26th week of 2014 patent applcation highlights part 73 |
Patent application number | Title | Published |
20140181011 | METHODS FOR CONTROLLING REMOTE ARCHIVING SYSTEMS - Embodiments of the present disclosure provide a unique and novel archiving system that includes two or more network storage systems, each network storage system including removable hard disk drives embedded in removable disk cartridges, referred to simply as removable disk drives. The removable disk drives allow for expandability and replacement such that the archiving system need not be duplicated to add new or more storage capacity. In embodiments, the archiving system accesses, writes, reads, or performs functions on data from one network storage system to another remote network storage system. | 2014-06-26 |
20140181012 | APPARATUS AND METHOD FOR CONTENTS BACK-UP IN HOME NETWORK SYSTEM - According to the present invention, content generated from a mobile terminal, a camera, or the like is stored automatically in a home gateway in a home network system. If synchronization is set between the home gateway and a home device, the home gateway may transmit backup content to the synchronized home device. Content may be selectively stored and classified based on a specific location, memo, voice, and the like set by a user for privacy protection. | 2014-06-26 |
20140181013 | SYSTEMS AND METHODS FOR PROVIDING ACCESS TO EXTERNAL CONTENT OBJECTS - Disclosed are methods, apparatus, systems, and computer readable storage media for providing access in an on-demand database service to a content object stored in an external content management data source. Information data identifying a content object stored in an external content management data source can be received and communicated through one or more middleware components. The one or more middleware components can serve as a content hub to establish access with the content object and retrieve data regarding the content object. The data regarding the content object can be stored in a persistent object, which can represent the content object in a social layer of the on-demand database service. | 2014-06-26 |
20140181014 | PRESERVING CONTENT ITEM COLLECTION DATA ACROSS INTERFACES - Systems, methods, and computer-readable storage media for preserving collection data across interfaces are disclosed. The system can generate, for a collection of content items stored in multiple user accounts in a synced online content management system, an index of the content items in the collection. The index can store, a content item identifier and a file location, for each content item. Upon detecting that a content item in the collection is moved to a new file location, the system can retrieve a collection identifier from metadata associated with the content item. The system can then locate the index for the collection associated with the collection identifier based on the collection identifier retrieved from the metadata associated with the content item. The system can then update the file location stored at the index for the content item to identify the new file location. | 2014-06-26 |
20140181015 | LIGHTWEIGHT SYNCHRONIZATION OF MIRRORED DISKS - In a process for migrating a virtual machine's storage from a source disk to a destination disk, during a steady state (i.e., wherein the contents of the virtual machine stored on the source disk and the destination disk are equal), a virtual machine monitor receives a set of write requests from a guest operating system (“guest”) of the virtual machine, provides confirmation of the completion of the set of writes to the source disk, and asynchronously replicates the set of write requests to the destination disk. Upon receipt of a flush request from the guest, the virtual machine monitor confirms completion of the flushing of the destination disk following replication of the write requests to the destination disk. Upon receipt of a switch request from a virtual machine manager, the virtual machine monitor switches the virtual machine to the destination disk and issues subsequent write requests to the destination disk. | 2014-06-26 |
20140181016 | ASYNCHRONOUS REPLICATION CORRECTNESS VALIDATION - A method for backing up a client data set on a computer by generating a manifest of the client data set and storing the manifest on a remote server along with a server data set corresponding to the client data set; taking a snapshot of the server manifest and data set; and comparing the manifest to the remote server data set and synchronizing the client dataset if a difference is detected. | 2014-06-26 |
20140181017 | CONSISTENT REPLICATION OF TRANSACTIONAL UPDATES - Embodiments of the present invention provide a method, system and computer program product for consistent replication of transactional updates. In an embodiment of the invention, a method for consistent replication of data in a transaction processing system is provided. The method includes recording entries in a replication log of different data updates and corresponding transactions and additionally recording entries in the replication log indicating whether or not the transactions have been backed out. The method also includes replicating only those data updates referenced in the log which do not correspond to transactions indicated in the log to have been backed out. For instance the additionally recorded entries in the replication log indicate when a transaction has been backed out. Alternatively, the additionally recorded entries in the replication log indicate when a transaction has been committed. | 2014-06-26 |
20140181018 | CONSISTENT REPLICATION OF TRANSACTIONAL UPDATES - Embodiments of the present invention provide a method, system and computer program product for consistent replication of transactional updates. In an embodiment of the invention, a method for consistent replication of data in a transaction processing system is provided. The method includes recording entries in a replication log of different data updates and corresponding transactions and additionally recording entries in the replication log indicating whether or not the transactions have been backed out. The method also includes replicating only those data updates referenced in the log which do not correspond to transactions indicated in the log to have been backed out. For instance the additionally recorded entries in the replication log indicate when a transaction has been backed out. Alternatively, the additionally recorded entries in the replication log indicate when a transaction has been committed. | 2014-06-26 |
20140181019 | Automatic Updating of Aggregations for Aggregating Data - In one embodiment, a method receives a specification for aggregating data from processing of beacons. A beacon is associated with an event occurring at a client while a user is interacting with a web application and including unstructured data. The method then parses the specification to automatically generate an aggregation to aggregate structured data that has been converted from the unstructured data and stores dependency information for changes to the aggregation. State information is analyzed and the dependency information to determine when a change in the state information indicates that a change should be made to the aggregation. The method then dynamically changes the aggregation based on the analyzing to generate a new aggregation to aggregate different data based on changed information. | 2014-06-26 |
20140181020 | INTEGRATION SCENARIO FOR MASTER DATA WITH SOFTWARE-AS-A-SERVICE SYSTEM - According to one general aspect, a method may include replicating, to a software-as-a-service application, a plurality of pieces of master data from a physically remote master database. The method may also include converting the plurality of pieces of master data into one or more pieces of local data of the software-as-a-service application. The method may include changing one or more of either the pieces of master data or the pieces of local data. The method may further include synchronizing the changed pieces of either master data or local data between the remote master database and the software-as-a-service application. | 2014-06-26 |
20140181021 | BACK UP USING LOCALLY DISTRIBUTED CHANGE DETECTION - Systems and methods for replicating a client data set on a computer includes replicating the client data set using an application software on the computer; generating a manifest of a target data set during replication containing state of target data reflecting post-update state; and determining differences between the local data and manifest to determine required backup operations. | 2014-06-26 |
20140181022 | SYSTEMS AND METHODS FOR MANAGING REPLICATED DATABASE DATA - Systems and methods for replicating database data and generating read-only copies of the replicated data in a clean shutdown state. For example, systems can include a tracking module (e.g., a filter driver) that monitors transactions from a database application to a source storage device to generate log entries having at least one marker indicating a known good state of the application. The systems further include a computer coupled to a target storage device comprising a database and log files. The computer processes the transactions, based on the log entries, to replicate data to the target storage device; performs a first snapshot on data stored in the database and log files; replays into the database data stored in the log files; performs another snapshot on the database; and reverts the database back to a state in which the database existed at the time of the first snapshot. | 2014-06-26 |
20140181023 | Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications - A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed. | 2014-06-26 |
20140181024 | APPROACH FOR MODULARIZED SYCHRONIZATION AND MEMORY MANAGEMENT - Approaches to memory management and synchronization are described relating to provision of highly robust and highly available servers that can serve multiple requests in parallel. Programming objects can be analyzed at design time by comparison to predefined patterns to identify a set of requirements and rules that must be followed to ensure that all part of a program cooperate. In highly complex programming environments, enforcement of such rules for a program as a whole can be quite difficult. As such, analysis of compliance can desirably occur at a programming object level. | 2014-06-26 |
20140181025 | Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications - A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed. | 2014-06-26 |
20140181026 | READ-ONLY OPERATIONS PROCESSING IN A PAXOS REPLICATION SYSTEM - Embodiments are directed to processing read-only operations without storing the operations persistently, determining a processing order for read-only requests, and to directing read-only requests to nodes best able to handle the requests. In an embodiment, a quorum leader receives various read-only requests. The quorum leader controls process ordering for replicas in the leader's quorum. The quorum leader determines an appropriate order for processing the read-only operations, without clock-based synchronization. The quorum leader sends the read-only request to an appropriate replica in the quorum and executes the read-only request at the appropriate replica without storing the operation persistently. | 2014-06-26 |
20140181027 | SYSTEMS AND METHODS FOR STATE CONSISTENT REPLICATION - Systems and methods are disclosed for state consistent replication of client data set on a client computer by generating a snapshot of the client data set on a local volume; synchronizing with a remote server volume corresponding to the local volume to create a copy of the client data set on the remote server; performing a master to slave replication of the data set; and taking a snapshot of the server data set to create a mirror of the snapshot of the client data set on the server. | 2014-06-26 |
20140181028 | SYSTEM AND METHOD FOR PERFORMING AN IMAGE LEVEL SNAPSHOT AND FOR RESTORING PARTIAL VOLUME DATA - The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents. | 2014-06-26 |
20140181029 | ROLLING CACHE CONFIGURATION FOR A DATA REPLICATION SYSTEM - Performing data management operations on replicated data in a computer network. Log entries are generated for data management operations of an application executing on a source system. Consistency point entries are used to indicate a time of a known good, or recoverable, state of the application. A destination system is configured to process a copy of the log and consistency point entries to replicate data in a replication volume, the replicated data being a copy of the application data on the source system. When the replicated data represents a known good state of the application, as determined by the consistency point entries, the destination system(s) may perform a storage operation (e.g., snapshot, backup) to copy the replicated data and to logically associate the copied data with a time information (e.g., time stamp) indicative of the source system time when the application was in the known good state. | 2014-06-26 |
20140181030 | IDENTIFYING DATA ITEMS - Each of a plurality of data items has an associated update time. Identifying updated data items comprises identifying those data items that have an update time later than a last synchronization time. The data items are updated such that each data item is associated with one of a plurality of update tokens. Each update token is associated with updates performed up to a respective bound period from a time at which the update token is superseded by a successive update token. The update tokens are allocated successively in a monotonic sequence. Data indicating a last synchronization time is received. An update token is identified that is associated with one or more updates performed relative to a point in time related to the last synchronization time by the bound period. Data items having an update time after the last synchronization time are identified on the basis of the identified update token. | 2014-06-26 |
20140181031 | SYSTEMS AND METHODS TO CONFIRM REPLICATION DATA ACCURACY FOR DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically determines the accuracy of replication data when performing data backup operations. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. The system automatically determines the accuracy of replication data during data backup. | 2014-06-26 |
20140181032 | SYSTEMS AND METHODS TO PERFORM DATA BACKUP IN DATA STORAGE SYSTEMS - A data storage system, according to certain aspects, automatically backs up source data when the replication data is faulty. For instance, the system performs data backup using replication data rather than source data to reduce the processing load on the source system. The backup data is then associated with the source data as if the backup had been performed on the source data. If the replication system fails, then backing up replication data results in backup data that does not accurately reflect the source data. When permitted by the user system configuration, the system automatically backs up source data when replication has failed. | 2014-06-26 |
20140181033 | SYSTEMS AND METHODS TO TRACK DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system copies the data to temporary storage, saves the file path in the temporary storage, and identifies the copy of the data in temporary storage for backup. In another manner, the system converts the data to a hidden file, copies the hidden file to temporary storage, saves the file path to the temporary storage, and identifies the copy of the hidden file for backup. In a further manner, the system copies the data to temporary storage when it is created, saves the file path to the temporary storage, and identifies the data in the temporary storage for backup after the delete operation is detected and the data is identified as not protected or as modified after the last backup operation. | 2014-06-26 |
20140181034 | SYSTEMS AND METHODS FOR MINIMIZING NETWORK BANDWIDTH FOR REPLICATION/BACK UP - Systems and methods are disclosed for backing up a client data set on a computer by identifying changed files; generating a first sub-file signature for one or more segments of a changed file; subsequently generating a second sub-file signature for each file segment to detect insertions, removals, and rearrangements of data in the file; transmitting one more changed segment(s) in the file; and writing a manifest file reflecting the new target state. | 2014-06-26 |
20140181035 | DATA MANAGEMENT METHOD AND INFORMATION PROCESSING APPARATUS - A first node is assigned a first data group, and a second node is assigned a second data group. In addition, the second node manages a backup copy of the first data group. The second node receives, from the first node, a log indicating an instruction executed on a data record belonging to the first data group, and stores the received log in a memory of the second node. The second node writes logs for a plurality of instructions accumulated in the memory into a storage device of the second node different from the memory when a predetermined condition is satisfied. | 2014-06-26 |
20140181036 | LOG CONSOLIDATION - Consolidating a set of tenant log streams from separate user databases into a consolidated log stream. The method includes receiving a plurality of tenant log streams from separate user data bases. The method further includes recording the plurality of tenant log streams as a consolidated log stream. The method further includes maintaining metadata about the consolidated log stream to map log records from the plurality of tenant log streams to their location in the consolidated log stream. | 2014-06-26 |
20140181037 | SYSTEMS AND METHODS TO DETECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. For instance, the system monitors data operations and when the data operation is a delete, the system determines whether the data identified for deletion has been protected by a backup operation. Data that has not been backed up, such as newly created data, is copied to temporary storage before deletion. When the data has been protected, the system determines whether the data has been modified after the backup operation. Data modified after the backup operation is copied to temporary storage before deletion. | 2014-06-26 |
20140181038 | SYSTEMS AND METHODS TO CATEGORIZE UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system automatically determines whether characteristics of the unprotected virtual machines meet characterization rules for backup policies and assigns backup policies to the unprotected virtual machines whose characteristics meet the characterization rules for a certain backup policy. The system further identifies those unprotected virtual machines that remain uncategorized and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. | 2014-06-26 |
20140181039 | SYSTEMS AND METHODS FOR ON-DEMAND DATA STORAGE - Systems and methods provide on demand data storage by creating an unpartitioned storage pool; generating a unique volume identifier for a data storage volume at a predetermined location; pre-provisioning the data storage volume in a volume queue ready for use on-demand; and storing data on the data storage volume at the predetermined location on-demand. | 2014-06-26 |
20140181040 | CLIENT APPLICATION SOFTWARE FOR ON-LINE BACKUP AND DISASTER RECOVERY - Systems and methods communicate back-up data files to one or more data storage silos by at a customer computer, installing and running a client software; providing a system management platform coupled to the client software over the Internet; and receiving inputs from a user web portal to control operations of the client software and the system management platform to back up the customer computer. | 2014-06-26 |
20140181041 | DISTRIBUTED DATA STORE - Systems and methods are disclosed for backing up a computer with a distributed meta data store by splitting meta data from file data; storing the meta data for each file in a separate file; mapping the file data and meta data to an arbitrary file system; and reconstructing files for the arbitrary file system. | 2014-06-26 |
20140181042 | INFORMATION PROCESSOR, DISTRIBUTED DATABASE SYSTEM, AND BACKUP METHOD - According to one embodiment, a apparatus includes a first module which stores update information includes position information indicating an update position in the data file in a first storage and data to be updated in a second storage, such that update information items includes the update information are stored in contiguous storage areas of the second storage in the order of request of each of the update information items when the data file is requested to be updated, and a second module which stores the update information items stored in the second storage in free space having contiguous addresses of a third storage, in the order of storing in the second storage, if an amount of the update information items in the second storage exceeds a set volume. | 2014-06-26 |
20140181043 | COMBINED STREAM AUXILIARY COPY SYSTEM AND METHOD - A system and method for transferring data in a library storage system. The library storage system comprises a management server including a storage policy. A media agent is connected to the management server. A plurality of storage media and a data source are connected to the media agent. The data source is divided into at least a first and a second portion of data. The portions of data are transferred from the data source to a first and second primary storage medium using a first and a second data stream respectively. The media agent then causes the first and second portion of data to be transferred from the first and second storage medium to a third auxiliary storage medium using a third combined data stream. Auxiliary copying is performed in chunks and multiple streams are copied in parallel. | 2014-06-26 |
20140181044 | SYSTEMS AND METHODS TO IDENTIFY UNCHARACTERIZED AND UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system automatically identifies and categorizes unprotected virtual machines. The system further identifies those unprotected virtual machines that remain uncategorized and notifies a system administrator of the unprotected virtual machines. The system further applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. | 2014-06-26 |
20140181045 | SYSTEMS AND METHODS TO IDENTIFY UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system compares a list of virtual machines with a list of computing devices having a designated backup policy in the data storage system and determines which of the virtual machines are unprotected. The system further automatically categorizes the unprotected virtual machines, identifies those unprotected virtual machines that remain uncategorized, and applies a default backup policy to the uncategorized and unprotected virtual machines to provide protected virtual machines. | 2014-06-26 |
20140181046 | SYSTEMS AND METHODS TO BACKUP UNPROTECTED VIRTUAL MACHINES - Virtualization sprawl can lead to virtual machines with no designated periodic backup. If the data associated with these unprotected virtual machines is not backed up, it cannot be restored if needed, leading to system failures. A data storage system identifies and protects the unprotected virtual machines. For instance, the system automatically identifies and categorizes unprotected virtual machines. The system further identifies those unprotected virtual machines that remain uncategorized, applies a default backup policy to the uncategorized and unprotected virtual machines, and backs up the virtual machines using the default backup policy. | 2014-06-26 |
20140181047 | SYSTEMS AND METHODS TO PROTECT DELETED FILES - A data storage system protects data identified for deletion which has been created or modified between scheduled data backups. The system copies the data to temporary storage, normalizes the copy, and merges the normalized data from the temporary storage to a secondary storage device. For instance, the system merges the data on the secondary storage device at locations indicated by the file path saved in metadata. In another manner, the system merges changes between the previously backed up version of the data and the data identified for deletion into the previously backed up version of the data stored on the secondary storage device at the locations indicated by the file path. In a further manner, the system merges the differences between the previously backed up version of the data and the data identified for deletion at the locations indicated by the file path. | 2014-06-26 |
20140181048 | FILTERED REFERENCE COPY OF SECONDARY STORAGE DATA IN A DATA STORAGE SYSTEM - The data storage system according to certain aspects can filter secondary copies of data (e.g., backups, snapshots, archives, etc.) generated by multiple client computing devices into a single, filtered, global reference copy. A reference copy may be a filtered view or representation of secondary storage data in a data storage system. A reference copy may include a data structure that includes references to a subset of secondary storage data that meets certain filtering criteria. The filtering criteria may be specified by users according to user preference. Data included in a reference copy may be stored in native format (e.g., format of the application that generated the data) and be accessible through the application associated with the data. | 2014-06-26 |
20140181049 | ARCHIVAL SYSTEMS AND METHODS FOR LIVE PERFORMANCES - Method and systems for creating a consumer accessible archive of live performances are described. The consumer accessible archive may be created by receiving a data file including recorded data for a live performance of an artist via a network at a central location, receiving another data file including recorded data for another live performance of the artist via the network at the central location, generating an archive including the recorded data, and posting the archive by the computer server system for access of the first and second portions by consumers via the network. Methods and systems are also described for creating and archiving live performances and for uploading digital content related to a live performance to a computer server system. | 2014-06-26 |
20140181050 | DATA ARCHIVE SYSTEM - The data archive system according to the present disclosure includes a client terminal | 2014-06-26 |
20140181051 | SYSTEMS AND METHODS FOR ON-LINE BACKUP AND DISASTER RECOVERY WITH LOCAL COPY - Systems and methods are disclosed for rapidly restoring client data set for a computer by storing the client data and one or more pat sets required to revert to one or more version of the client data on a remote server; storing a local copy of the replicated client data on a local data storage device coupled to the computer; receiving a request to revert to a predetermined version of the client data; using the local copy as a seed, receiving a patch set corresponding to a predetermined version; and updating the local copy using the patch set to generated the predetermined version. | 2014-06-26 |
20140181052 | TECHNIQUES FOR ALIGNED RUN-LENGTH ENCODING - Techniques for Aligned Run-Length Encoding (ARLE) are described. ARLE is an encoding scheme that transforms sets of same-valued consecutive rows into one or more runs, while enforcing boundaries between the runs at set intervals (e.g. every predetermined number of rows). Consecutive rows that contain the same value, but which cross one or more interval boundaries, are encoded as multiple runs that are divided along those interval boundaries. According to one technique, a database server accelerates query processing by setting the interval size to the word size of the processor performing the predicate comparisons. According to another technique, a database server accelerates row lookup by maintaining an offset array that stores the run offsets into the ARLE data of the run that begins each interval. | 2014-06-26 |
20140181053 | CONDENSING EVENT MARKERS - Systems, methods, and computer-readable storage media for analyzing the recorded interactions of users within a shared dataspace, where the shared dataspace is provided by an a synced online content management system. As each user adds and deletes files in the shared dataspace, the content management system can record each interaction. The content management system can then analyze the recorded interactions, creating collapsed summaries of the interactions, and generate notifications that can be presented to users. Various thresholds can be used to determine when the recorded interactions are condensed, and when notifications associated with those condensed interactions are presented to users. | 2014-06-26 |
20140181054 | DATA DEDUPLICATION IN A REMOVABLE STORAGE DEVICE - An apparatus and associated methodology contemplate a data storage system having a removable storage device operably transferring user data between the data storage system and another device via execution of a plurality of input/output commands. A commonality factoring module executes computer instructions stored in memory to assign commonality information to the user data. A deduplication module executes computer instructions stored in memory to combine a plurality of files of the user data (user data files) with at least one file of corresponding commonality information (commonality information file), the combined files forming a sequential data stream. | 2014-06-26 |
20140181055 | Policy-based management of a redundant array of independent nodes - An archive cluster application runs across a redundant array of independent nodes. Each node runs an archive cluster application instance comprising a set of software processes: a request manager, a storage manager, a metadata manager, and a policy manager. The request manager manages requests for data, the storage manager manages data read/write functions, and the metadata manager facilitates metadata transactions and recovery. The policy manager implements policies, which are operations that determine the behavior of an “archive object” within the cluster. The archive cluster application provides object-based storage. It associates metadata and policies with the raw archived data, which together comprise an archive object. Object policies govern the object's behavior in the archive. The archive manages itself independently of client applications, acting automatically to ensure that object policies are valid. | 2014-06-26 |
20140181056 | SYSTEM AND METHOD OF QUALITY ASSESSMENT OF A SEARCH INDEX - Systems, methods, and computer program products for enabling assessment of the quality of a search index. In one embodiment, objects are processed to produce corresponding text that is stored and indexed. The objects are also processed to identify and store corresponding metadata values for indexing. Error conditions that are detected during the processing of objects to generate corresponding text are tracked and compared to determine the most severe of the error conditions. An indication of the most severe error condition is stored in a first consolidated error field. Errors that are encountered in the identification and storage of metadata values are counted and this count is stored in a second consolidated error field. Both of the consolidated error fields are indexed in the same manner as the text and metadata for the objects, so that the stored error information can be used in queries of the search index. | 2014-06-26 |
20140181057 | SYSTEM AND METHOD FOR PREVENTING DUPLICATE UPLOADS OF MODIFIED PHOTOS IN A SYNCHRONIZED CONTENT MANAGEMENT SYSTEM - A method and system for automatically rotating image files and preventing duplicate uploads in a remote file storage system is described. The system receives an image file. The system calculates a hash value associated with newly uploaded files. The system then automatically rotates the images based on orientation data associated with the files (if included). The system then compares the hash value(s) associated with the new file(s) with the hash values from the existing files stored on the remote file storage system. If the hash values of any of the new files to be uploaded match a hash value on the hash value list, then the system prevents the new files from being uploaded to the remote file storage system. | 2014-06-26 |
20140181058 | APPARATUS FOR AUTHENTICATION OF SOLUTION TOPOLOGY - A computer implemented method is provided to verify an integrity of a solution. The computer implemented method comprises hashing, by a computer, a set of virtual machine instances in a solution topology of the solution. The computer hashes a set of connections in the solution topology. The set of connections comprising a connection between ones of the set of virtual machine instances, a connection between a first component of a first one of the set of virtual machine instances and a second component of a second one of the set of virtual machine instances, and combinations thereof. The computer hashes a set of solution-specific information, and then signs the hashes to create a first signed topology. | 2014-06-26 |
20140181059 | BATCHING CONTENT MANAGEMENT OPERATIONS TO FACILITATE EFFICIENT DATABASE INTERACTIONS - Batching content management operations to facilitate efficient database interactions is disclosed. Two or more content management-related requests are received. The two or more content management-related requests are treated as a batch, including by formulating and sending to a database in a single database interaction a grouped request to add, delete, or modify each of a plurality of database records. | 2014-06-26 |
20140181060 | Record Protection System For Networked Databases - A record protection system for a networked database is provided. The system includes a client, a host processor accessible by the client via a telecommunications network, a database accessible by the host processor and containing at least one data record, software executing on the host processor for receiving data from the client for one or more fields of the data record, software executing on the processor for receiving data from a source, software executing on the host processor for comparing the data received from the client to the data received from the source, and software executing on the host processor to prevent editing of the data record by the client if the at least a portion of the data received from the client matches the data received from the source. | 2014-06-26 |
20140181061 | DATA DISTRIBUTION IN A CLOUD COMPUTING SYSTEM - An illustrative data access management system includes a plurality of data storage devices and at least one data manager device configured to arrange information stored by the data storage devices. The data manager device segments compressive measurements of data into a plurality of subsets. Each of the subsets contains measurement information for facilitating a reconstruction of at least an approximation of the data. The data manager device provides at least a first one of the subsets to a first one of the data storage devices and at least a second one of the subsets to a second one of the data storage devices. One of the data storage devices may be selected, based on at least one criterion, for providing a user access to the at least one subset stored by the selected data storage device. | 2014-06-26 |
20140181062 | PROVIDING A COMMON VIRTUAL ITEM REPOSITORY IN A VIRTUAL SPACE - Virtual items may be unlocked in a virtual space responsive to physical token detection. A common virtual item repository may be provided in the virtual space. Once unlocked, a given virtual item may be accessible to multiple characters in the virtual space via the virtual item repository. Customization of a virtual space may be facilitated. The customization may be based on the virtual items accessible via the virtual item repository. | 2014-06-26 |
20140181063 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PROTECTING DERIVED METADATA WHEN UPDATING RECORDS WITHIN A SEARCH ENGINE - A search engine may maintain a list of derived metadata. When an event occurs that requires updating a search index, the search engine can determine which metadata is derived metadata and take appropriate actions with respect to the derived metadata. For example, if a request is received to update the index for a particular object, the search engine may protect the derived metadata from change while updating the other metadata in the index. As another example, if a request is received to update the text content for the object, the search engine may change the text content and the derived metadata. By identifying derived metadata, the search engine can protect the derived metadata from change when a request is received that otherwise causes metadata to change and can change the derived metadata when a request is received that would otherwise not change the metadata portion of the index. | 2014-06-26 |
20140181064 | GEOGRAPHICAL AREA CORRELATED WEBSITES - A system, method and/or software for using overlap between a first website area-of-interest map, associated with a first website, and a searcher area-of-interest map to help prioritize the websites returned by a search engine search. The area-of-interest maps are made up of geographic pixels respectively assigned with area-of-interest values. Overlap area is determined by comparing, on a pixel-by-pixel basis, corresponding pixels of the searcher area-of-interest map and the first website area-of-interest map to determine overlap pixels where the following conditions hold: (i) the first website area-of-interest map has a non-zero interest value, and (ii) the searcher area-of-interest map has a non-zero interest value. | 2014-06-26 |
20140181065 | Creating Meaningful Selectable Strings From Media Titles - A method and medium are provided for generating shortened media titles. The length of a media title is constrained by the physical space allotted to it on a display device. Interfering and inaudible portions are removed from the media title. The media title is then split at join phrases in order to create multiple substrings. The multiple substrings are ranked according to relevance and audibility. The highest ranked substring is either stored or displayed. | 2014-06-26 |
20140181066 | INTEREST MATCHING TECHNIQUES USING INTERNET SEARCHES - According to certain techniques, a first search engine result page (“SERP”) is obtained. The first SERP is associated with a first user. A second SERP is obtained, and the second SERP is associated with a second user. The first SERP is compared with the second SERP to determine an overall degree of correlation. The first SERP may include at least one of a query, at least one title, at least one uniform resource locator (“URL”), at least one snippet, or at least one related search. The second SERP may include at least one of at least one query, at least one title, at least one URL, at least one snippet, or at least one related search. | 2014-06-26 |
20140181067 | METHOD AND APPARATUS OF ORDERING SEARCH DATA, AND DATA SEARCH METHOD AND APPARATUS - The present disclosure provides a method and an apparatus of ordering search data, and a method and an apparatus of data searching. The method of ordering search data includes: generating data of a moderate demand point, the data of the moderate demand point including a reference property value of a search target; and ordering a corresponding data set associated with the search target based on the data of the moderate demand point, the ordering including: obtaining the data set that is associated with the search target, and obtaining current property values of one or more search targets from the data set; computing distances between the current property values of one or more search targets and the reference property value; and ordering the one or more search targets of the data set based on the distances. The present embodiments can improve the search efficiency on top of satisfying individualized needs of a user, simplifying operations of the user and saving resource consumption of a client and a server. | 2014-06-26 |
20140181068 | COMMUNICATION SYSTEM - A method of updating a data record stored in a data store with information supplied by at least one of a plurality of users of a communication network includes storing a communication identifier in association with the data record; providing information to update the data record from a user together with a communication identifier associated with the user providing the information; and comparing the identifier stored in association with the data record to the communication identifier associated with the user providing the information. If the information is the first type of information, the data record is updated with the information only if the identifier associated with the user providing the information is the same as the identifier stored in association with the data record and if the information is the second type of information the data record is updated with the information. | 2014-06-26 |
20140181069 | SPECULATIVE SEARCH RESULT ON A NOT-YET-SUBMITTED SEARCH QUERY - Providing a speculative search result for a search query prior to completion of the search query is described. In response to receiving a search query from a client node, a speculative search result is provided to the client node for the search query prior to receiving an indication from the client node that said search query is completely formed. The speculative search result may be displayed on the same web page on the client node as the search query, while the search query is being entered by the user. As the user further enters the search query, a new speculative search result may be provided to the user. | 2014-06-26 |
20140181070 | PEOPLE SEARCHES USING IMAGES - Methods, systems, and computer-readable media for resolving a search query for a person using an image of the person are provided. An image index containing web images and links to the web images is created. Identifiers of the web images are mapped to the links to the web images and stored in the image index. A search query for a person is received. Upon recognizing the intent of the search query is to find information about the person, at least one digital image related to the person is selected, and an identifier of the digital image is submitted to the image index. The identifier of the digital image is compared against the identifiers of the stored web images and determined to correspond to an identifier of a web image. A link mapped to the identifier of the web image is read and distributed for presentation to a user. | 2014-06-26 |
20140181071 | SYSTEM AND METHOD OF MANAGING CAPACITY OF SEARCH INDEX PARTITIONS - A search system can maintain a search index of metadata and text for objects in a repository, repositories or distributed across a network. The search index can be divided into partitions with a partition assigned a first capacity utilization threshold and a second capacity utilization threshold. If the capacity utilization of the partition is below the first threshold, the system can add, update and delete information in the partition. If the capacity utilization of the partition is above the first threshold, the system can update and delete information in the partition, but cannot add information for new objects to the partition. If the capacity utilization of the partition is above the second threshold, the system can enter a rebalancing mode in which it seeks to rebalance capacity utilization between partitions. The behavior of the system can change depending upon the size of a partition relative to its configurable thresholds. | 2014-06-26 |
20140181072 | AUTOMATIC TUNING OF DATABASE QUERIES - A database query is modified to improve performance by identifying portions of database tables that are likely to be reused and modifying the database query accordingly. According to certain embodiments, the degree of selectivity with which a table is accessed is used to identify tables that are likely to be reused in subsequent database operations. | 2014-06-26 |
20140181073 | METHOD AND SYSTEM FOR GENERATING OPTIMAL MEMBERSHIP-CHECK QUERIES - A method and system of transforming a query at a web server are provided. An abstract syntax tree representing the query can be traversed from the top down, for each node in the abstract syntax tree: labeling the node as being in a conjunct position when the node's parent is a WHERE node; labeling the node as being not in a conjunct position when the node's parent is an OR node; and labeling the node identically to the node's parent node when the node's parent is an AND node. Then any IN node in the abstract syntax tree can be transformed to an INNER JOIN node when the IN node is labeled as being in a conjunct position. The abstract syntax tree can be converted into a Structured Query Language (SQL) query, which can then be passed to a database for processing. | 2014-06-26 |
20140181074 | ESTIMATING NUMBER OF ITERATIONS OR SELF JOINS REQUIRED TO EVALUATE ITERATIVE OR RECURSIVE DATABASE QUERIES - The number of iterations or self joins required to execute a recursive database query can be estimated. It will be appreciated that this estimation can be used to plan the execution of the recursive query and can be made in various ways and for various applications. By way of example, an estimated number of iterations or self joins required to execute a recursive database query (e.g., 12) can be used as a basis to determine or plan an optimal execution plan. For example, given an estimated twelve (12) iterations, an execution plan can be determined for executing at least the first three (3) iterations or for executing every there (3) iterations, whereas for an estimated twenty (21) iterations required to complete a recursive database query, an execution plan can be determined for the first five (5) or six (6) iterations, and so on. | 2014-06-26 |
20140181075 | TECHNIQUES FOR QUERY STATISTICS INHERITANCE - Techniques for query statistics inheritance are provided. Statistics for a database are used to determine selectivity estimates for sparse joins and tables being joined together within a given query. These statistics are inherited up to the given query along with the selectivity estimates and provided to a database optimizer to use when developing query plans and selecting an optimal query plan for the given query. | 2014-06-26 |
20140181076 | TECHNIQUES FOR JOIN PROCESSING ON COLUMN PARTITIONED TABLES - Techniques for processing joins on column partitioned tables are provided. A join operation having a column partitioned table within a query is decomposed into a two-step process. The first process performs the join condition on the column portioned table with optional filtering conditions and a non-column partitioned table and spools the resulting columns to a spooled table. The spooled table is then rowid joined back to the column partitioned table to acquire remaining columns not present in the spooled table. Both the first and second steps can be separately resolved for costs when determining a query execution plan. | 2014-06-26 |
20140181077 | TECHNIQUES FOR THREE-STEP JOIN PROCESSING ON COLUMN PARTITIONED TABLES - Techniques for processing joins on column partitioned tables are provided. A query includes a first-Column Partition (CP) table joined with a second-CP table. The query is decomposed into a three-step process and rewritten and processed. | 2014-06-26 |
20140181078 | CARDINALITY ESTIMATION FOR OPTIMIZATION OF RECURSIVE OR ITERATIVE DATABASE QUERIES BY DATABASES - An execution plan for executing one or more iterations of recursive database queries can be generated in accordance with one aspect of the invention. For example, in accordance with one embodiment of the invention, one or more cardinalities (results or size of results, including intermediate results) associated with one or more iterations can be estimated. This estimation can, for example, by performed by using a sampling or sampling-based algorithm. | 2014-06-26 |
20140181079 | ADAPTIVE OPTIMIZATION OF ITERATIVE OR RECURSIVE QUERY EXECUTION BY DATABASE SYSTEMS - Based on one or more predicated results (e.g., estimations of the actual results) associated with one or more iterations and/or sub-queries of an iterative or recursive database query, it can be determined whether to use an execution plan (e.g., a current execution plan used to execute one or more iterations) to execute one or more other iterations and/or sub-queries of the iterative or recursive database query. Consequently, use of the execution plan to execute the one or more other iterations and/or sub-queries of the iterative or recursive database query can be disallowed. As a result, the iterative or recursive database query can be executed more efficiently. The determination of whether to use an execution plan can, for example, be performed by determining whether an actual result obtained by executing one or more iterations differs or diverges more than a determined value from an estimated result of the same iteration(s). | 2014-06-26 |
20140181080 | COSTS OF OPERATIONS ACROSS COMPUTING SYSTEMS - Disclosed herein are techniques for measuring or assessing the costs of executing operations across a plurality of computing systems. The cost of transferring data across at least one arrangement of computing systems is determined. The cost of executing at least one arrangement of the operations is also determined. | 2014-06-26 |
20140181081 | MAINTENANCE OF ACTIVE DATABASE QUERIES - An aspect includes a method for maintaining active queries. The method includes executing a query based on data items in at least two relations in a database. The executing includes outputting a query result and control information associated with the query. The query result and the control information are recorded. A notification that at least one of the data items has been updated subsequent to the executing is received. The query result is modified, responsive to the control information, to reflect the data items that were updated subsequent to the executing. | 2014-06-26 |
20140181082 | ENHANCING SEARCH RESULTS WITH SOCIAL NETWORKING DATA - A method of enhancing search results pertaining to an item with information about the item from a social network is disclosed. It is detected that a user is searching for information about the item in a context outside of a social networking context. Data relating to the item is collected from a social network of the user. A notification of the data relating to the item is generated to supplement a search result that is to be presented to the user in response to the searching. | 2014-06-26 |
20140181083 | METHOD AND APPARATUS FOR MULTI-DIMENSIONAL GRAPHICAL REPRESENTATION OF SEARCH QUERIES AND RESULTS - A method and user terminal are provided that graphically formulate a search query. The method and user terminal display, via a display screen, a multi-dimensional graphical representation of a search query space, receive a plurality of parameters from a user, wherein the parameters define the search query space, position a multi-dimensional icon in the multi-dimensional representation of the search query space, associate one or more of a keyword and multimedia content with the icon, and generate a search query based on the keyword and the position of the icon in the multi-dimensional representation of the search query space. The method and user terminal further may graphically display the results of the corresponding database search, wherein the retrieved content is displayed as one or more icons positioned in a multi-dimensional graph having a plurality of axes associated with the plurality of parameters defining a context of the search query. | 2014-06-26 |
20140181084 | TYPE-AHEAD SEARCH OPTIMIZATION - Techniques are provided for efficiently performing a series of searches. After an initial set of search results is determined from a data set based on a search query, one or more additional characters are added to the search query. In response, another search is performed, using the updated search query, but the new search is limited to searching the initial set of search results. Thus, the original data set is not accessed or searched again. This is possible due to the nature of the data. Each subsequent search is based on one or more characters that were added to a previous search query. Thus, each subsequent search is constrained to the search results that were identified in a previous search. | 2014-06-26 |
20140181085 | DATA STORAGE SYSTEM FOR ANALYSIS OF DATA ACROSS HETEROGENEOUS INFORMATION MANAGEMENT SYSTEMS - Systems and methods for generating customized reports from data storage databases and other information management system databases. The methods include normalizing queried information from different types of information management system databases to enable system-wide report generation. Other implementations are disclosed. | 2014-06-26 |
20140181086 | SYSTEM AND METHOD OF PERFORMING A FACETED SEARCH - A content management system that enables a member of a service to search for other members whose group profiles satisfy one or more search criteria is disclosed. The system further enables the member to select one or more of the members whose profile satisfies the search criteria, and facilitates communication between the member and the selected members. Thus, the member may send a communication to all members whose profiles satisfy the search criteria, or to a subset of those members whose profiles satisfy the search criteria. The communication may be an e-mail, an invitation, a chat message, a private positing on a public message board, a text message, or any other suitable type of communication. | 2014-06-26 |
20140181087 | Device, Method and User Interface for Determining a Correlation between a Received Sequence of Numbers and Data that Corresponds to Metrics - A device with one or more processors and memory receives, from a first party, an input including a sequence of numbers corresponding to a plurality of key performance indicator values associated with an entity and time range information for the sequence of numbers. In response to receiving the input, the device obtains, from a data set associated with the entity, data that corresponds to a plurality of metrics in accordance with the time range information, wherein the data set is accessible to a second party that does not have direct knowledge of the key performance indicators and determines correlations between the plurality of metrics and the sequence of numbers. The device provides, to the first party, a result indicative of a respective correlation between one or more of the metrics and the sequence of numbers. | 2014-06-26 |
20140181088 | ACTIVITY CONTEXTUALIZATION - Exemplary methods, apparatuses, and systems request and receive network service activity data for a user. The received activity data is parsed to identify one or more subjects of the user activity. A plurality of cells is searched for a cell corresponding to the identified subject. Each of the plurality of cells includes displayable data about a subject and links assigned, respectively, to a causal context relationship, inclusion contextual relationship, temporal contextual relationship, and spatial contextual relationship. Each of the links provides a navigation link from the cell to the corresponding context cell. In response to the search, it is determined that a first cell within the plurality of cells includes displayable data about the identified subject and one of the links is identified as being defined as a highlighted contextual relationship and transmitted with a representation of the identified subject to a user device for display. | 2014-06-26 |
20140181089 | METHOD AND APPARATUS FOR MANAGING DIGITAL FILES - A computer-implemented method of associating digital tags with digital files comprises storing a plurality of digital files having embedded therein content data and metadata including tags; receiving, via a user interface device of a client device, a first tag label containing alphanumeric text created and inputted by a user of the client device; modifying, using a controller device, a selected first one of the tags of the metadata in a first of the digital files to include the first tag label; receiving, via the user interface device or another user interface device, an instruction to search for all of the digital files having at least the first tag label; responsive to receiving the instruction, automatically searching for all of the digital files having at least the first tag label; and displaying, on a video display device associated with the client device, a first indication of the first tag label. | 2014-06-26 |
20140181090 | SYSTEMS AND METHODS FOR OPTIMIZING FILE DISPLAY FOR USERS - A system for optimizing the manner in which a listing of files is displayed to a user. In various embodiments, the system is configured to display the files based at least in part on a number of times the user has shared the files with other users of the system. In other embodiments, the system is configured to display the files based at least in part on the number of times the user has accessed the files or the number of times users with whom the files have been shared have accessed the files. In particular embodiments, the system displays files based at least in part on an amount of time that the user has accessed the files, that any user of the system has accessed the files, or that other users with whom that user has shared the files have accessed the files. | 2014-06-26 |
20140181091 | Extract Operator - In one embodiment, a method includes receiving a search query requesting first search results of a first object type. The search query includes an inner query requesting second search results of a second object type. The method includes accessing an inverted index of a data store corresponding to the second object type; retrieving the second search results requested by the inner query using the inverted index of the data store corresponding to the second object type; accessing a forward index of the data store corresponding to the second object type; retrieving the first search results requested by the search query using the second search results and the forward index of the data store corresponding to the second object type. | 2014-06-26 |
20140181092 | MANAGEMENT OF INTENDED FUTURE CONVERSATIONS - Arrangements relate to the management of data items representing intended future conversations. A plurality of first inputs related to a respective intended future conversation can be received. At least one data item representing the respective intended future conversation can be created for each first input. At least one attribute can be received for each of the plurality of intended future conversations associated with-each first input. In response to receiving at least one attribute for each of the plurality of the intended future conversations associated with each first input, the plurality of intended future conversations associated with each first input can be ranked in a particular order based on at least one of the received attributes. A listing of the intended future conversations that is based on the ranking can be generated. | 2014-06-26 |
20140181093 | Search Results Through Interest Circles - Systems, methods, and computer-readable media for responding to a search query with search results ranked according to interest circles of a plurality of computer users are presented. Interest circles are formed from a computer user's navigation data, including the computer user's navigation history. A search query is received from a requesting computer user. The search query is directed to a query topic or set of query topics. A set of search results responsive to the search query are obtained. A plurality of computer users, each of the plurality of computer users having an established interest circle corresponding to the query topic, is identified. The set of search results are then ordered according to the interest circles of the identified plurality of computer users. Thereafter, the higher ordered search results are returned to the requesting computer user in response to the search query. | 2014-06-26 |
20140181094 | MANAGEMENT OF INTENDED FUTURE CONVERSATIONS - Arrangements relate to the management of data items representing intended future conversations. A plurality of first inputs related to a respective intended future conversation can be received. At least one data item representing the respective intended future conversation can be created for each first input. At least one attribute can be received for each of the plurality of intended future conversations associated with-each first input. In response to receiving at least one attribute for each of the plurality of the intended future conversations associated with each first input, the plurality of intended future conversations associated with each first input can be ranked in a particular order based on at least one of the received attributes. A listing of the intended future conversations that is based on the ranking can be generated. | 2014-06-26 |
20140181095 | METHOD FOR PROVIDING SEARCH RESULTS INCLUDING RELEVANT LOCATION BASED CONTENT - A search engine considers events and stories described in electronic documents, a location of a searcher/reviewer, and a situs associated with a query and content of the document to determine how/if they should be presented to users as part of relevant search results. | 2014-06-26 |
20140181096 | ENTITY NAME DISAMBIGUATION - Systems, methods, and computer-readable storage media for disambiguating entity names by determining query terms to associate with certain entities based on, for instance, user selection of Uniform Resource Locators (URLs), are provided. In embodiments, query data is analyzed to determine which queries are most closely associated with certain entities, based on quantities of user selections associated with a particular URL and a given query, as compared to a total quantity of user selections associated with the query. Identified queries can be used to return search results, images to supplement search results, advertising, or the like that are associated with appropriate entities. | 2014-06-26 |
20140181097 | PROVIDING ORGANIZED CONTENT - Systems and methods for providing organized content are described herein. In one example, a method includes identifying a spine document from a collection of documents, wherein the spine document comprises a plurality of sections. The method also includes splitting a related document into a plurality of subdocuments. In addition, the method includes mapping the subdocuments to corresponding sections of the spine document. Furthermore, the method includes displaying subdocuments based on a search of the collection of documents. | 2014-06-26 |
20140181098 | METHODS AND SYSTEMS FOR RETRIEVAL OF EXPERTS BASED ON USER CUSTOMIZABLE SEARCH AND RANKING PARAMETERS - Methods and systems for finding experts based upon user customizable search and ranking criteria, and providing the search results at a person or expert level are disclosed. The methods generally entail cataloging data within one or more document databases, and includes the steps of (a) inputting disparate data sources which may include publications, awarded grants, clinical trials, and/or patents; (b) processing the data within each document in the document database(s); (c) creating a document profile for each document using relevant keywords; (d) assigning weighting factors to the relevant keywords based upon selected attributes; (e) assigning an identifier to each document and document author; (f) removing duplicate document data using a disambiguation algorithm; (g) extracting author level attributes from the retrieved documents; and (h) creating or updating each document profile. The method steps may be implemented using a system of computer servers communicatively linked to a plurality of clients via a global network. | 2014-06-26 |
20140181099 | USER MANAGEMENT OF ELECTRONIC DOCUMENTS - Described is the user management of electronic documents. Content selected from a first electronic document is received. Metadata are generated corresponding to the received selected content and a location of the received content in the first electronic document. The metadata are stored and a search term is subsequently received that is also in the received content. In response to a search against a repository, search results are displayed. The search results include an indicator of the first electronic document and an indicator of a second electronic document that includes the search term. The indicator of the first electronic document is displayed higher in the search results than the second electronic document. | 2014-06-26 |
20140181100 | Predictive Text Completion For A Mobile Communication Facility - A system predicts a search query term, wherein the prediction is based at least in part on a plurality of keystrokes entered on a mobile communication facility and wherein the prediction is further based at least in part on information relating to the mobile communication facility and/or its user. | 2014-06-26 |
20140181101 | PROVIDING OBJECTIVE AND PEOPLE RESULTS FOR SEARCH - Search results may include both objective results and person results. In one example, a search query is evaluated to determine whether it is the type of query that a user might want to ask to a friend. If the query is of such a type, then the search engine may examine a social graph to determine which friends of the user who entered the query may have information that is relevant to answering the query. If such friends exist, then the friends may be displayed along with objective search results, along with an explanation of each friend's relevance to the query. Clicking on a person in the results may cause a conversation to be initiated with that person, thereby allowing the user who entered the query to ask his or her friend about the subject of the query. | 2014-06-26 |
20140181102 | METHOD AND SYSTEM FOR ROBUST SOCIAL CHOICES AND VOTE ELICITATION - The present invention is a method and system for learning models of the preferences of members drawn from some population or group, utilizing arbitrary paired preferences of those members, in any commonly used ranking model. In particular the present invention involves techniques for learning Mallows models, and mixtures thereof, from pairwise preference data. | 2014-06-26 |
20140181103 | MODIFYING A USER PROFILE - Modifying a user profile, including: receiving, by a content presentation module, a request for one or more elements in a user profile, wherein each element in the user profile includes information identifying attributes associated with a user; presenting, by the content presentation module, content provided by a content provider; receiving, by the content presentation module, a user request to alter the presentation of the content; receiving, by the content presentation module, updated values for the requested one or more elements in the user profile; and updating, by the content presentation module, the user profile in dependence upon the updated values for the requested one or more elements in the user profile. | 2014-06-26 |
20140181104 | IDENTITY WORKFLOW THAT UTILIZES MULTIPLE STORAGE ENGINES TO SUPPORT VARIOUS LIFECYCLES - In one embodiment, an indication of a request pertaining to a user account is obtained, where the user account is associated with at least one user. An account type of the user account is determined, where the account type is one of two or more account types. One or more actions indicated by the request are performed based, at least in part, upon the account type. | 2014-06-26 |
20140181105 | VEHICLE POINT AND SELECT - A point and select method, apparatus and system are disclosed. The method comprises capturing a pointing direction of a user, obtaining geopositioning information, communicating the pointing direction and the geopositioning information to a database, the database configured to analyze the pointing direction and the geopositioning information to arrive at at least one of context dependent options and context dependent information, receiving and communicating to the user the at least one of context dependent options and context dependent information, and upon a user requesting one of the at least one context dependent option, receiving and fulfilling the requested option. | 2014-06-26 |
20140181106 | SHARING PHOTOS - Implementations generally relate to sharing photos. In some implementations, a method includes collecting photos associated with one or more objects, where the photos are collected from a plurality of users. The method also includes collecting attention information associated with the one or more objects. The method also includes generating an attention map based on the attention information. The method also includes grouping the one or more photos into groups of photos based on the attention map. The method also includes causing the groups of photos to be displayed to a target user based on one or more predetermined criteria. | 2014-06-26 |
20140181107 | Private Queue for a Media Playback System - Embodiments are discussed for providing private playback queues in a media playback system such that users without access rights to the playback queue may not access the contents of the playback queue. The embodiments may involve receiving at a playback device of a network media system a playlist responsive to an instruction via a first controller interface, adding the playlist to a playback queue associated with the zone, receiving a request from a second controller interface for the information identifying the one or more items in the playback queue, determining that the second controller interface lacks a credential to receive the information identifying the one or more items in the playback queue, and providing the information identifying a subset of the one or more items in the playback queue to the second controller interface. | 2014-06-26 |
20140181108 | USING DATA FROM WEARABLE MONITORS TO IDENTIFY AN INDIVIDUAL - The methods and systems described herein may involve determining at least one lifeotype of at least one individual, analyzing the at least one lifeotype, and delivering content to at least one individual based on the analysis. The methods and systems described herein may involve providing a game, determining at least one lifeotype of at least one player of the game, analyzing the at least one lifeotype, and affecting the game play based on the analysis. The methods and systems described herein may involve providing an interactive space, determining at least one lifeotype of at least one individual in the space, analyzing the at least one lifeotype, and modifying at least one attribute of the space based on the analysis. | 2014-06-26 |
20140181109 | SYSTEM AND METHOD FOR ANALYSING TEXT STREAM MESSAGE THEREOF - A system and method for analyzing text stream message for a micro-blog are provided. The system includes a sliding window module, storing a plurality of text stream messages from the micro-blog and updating the plurality of text stream messages once every preset duration; a dynamic text weight module, receiving the plurality of text stream messages and calculating the plurality of text stream messages for generating a burst weight according to a dynamic text stream weight algorithm; a clustering module, clustering the plurality of text stream messages for generating a plurality of clusters by a clustering algorithm according to the plurality of text stream messages and the burst weight; and a memory device, storing the clusters. | 2014-06-26 |
20140181110 | METHOD AND SYSTEM FOR STORYTELLING ON A COMPUTING DEVICE VIA MULTIPLE SOURCES - Disclosed is a method and system for enabling storytelling on a computing device. A processor (a) analyzes a first set of media items associated with a user, where each media item has associated metadata; (b) identifies, based on analysis of the associated metadata in the first set, one or more related characteristics among the media items in the first set; (c) forms a cluster of media items associated with an event based on the one or more characteristics; (d) repeats steps (a) and (b) for a second set of media items; (e) adds one or more media items in the second set having the one or more related characteristics, from a computing device associated with the second set, to the cluster; (f) edits selected media items in the cluster to fit into selected templates; and (g) creates a mixed-media module comprising the templates organized into a desired sequence. | 2014-06-26 |