | PROCESSING DEVICE AND METHOD THEREOF - A processing device comprises inter alia a monolithic memory accumulator unit, which exposes a virtual memory space to an interconnect bus and comprises a conversion table with translation information to translate requests with virtual addresses into requests with physical addresses. The MMA is configured to receive a transaction request; to translate the address of the received request into physical address(es); and to pass on transaction request(s) to storage locations of an integrated peripheral. | 2016-04-14 |
20160103770 | TAPE BACKUP METHOD - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 2016-04-14 |
20160103771 | VENDOR-SPECIFIC PERIPHERAL DEVICE CLASS IDENTIFIERS - A peripheral device class identifier is generated for a class of peripheral devices, and is used to identify a setup record that indicates how to install or otherwise set up the class of peripheral devices on a computing device. The peripheral device class identifier is a combination of three components: a vendor identifier, a namespace identifier, and a namespace entry identifier. The vendor identifier is an identifier of the vendor of the class of peripheral devices. The namespace identifier is an identifier of different collections or groups of types of peripheral devices or types of functionality of peripheral devices. The namespace entry identifier is an identifier of a particular type of peripheral device (or particular functionality) of the different collections or groups of types of peripheral devices (or types of functionality of peripheral devices). | 2016-04-14 |
20160103772 | SIDE CHANNEL ACCESS THROUGH USB STREAMS - A system may provide side channel access of a Universal Serial Bus (USB) device using USB streams. The system may include a USB interface with a USB device controller, an internal bus, a logical unit number (LUN) arbiter coupled between the USB controller and the internal bus, and a secondary interface coupled with the LUN arbiter. The system may include a plurality of storage devices coupled to the internal bus. The system may provide access to the storage devices via both the USB device controller and the secondary interface. The LUN arbiter may accept a plurality of USB streams (e.g., storage device access requests) from the USB device controller and at least one additional USB stream (e.g., storage device access request) from the secondary interface. The LUN arbiter may determine a priority of access between USB streams originating from the USB device controller and the secondary interface. | 2016-04-14 |
20160103773 | DYNAMICALLY ADDRESSABLE MASTER-SLAVE SYSTEM AND METHOD FOR DYNAMICALLY ADDRESSING SLAVE UNITS - A master-slave system includes a master unit having a digital output for providing a signal or a serial signal sequence of signals, and at least two slave units. Each of the slave units includes at least one digital serial memory having a size of one bit, and each slave unit includes an input and an output. The slave units are serially connected to one another via the inputs and the outputs via a signal line ( | 2016-04-14 |
20160103774 | EFFICIENT INTERRUPTION ROUTING FOR A MULTITHREADED PROCESSOR - A system and method of implementing a modified priority routing of an input/output (I/O) interruption. The system and method determines whether the I/O interruption is pending for a core and whether any of a plurality of guest threads of the core is enabled for guest thread processing of the interruption in accordance with the determining that the I/O interruption is pending. Further, the system and method determines whether at least one of the plurality of guest threads enabled for guest thread processing is in a wait state and, in accordance with the determining that the at least one of the plurality of guest threads enabled for guest thread processing is in the wait state, routes the I/O interruption to a guest thread enabled for guest thread processing and in the wait state. | 2016-04-14 |
20160103775 | IMAGE SHARING SYSTEM AND METHOD THEREOF - An image sharing system includes a first electronic device, a number of second electronic devices in wireless communication with the first electronic device, and a host electronic device in wireless communication with the first electronic device and the number of second electronic devices. The host electronic device is one of the second electronic devices designated by the first electronic device to capture an image. The first electronic device controls the host electronic device to capture the image. The first electronic device and the host electronic device each send the captured image to a corresponding second electronic device. The first electronic device controls each of the second electronic devices that have received the image to send the image to another second electronic device that has not yet received the image, until all of the second electronic devices have received the image. | 2016-04-14 |
20160103776 | TRANSACTION RESPONSE MODIFICATION WITHIN INTERCONNECT CIRCUITRY - Interconnect circuitry | 2016-04-14 |
20160103777 | MEMORY AGGREGATION DEVICE - The invention relates to a memory aggregation device for storing a set of input data streams and retrieving data to a set of output data streams, the memory aggregation device comprising: a set of first-in first-out (FIFO) memories each comprising an input and an output; an input interconnector configured to interconnect each one of the set of input data streams to each input of the set of FIFO memories according to an input interconnection matrix; an output interconnector configured to interconnect each output of the set of FIFO memories to each one of the set of output data streams according to an output interconnection matrix; an input selector; an output selector; and a memory controller. | 2016-04-14 |
20160103778 | MEMORY COMPONENT CAPABLE TO COMMUNICATE AT MULTIPLE DATA WIDTHS - Examples disclose a method, memory component, and storage medium to configure a data width of the memory component. The examples disclose receiving a configuration transaction at the memory component capable to communicate at multiple data widths. Additionally, the examples disclose configuring the data width of the memory component based on the configuration transaction. | 2016-04-14 |
20160103779 | METHODS AND SYSTEMS FOR SHARING INFORMATION BETWEEN PROCESSORS - Methods and systems for sharing access to a computer resource accessible by a bus between two controllers are provided. For example, a machine implemented method of sharing access to computer resources includes requesting access to a bus from a processor of a first controller to access a device shared with a processor of a second controller; waiting for a positive response from the second controller; when the positive response is received, accessing the bus for less than a first timeout period; resetting a timer before the timer reaches the first timeout period to extend access to the bus, when access is not complete and a total access time is less than a second timeout period; and releasing the bus when access is complete or the second timeout period has been reached. | 2016-04-14 |
20160103780 | UNIVERSAL TRANSPONDER INTERFACE WITH A DATABUS DOCKING STATION - A universal transponder interface including: a compartment configured to store a vehicle ignition key; a docking station configured to receive a databus cartridge, wherein the databus cartridge includes codes to support a plurality of different types of databus communication; a first interface configured to connect the universal transponder interface to a vehicle databus; and a second interface configured to connect the universal transponder interface to a vehicle security or remote start system. | 2016-04-14 |
20160103781 | ENVELOPE DETECTION DEVICE AND RELATED COMMUNICATION DEVICE - An envelope detection device for detecting a transmission signal of a high speed serial communication includes: an operation circuit, for receiving the transmission signal and generating a set of operated outputs according to the transmission signal and at least one reference signal; a reference signal generating circuit coupled to the operation circuit, for providing the reference signal to the operation circuit, wherein the reference signal generating circuit is operable to provide the reference signal with different voltage levels; and a comparing circuit coupled to the operation circuit, for comparing the set of calculated outputs to generate a comparison result. The envelope detection device detects a transmission state and a disconnect state of the high speed serial communication according to the comparison result generated based on the reference signals at different voltage levels. | 2016-04-14 |
20160103782 | METHODS AND SYSTEMS FOR SECURE TRANSMISSION AND RECEPTION OF DATA BETWEEN A MOBILE DEVICE AND A CENTRAL COMPUTER SYSTEM - Methods and systems provide secure data transmission from a mobile device to a central computer system over a communication network. The method includes executing a first computer program in the mobile device and allocating by the first computer program a volatile memory space in the mobile device for a defined session. The method includes storing data in the allocated volatile memory space. The method includes transmitting the stored data to the central computer using a secure transmission protocol over the communication network. The method includes de-allocating by the first computer program the volatile memory space at the termination of the session. The de-allocation erases the transmitted data from the volatile memory space. | 2016-04-14 |
20160103783 | LOW LATENCY DEVICE INTERCONNECT USING REMOTE MEMORY ACCESS WITH SEGMENTED QUEUES - A writing application on a computing device can reference a tail pointer to write messages to message buffers that a peer-to-peer data link replicates in memory of another computing device. The message buffers are divided into at least two queue segments, where each segment has several buffers. Messages are read from the buffers by a reading application on one of the computing devices using an advancing head pointer by reading a message from a next message buffer when determining that the next message buffer has been newly written. The tail pointer is advanced from one message buffer to another within a same queue segment after writing messages. The tail pointer is advanced from a message buffer of a current queue segment to a message buffer of a next queue segment when determining that the head pointer does not indicate any of the buffers of the next queue segment. | 2016-04-14 |
20160103784 | ASYMMETRICAL PROCESSOR MEMORY ARCHITECTURE - An asymmetrical processing system is provided. The processor has a vector unit comprised of one or more computational units coupled with a vector memory space and a scalar unit coupled with a data memory space and the vector memory space, the scalar unit accessing one or more memory locations within the vector memory space. | 2016-04-14 |
20160103785 | GATHER USING INDEX ARRAY AND FINITE STATE MACHINE - Methods and apparatus are disclosed for using an index array and finite state machine for scatter/gather operations. Embodiment of apparatus may comprise: decode logic to decode a scatter/gather instruction and generate a set of micro-operations, and an index array to hold a set of indices and a corresponding set of mask elements. A finite state machine facilitates the gather operation. Address generation logic generates an address from an index of the set of indices for at least each of the corresponding mask elements having a first value. An address is accessed to load a corresponding data element if the mask element had the first value. The data element is written at an in-register position in a destination vector register according to a respective in-register position the index. Values of corresponding mask elements are changed from the first value to a second value responsive to completion of their respective loads. | 2016-04-14 |
20160103786 | COALESCING ADJACENT GATHER/SCATTER OPERATIONS - According to one embodiment, a processor includes an instruction decoder to decode a first instruction to gather data elements from memory, the first instruction having a first operand specifying a first storage location and a second operand specifying a first memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to read contiguous a first and a second of the data elements from a memory location based on the first memory address indicated by the second operand, and to store the first data element in a first entry of the first storage location and a second data element in a second entry of a second storage location corresponding to the first entry of the first storage location. | 2016-04-14 |
20160103787 | COALESCING ADJACENT GATHER/SCATTER OPERATIONS - According to one embodiment, a processor includes an instruction decoder to decode a first instruction to gather data elements from memory, the first instruction having a first operand specifying a first storage location and a second operand specifying a first memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to read contiguous a first and a second of the data elements from a memory location based on the first memory address indicated by the second operand, and to store the first data element in a first entry of the first storage location and a second data element in a second entry of a second storage location corresponding to the first entry of the first storage location. | 2016-04-14 |
20160103788 | COALESCING ADJACENT GATHER/SCATTER OPERATIONS - According to one embodiment, a processor includes an instruction decoder to decode a first instruction to gather data elements from memory, the first instruction having a first operand specifying a first storage location and a second operand specifying a first memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to read contiguous a first and a second of the data elements from a memory location based on the first memory address indicated by the second operand, and to store the first data element in a first entry of the first storage location and a second data element in a second entry of a second storage location corresponding to the first entry of the first storage location. | 2016-04-14 |
20160103789 | COALESCING ADJACENT GATHER/SCATTER OPERATIONS - According to one embodiment, a processor includes an instruction decoder to decode a first instruction to gather data elements from memory, the first instruction having a first operand specifying a first storage location and a second operand specifying a first memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to read contiguous a first and a second of the data elements from a memory location based on the first memory address indicated by the second operand, and to store the first data element in a first entry of the first storage location and a second data element in a second entry of a second storage location corresponding to the first entry of the first storage location. | 2016-04-14 |
20160103790 | COALESCING ADJACENT GATHER/SCATTER OPERATIONS - According to one embodiment, a processor includes an instruction decoder to decode a first instruction to gather data elements from memory, the first instruction having a first operand specifying a first storage location and a second operand specifying a first memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the first instruction, to read contiguous a first and a second of the data elements from a memory location based on the first memory address indicated by the second operand, and to store the first data element in a first entry of the first storage location and a second data element in a second entry of a second storage location corresponding to the first entry of the first storage location. | 2016-04-14 |
20160103791 | AUTHORING TOOL FOR THE AUTHORING OF WRAP PACKAGES OF CARDS - An authoring tool for authoring wrap packages of cards. The authoring tool includes a set of tools that enable an author to create a new card of a wrap selected from a variety of card templates. In various embodiments, the card templates include textual, video, image/photo, document, gallery, chat, location/GPS, transact, appointment, and end-of-wrap card templates. When a particular card template is selected, the template is then duplicated to create the new card. Thereafter, the author may author the card to include various components, content, attributes, layouts, styles triggers and/or behaviors. As the cards of the wrap are created, the authoring tool provides the author with the ability to order the sequence of the cards. The authoring tool thus enables authors to selectively create wrap packages that include media that conveys a narrative story and application functionality. | 2016-04-14 |
20160103792 | INTELLIGENT MESSAGE PROCESSING - Techniques facilitate intelligent message processing of messages. With regard to a message, an intelligent message processor component (IMPC) can intelligently identify a desired file folder and archive the message in the folder in response to as little as one user interface (UI) control manipulation (e.g., click), when the intelligent message processor UI (IMPUI) is activated. When the IMPUI is activated, the IMPC automatically parses the message and identifies, or allows the user to identify, a keyword/phrase in the message. The IMPC automatically identifies the desired folder based on the identified keyword/phrase, and the user can click on the identified keyword/phrase to store the message in the identified file folder. The IMPUI also can comprise other UI controls that can, e.g., forward a message to another user, archive the message or related attachment in a remote storage destination, perform a customized message process, etc. | 2016-04-14 |
20160103793 | Heterogeneous Application Tabs - This document describes techniques and apparatuses enabling heterogeneous application tabs. In some embodiments, these techniques and apparatuses enable grouping, sizing, and/or positioning of heterogeneous application tabs to provide an optimized layout of application content. | 2016-04-14 |
20160103794 | CARD BASED PACKAGE FOR DISTRIBUTING ELECTRONIC MEDIA AND SERVICES - A variety of data structures, components, runtime viewers and methods are described for defining, delivering and rendering wrapped packages of cards in a manner that is particularly well suited, but not limited to, display on mobile devices. Each card may selectively include media content, and a palette of application functionality and/or supporting e-commerce related services. The cards of the wrap packages are ideally threaded together into one or more linear sequences, and authored to convey a book-like narrative that unfolds as the cards are sequentially browsed. In addition, the wrap packages are portable objects that are readily distributed, similar to other electronic messages, through e-mail, messaging, social-media, or via a variety of other electronic communication platforms. As a result, wrap packages are consumable, sharable and savable objects. | 2016-04-14 |
20160103795 | CARD BASED PACKAGE FOR DISTRIBUTING ELECTRONIC MEDIA AND SERVICES - A variety of data structures, components, runtime viewers and methods are described for defining, delivering and rendering wrapped packages of cards in a manner that is particularly well suited, but not limited to, display on mobile devices. Each card may selectively include media content, and a palette of application functionality and/or supporting e-commerce related services. The cards of the wrap packages are ideally threaded together into one or more linear sequences, and authored to convey a book-like narrative that unfolds as the cards are sequentially browsed. In addition, the wrap packages are portable objects that are readily distributed, similar to other electronic messages, through e-mail, messaging, social-media, or via a variety of other electronic communication platforms. As a result, wrap packages are consumable, sharable and savable objects. | 2016-04-14 |
20160103796 | Rich Formatting for a Data Label Associated with a Data Point - Rich formatting may be provided for rich data labels. A rich data label may be created for at least one data point associated with a visualization. The data label may be formatted and displayed on the visualization. The rich data label may bind to a particular data point rather than adhering to conventional index-based anchor logic where a data label is bound to the index of a data point. Accordingly, in response to determining that the location of the data point has changed in the visualization, the location of the rich data label is automatically adjusted to remain attached to its original data point. | 2016-04-14 |
20160103797 | AUTHORING TOOL FOR THE AUTHORING OF WRAP PACKAGES OF CARDS - An authoring tool for authoring wrap packages of cards. The authoring tool includes a set of tools that enable an author to create a new card of a wrap selected from a variety of card templates. In various embodiments, the card templates include textual, video, image/photo, document, gallery, chat, widgets, global components, location/GPS, transact, appointment, and end-of-wrap card templates. When a particular card template is selected, the template is then duplicated to create the new card. Thereafter, the author may author the card to include various components, content, attributes, layouts, styles triggers and/or behaviors. As the cards of the wrap are created, the authoring tool provides the author with the ability to order the sequence of the cards. The authoring tool thus enables authors to selectively create wrap packages that include media that conveys a narrative story and application functionality. | 2016-04-14 |
20160103798 | INTEGRATION OF SOCIAL MEDIA WITH CARD PACKAGES - Data structures, components, runtime viewers and methods are described for integrating wrapped packages of cards into various social media feeds and for integrating social media feeds into wraps. In some embodiments, a wrap identifier or cover is provided within a social media feed. In response to selection of the wrap identifier a runtime viewer is initiated and a descriptor that defines the selected wrap is obtained. The runtime viewer creates a wrap instance based on the descriptor. The instance may be displayed in-line within the social media feed, in an overlay frame, a new browser tab or using other suitable mechanisms. Preferably, each card in the wrap is rendered at the same portrait aspect ratio. Within each card, the relative positioning of the card content is immutable. In a separate aspect, a wrap package may include a social media card arranged to display a social media feed. | 2016-04-14 |
20160103799 | METHODS AND SYSTEMS FOR AUTOMATED DETECTION OF PAGINATION - The present disclosure is directed to methods and systems for monitoring and replaying user interactions with one or more interactive multi-page electronic documents. The methods generally include observing an event consisting of an interaction between a user and a first page of a first instance of an interactive electronic document, identifying a first pagination element in the page, recording data for the event, and using the recorded data to identify, in a second page of a second instance of the interactive electronic document, a second pagination element in the second page, and locating a third page of the second instance of the interactive electronic document based on the second pagination element. | 2016-04-14 |
20160103800 | UNIVERSAL REBRANDING ENGINE - Embodiments of the invention provide for universal rebranding of a Web site. A method for Web site universal rebranding includes loading source code for a source Web site and source code for a target Web site. The method also includes parsing the source code to identify for each of the source Web site and the target Web site a style sheet framework, one or more icons representative of branded logos, and a color and font scheme. Thereafter, design ontologies for both the source and also the target Web site are generated based upon the respectively identified style sheet frameworks, icons, logos and color and font schemes. Finally, the ontologies can be compared to identify common design elements and the style sheet framework of the target Web site can be modified to incorporate design values for the common design elements drawn from the style sheet of the source Web site. | 2016-04-14 |
20160103801 | SYSTEM AND METHOD FOR SERVING ONLINE SYNCHRONIZED CONTENT FROM A SANDBOX DOMAIN VIA A TEMPORARY ADDRESS - Systems, methods, and non-transitory computer-readable storage media for serving content stored in an online synchronized content management system from a sandbox domain via a temporary address. The online synchronized content management system may receive a first request from a user to access a content item stored in the system. The first request may be received at a first domain via a first address that is directed to the first domain. The system may generate a second address that is directed to a second domain such as a sandbox domain. Then, the second address can be associated with the content item for direct access. When the system receives, at the second domain via the second address, a second request to access the content item, the content item can be served from the second domain. After the system receives the second request, it can generate and issue a session identifier for the second address to verify any subsequent requests to access the content item via the second address. | 2016-04-14 |
20160103802 | METHOD AND SYSTEM FOR FACILITATING ELECTRONIC COMMUNICATION BETWEEN THE PUBLIC AND A PUBLIC PERSONALITY OR REPRESENTATIVE - The invention is concerned with a virtual trading card system, comprising a data source that provides information associated with a public figure, and a user device configured to display a first and a second virtual view of an electronic card associated with the public figure, wherein the second virtual view includes a plurality of updateable data fields. | 2016-04-14 |
20160103803 | SYSTEMS AND METHODS FOR OPTIMIZING WEB PAGE LOAD TIME - The technology disclosed relates to systems and methods for using deduplication when rendering complex web pages with multiple iFrames, to improve performance and reduce memory requirements. We refer to the technology disclosed as “server-side rework” of interface web pages with multiple iFrames by post processing. Custom interface web pages with multiple iFrames can use the disclosed server-side rework to post-process complex interface web pages for improved performance and reduced memory requirements. | 2016-04-14 |
20160103804 | WRAP DESCRIPTOR FOR DEFINING A WRAP PACKAGE OF CARDS INCLUDING A GLOBAL COMPONENT - A wrap descriptor, which defines a wrap package of cards, including (i) a plurality of card descriptors, each defining card-specific components that define content, structure and a layout for an associated card and (ii) a global component descriptor for specifying a global component associated with two or more cards of the wrap package. Unlike card descriptors that define only card-specific components, global descriptors define components that can be applied to all the cards, or a designated subset of the cards, of a wrap package. | 2016-04-14 |
20160103805 | CARD BASED PACKAGE FOR DISTRIBUTING ELECTRONIC MEDIA AND SERVICES - A variety of data structures, components, runtime viewers and methods are described for defining, delivering and rendering wrapped packages of cards in a manner particularly well suited, but not limited to, display on mobile devices. Each card may selectively include media content, a palette of application functionality and/or supporting e-commerce related services. A wrap descriptor, composed of a plurality of card descriptors defines the structure, layout and content of a set of cards that constitute the wrap. The wrap descriptor may take the form of a JSON data object. A runtime viewer that executes on the rendering computing device may be used to transform the wrap descriptor into a runtime instance of the wrap that includes the content and functionality defined by the descriptor. In some implementations, the runtime viewer creates an object graph, which may then be converted to an object model suitable for rendering on the consuming device. | 2016-04-14 |
20160103806 | HIERARCHICAL MODELING FOR NETWORK SITES - Disclosed are various embodiments for hierarchical modeling of network sites. A page model from a hierarchy of page models is provided in at least one computing device. The page model includes a plurality of features. Each one of the features is assigned to a respective network page region. The features include at least one original feature and at least one inheritable feature from a parent page model. A network page is generated in the at least one computing device corresponding to the page model. Each one of the features of the page model is encoded for rendering within the respective network page region. | 2016-04-14 |
20160103807 | Flexible Analytics-Driven Webpage Design and Optimization - In an approach for selecting a version of a webpage to present to a user, a processor receives a request to access a webpage from a device, wherein the webpage includes a plurality of versions of the webpage. A processor receives information about the device. A processor determines a version of the webpage to present, based on the information about the device and a predefined goal associated with the webpage. A processor causes the version of the webpage to be presented. | 2016-04-14 |
20160103808 | SYSTEM FOR HANDLING ABBREVIATION RELATED TEXT - Abbreviations can be handled by a computer system that receives a message that specifies a recipient and a sender. A first text portion is identified from the message as being associated with an abbreviation. A sender and receiver profile are used to identify a set of one or more solutions for the first text portion. The solutions are scored based upon the online content exposure information in the profile of the recipient. Based upon the scoring, a particular solution of the one or more solutions is identified for use. The text body of the message is modified to include the particular solution, and the modified message is transmitted to the recipient. | 2016-04-14 |
20160103809 | BIG FILE EDITOR - Embodiments of the invention are directed to systems, methods, and computer program products to enable a user to edit a large text file. In some embodiments, the system is configured to receive a first input from a user, wherein the first input comprises selecting a large text file from an external source; receive a second input from the user, wherein the second input comprises a start line and an end line; retrieve the section of the selected large text file defined by the start line and the end line from the external source and load the retrieved section onto a temporary memory location; initiate presentation of the retrieved section of the selected large text file to the user; and enable the user to edit and save at least a portion of the retrieved section of the selected large text file. | 2016-04-14 |
20160103810 | INTRA-SURGICAL DOCUMENTATION SYSTEM - A method of creating a surgical operative note during a specific surgical procedure on a patient. The method includes creating surgical checklists for a plurality of surgical procedures before initiation of the surgical procedure, creating an index of image specific annotations for the specific surgical procedure before initiation of the surgical procedure, obtaining an electronic template, inserting one of the surgical checklists into the template associated with the specific surgical procedure on the patient, obtaining an image of the patient, inserting the image of the patient into the electronic template, using a voice command to associate at least one of the image specific annotations with the image of the patient in the electronic template, and inserting the at least one of the image specific annotations into the electronic template adjacent the image. | 2016-04-14 |
20160103811 | ENHANCED DOCUMENTATION VALIDATION - Updating a document relating to updates of a graphical user interface (GUI) is provided. An example method includes identifying one or more images in a screenshot of an existing graphical user interface (GUI) and in a screenshot of a new GUI modified from the existing GUI; extracting image text associated with one or more component images from the existing GUI and the new GUI; identifying, in the new GUI, text and image differences between the component images from the existing GUI and the new GUI; identifying, in a document, document text associated with the text and image differences; and modifying the associated document text according to the identified text and image differences. | 2016-04-14 |
20160103812 | TYPING ASSISTANCE FOR EDITING - Apparatus and methods are disclosed for providing feedback and guidance to touch screen device users to improve the text entry user experience and performance. According to one embodiment, a method comprises receiving a text entry, receiving input on a touch screen in the form of a first single touch input located over a word of previously entered text, and presenting the user with one or more suggestion candidates indicated possible replacement words related to the selected word. The user can then select one of the suggestion candidates using a second single touch input to replace the selected word with a word associated with the selected suggestion candidate. | 2016-04-14 |
20160103813 | CONTEXT SENSITIVE AUTO-CORRECTION - Methods, systems, and computer program products are provided for adaptively autocorrecting text according to context. Text may be received at a mobile electronic device that was input by a user. The received text may be displayed at a display component of the mobile electronic device. An auto-correct dictionary is selected from a plurality of auto-correct dictionaries. The auto-correct dictionary may be selected based at least on usage information that is representative of a usage context of the mobile electronic device. The displayed text is auto-corrected according to the selected autocorrect dictionary. | 2016-04-14 |
20160103814 | GENERATING WEB BROWSER VIEWS FOR APPLICATIONS - A system and method for generating a web browser view of a desktop application. The system and method can include obtaining source code for the desktop application, where the source code includes various properties, determining annotations associated with the one or more properties, where the annotations describe display properties for the one or more properties, and generating the web browser view with the display properties based on the annotations. The system and method can also include receiving input from a user via the web browser view, performing backend logic based on the input and the source code where the backend logic results in a change in a view, and updating the web browser view based on the change in the view | 2016-04-14 |
20160103815 | GENERATING MOBILE WEB BROWSER VIEWS FOR APPLICATIONS - A system and method for generating a mobile web browser view of a desktop application. The system and method can include obtaining source code for the desktop application, where the source code includes various properties, and determining annotations associated with the one or more properties, where the annotations describe display properties for the one or more properties. The system and method can also include determining one or more display settings for a client device, and generating the mobile web browser view with the display properties based on the annotations and display settings. The system and method can also include receiving input from a user via the mobile web browser view, performing backend logic based on the input and the source code where the backend logic results in a change in a view, and updating the mobile web browser view based on the change in the view. | 2016-04-14 |
20160103816 | SYSTEMS AND METHODS FOR VALIDATING AND CORRECTING AUTOMATED MEDICAL IMAGE ANNOTATIONS - Systems and methods are disclosed for manipulating image annotations. One method includes receiving an image of an individual's anatomy; automatically determining, using a processor, one or more annotations for anatomical features identified in the image of the individual's anatomy; determining a dependency or hierarchy between at least two of the one or more annotations for anatomical features identified in the image of the individual's anatomy; and generating, based on the dependency or hierarchy, a workflow prompting a user to manipulate the one or more annotations for anatomical features identified in the image of the individual's anatomy. | 2016-04-14 |
20160103817 | Method, device and system for electronic stamping - A method for electronic stamping comprises: receiving a touching event of a touchscreen and position information indicating a position on the touchscreen where the touching event occurs; receiving a stamping event of an electronic stamping device; retrieving a stamp image and electronic stamping authentication information from the electronic stamping device after receiving, in a predefined time period, the touching event of the touchscreen and the stamping event of the electronic stamping device; and determining a stamping position based on the position information indicating the position on the touchscreen where the touching event occurs, and executing electronic stamping at the determined stamping position based on the stamp image and the electronic stamping authentication information. An electronic stamping device and a stamping apparatus are also disclosed. | 2016-04-14 |
20160103818 | MANAGING PRODUCT CONFIGURATION - A computer-implemented method, carried out by one or more processors, for managing product configuration files. In an embodiment, the method comprises the steps of receiving, by one or more processors, a document containing one or more annotations, wherein the one or more annotations are associated with one or more files; determining, by one or more processors, an annotation has been selected from the one or more annotations to access a particular file associated with the selected annotation; linking, by one or more processors, a storage location for the particular file associated with the selected annotation to the received document; and displaying, by one or more processors, content of the particular file associated with the selected annotation in the received document. | 2016-04-14 |
20160103819 | UPDATING FORMULAS IN RESPONSE TO TABLE TRANSPOSITION - Embodiments are disclosed in which an algorithm that updates or rewrites one or more formulas when a table is transposed in an application. In certain embodiments the formula is rewritten so as to preserve the functionality of the formula with respect to the transposed table. In certain embodiments, a notification may be provided that a formula is changed or not changed in response to the table transposition event. | 2016-04-14 |
20160103820 | AUTHORING TOOL FOR THE AUTHORING OF WRAP PACKAGES OF CARDS - An authoring tool for authoring wrap packages of cards. The authoring tool includes a set of tools that enable an author to create a new card of a wrap selected from a variety of card templates. In various embodiments, the card templates include textual, video, image/photo, document, gallery, chat, location/GPS, transact, appointment, and end-of-wrap card templates. When a particular card template is selected, the template is then duplicated to create the new card. Thereafter, the author may author the card to include various components, content, attributes, layouts, styles triggers and/or behaviors. As the cards of the wrap are created, the authoring tool provides the author with the ability to order the sequence of the cards. The authoring tool thus enables authors to selectively create wrap packages that include media that conveys a narrative story and application functionality. | 2016-04-14 |
20160103821 | AUTHORING TOOL FOR THE AUTHORING OF WRAP PACKAGES OF CARDS - An authoring tool for authoring wrap packages of cards. The authoring tool includes a set of tools that enable an author to create a new card of a wrap selected from a variety of card templates. In various embodiments, the card templates include textual, video, image/photo, document, gallery, chat, location/GPS, transact, appointment, and end-of-wrap card templates. When a particular card template is selected, the template is then duplicated to create the new card. Thereafter, the author may author the card to include various components, content, attributes, layouts, styles triggers and/or behaviors. As the cards of the wrap are created, the authoring tool provides the author with the ability to order the sequence of the cards. The authoring tool thus enables authors to selectively create wrap packages that include media that conveys a narrative story and application functionality. | 2016-04-14 |
20160103822 | NATURAL LANGUAGE CONSUMER SEGMENTATION - Techniques are disclosed for using natural language processing techniques to define, manipulate, and interact with consumer segmentations. In such embodiments a content consumption analytics engine can be configured to receive and process a natural language segmentation query. The query may comprise, for example, a command that defines a new segmentation, a command that manipulates existing segmentations, or a command that solicits information relating to existing consumer segmentations. The query is parsed to identify individual grammatical tokens which are then correlated with specific segment token types through the use of a token repository. A custom thesaurus is used to identify synonymous terms for grammatical tokens which may not exist in the token repository. User feedback enables the custom thesaurus to learn additional synonyms for future use. Once the grammatical tokens are mapped onto the identified segment token types, a formal segment definition can be constructed based on a segment definition structure. | 2016-04-14 |
20160103823 | Machine Learning Extraction of Free-Form Textual Rules and Provisions From Legal Documents - Disclosed herein is a system and method for machine learning extraction of free-form textual rules and provisions from legal documents. The method comprising electronically receiving, by the legal rules extraction engine, a document, processing the document using a first trained model executed by the legal rules extraction engine to classify the document into a document class, processing the document using a second trained model executed by the legal rules extraction engine to extract rules within the document conditional on the document class identified by the first trained model, extracting a plurality of data variables from the document by processing the classified features in the document using a third trained model executed by the legal rules extraction engine, generating by the legal rules extraction engine an output vector based on the plurality of data variables, and displaying the output vector by the legal rules extraction engine at the user interface. | 2016-04-14 |
20160103824 | METHOD AND SYSTEM FOR TRANSFORMING UNSTRUCTURED TEXT TO A SUGGESTION - A system for transforming unstructured text into at least one suggestion for content creation, the system having: a tagging module having instructions in memory, said instructions executable by a processor to receive unstructured text from external sources having at least one sentence; disassemble said at least one sentence into individual words; and tag said individual words by determining a speech type for each of said individual works; a chunking module having instructions in memory, said instructions executable by a processor to said individual words together into phrases to form a tree-like structure of the text, when said individual words are tagged correctly; and a suggestion module having instructions in memory, said instructions executable by a processor to generate said at least one suggestion based on said chunking. | 2016-04-14 |
20160103825 | MOBILE SPEECH-TO-SPEECH INTERPRETATION SYSTEM - Interpretation from a first language to a second language via one or more communication devices is performed through a communication network (e.g. phone network or the internet) using a server for performing recognition and interpretation tasks, comprising the steps of: receiving an input speech utterance in a first language on a first mobile communication device; conditioning said input speech utterance; first transmitting said conditioned input speech utterance to a server; recognizing said first transmitted speech utterance to generate one or more recognition results; interpreting said recognition results to generate one or more interpretation results in an interlingua; mapping the interlingua to a second language in a first selected format; second transmitting said interpretation results in the first selected format to a second mobile communication device; and presenting said interpretation results in a second selected format on said second communication device. | 2016-04-14 |
20160103826 | LOCALIZATION FRAMEWORK FOR DYNAMIC TEXT - An apparatus and method providing a localization framework capable of localizing dynamic text is disclosed herein. The localization framework is configured to automatically identify and prioritize certain text contained within an application code base to be translated. Such text is pre-processed prior to translation to facilitate accurate and complete translation in a target language. | 2016-04-14 |