24th week of 2011 patent applcation highlights part 67 |
Patent application number | Title | Published |
20110145124 | Cover-OCO for Legged Order - A position associated with a synthetic spread order may be managed where a status of a synthetic spread order is identified as legged. The synthetic spread order may have at least one child hedge order pending at an electronic exchange and in response, a bracket order is submitted to an electronic exchange for the tradeable object associated with a filled leg of the synthetic spread. In response to execution of the bracket order, the child hedge order may be cancelled. | 2011-06-16 |
20110145125 | System and Methods for Risk-Based Prioritized Transaction Message Flow - Various systems and methods are provided for prioritized sending of transaction messages to an electronic exchange. According to one embodiment, a system determines a priority level for each transaction message based on a potential monetary reward or risk associated with sending or delaying the message. Once the priority levels are determined, the messages may be sent based on the priority levels. Additionally, each priority level may be associated with a predetermined threshold level. If a message threshold is reached, a new message corresponding to that priority level is queued until the message may be transmitted without exceeding the threshold limit. | 2011-06-16 |
20110145126 | Dynamic Selection of a Quoting Leg Based on Liquidity - Certain embodiments of the present inventions provide for dynamic selection of a quoting leg based on liquidity. Certain embodiments of the present inventions utilize various techniques for determining the liquidity of one or more legs. Certain embodiments provide for selecting a leg to quote based on the determined liquidity. Certain embodiments provide a configuration interface for specifying techniques to be used in determining a liquidity value for a particular tradeable object. Certain embodiments provide for liquidity indicators being presented in various user interfaces. | 2011-06-16 |
20110145127 | FINANCIAL MANAGEMENT SYSTEM AND RELATED METHODS - A financial management system includes a portal which makes transaction information available to a corresponding mutual fund in real time. In one implementation, information related to multiple portals can be presented to a mutual fund. Suitable programming may optionally identify, at least partially, the users associated with transactions associated with a given mutual fund. | 2011-06-16 |
20110145128 | System and Method for Auctioning Environmental Commodities - An institutionally-focused, neutral auction platform is provided that may be utilized for both the primary and secondary trading of environmental commodities and instruments. The auction platform may perform an on-boarding process for auction participants. Thereafter, the auction platform initiates an auction event, in response to a request by an auctioner, based on an identified block of environmental commodities. The auction platform may also receive an indication of financial security from one or more of the auction participants. A winning bidder may then be selected based on auctioner-defined parameters. In certain embodiments, the auction platform may also perform a settlement function for the auctioner and winning bidder relating to the delivery of, and payment for, the identified block of environmental commodities. Various other services and processes may also be provided by the auction platform. | 2011-06-16 |
20110145129 | METHOD AND SYSTEM FOR REBROKERING ORDERS IN A TRADING SYSTEM - Systems and methods are described herein for supporting the trading of bonds in a computerized system using broker dealers as intermediaries. Broker dealers receive orders relating to particular transactions and have the option to accept the order by submitting a matching counter order, or to rebroker the order with the same or modified terms to a number of other investors or additional broker dealers. The additional broker dealers have similar options, thus providing a system wherein orders can be quickly proliferated to a large number of parties. This order proliferation can be fully or partially automated through the use of predefined rules stored in a database which dictate for each broker dealer whether, to whom and under what terms to rebroker orders. When an order is received, the system processes all such rules to output a set of orders which are then communicated to the corresponding parties. | 2011-06-16 |
20110145130 | GLOBAL ELECTRONIC TRADING SYSTEM - Methods, systems, and computer readable media for facilitating trading two items (L,Q) from the group of items comprising commodities and financial instruments. At least two agents ( | 2011-06-16 |
20110145131 | SYSTEM AND METHOD FOR PROCESSING AND DISPLAYING QUANTITY INFORMATION DURING USER-CONFIGURABLE TIME PERIODS - A system and method for displaying quantity related information determined for a plurality of time periods are described. According to one method, a trader may define one or more time periods for which a trading application may determine traded quantities, traded buys, traded sells, or other quantity related information at a plurality of price levels during the defined time periods. The trading application may then graphically display the quantities for each time period in relation to the static axis of prices. The method further includes periodically updating the displayed traded quantity to reflect the quantity during the defined time period, where the quantity is updated based on subsequent market updates that are received from the exchange for the tradable object. | 2011-06-16 |
20110145132 | REMOTE TRANSACTION METHOD AND SYSTEM OF AN ON-LINE PLATFORM FOR FLOATING-RATE FUND-TRADING - The present invention provides a remote transaction method and system of an on-line platform for auctioning of money applied in the field of financial e-commerce. Nodes are disposed on the Internet to expand the market of fund-trading platform in the virtual network communities, to enhance the efficiency of operations in the financial market and realize the goal of de-intermediation and de-centralization of direct finance. A node helps a member to establish a platform account via a related connection network and interface, and helps the member to acquire a necessary loan amount for an intended fund-bidding pool by means of loan amount application and providing collateral. A subordinate member attends fund-bidding directly via the platform, or enters the platform via a node, according to his preference. The platform helps node members enter the platform and attend fund trading and monitors the credit-risk status of nodes and members. | 2011-06-16 |
20110145133 | System and Method for an Auction of Multiple Types of Items - An improved system and method for a computer-implemented auction in which multiple types of items are auctioned together without imposing a particular division of supply or demand among the individual types of items. In some embodiments the auction of the present invention provides a means or method for establishing prices for the types of items, wherein the prices maintain a relationship. In other embodiments, the present invention provides a means or method for implying prices from price parameters in the bids received form bidders, based on a relation among the prices for the types of items. Market clearing may be defined by the condition that the aggregate quantity bid for all types of items is less than or equal to the available quantity of all types of items. The division among the types of items within is thus determined flexibly, based on the bids at the associated prices. In other embodiments, market clearing is defined by the condition that the quantity bid for one selected type of item is less than or equal to the available quantity of the selected type of item. The quantities of the other types of items are thus determined flexibly, based on the bids at the associated prices. | 2011-06-16 |
20110145134 | SYSTEM AND METHOD FOR MANAGING TRANSACTIONS OF FINANCIAL INSTRUMENTS - A system and method for managing transactions of financial instruments that comprises generating a graphical representation having a plurality of multi-dimensional objects positioned along an axis. Each position along the axis represents a price of a financial instrument. The system receives an indication that at least one multi-dimensional object has been selected. The system generates, in response to the at least one multi-dimensional object being selected, a dialog box in the graphical representation. The system receives information relating to a transaction of the financial instrument. The information is displayed in the dialog box and comprises a desired volume of the financial instrument at a specific price. The system communicates to a remote device the information. The remote device is in communication with the processor over a network. The system receives an indication that the transaction of the financial instrument has been executed for the desired volume at the specific price. | 2011-06-16 |
20110145135 | PROCESS AND ARCHITECTURE FOR STRUCTURING FACILITIES REVENUE BOND FINANCINGS - A process and architecture may be implemented to structure ESFRB financing or refinancing for Municipal Facilities operation, construction and/or renovation to improve economic and business terms for involved or interested parties, including without limitation, a Municipal Entity which owns, for example, water/sewer facilities, airports, seaports, bus and train transit systems, toll roads and bridges, parking lots and/or energy plants. | 2011-06-16 |
20110145136 | PAYMENT CARD REFERRAL PROGRAM - A method for enhancing value of a credit card may include providing an authorized user of a credit card issued by a service provider. A set of applications may be received from a set of referrals of the authorized user for credit card services. The set of applications from the set of referrals may be processed. A credit card may be issued to each of the referrals that qualify for the credit card, where the referrals issued credit cards define a set of customers. Valuable consideration may be issued to the authorized user, where the valuable consideration may be based on the number of customers in the set of customers. | 2011-06-16 |
20110145137 | APPARATUSES,METHODS AND SYSTEMS FOR A TRACKABLE VIRTUAL CURRENCIES PLATFORM - The APPARATUSES, METHODS AND SYSTEMS FOR A TRACKABLE VIRTUAL CURRENCIES PLATFORM (“TVC”) transform user transaction request input via various TVC components into transaction result output. In one embodiment, information regarding a virtual currency transaction including a user identifier of a user associated with the virtual currency transaction may be received. A potential fraud event threshold score for the user may be calculated by analyzing past fraud data associated with the user, and a virtual currency transaction fraud score may be calculated by analyzing the user's social graph and the user's prior game play patterns. If the virtual currency transaction fraud score exceeds the potential fraud event threshold score for the user, the virtual currency transaction may be identified as potentially fraudulent. | 2011-06-16 |
20110145138 | Browser extension that processes text to facilitate commerce on social media - A system (FIG. | 2011-06-16 |
20110145139 | METHODS, APPARATUS, AND SYSTEMS FOR SUPPORTING PURCHASES OF GOODS AND SERVICES VIA PREPAID TELECOMMUNICATION ACCOUNTS - Apparatus and method for detecting in real-time when a User of a prepaid telecommunications account tries to complete a data, voice or financial transaction to purchase a product or service but cannot, due to insufficient funds in the Prepaid Account. The system then determines whether the Account is eligible to receive a Facilitation according to predetermined criteria and, if so, either (1) automatically authorizes the transaction to be completed based on a Facilitation amount, subsequently recorded by the system to satisfy the insufficiency, or (2) instantly communicates to the User an offer to do so, and if the User accepts the offer, authorizes the transaction and records the Facilitation amount. The transaction can then be completed without significant interruption. A mechanism is provided such that on the next Topping-Up event(s) of the User's Account, the Facilitation amount is debited from the User's Account for return to the Facilitator. | 2011-06-16 |
20110145140 | METHODS, APPARATUS, AND SYSTEMS FOR SUPPORTING PURCHASES OF GOODS AND SERVICES VIA PREPAID TELECOMMUNICATION ACCOUNTS - Apparatus and method for detecting in real-time when a User of a prepaid telecommunications account tries to complete a data, voice or financial transaction to purchase a product or service but cannot, due to insufficient funds in the Prepaid Account. The system then determines whether the Account is eligible to receive a Facilitation according to predetermined criteria and, if so, either (1) automatically authorizes the transaction to be completed based on a Facilitation amount, subsequently recorded by the system to satisfy the insufficiency, or (2) instantly communicates to the User an offer to do so, and if the User accepts the offer, authorizes the transaction and records the Facilitation amount. The transaction can then be completed without significant interruption. A mechanism is provided such that on the next Topping-Up event(s) of the User's Account, the Facilitation amount is debited from the User's Account for return to the Facilitator. | 2011-06-16 |
20110145141 | METHOD AND APPARATUS FOR RECHARGING ELECTRIC VEHICLES - An electric vehicle recharge station includes a housing with an outlet switchably coupled to an electrical electric power source. A vehicle connectible plug is removably mounted on the housing and connected to the outlet for supplying electric power from the outlet to the vehicle. The housing is mountable on top of a concrete pedestal embedded in the ground. The vehicle connectible plug is connected to the outlet by a coiled electrical cord. The housing supports two outlets and two J1772 plugs. A user interface communicates and receives instructions to and from the user via a touch screen display. The user interface provides selection of power charge time periods, stations on the housing, and payment. The housing can be configured for home use via a wall mount or as a wall mount for a parking garage. | 2011-06-16 |
20110145142 | METHOD AND APPARATUS FOR ISSUING AND MANAGING GIFT CERTIFICATES - The present invention relates to a method and apparatus for issuing and redeeming a gift certificate drawn on a credit card or other financial account. | 2011-06-16 |
20110145143 | INTERNET BILLING METHOD - A system that incorporates teachings of the present disclosure may include, for example, identifying a consumer account managed by a service provider to which purchases are chargeable, the identification of the account based on transactional information, enabling customer equipment to request a purchase of an electronically-purchasable item of a vendor via network equipment of the service provider, wherein the vendor is a party other than the service provider, charging the consumer account a fee for a purchase initiated by the customer equipment, and remitting a portion of the fee to an account of the vendor. Other embodiments are disclosed. | 2011-06-16 |
20110145144 | Method of authorizing automated banking machine use responsive to user data read from data bearing records - An automated banking machine operates responsive to data read from data bearing records, such as user cards, to cause machine user authorization and financial transfers. Account data read from a user card is associated in a data store with instructions for displaying a customer interface uniquely associated with the particular bank where the user holds the account. The customer interface includes user-selectable financial transaction options. The arrangement enables the customer interface of the user's home bank, with which the user is familiar, to also be automatically displayed when the user operates automated banking machines of other banks. | 2011-06-16 |
20110145145 | Integrated Technology Money Transfer System - A money transfer system where a sender can authorize an escrow agent computer system electronically by touch-tone telephone, computer modem, P.O.S. (point of sale) terminal, live operators, and the like, to send a money transfer such as a cash transfer from their card account such as their credit card, debit card, bank card, ATM card, or a bank checking account, bank savings account, and the like, to a recipient that can access the money transfer at any remote ATM type location or P.O.S. (point of sale) terminal by using magnetic cards such as a specialized magnetic (Cash Magic) card, credit cards, debit cards, and automated teller machine (ATM) card, at anytime and anywhere that the ATM or P.O.S. (point of sale) terminal is located worldwide. The system can be used to quickly and easily send another party cash for pickup at any ATM location or P.O.S. (point of sale) terminal worldwide without having pre-existing relationships between the parties. A sending party can authorize, by touch-tone and PIN (personal identification number) secure codes to a central computer system which authorizes taking of funds from one type account (for example, a bank account, a credit account, and the like) and put credit for access by a recipient-user. The recipient-users can take the cards to withdrawal sites such as ATM machines, merchant machines, credit card machines, banks, and the like, to be used. The invention computer system can monitor the charging transaction and take surcharges based on the amount of cash being transferred and deposited into the escrow account accessible by the debit type cards. The system can be an alternative to wire money transfers, and Western Union type services. The system offers customers an easy method for sending cash, making it available at existing ATM type machine locations throughout the world, 24 hours a day, 365 days a year. The invention can also allow for having a universal specialized magnetic card permanently tethered to an ATM machine so that money transfer recipients do not need to possess any magnetic card, and/or be used with novel double magnetic sided cards. | 2011-06-16 |
20110145146 | Off-Line Account Recharging - A method for off-line account recharging allows recharging of a user account at a simple payment node without sophisticated account interface. The method does not require the user to have an online bank account. The user enters a recharge amount and a mobile device number at the payment node, which sends the entered recharge information to a server where the user account is held. The server generates a recharge code which corresponds to the recharge amount and the mobile device number, and provides the recharge code to the user. The user uses the received recharge code to contact the server and complete the account recharge. The server may perform additional identity verification using the mobile device number and a random challenge code when the user requests to complete the count recharge. The recharge process does not require complex account information to be entered. | 2011-06-16 |
20110145147 | SYSTEM AND METHOD FOR AUTHORIZING TRANSACTIONS - A method and system for authorizing a transaction that includes a remote location where the transaction takes place from which purchaser information may be obtained and providing that information to a central site where pre-determined information regarding the customer exists. Storing legal information at that central site provides the criterion for determining authorization by comparing the purchaser data with the stored legal information. The transaction data is stored, authorization is transmitted to the remote location, and the transaction authorization is transmitted to a temporary database available for near real-time access solely by law enforcement officers. | 2011-06-16 |
20110145148 | MERCHANT ALERTS INCORPORATING RECEIPT DATA - One embodiment of the invention is directed to a method comprising receiving an authorization request message for a transaction conducted by a consumer with a merchant, sending the authorization request message to an issuer, receiving an authorization response message, modifying the authorization response message using a server computer to include receipt preference data, wherein the receipt preference data is derived from receipt preferences of the consumer or the merchant, and sending the authorization response message comprising the receipt preference data to the merchant, wherein the merchant generates a receipt for the consumer according to the receipt preference data. | 2011-06-16 |
20110145149 | METHODS, APPARATUS, AND SYSTEMS FOR SUPPORTING PURCHASES OF GOODS AND SERVICES VIA PREPAID TELECOMMUNICATION ACCOUNTS - Apparatus and method for detecting in real-time when a User of a prepaid telecommunications account tries to complete a data, voice or financial transaction to purchase a product or service but cannot, due to insufficient funds in the Prepaid Account. The system then determines whether the Account is eligible to receive a Facilitation according to predetermined criteria and, if so, either (1) automatically authorizes the transaction to be completed based on a Facilitation amount, subsequently recorded by the system to satisfy the insufficiency, or (2) instantly communicates to the User an offer to do so, and if the User accepts the offer, authorizes the transaction and records the Facilitation amount. The transaction can then be completed without significant interruption. A mechanism is provided such that on the next Topping-Up event(s) of the User's Account, the Facilitation amount is debited from the User's Account for return to the Facilitator. | 2011-06-16 |
20110145150 | COMPUTERIZED VOTING SYSTEM - Officials send Eligible Voters encoded Voter Registration(s) and WHOLE Ballot(s) of this invention. Each WHOLE Ballot and Voter Registration has a MASTER part and at least one RECEIPT part that are correlated via a shared, unique group of symbols—a Random Symbolic Identifier (RSID)e. Each RSID is randomly generated and extremely difficult to guess, making it impossible to counterfeit any significant number of Ballots or Registrations. Anonymity is provided to Voters by optional private WHOLE Ballot exchanges among Registered Voters within their Voting Region. Completed MASTER Ballots are delivered by the Due Date to Officials by mail or electronically (using a security verification code) via Internet, Telephone, Fax, Email or interactive Television. Referring to RECEIPT Ballot(s), any Voter may use a telephone or electronic device(s) connected to the Internet to verify accurate processing of their MASTER Ballot. | 2011-06-16 |
20110145151 | FINANCIAL CARD SYSTEM, COMMUNICATIONS DEVICE, AUTHENTICATION TERMINAL, AUTHENTICATION METHOD, AND PROGRAM - Disclosed herein is a financial card system. The system includes a communications device on which a non-contact integrated circuit chip is installed; and an authentication terminal having a reader/writer allowing reading/writing information on the communications device and capable of transmission and reception of information with the communications device through the reader/writer. The communications device has a storage block, a common area information transmission block, and an individual area information transmission block. The reader/writer of the authentication terminal has a storage block, a common area information reception block, and an individual area information reception block. | 2011-06-16 |
20110145152 | SYSTEMS, APPARATUS, AND METHODS FOR IDENTITY VERIFICATION AND FUNDS TRANSFER VIA A PAYMENT PROXY SYSTEM - Systems, apparatus, and methods for verifying a user's identity and conducting a transfer of funds via a payment proxy system are herein provided. A message including a request for verification of the user's identity and/or a transfer of funds via a proxy payment system may be received. The message may also include user identification information and/or a token. Completion of the identification verification and/or requested funds transfer may be dependent upon verification of user identification information and/or a token. | 2011-06-16 |
20110145153 | NEGOTIATING AGREEMENTS WITHIN A CLOUD COMPUTING ENVIRONMENT - The present invention provides a solution for agreement/contract negotiations within a Cloud computing environment. Specifically, under the present invention, a resource requirement for performing a task for a first Cloud partner is assessed. Once the resource requirement is known, it can be determined whether a shortfall exists between available resources of the first Cloud partner and the resource requirement. If so, a master agreement with a second Cloud partner is identified to address the shortfall. Typically, the master agreement specifies at least a minimum service requirement and a maximum price for the second Cloud partner to provide resources to address the shortfall. If the terms are agreeable to both Cloud partners, a contract between the two can be formed (e.g., digitally) based on the master agreement. | 2011-06-16 |
20110145154 | Policy Development Criticality And Complexity Ratings - Methods, computer readable media, and apparatuses for policy development and management are presented. One or more policy needs may be identified, and a criticality rating and a complexity rating may be determined for each policy need. The criticality rating and the complexity rating may be based on one or more weighted criticality and complexity factors. The criticality rating may affect prioritization of policy development, and the complexity rating may affect an estimate of time required for policy development. Subsequently, a report may be generated. | 2011-06-16 |
20110145155 | Methods, Systems, and Products for Predicting Work force Requirements - Methods, systems, and products are disclosed for predicting work force requirements. Work order information is retrieved describing work orders, and weather information is retrieved describing a weather event. The work order information and the weather information are combined to determine an impact on the work orders due to the weather event. The work force requirements are then predicted to resolve the work orders. | 2011-06-16 |
20110145156 | Method and System for Acquiring High Quality Non-Expert Knowledge from an On-Demand Workforce - Systems and computer-implemented methods include a validation phase in which validation projects are submitted to an online crowdsourcing system. The validation projects each have different combinations of the two validation control parameters, payment per human intelligence task (“HIT”) and number of solutions per HIT. By analyzing the solutions for the validation projects, final control parameters can be selected from the validation project having the best combination of high quality, low cost, and short time to completion. The final control parameters can be submitted along with a final project to the online crowdsourcing system. In addition, a novel outlier detection algorithm enables the system to detect outlier workers based on the distribution of non-experts' agreement probabilities, reject outlier workers' results, and thus save labeling cost. | 2011-06-16 |
20110145157 | Method And System For Receiving And Providing Access To Information At A Web Site - At a vendor-managed web site, purchasing information is received from a first terminal, including purchasing information that is customized for a customer. The customer includes first and second users having respective first and second levels of authorized access to the purchasing information. The first user is identified by a first identifier, and the second user is identified by a second identifier. To a second terminal, access at the vendor-managed web site is provided to: only a first portion of the purchasing information in response to receiving the first identifier from the second terminal which identifies the first user; and at least a second portion of the purchasing information in response to receiving the second identifier from the second terminal which identifies the second user. The second portion includes at least a part of the first portion and a third portion of the purchasing information. The part of the first portion includes at least a portion of the customized purchasing information. | 2011-06-16 |
20110145158 | DIGITAL DATA PROCESSING METHODS AND SYSTEMS FOR CULTIVATING AND PROVIDING GUEST FEEDBACK ON RENTAL ACCOMODATIONS - The invention provides, in some aspects, methods and systems for cultivating and providing guest feedback on rental accommodations that comprise a plurality of modules that execute on a digital data processor, including, a first module that obtains email addresses, a second module that validates those e-mail addresses, a third module that generates and delivers invitations to authorized email addresses, a fourth module that authenticates users that respond to those invitations, a fifth module that validates content entered by users in response to the invitations, a sixth module that stores the validated content, and a seventh module that accepts input from managers in regard to that content. Method and systems according to the invention cultivate user feedback and reviews to substantiate accurate vacation home rental and alternative lodging (refers to small lodging services, such as bed and breakfasts, cabins, etc.) accommodations through a closed cultivation system. | 2011-06-16 |
20110145159 | METHODS AND SYSTEMS FOR REAL ESTATE AGENT TRACKING AND EXPERTISE DATA GENERATION - Disclosed herein is a real estate management application with a “property check-in” feature that enables the agent to automatically check-in at each property location. Subsequent to entering a given property, the agent selects the check-in feature in a mobile real estate service application, allowing the real estate service to determine a present geographic location of the agent. Using this, the service identifies an MLS location of the client and uses corresponding MLS information to update a tracking entry associated with the agent. In embodiments, the tracking entry enables the real estate service to maintain accurate expertise history for each agent. | 2011-06-16 |
20110145160 | INFORMATION POSTING BY STRATEGIC USERS IN A SOCIAL NETWORK - Embodiments are directed to modeling propagation of an information item in an online social network. A quality value for the information item to be posted in the online social network is calculated, and the quality value is compared to a posting threshold value. The posting threshold value being determined based on a strategic user model. A propagation of the information item through the online social network is emulated based on the comparison. | 2011-06-16 |
20110145161 | ELECTRONIC EMPLOYEE SELECTION SYSTEMS AND METHODS - An automated employee selection system can use a variety of techniques to provide information for assisting in selection of employees. For example, pre-hire and post-hire information can be collected electronically and used to build an artificial-intelligence based model. The model can then be used to predict a desired job performance criterion (e.g., tenure, number of accidents, sales level, or the like) for new applicants. A wide variety of features can be supported, such as electronic reporting. Pre-hire information identified as ineffective can be removed from a collected pre-hire information. For example, ineffective questions can be identified and removed from a job application. New items can be added and their effectiveness tested. As a result, a system can exhibit adaptive learning and maintain or increase effectiveness even under changing conditions. | 2011-06-16 |
20110145162 | Product Integrity Tracking Shipping Label, And Associated Method - A product integrity tracking shipping label includes a label body for attaching to a product to be shipped or to packaging containing the product. One or more movement monitoring configured with the label body detects a movement metric of the product. A microprocessor configured with the label body and in communication with the one or more movement monitoring devices time-tags the movement metric when the movement metric exceeds a pre-selected threshold. A product integrity tracking system includes a movement monitoring device with one or more sensors for attachment to a product or packaging containing the product. The movement monitoring device senses at least one movement event during handling of the product. A processor compares the movement event with a pre-selected event threshold, and time-tags and stores above-threshold movement events in a memory. Information in the memory is readable via an interrogation device during shipment or at product delivery. | 2011-06-16 |
20110145163 | PROVISION OF SELLER PROFILE - In an example embodiment, a method is provided for providing a profile of a seller. In this method, a request from a computing device inquiring about the profile of the seller of an item is received. A category and/or price of the item are identified. Information from transactions associated with the seller is retrieved from a data structure using the category and/or prices as the filtering criteria. A metric is then calculated based on the information from the previous transactions and thereafter, a response to the request with the metric is provided to the computing device. | 2011-06-16 |
20110145164 | SYSTEM AND METHOD FOR FACILITATING THE CREATION, MANAGEMENT, AND VALUATION OF SECURITIES RESEARCH - A Research Management System (“RMS”) enables individuals associated with sell-side firms, buy-side firms, and/or other individuals/entities (e.g., wealth managers, corporate officers, experts, and providers and distributors of dynamic financial news reports) to create, manage, and valuate securities research. Individuals associated with a sell-side firm may generate, collaborate on, and/or publish dynamic content (e.g., assets, research reports, trade ideas) that may be tracked both internally and externally. Individuals associated with a buy-side firm may provide feedback (e.g., comments and ratings) on the sell-side content. This feedback together with other content usage metrics provide an objective measure by which buy-side firms may valuate sell-side research and other services for, among other things, determining how to allocate commissions among sell-side firms. Sell-side firms may receive selected feedback from buy-side firms on their individual performance and/or their performance vis-à-vis other sell-side firms. Sell-side firms may use the objective information they receive to better understand and appreciate how the content they generate is used and valued by their clients. | 2011-06-16 |
20110145165 | Synthetic Spread Trading - Synthetic spread trading strategies are represented and managed as homogeneous tradeable objects. Relationships between a synthetic spread and its constituent parts are defined and states for a spread are developed for accurately reporting, tracking and otherwise administering a synthetic spread and its constituent parts. A state of a synthetic spread is identified as working, pending, legged or filled. The states, in addition to identification of a synthetic spread's constituent parts, introduces information to allow a spread order and its post trade analysis to be consistently and effectively managed by multiple trading tools. | 2011-06-16 |
20110145166 | SYSTEM AND METHOD FOR EVALUATING DEFINED CONTRIBUTION PLANS - A system and method for comparing retirement plans against a selected group of similar plans is disclosed. In one embodiment, a computer system for evaluating a retirement plan comprises a computer server having a database comprising a plurality of data defining a plurality of characteristics of each of a plurality of retirement plans, software configured for identifying a subset of the plurality of retirement plans having characteristics comparable to characteristics of a selected retirement plan, software configured for permitting the selection of at least one report from a plurality of report types, and software configured for automatically generating the selected at least one report, where the at least one report comprises an evaluation of the characteristics of the selected retirement plan against the characteristics of the subset of the plurality of retirement plans. | 2011-06-16 |
20110145167 | METHOD AND SYSTEM FOR THE PROTECTION OF BROKER AND INVESTOR RELATIONSHIPS, ACCOUNTS AND TRANSACTIONS - A computer based method and system for advanced scenario based alert generation and processing is presented, with the specific ability to broker and investor activities that put either at risk. Advanced scenarios that describe such broker and investor activities are specifically defined. By applying these scenarios to transactional data from a variety of financial institutions, broker and investor activities causing unacceptable amounts of risk can be detected on an automated basis. | 2011-06-16 |
20110145168 | Apparatus for Energy-Efficient Estimation of a Yield of a Financial Product - An apparatus for estimating a yield of a financial product, as well as to a corresponding method and a corresponding computer program product. The present disclosure can be loosely summarized, in one aspect, as teaching a method of pricing a financial product under a number of potential future scenarios wherein, instead of carrying out a separate (and perhaps nested) Monte Carlo simulation for each scenario under consideration, a smoothing function is generated from the results of a proportionately small number of representative (nested) simulations and the pricing is estimated at each scenario using the smoothing function. Each Monte Carlo simulation simulates the yield of the financial product under the conditions of the specific scenario. Accordingly, the smoothing function represents the (simulation) yield of the financial product as a function of the scenario parameters. | 2011-06-16 |
20110145169 | System and Method for Providing a Financial Instrument Utilizing a Liability Ratio - One embodiment of the invention is a method for providing a financial instrument including determining a current account balance for a financial account, calculating a liability ratio for the financial account, and determining whether to transfer at least a portion of the account balance from a variable sub-account to a low-risk sub-account based on the liability ratio. | 2011-06-16 |
20110145170 | Financial Instrument Utilizing an Optional Benefit Election - According to one embodiment of the invention, a financial instrument includes an account with an account balance that changes over time, wherein at least part of the account balance may be discretionarily withdrawn and wherein the initial account balance is based upon an initial deposit; a guarantee that a beneficiary may periodically receive a transfer of an amount of money for the life of a first designated party, wherein the transfer may be due to withdrawal from the account or due to benefit payments made to the beneficiary, provided that the amount may vary based upon withdrawals from the account in excess of a particular limit; and an option to modify the guarantee such that upon election the beneficiary may periodically receive the transfer of the amount of money for the longer of the life of the first designated party and the life of a second designated party. | 2011-06-16 |
20110145171 | CONVERTING A COMPUTATIONAL FORMULA INTO EXECUTABLE CODE - This method of converting a computational formula having been acquired in the form of a tree structure containing at least one node associated with a parameterized conditional branching operation and connected to at least a first and a second child node, the child node which is associated with the operation which is not executed and the set of nodes which have this child node as parent node being called ‘dead branch’, this method comprising:—the identification and the deletion ( | 2011-06-16 |
20110145172 | Prior art - At least a primary prior art, a secondary prior art and a combination of at least a teaching of the primary prior art or any part thereof in view of at least a teaching of the secondary prior art or any part thereof are relied upon, for example, to anticipate under 35 U.S.C. §102 and/or make obvious under 35 U.S.C. §103 a plurality of patent claims. Each of the primary prior art and the secondary prior art is, for example, any prior art (e.g., any prior art reference) charged to PHOSITA under 35 U.S.C. §103. All prior art references, for example, charged to PHOSITA under 35 U.S.C. §103 have been incorporated by reference in their entireties herein. | 2011-06-16 |
20110145173 | TECHNIQUES FOR MANAGING INFORMATION RELATING TO RECYCLABLE CONTAINERS - Methods and apparatus are provided for managing information relating to recycling activities. In one embodiment, a method is provided in which a consumer returns beverage containers to a redemption kiosk offering a significantly improved consumer experience. Rather than having to wait for an attendant to count the containers and provide value in exchange, an account is maintained for the consumer to which the containers' value is ascribed. The redemption kiosk projects a neat and sanitary appearance, and is designed to be situated in a parking lot outside a retail location so as not to occupy valuable floor space. Information on consumer recycling activities is captured and analyzed to support marketing activities. | 2011-06-16 |
20110145174 | Hair Color Based Method of Choosing Hair Accessories - A method of choosing hair accessories based on a hair color of a user. The method includes browsing a display device containing a first set of hair accessories and a second set of hair accessories. Each hair accessory of the first and second sets is of a different accessory type and has a first or second color, respectively. The method also includes inputting the hair color of the user to a hair accessory selection device populated with information relating to the first and second colors and to a range of hair colors. The method further includes receiving from the hair accessory selection device one or more recommended hair accessories from the first and second sets that best match the hair color of the user. The method also includes selecting one or more accessories from the display device based upon the one or more recommended hair accessories. | 2011-06-16 |
20110145175 | Methods, Systems and Media Utilizing Ranking Techniques in Machine Learning - Methods, systems and media are taught utilizing ranking techniques in machine learning to learn a ranking function. Specifically, ranking algorithms are applied to learn a ranking function that advantageously minimizes ranking error as a function of targeted ranking order discrepancies between a predetermined first ranking of a training plurality of data elements and a second ranking of the training plurality of data elements by the ranking function. The ranking algorithms taught may be applied to ranking representations of chemical structures and may be particularly advantageous in the field of drug discovery, e.g., for prioritizing chemical structures for drug screenings. | 2011-06-16 |
20110145176 | GENE EXPRESSION PROFILES TO PREDICT BREAST CANCER OUTCOMES - Methods for classifying and for evaluating the prognosis of a subject having breast cancer are provided. The methods include prediction of breast cancer subtype using a supervised algorithm trained to stratify subjects on the basis of breast cancer intrinsic subtype. The prediction model is based on the gene expression profile of the intrinsic genes listed in Table 1. This prediction model can be used to accurately predict the intrinsic subtype of a subject diagnosed with or suspected of having breast cancer. Further provided are compositions and methods for predicting outcome or response to therapy of a subject diagnosed with or suspected of having breast cancer. These methods are useful for guiding or determining treatment options for a subject afflicted with breast cancer. Methods of the invention further include means for evaluating gene expression profiles, including microarrays and quantitative polymerase chain reaction assays, as well as kits comprising reagents for practicing the methods of the invention. | 2011-06-16 |
20110145177 | HIERARCHICAL TEMPORAL MEMORY - Methods and systems for constructing biological-scale hierarchically structured cortical statistical memory systems utilizing fabrication technology and meta-stable switching devices. Learning content-addressable memory and statistical random access memory circuits are detailed. Additionally, local and global signal modulation of bottom-up and top-down processing for the initiation and direction of behavior is disclosed. | 2011-06-16 |
20110145178 | DATA CLASSIFICATION USING MACHINE LEARNING TECHNIQUES - A system and article of manufacture enabling adapting to a shift in document content according to one embodiment of the present invention includes instructions for: receiving at least one labeled seed document; receiving unlabeled documents; receiving at least one predetermined cost factor; training a transductive classifier using the at least one predetermined cost factor, the at least one seed document, and the unlabeled documents; classifying the unlabeled documents having a confidence level above a predefined threshold into a plurality of categories using the classifier; reclassifying at least some of the categorized documents into the categories using the classifier; and outputting identifiers of the categorized documents to at least one of a user, another system, and another process. Systems and articles of manufacture for separating documents are also presented. Systems and articles of manufacture for document searching are also presented. | 2011-06-16 |
20110145179 | FRAMEWORK FOR THE ORGANIZATION OF NEURAL ASSEMBLIES - A framework for organization of neural assemblies. Stable neural circuits are formed by generating comprehensions. A packet of neurons projects to a target neuron after stimulation. A target neuron in STDP state is recruited if it fires within a STDP window. Recruitment leads to temporary stabilization of the synapses. The stimulation periods followed by decay periods lead to an exploration of cut-sets. Comprehension results in successful predictions and prediction-mining leads to flow. Flow is defined as the production rate of signaling particles needed to maintain communication between nodes. The comprehension circuit competes for prediction via local inhibition. Flow can be utilized for signal activation and deactivation of post-synaptic and pre-synaptic plasticity. Flow stabilizes the comprehension circuit. | 2011-06-16 |
20110145180 | Diagnostic Method for a Process Automation System - A diagnostic method for a process automation system composed of at least one field device, a control unit, and at least one fieldbus. The following method steps are included: in a learning phase raw data of measured variables, raw data of manipulated variables and/or raw data of state variables are stored. The field devices or the processes as input variables are registered and stored normalized. Moreover, in the learning phase at least one parameter, a measuring condition, at least one parameter of a process state and/or at least one parameter of a field device state as output variable predetermines, which corresponding output variables are the input variables associated with that which is stored, during the learning phase. A neural network formed by the input variables and the associated with output variables, in the learning phase are the causal relationships between the ascertained input variables and the corresponding, specified output variables by a transfer function of the neural network ascertained and stored, in an operating phase is by means of the transfer function from the current raw data the field devices as input variables at least one change of the current measuring condition, the current process state and/or the current field device state ascertained. | 2011-06-16 |
20110145181 | 100GBPS SECURITY AND SEARCH ARCHITECTURE USING PROGRAMMABLE INTELLIGENT SEARCH MEMORY (PRISM) THAT COMPRISES ONE OR MORE BIT INTERVAL COUNTERS - Memory architecture provides capabilities for high performance content search. The architecture creates an innovative memory that can be programmed with content search rules which are used by the memory to evaluate presented content for matching with the programmed rules. When the content being searched matches any of the rules programmed in the Programmable Intelligent Search Memory (PRISM) action(s) associated with the matched rule(s) are taken. Content search rules comprise of regular expressions which are converted to finite state automata (FSA) and then programmed in PRISM for evaluating content with the search rules. PRISM architecture comprises of a plurality of programmable PRISM Memory clusters (PMC) which comprise of a plurality of programmable PRISM Search Engines (PSE). Groups of PMCs can be programmed with the same rules and used in parallel to apply these rules to multiple data streams simultaneously to achieve increased performance. PMC groups provide 10 Gbps performance with 10 PMC groups enabling 100 Gbps content search and security performance. | 2011-06-16 |
20110145182 | ADAPTIVE CONTENT INSPECTION - Methods and apparatus are provided involving adaptive content inspection. In one embodiment, a content inspection processor may identify information with respect to input data and provide the information to a host controller. The host controller may adapt search criteria or other parameters and provide the adapted parameter to the content inspection processor. Other embodiments may include a content inspection processor having integrated feedback, such that results data is fed back to the content inspection processor. The results data may be processed before being provided to the content inspection processor. | 2011-06-16 |
20110145183 | PREDICTOR OF THE PERIOD OF PSYCHOTIC EPISODE IN INDIVIDUAL SCHIZOPHRENICS AND ITS METHOD - A predictor of the period of psychotic episode in individual schizophrenia patients, and its method. It consists of, a data constructor and an incident simulator, which concludes rules from the total incidents of patients' recurrence as well as the historical time data. Then it applies the said rules to predict the following happening time of a recurrence or a stabled situation. | 2011-06-16 |
20110145184 | METHODS AND SYSTEMS TO TRAVERSE GRAPH-BASED NETWORKS - Methods and systems to translate input labels of arcs of a network, corresponding to a sequence of states of the network, to a list of output grammar elements of the arcs, corresponding to a sequence of grammar elements. The network may include a plurality of speech recognition models combined with a weighted finite state machine transducer (WFST). Traversal may include active arc traversal, and may include active arc propagation. Arcs may be processed in parallel, including arcs originating from multiple source states and directed to a common destination state. Self-loops associated with states may be modeled within outgoing arcs of the states, which may reduce synchronization operations. Tasks may be ordered with respect to cache-data locality to associate tasks with processing threads based at least in part on whether another task associated with a corresponding data object was previously assigned to the thread. | 2011-06-16 |
20110145185 | SYSTEM AND METHOD FOR NETWORK SECURITY EVENT MODELING AND PREDICTION - A security tool is disclosed for predicting a sequence of events based on the current events observed. The security tool relies on sequential event mining algorithms to discover the baseline event patterns, from which a prediction can be performed. The security tool translates the sequential patterns into a Dynamic Bayesian Network prediction model. A temporal reasoning engine then feeds the model with the current event status and predicts what events are likely to happen in next time window, and with what probability. | 2011-06-16 |
20110145186 | ONLINE ACCESS TO DATABASE SNAPSHOTS - An executing database instance includes a first plurality of database pages associated with a previous state of the database instance, a cache storing a current converter of the executing database instance, the current converter not representing the first plurality of database pages, and a database management system. The database management system is to receive a request for access to the first plurality of database pages, and perform a database task using one or more of the first plurality of database pages while the database instance is executing. | 2011-06-16 |
20110145187 | CONFLICT FRAMEWORK FOR GUIDED STRUCTURE SYNCHRONIZATION - A system and method for handling conflicts during structure synchronization. Conflicts are identified as the structure moves through the synchronization process. An intermediate structure is generated on a format of a target structure. A proposal for resolution of the identified conflicts is created. The conflicts and proposed resolutions are presented to a user. Proposals accepted by the user are applied to the intermediate structure. | 2011-06-16 |
20110145188 | PROVIDING DATA STRUCTURES FOR DETERMINING WHETHER KEYS OF AN INDEX ARE PRESENT IN A STORAGE SYSTEM - Keys of an index are associated with corresponding data chunks in a storage system. In response to a request for a particular key, a particular location is accessed in a first data structure which is maintained in a first storage using a first portion of the particular key. In response to the particular location containing a first value, indicating that the particular key is not present in the index. In response to the particular location containing a second value, a map is accessed using a second portion of the particular key to retrieve an entry in a second data structure maintained in a second storage. The second data structure provides a collision chain to link entries of the second data structure that share a common value of the second portion of the particular key. The first data structure, map, and second data structure are part of the index. | 2011-06-16 |
20110145189 | Reducing Latency of Access Requests in Distributed Storage Systems Having a Shared Data Set - Described are methods and apparatus for reducing latency of read and write requests for a set of storage system sites having a shared data set. An owner site may directly write to the shared data set and contains current data regarding the shared data set. The remote sites may experience substantial latency when accessing the shared data set stored at the owner site. Synchronizing and caching methods may reduce overall read latency experienced at remote sites by periodically transmitting images of the shared data set to the remote sites. Also, a migration method may be used to change ownership of the shared data set from a current owner site (that may be receiving a relatively low number of read/write requests) to a new owner site (that may be receiving a relatively high number of read/write requests) to reduce the overall read and write latency experienced in the sites. | 2011-06-16 |
20110145190 | PUBLIC INSPECTION SYSTEM AND METHOD FOR FCC LICENSED MEDIA OUTLET - A kiosk system facilitates compliance with FCC-mandated Public File requirements for licensed media outlets such as radio and television stations. The system intelligently routes Public File documents to the appropriate field entity (kiosk) without human intervention. These documents are categorized, tagged and made available to the public satisfying the federal requirements. The kiosks can operate in an offline mode with a synchronization system from the parent server to update the kiosks with documents and system data. An alerting system can generate push-email reminders and notifications for key media outlet staff. Additionally, the present invention can provide a virtual workstation kiosk to embed into a media outlet's public-facing websites, providing virtual kiosk access to remote members of the public. | 2011-06-16 |
20110145191 | Proxy-Based, Distributed Computer-Aided Dispatch System - In one embodiment, a computer-aided dispatch (CAD) system includes a database for storing data originated at a plurality of CAD stations; a first manager that manages access to the data stored in the database; one or more second managers communicatively connected with the first manager; and the CAD stations. Each one of the second managers is communicatively connected with particular ones of the CAD stations. The particular ones of the CAD stations communicatively connected with the same second manager are communicatively connected with each other. For each one of the second managers communicatively connected with the particular ones of the CAD stations: while the second manager is available, the particular ones of the CAD stations exchange data via the second manager; and while the second manager is unavailable, the particular ones of the CAD stations exchange data directly with each other. | 2011-06-16 |
20110145192 | Systems and Methods to Provide Server Side Profile Information - Systems and methods to provide server side profile information. An LDAP server is provisioned for each user of a plurality of users. Profile information is received. The profile information is stored in a database associated with the LDAP server. Via the LDAP server, a suggestion from the profile information is provided in response to a partial entry provided by the user to a first client associated with the user. | 2011-06-16 |
20110145193 | APPARATUS AND METHOD FOR CREATING A REAL TIME DATABASE REPLICA - A method of processing data includes identifying a capture redo byte address, initiating a capture process at the capture redo byte address, creating a clone of a source database to a logical change number, and initiating an apply process at a target database. | 2011-06-16 |
20110145194 | METHOD AND SYSTEM FOR NOTES FOR BUSINESS OBJECTS - A system and method for creating notes for business object instances are described. In various embodiments, a system includes modules to receive note data and bind notes to business object instances. In various embodiments, the system saves notes to a database via a dedicated database connection in a dedicated transaction. In various embodiments, a user interface is provided for creating and modifying notes on business content. In various embodiments, a method for creating notes in a user interface and attaching the notes to one or more positions in a user interface screen displaying business content in an enterprise information system is presented. | 2011-06-16 |
20110145195 | SYSTEMS AND METHODS FOR ACCESSING AND UPDATING DISTRIBUTED DATA - Systems and methods are disclosed that provide an indexing data structure. In one embodiment, the indexing data structure is mirrored index tree where the copies of the nodes of the tree are stored across devices in a distributed system. In one embodiment, nodes that are stored on an offline device are restored, and an offline device that comes back online is merged into the distributed system and given access to the current indexing data structure. In one embodiment, the indexing data structure is traversed to locate and restore nodes that are stored on offline devices of the distributed system. | 2011-06-16 |
20110145196 | SYSTEM AND METHOD FOR PROVIDING A BACKUP/RESTORE INTERFACE FOR THIRD PARTY HSM CLIENTS - Performing a backup of a stub object located on a file system managed by a hierarchical storage manager configured to migrate data objects from the file system to a migration storage pool. The stub object includes information for recalling a migrated data object and is configured to determine whether a backup copy of the migrated data object is stored in a backup storage pool if the backup is performed in an incremental backup operation. The backup further includes directing the hierarchical storage manager to recall the migrated data object to the file system if the backup copy of the migrated data object is not stored in the backup storage pool or if the backup is performed in a selective backup operation. The backup additionally includes storing a backup copy of the migrated data object in the backup storage pool if the migrated data object is recalled. | 2011-06-16 |
20110145197 | Storage system and method for operating storage system - By considering a device life and time needed for data migration, data stored in a storage apparatus is securely preserved until a retention term of each of the data. Multiple disk devices | 2011-06-16 |
20110145198 | Contextual and Semantic Differential Backup - A backup system that utilizes contextual and semantic concepts is described. The backup system provides for the ability to create a version changes log for listing and tracking all the changes in the different versions of the file. The version changes log creates a contextual description around the changes, deletions and additions. The semantic concept log is created from the version changes log to create a log of all of the semantic concepts associated with each change. A visualization builder then creates visualizations that can be used by the user to search for changes, deletions and additions whether in a text file or an image file. | 2011-06-16 |
20110145199 | SYSTEM AND METHOD OF STORING BACKUP IMAGE CATALOG - A system and method for managing backup and restore operations associated with a backup system. Metadata associated with files/directories of one or more file systems associated with one or more resources may be received. A virtual catalog image associated with the metadata may be created in a virtual file system image format. Once the virtual catalog image is created, virtualization vendor specific technology may be utilized to mount the image on the backup system and search and browse operations may be performed. The virtual catalog image may contain the file/directory hierarchy without containing actual file data. | 2011-06-16 |
20110145200 | PRECEDENCE BASED STORAGE - Techniques for precedence based storage are presented. Storage for a database is organized into storage pools; collections of pools form storage classes. The storage pools within a particular class are organized in a precedence-based order so that when storage for the database is needed, the storage pools are used in the defined order of precedence. Additionally, each storage pool or storage class can be circumscribed by security limitations, quality of service limitations, and/or backup procedures. | 2011-06-16 |
20110145201 | DATABASE MIRRORING - Methods, systems, and computer-readable media of database mirroring are disclosed. A particular method includes initiating a transaction that modifies one or more pages of a first database. Each page includes a structure modification operation (SMO) bit and initiating the transaction includes setting the SMO bit of each of the one or more pages to a first value. One or more first records are created at a transaction log of the first database. The transaction log is useable at a second database to mirror the transaction. Each first record indicates the setting of a SMO bit of a particular page to the first value. The database transaction is performed, and the SMO bit of each of the one or more pages is set to a second value. One or more second records are created at the transaction log, each second record indicating the setting of a SMO bit of a particular page to the second value. The method includes committing the transaction. | 2011-06-16 |
20110145202 | Archiving system - An archiving system for enabling searching for collections of items is disclosed. A processing unit displays an archived items collection management template in respect of a particular collection of items and prompts a user to complete the template fields with data obtained by the user from manually reviewing that collection of items to capture information relevant to each of the template fields. An archiving controller stores, in pre-determined data fields of a storage area of a data store corresponding to said collection of items, the data from the completed template fields. A document search controller may search the pre-determined data fields of the storage areas of the data store corresponding to each of the collections of items to identify ones of the collection of items which match search criteria. | 2011-06-16 |
20110145203 | METHOD, SYSTEM, AND APPARATUS FOR ARCHIVING NETWORKED DATA - A method for archiving networked data includes repeatedly transmitting an interrupt message to at least one controller, wherein each transmission of the interrupt message includes a data collection command, and wherein a portion of the transmissions of the interrupt message includes the data collection command and a time synchronization command. The method also includes receiving event data from the at least one controller in response to the data collection command, and storing the event data in a memory. | 2011-06-16 |
20110145204 | Transaction Recovery in a Transaction Processing Computer System Employing Multiple Transaction Managers - A technique for transaction recovery by one transaction manager of another transaction manager's transactions in which each transaction manager is adapted to manage two phase commit transactional operations on transactional resources and to record commit or rollback decisions in a transaction recovery log. The recovery transaction manager detects apparent unavailability of the another transaction manager for transaction processing and initiates a transaction recovery process for the another transaction manager's transactions. This process also determines whether any of the transactions of the another transaction manager have all respective resources prepared to commit without there yet being a pending commit decision record in the another transaction manager's recovery log. If so, the recovery transaction manager writes a rollback record indicating an intention to roll back the identified transaction, in the another transaction manager's recovery log provided no commit decision record has been recorded. | 2011-06-16 |
20110145205 | Packet Boundary Spanning Pattern Matching Based At Least In Part Upon History Information - An embodiment may include circuitry to determine, at least in part, based at least in part upon history information, whether one or more reference patterns are present in a data stream in a packet flow. The data stream may span at least one packet boundary in the packet flow. The history information may include a beginning portion of a packet in the data stream, an ending portion of the packet, and another portion of the data stream. The circuitry may overwrite the another portion of the history information with a respective portion of the data stream to be examined by the circuitry depending, at least in part, upon whether the circuitry determines, at least in part, whether the one or more reference patterns are present in the data stream. The respective portion may be relatively closer than the another portion is to a beginning of the data stream. | 2011-06-16 |
20110145206 | ATOMIC DELETION OF DATABASE DATA CATEGORIES - A device maintains, in a database, a plurality of data items, each data item of the plurality of data items being associated with a respective category. The device associates, in the database, a first counter value with each data item, the first counter value indicating a number of times the respective category has been deleted from the database at a time when the data item was stored in the database. The device associates, in the database or another database, a second counter value with the respective category, the second counter value indicating a current value for a number of times the respective category has been deleted from the database. The device selectively deletes, from the database, one or more data items of the plurality of data items from the database based on the first counter values and the second counter value. | 2011-06-16 |
20110145207 | SCALABLE DE-DUPLICATION FOR STORAGE SYSTEMS - A method for performing storage system de-duplication. The method includes accessing a plurality of initial partitions of files of a storage system and performing a de-duplication on each of the initial partitions. For each duplicate found, an indicator comprising the metadata that is similar across said each duplicate is determined. For each indicator, indicators are determined that infer a likelihood that data objects with said indicators contain duplicate data is high. Optimized partitions are generated in accordance with the chosen indicators. A de-duplication process is subsequently performed on each of the optimized partitions. | 2011-06-16 |
20110145208 | POLICY DRIVEN DISTRIBUTED DATA RESILIENCY - A data resiliency layer provides manageable data resiliency policy options for email related applications. Through one or more APIs such applications are enabled to query whether a data resiliency policy is satisfied for a given mailbox or database at a given point in time. Email related applications may consume this information to modify their behavior such as to wait, repeat, or fail the actions at hand to the point where data committal is guaranteed to a degree specified by the data resiliency policy. | 2011-06-16 |
20110145209 | ATOMIC DELETION OF DATABASE DATA CATEGORIES - A device may maintain, in a database, a plurality of data items, each data item of the plurality of data items being associated with a respective category and supplemental information relating to deletion of the data item. The device may associate a group of counters with at least one of the categories and receive a deletion request corresponding to one of the group of categories, the deletion request including the supplemental information. The device may identify a counter associated with the category corresponding to the deletion request based on the supplemental information. The device may then increment the identified counters and selectively delete the data items based on values of the counters. | 2011-06-16 |
20110145210 | System and Method for Managing One or More Databases - A system and method for managing one or more databases. A computing device includes a processor and memory device having stored therein a plurality of instructions which, in response to execution by the processor, cause the processor to connect to a first database, retrieve first metadata from the first database based upon a metadata retrieval policy, and store the first metadata as a first schema view of the first database in a unified data repository. The method is for managing a plurality of databases, where each database includes metadata having a plurality of database objects. The method includes receiving a request on a computing device to change at least one database object of a first database, then storing a tracking and number associated with the request, then comparing the metadata of the first database to metadata of a second database, then generating comparison data indicative of differences between the first database and the second database based upon the comparing step and, finally, verifying the comparison data based on the stored tracking number. | 2011-06-16 |
20110145211 | Network Based Audience Measurement - Methods, systems, and computer-readable media for providing network-based audience measurement are provided. Data packets are intercepted between a client computer and a content server. Unique subscribers and content names are identified based on the data packets. One or more audience measurement metrics are computed based on the unique subscribers and the content names. | 2011-06-16 |
20110145212 | METHOD AND SYSTEM FOR PROVIDING MEDIA SERVICE - In a method for providing a media service, the media service providing system retrieves an index file corresponding to a requested broadcast service after receiving a request for the broadcast service from the terminal. The media service providing system provides the retrieved index file to the terminal. Here, the index file includes a plurality of internet identifiers of a plurality of the media files corresponding to the broadcast service. | 2011-06-16 |
20110145213 | CONFIGURABLE PLUG-IN ARCHITECTURE FOR MANIPULATING XML-FORMATTED INFORMATION - A method and system is described for building a document using a configurable plug-in architecture. In one example, a configuration file containing information of building the document with one or more components is received. The one or more components execute to modify or manipulate the document. The document may further be passed from one component to another component, where each of the components performs a function on the document. The sequence of execution of the components, the type of function or activity executed by each of the components, and/or configuration data of the components may be provided by the configuration file. The document may further be output to a user or stored. | 2011-06-16 |
20110145214 | VOICE WEB SEARCH - A search system will receive a voice query and use speech recognition with a predefined vocabulary to generate a textual transcription of the voice query. Queries are sent to a text search engine, retrieving multiple web page results for each of these initial text queries. The collection of the keywords is extracted from the resulting web pages and is phonetically indexed to form a voice query dependent and phonetically searchable index database. Finally, a phonetically-based voice search engine is used to search the original voice query against the voice query dependent and phonetically searchable index database to find the keywords and/or key phrases that best match what was originally spoken. The keywords and/or key phrases that best match what was originally spoken are then used as a final text query for a search engine. Search results from the final text query are then presented to the user. | 2011-06-16 |
20110145215 | METHOD FOR ANALYZING WEB SPACE DATA - A method for analyzing data from the web that determine the importance that a chosen subject has in society, e.g., subject matter relating a concert, a scientific discovery, a football match, a person, a corporation, a brand, or a car, and analyze such data that can represent the entire society better than the known techniques. The method according to the invention can avoid malicious alterations and is able to measure and detect the temporal relations among all the web resources that talk about a particular topic or subject matter. | 2011-06-16 |
20110145216 | FILE CHANGE DETECTOR AND TRACKER - A method for detecting changes in a computing environment. In an example embodiment, the method includes observing a file system of the computing environment during a predetermined time interval and providing a signal when a predetermined change to the file system is detected during the predetermined time interval; employing the signal to log a description of detected file system changes; and using a logged description of the file system changes to perform an incremental crawl of the file system. In a more specific embodiment, the predetermined time interval includes an interval of time between crawls of the file system. The predetermined change to the file system includes a change to content of a file included in the file system, a change in user access rights to a file, a change in a location of a file of the file system, a change in a folder of the file system, a deletion of a file or folder in the file system, and so on. | 2011-06-16 |
20110145217 | SYSTEMS AND METHODS FOR FACILITATING DATA DISCOVERY - A system for facilitating data discovery on a network, wherein the network has one or more data storage devices. The system may include a crawler program configured to select at least a first set of files and a second set of files, each of the first set of files and the second set of files being stored in at least one of the one or more data storage devices. The system may also include a data fetcher program configured to obtain a copy of the first set of files, the data fetcher program being further configured to resist against obtaining a copy of the second set of files. The system may also include circuit hardware implementing one or more functions of one or more of the crawler program and the data fetcher program. | 2011-06-16 |
20110145218 | SEARCH SERVICE ADMINISTRATION WEB SERVICE PROTOCOL - The embodiments described herein generally relate to a method and system for enabling a client to configure and control the crawling function available through a crawl configuration Web service. A client is able to configure and control the crawling function by defining the URL space of the crawl. Such space may be defined by configuring the starting point(s) and other properties of the crawl. The client further configures the crawling function by creating and configuring a content source and/or a crawl rule. Further, a client defines authentication information applicable to the crawl to enable the discovery and retrieval of electronic documents requiring authentication and/or authorization information for access thereof. A protocol governs the format, structure and syntax (using a Web Services Description Language schema) of messages for communicating to and from the Web crawler through an application programming interface on a server hosting the crawler application. | 2011-06-16 |
20110145219 | OBJECTIVE AND SUBJECTIVE RANKING OF COMMENTS - A system may receive a request for comments associated with a particular document, identify a comment associated with the particular document, generate an objective score for the comment that is independent of a user associated with the request, identify the user associated with the request, generate a subjective score for the comment based on parameters associated with the identified user, generate a combined score for the comment by combining the objective score and the subjective score, and provide the comment, ranked based on the combined score, to the user for presentation with the particular document. | 2011-06-16 |
20110145220 | SYSTEM AND METHOD FOR EXECUTING A QUERY - There is provided a computer-implemented method of executing a query. An exemplary method comprises optimizing the query. The query may specify multiple operations on corresponding multiple column sets of a table in a database. The exemplary method further comprises partitioning data of the table based on the operations within a single pass of the table. Additionally, the exemplary method comprises performing the operations on the partitioned data in parallel. | 2011-06-16 |
20110145221 | APPARATUS AND METHOD FOR PROCESSING A DATA STREAM - An apparatus and method for processing data stream are provided. A query execution plan for processing data stream is shared between the server and the terminal. The server builds a query execution plan and determines a part of the built query execution plan to be executed in the terminal. The terminal executes the part of the built query execution plan and transfers a result of the execution. The server executes the remaining part of the built query execution plan based on the execution result transferred by the terminal. The part of the query execution plan to be executed in the terminal is determined depending on the performance of the terminal. | 2011-06-16 |
20110145222 | ABSTRACTING INFORMATION FROM A DEVICE - Requesting from a device to a source. In a device comprising a datastore, the datastore comprising a plurality of records, each record comprising a plurality of fields, retrieving a common set of fields from each of the plurality of records. The technology abstracts at least one of the retrieved fields across the plurality of records, resulting in abstracted information. The technology sends, to the source, the abstracted information from the device in place of the retrieved fields. | 2011-06-16 |
20110145223 | METHODS AND APPARATUS FOR REPRESENTING PROBABILISTIC DATA USING A PROBABILISTIC HISTOGRAM - Methods and apparatus for representing probabilistic data using a probabilistic histogram are disclosed. An example method comprises partitioning a plurality of ordered data items into a plurality of buckets, each of the data items capable of having a data value from a plurality of possible data values with a probability characterized by a respective individual probability distribution function (PDF), each bucket associated with a respective subset of the ordered data items bounded by a respective beginning data item and a respective ending data item, and determining a first representative PDF for a first bucket associated with a first subset of the ordered data items by partitioning the plurality of possible data values into a first plurality of representative data ranges and respective representative probabilities based on an error between the first representative PDF and a first plurality of individual PDFs characterizing the first subset of the ordered data items. | 2011-06-16 |