35th week of 2014 patent applcation highlights part 69 |
Patent application number | Title | Published |
20140244508 | Prepaid Micropayments Solution - An infrastructure and method for making online payments without the use of a credit card is disclosed. The infrastructure includes a prepaid technology module for receiving information related to a purchased pre-paid card. The prepaid technology module stores at least one of a PIN number and a serial number associated with a plurality of pre-paid cards. The infrastructure also includes a interface for receiving information from the consumer, related to the purchased pre-paid card, and a digital settlement network for receiving a purchase request from a consumer, the digital settlement network further for authenticating the purchased pre-paid card. | 2014-08-28 |
20140244509 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS - A method for performing transactions comprises receiving registration information and money transfer transaction specifications, generating a distribution profile based on the registration information, and storing the money transfer transaction specifications in the distribution profile. The distribution profile is identified based on an initiation instruction and associated user authentication data, and one of the money transfer transaction specifications in the distribution profile is identified based on the initiation instruction. Payment source status is verified according to the identified money transfer transaction specification, and a staged send transaction is initiated, based on the payment source status at the time the send transaction is initiated. | 2014-08-28 |
20140244510 | PRIVACY PROTECTION SYSTEM AND METHOD - Disclosed herein are privacy protection systems and related methods for providing subscribers of the system or method, such as credit card issuers, banks, etc., independent verification of the identity of individuals attempting to do business with the subscriber. The independent verification disclosed herein does not rely solely on the information accessible or maintained by an entity that issued a piece of identification data to the individual. Instead, disclosed systems and methods may not only check with the entity that issued the piece(s) of identification data presented by a user to identify himself, but also may review the records of that issuing entity such that older records can be actively compared to current records in an effort to determine if the currently issued identification data is correct. Furthermore, the disclosed technique checks at least one other informational source to verify the identity of the user, and typically several other source of information that are not related to one another and are not administered by the entity issuing the identification data to the individual. | 2014-08-28 |
20140244511 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 2014-08-28 |
20140244512 | Method for Separating Private Data from Public Data in a Database - An electronic voting terminal includes: a display; a data input device; a biometric input device; a case having an open and a closed position, the case protecting the display, the input device, and the biometric input device in the closed position, the case making the display, input device and biometric input device accessible by the voter in the open position; a communications medium; a microprocessor to control the display, the data input device, the biometric input device, and the communications medium; and a power supply that accepts alternating current and provides direct current to the microprocessor The device utilizes the biometric input device to validate the identity of the voter, utilizes the data input device to receive the ballot from the voter, and utilizes the communications medium to transmit the ballot. A system for voting also includes a centralized computer and voter registration database. | 2014-08-28 |
20140244513 | DATA PROTECTION IN NEAR FIELD COMMUNICATIONS (NFC) TRANSACTIONS - Described herein are architectures, platforms and methods for protecting sensitive data that are utilized during near field communications (NFC) communications or transactions and more particularly, a system on chip (SOC) microcontroller that is configured to control processing of the sensitive data during the NFC transactions is described. The sensitive data may include, but not limited to, personal information, financial information, or business identification numbers. | 2014-08-28 |
20140244514 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS - The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors. The one or more processors are configured for: controlling the video camera to capture imagery corresponding to a checkout terminal's display, the display displaying imagery including digital watermarking information hidden therein, the information including transaction information; processing captured imagery to decode the digital watermarking to obtain the transaction information; receiving user input corresponding to payment information included in a component of the virtual wallet; controlling communication with a remotely located third party, so that the transaction information and payment information are provided to the third party; outputting a request for user confirmation based on a request received from the third party; and controlling communication with the remotely located third party so that a user confirmation is provided to the third party. A great variety of other features, arrangements and claims are also detailed. | 2014-08-28 |
20140244515 | SYSTEMS AND METHODS FOR FACILITATING SECURE ACCESS - Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data. | 2014-08-28 |
20140244516 | Mobile Wireless Customer Micro-Care Apparatus and Method - Measurements are taken at each mobile wireless device and aggregated to establish norms. The transformations are suitable for a massively parallel array of processors using map-reduce computing. Upon demand, equivalent measurements for individual mobile wireless devices may be computed for comparable multidimensional analysis. The same transformations may be applied in a silo of processors chained by memory locations feeding data driven processes. Analysis of variance from norms can isolate potential causes of customer dissatisfaction. Detailed and immediate issue resolution and remedies may save support costs and increase subscriber revenue. Identical transformations applied to an individual device as well as across the entire comparable population of devices enables reactive care to a customer incident. | 2014-08-28 |
20140244517 | Incremental Batch Method for Transforming Event-driven Metrics and Measures within a Map/Reduce Data Center - A method for a plurality of processors configured to perform steps in a map/reduce network operation adds incremental batch transformation of sequential measures recorded by time periods and uploaded asynchronously from their capture on mobile devices. The method creates and tracks measure states for each measure. The current recurrence of a measure is a transformation of selected past recurrences and measures. Measure state is propagated according to rules. The ID for a current measure is derived from the IDs of its cache measures and the IDs of its trigger measures. A batch incremental enrichment transforms one or more measures from one or more recurrences into at least one output measure that may be transformed again by the same or another batch incremental enrichment. The apparatus determines if the value needs to be overwritten with a newer value by the type of transformation, the recurrence id and the state. | 2014-08-28 |
20140244518 | AMBIENT CONDITIONS MONITORING SYSTEM FOR MACHINERY - A method for monitoring machines is provided. According to the method, a computer server determines a location of at least one machine. The complier server transmits a request to an external source for ambient conditions associated with the location of the at least one machine. The computer server receives a response indicative of the ambient conditions associated with the location of the at least one machine. In addition, the computer server evaluates operation of the at least one machine based in part on the received ambient conditions. | 2014-08-28 |
20140244519 | VEHICLE RENTAL TRANSACTION SYSTEM AND METHOD - A vehicle rental transaction system and method which provide a vehicle lot owner with a choice of options for vehicle security and customer convenience. The vehicle rental transaction system includes a computer for identifying a customer as part of a rental transaction involving a vehicle, and for sending a wireless message to the vehicle containing instructions for preparing the vehicle for the customer. Example instructions include, but are not limited to, unlocking doors and a trunk of the vehicle, adjusting power seats and power mirrors in accordance with customer preferences, adjusting climate control settings in accordance with the customer preferences, adjusting radio station settings in accordance with the customer preferences, and adjusting GPS settings in accordance with the customer preferences. | 2014-08-28 |
20140244520 | METHOD OF MANAGING A CROWDSOURCE SCOUTING SYSTEM - A system and method of managing a server based multi-member or crowdsourced scouting process for client sponsored technology, product, or prior art searches. Clients submit search requests with non-confidential and often confidential parts, and associated search constraints, often via electronic client workspaces. This is stored in the system database. Members and their associated member information are also stored in the system database. Potentially interested members are contacted, given non-confidential information, and NDA submitting members then are provided with any confidential part of the search. Members then utilize their own networks to generate search leads. Member submitted leads are then evaluated either automatically or via administrator system dashboards, and passing leads given to clients for review or approval. Efficiency is enhanced by allowing various types of member-client feedback during the process. Funds or other rewards are dispersed to those members who submit client approved leads. | 2014-08-28 |
20140244521 | SYSTEMS AND METHODS FOR LEGAL DATA PROCESSING - Systems and methods for organizing multiple public legal databases of related and unrelated data into a unified structure and deriving data analytics from the unified database. The data and analytics are then provided to attorneys, judges, and other users to assist with litigation and business strategies. | 2014-08-28 |
20140244522 | SYSTEM AND METHOD FOR COLLECTING FORENSIC DATA VIA A MOBILE DEVICE - A system and method for conducting forensic investigations by investigators on an investigations field using a mobile device. A digital search warrant is downloaded to the mobile device prior to conducting the forensic investigation. The digital search warrant defines the search parameters of the search to be conducted, including key terms, file types, and the like. The mobile device is coupled to a target device in the investigations field that is the subject of the forensic investigation. The mobile device parses the digital search warrant and automatically identifies and collects data from the target device based on the parsed digital search warrant. The automatically identifying and collecting of the data is done without modifying a state of the target device to retain forensic integrity during the investigation process. | 2014-08-28 |
20140244523 | METHOD AND SYSTEM FOR PROVIDING ONLINE RECORDS - A method for providing a user with the ability to access and collect legal records associated with the user includes assigning a phone number to the user for fax and voice user for the user to use to access a secure web site, providing the user with a document to provide to the legal services provider exercising rights of the user for access to the legal records, the document requesting the legal services provider to send the legal records to the phone number, receiving a private fax communication comprising a legal record associated with the consumer for which the consumer has requested and given permission to the legal services provider to send, converting the private fax communications into an image file format, storing the legal services record encoded in the image file format, and providing the user with secure access to the web site using the access information and providing on the web site an interface to the legal records of the user for the user to access the legal record. | 2014-08-28 |
20140244524 | SYSTEM AND METHOD FOR IDENTIFYING POTENTIAL LEGAL LIABILITY AND PROVIDING EARLY WARNING IN AN ENTERPRISE - A system for detection of potential legal liability is presented. The system uses factual information that has triggered liability based on any number of legal theories, and compares the words expressing those facts to customer and employee communications in order to identify potential liability to an enterprise by reviewing of the enterprise's emails. The system generates seeding information based on the factual information and words expressing certain sentiments, and provides the seeding information to a document fracturing engine which scans the email archives and identifies emails with words that potentially give rise to a liability risk. The identified emails may then be reviewed by authorized personnel so that appropriate proactive and/or corrective action may be taken before the legal liability occurs. | 2014-08-28 |
20140244525 | ENTITLEMENT CARDS AND USER LICENSE REDEMPTION IN ONLINE SERVICES - Entitlement cards having an offer term and number of user licenses for a subscription to an online service can be applied to existing subscriber accounts to add or otherwise adjust the number of user licenses associated with the subscription. When an entitlement card is added to an account, the system automatically adjusts the amount of time for each user license so that an entire value of an entitlement subscription is used and a same expiry date is maintained even when adding new user licenses to an existing account. A user interface is provided that enables a customer to change the number of user licenses for a subscription when redeeming an entitlement card to their account and view a new end date for the subscription as a whole resulting from a change in user licenses during a current subscription. | 2014-08-28 |
20140244526 | METHODS OF PRINTING FOOD LABELS FOR RESTAURANT FOOD ITEMS - A method is provided of operating a back office facility of a restaurant to provide a food safety label for labeling of at least one raw food item received for the restaurant. The method comprises receiving delivery of raw food items from a vendor, converting a purchase order associated with the received raw food items from the vendor to an invoice, and printing a food safety label based upon quantity of raw food items indicated in the invoice. Another method is provided of operating a back office facility of a restaurant to provide a food safety label for labeling of at least one prep food item by the restaurant using raw food items. Still another method is provided of operating a back office facility of a restaurant to provide a nutrition facts label for labeling of at least one prep food item by the restaurant using raw food items. | 2014-08-28 |
20140244527 | PROVIDING CONFINED SPACE PERMITS AND CONFINED SPACE ACCESS PROCEDURES - For providing confined space access procedures and confined space permits, a synchronization module stores a plurality of confined space permits and a plurality of confined space access procedures in a confined space database. Each confined space permit and each confined space access procedure corresponds to a confined space of a plurality of confined spaces and each confined space is indexed to a space reference code. The synchronization module synchronizes the plurality of confined space permits and the plurality of confined space access procedures to a mobile device. A retrieval module receives a first space reference code at the mobile device and retrieves a first confined space permit and a first confined space access procedure indexed to the first space reference code. | 2014-08-28 |
20140244528 | METHOD AND APPARATUS FOR COMBINING MULTI-DIMENSIONAL FRAUD MEASUREMENTS FOR ANOMALY DETECTION - A fraud-detection system facilitates detecting fraudulent entities by computing weighted fraud-detecting scores for the individual entities. During operation, the system can obtain fraud warnings for a plurality of entities, and for a plurality of fraud types. The system computes, for a respective entity, a fraud-detection score which indicates a normalized cost of fraudulent transactions from the respective entity. The system then determines, from the plurality of entities, one or more anomalous entities whose fraud-detection score indicates anomalous behavior. The system can determine an entity that is likely to be fraudulent by comparing the entity's fraud-detection score to fraud-detection scores for other entities. | 2014-08-28 |
20140244529 | Banknote Processing Apparatus for Detecting, Reporting, and Integrally Managing Counterfeit Banknotes and Method of Controlling the Same - A method of controlling a banknote processing apparatus for detecting, reporting, and integrally managing counterfeit banknotes includes detecting an injected banknote through an injection detecting unit; determining whether the injected banknote is a counterfeit banknote; obtaining counterfeit banknote information including a serial number of a banknote firmly determined as a counterfeit banknote; and transmitting the counterfeit banknote information including the serial number to a counterfeit banknote management system of a central bank through a communication unit when a counterfeit banknote report command previously set by a user is input. Since the blacklist of counterfeit banknotes established by the counterfeit banknote management system of the central bank is received and it is determined whether the injected banknote is a counterfeit banknote based on the received blacklist, accuracy of discriminating counterfeit banknotes of financial facilities including banks is improved. | 2014-08-28 |
20140244530 | TECHNIQUES FOR USING SOCIAL PROXIMITY SCORES IN RECRUITING AND/OR HIRING - Techniques for analyzing a social graph of a social networking service to derive a social proximity score representing a measure of how socially connected a member is to a target entity are described. With some embodiments, an aggregate social proximity score is derived to reflect a measure of how well socially connected a person is to a set of organizations representing customer accounts of a business organization. Accordingly, the aggregate social proximity score can be used to compare candidates in a hiring decision, or to identify potential candidates during recruiting. | 2014-08-28 |
20140244531 | TECHNIQUES FOR USING SOCIAL PROXIMITY SCORES IN RECRUITING AND/OR HIRING - Techniques for analyzing a social graph of a social networking service to derive a social proximity score representing a measure of how socially connected a member is to a target entity are described. With some embodiments, an aggregate social proximity score is derived to reflect a measure of how well socially connected a person is to a set of organizations representing customer accounts of a business organization. Accordingly, the aggregate social proximity score can be used to compare candidates in a hiring decision, or to identify potential candidates during recruiting. | 2014-08-28 |
20140244532 | CANDIDATE AND JOB TRENDING IN EMPLOYMENT SYSTEM - Systems and methods described herein provide an application through which social media can accelerate communication between a job seeker and a talent seeker (e.g., an employer). | 2014-08-28 |
20140244533 | Connecting Individuals with Organizational Opportunities - Individuals may be connected with organizations via a communications network. A resume database may hold resume data for one or more independent users. The resume data may include donated time, monetary contributions, and/or the like. An organization database may hold organization data for one or more independent organizations. The organizational data may include opportunities, events, and/or the like. | 2014-08-28 |
20140244534 | CAREER DEVELOPMENT WORKFLOW - Career development processes face three major challenges (1) simplifying steps that require input from multiple users, (2) promoting follow-through with career development plans, and (3) adapting to individual corporate business processes. These issues can be addressed by disabling access to a step if required previous steps have not yet been completed. Additionally, the user can receive a notification over a network when the required previous steps have been completed by a remote user. Follow-through with a career development plan can be promoted by dynamically altering a career development workflow to incorporate the steps of the development plan as they are created. That is, the development plan drives the definition of the career development workflow in which the user is already engaged, helping to monitor and enforce milestones of the development plan. | 2014-08-28 |
20140244535 | TRACKING SYSTEM FOR FOOD DONATION PROGRAMS - A food donation tracking system is provided for tracking food donations along a food donation route that includes a food recipient location and a plurality of food rescue locations. The system includes a display device at each of the food rescue locations, each display device being operable to generate a dynamic unique code specific to the food rescue location where the display device is located. A driver scans the dynamic unique code with a handheld unit. Tracking information is recorded and transmitted from the handheld unit to a central server. The tracking information includes location information identifying the food rescue location of the food donation pickup based on the dynamic unique code scanned at the food rescue location and time information corresponding to when the unique code was scanned at the food rescue location. | 2014-08-28 |
20140244536 | POSTAGE-FREE MAIL DELIVERY USING A MOBILE DEVICE - Machines, systems and methods for delivering mail items are provided. The method comprises scanning route information, for delivery of a mail item, using a mobile communication device; generating a first unique identifier from data comprising the route information, wherein the first unique identifier identifies the mail item; recognizing a second unique identifier associated with the mobile communication device used for scanning the route information, wherein the second unique identifier identifies a user account to which delivery charges associated with delivering the mail item are applied; associating the first unique identifier and the second unique identifier so that having access to the first unique identifier as stored in a database provides access to the second unique identifier; and mailing the mail item without prepaid postage affixed to the mail item. | 2014-08-28 |
20140244537 | TRANSMODAL AND LOGISTICS SYSTEM AND METHOD - A transmodal and logistics, method, comprising generating at least, one transportation route for shipping a shipment using one or more different transportation modes and at least two transportation providers, and calculating a cost rate associated with the at least one transportation route. | 2014-08-28 |
20140244538 | BUSINESS PROCESS MANAGEMENT, CONFIGURATION AND EXECUTION - Methods and systems may provide for identifying a first process template associated with a first business process, and modifying an arrangement of the first process template based on user input to obtain a second process template. The second process template may be associated with a second business process. In one example, a validation of the second process template is conducted. | 2014-08-28 |
20140244539 | BUSINESS PROCESS MANAGEMENT, CONFIGURATION AND EXECUTION - Methods and systems may provide for identifying a first process template associated with a first business process, and modifying an arrangement of the first process template based on user input to obtain a second process template. The second process template may be associated with a second business process. In one example, a validation of the second process template is conducted. | 2014-08-28 |
20140244540 | SYSTEM FOR REAL TIME CONTINUOUS DATA PROCESSING FOR INVESTMENT PORTFOLIOS - A real time continuous data inputting, processing, scanning and displaying system for financial data and inputting variable boundaries of data for a variety of desired data characteristics. The process displays when the data characteristics fall outside their respective variable boundaries. Real time financial markets data and conventional data inputs are input into the system which is comprised of conventional and new computer processor enabled processes, clusters of central processing units, a report writer, terminal device, data disk, and interface. The data disks and real time financial market data and conventional data inputs and outputs are continuously referenced during the scanning process for exceptions to the boundaries of desired data characteristics. | 2014-08-28 |
20140244541 | CONVERSION AND LIQUIDATION OF DEFAULTED POSITIONS - A method of liquidating defaulted positions associated with centrally cleared financial product is disclosed. The method includes identifying a defaulted position associated with a centrally cleared financial product, calculating a value differential between the defaulted position and a standard position, offering the value differential and the standard position to a party such that the value differential and the standard position represent a converted position, and settling the converted position upon acceptance of the offer by the party. | 2014-08-28 |
20140244542 | SYSTEMS AND METHODS FOR PROVIDING SHARE ASSESSMENT DATA WITH CAPITAL ANALYSIS - A computer-implemented method for transforming share assessment data thereby to provide return on equity assessment data, the method including: maintaining access to a repository of data for a plurality of shares, wherein the data includes, for each share, company performance data for the company in respect of which the share is issued; receiving, from a client, a capital history assessment request for a given one of the shares; obtaining from the repository, for the user-selected share, values for a set of data fields associated with the given one of the shares, wherein the values are indicative of, for one or more historical periods, a profit quantifier, one or more equity quantifiers, and a debt quantifier; determining a return on equity quantifier for each of the historical periods, wherein the return on equity quantifier is derived from the profit quantifier and at least one of the equity quantifiers; defining data indicative of a chart to be displayed by the client, wherein the chart displays in graphical form, overlaid on common axes, for each historical period, at least one equity quantifier, the debt quantifier, the profit quantifier and the return on equity quantifier; and providing the defined data to the client thereby to allow generation of the chart. | 2014-08-28 |
20140244543 | Computer-Implemented Optimization of Retirement Income Sourcing - Computer-implemented methods for optimizing income sources in an investment portfolio over a specified course of years. Once input data concerning household income sources, investment assets, preferences and putative strategies have been received, sources of income available to the household in a first year are then optimized on the basis of a first set of simulation assumptions. Sources include social security, investment income, withdrawals from accounts, and annuity income. Iteration over a specified retirement period yields an optimized sequence of income, as well as recommended sources of income and investment allocations. | 2014-08-28 |
20140244544 | METHOD AND APPARATUS FOR PROVIDING AFTER TAX BOND VALUATION - Methods and systems are disclosed for determining valuation and risk analysis of municipal debt instruments on an after-tax basis. In one embodiment, bond terms, yield curve and interest rate volatility data are received for a set of bonds. Additionally, IRS treatment data and applicable tax rates for the set of bonds and a purchaser of the bonds are also received. Theoretical tax-neutral values of the bonds are calculated using a buy-and-hold methodology, wherein the tax-neutral value comprises the price of the at least one municipal debt offering such that its discounted after-tax value equals the price. A theoretical maximum after-tax values of the bonds are also calculated using a recursive valuation path-dependent methodology. Optimal bond management is determined using the calculated theoretical tax-neutral values and maximum after-tax values of the bonds. | 2014-08-28 |
20140244545 | SYSTEM, METHOD, AND RECORDING MEDIUM - A system includes circuitry configured to identify an accumulated amount of service that has been provided by a service, and determine whether to restrict access to a software resource provided by the service based on the accumulated amount of service. | 2014-08-28 |
20140244546 | METHODS AND SYSTEM FOR PROVIDING DRUG PRICING INFORMATION FROM MULTIPLE PHARMACY BENEFIT MANAGERS (PBMS) - A system according to certain aspects of the disclosure provides drug pricing information from multiple PBMs to users. For example, the system may obtain, calculate, and/or estimate drug prices that are available under contracts or agreements between PBMs and various pharmacies. These prices may be prices of drugs for purchase at the various pharmacies. In response to requests for prices of particular drugs, the system can display relevant prices. For example, the system displays a price for each pharmacy chain and/or displays prices for a particular geographical area. The users can compare the prices for a particular drug and determine which pharmacy they would like to purchase the drug from. The system can provide a discount coupon that allows the users to purchase the drug at the price listed by the system at the selected pharmacy. | 2014-08-28 |
20140244547 | Antimicrobial film retrofit product for high traffic sanitation - There is a widespread need for an improvement in the overall sanitation level of high traffic public and private establishments, which contain equipment that undergoes constant changing of hands by those who frequent the establishment. Currently, there is little financial incentive for such establishments to incorporate more advanced sanitation and cleaning protocols. The solution can be realized by creating an article of manufacture with antimicrobial properties and providing installation in immediately retrofit form to create financial incentives for the establishment operator/owner and companies whose products are marketed within that establishment. The invention consists of two key components that, together, satisfy a continuing technical and biological problem and provide a valuable advertising vehicle for many companies. The first component is an article of manufacture with antimicrobial properties customized to retrofit onto existing equipment to improve sanitation. The second component is a method of conception of the article of manufacture that incorporates advertising graphics and installation service. | 2014-08-28 |
20140244548 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR CLASSIFICATION OF SILICON WAFERS USING RADIAL SUPPORT VECTOR MACHINES TO PROCESS RING OSCILLATOR PARAMETRIC DATA - A system, method, and computer program product for testing and classifying silicon wafers using a support vector machine. The method includes the steps of receiving parametric data associated with one or more die on a wafer and analyzing the parametric data via a support vector machine to determine a classification for each die of the one or more die. The parametric data includes at least one ring oscillator ratio. The method further includes the step of determining a classification of the wafer based on the classification of the one or more die. | 2014-08-28 |
20140244549 | Predictive Cueing - A method and system that provide for decision support and/or training support in crisis decision-making situations are provided. In one implementation, for example, a method identifies patterns from known cases based on information from a crisis event. Each of the known cases includes attributes and at least one outcome. The method also identifies a first subset of the known cases that relate to the identified patterns from the known cases. The method also analyzes the identified patterns to determine a cue that, if answered, will provide a second subset of the known cases including a more converged range of decision outcomes than the first subset. | 2014-08-28 |
20140244550 | POSTERIOR PROBABILITY PURSUIT FOR ENTITY DISAMBIGUATION - Various technologies described herein pertain to disambiguation of a mention of an ambiguous entity in a document. A set of candidate entities can be retrieved from an entity knowledge base based upon the mention of the ambiguous entity, where each of the candidate entities has a respective entity feature representation. Moreover, a document feature representation can be generated based upon features of the document and the respective entity feature representations of the candidate entities. A processor can be caused to select a subset of features from the document feature representation based upon a measure of how discriminative the features from the document feature representation are for disambiguating the mention of the ambiguous entity. A disambiguated result for the mention of the ambiguous entity can be determined based upon the subset of the features. The disambiguated result can be an unknown entity or one of the candidate entities. | 2014-08-28 |
20140244551 | INFORMATION SPREAD SCALE PREDICTION DEVICE, INFORMATION SPREAD SCALE PREDICTION METHOD, AND INFORMATION SPREAD SCALE PREDICTION PROGRAM - To provide an information spread scale prediction device capable of accurately predicting the number of future contributions for a specific topic in SNS and the like. The information spread scale prediction device includes: a learning text data input unit which acquires learning text data from a specific website; a node influence learning unit which calculates the influence for the number of statements by each group to which a node specifying a single specific user belongs for the topic from the number of statements by each classified topic, and stores it as learning data; a prediction text data input unit which acquires prediction text data from the specific website after storing the learning data; and a future contribution number prediction unit which predicts and outputs the number of contributions at a specific future time of the topic based on the number of statements of each topic and the learning data. | 2014-08-28 |
20140244552 | GLOBAL MODEL FOR FAILURE PREDICTION FOR ARTIFICIAL LIFT SYSTEMS - Methods and systems for predicting failures in an artificial lift system are disclosed. One method includes extracting one or more features from a dataset including time sampled performance of a plurality of artificial lift systems disposed across a plurality of different oil fields, the dataset including data from failed and normally operating artificial lift systems. The method also includes forming a learning model based on identified pre-failure signatures in the extracted features, the learning model configured to predict a failure of an artificial lift system based on observation of one of the identified pre-failure signatures in operational data received from the artificial lift system. | 2014-08-28 |
20140244553 | MACHINE LEARNING APPARATUS AND MACHINE LEARNING METHOD - A machine learning apparatus includes an analytical information storage unit that stores therein two or more pieces of analytical information each associating input/output information used for machine learning with time-point information indicating a time point of the input/output information, an analysis-object-set specifying unit that specifies an analysis object set containing a unit-period input-output set being a set of pieces of the input/output information corresponding to pieces of the time-point information indicating the time point in a unit period and an amount of the pieces of the input/output information of the set being dependent on a period between the time point of the unit periods and a specific time point, and a machine learning unit that performs machine learning by using the pieces of the input/output information contained in the analysis object set. | 2014-08-28 |
20140244554 | NON-DETERMINISTIC FINITE STATE MACHINE MODULE FOR USE IN A REGULAR EXPRESSION MATCHING SYSTEM - A non-deterministic finite state machine module for use in a regular expression matching system. The system includes a computational unit implementing a non-deterministic finite state machine representing a regular expression, wherein the computational unit is configured to: receive an input data stream, wherein an occurrence of the regular expression is determined, and an activation signal; process the input data stream with respect to the non-deterministic finite state machine depending on the activation signal; and provide at least one branch data output for initializing an additional non-deterministic finite state machine module if the processing of an element of the input data stream according to the non-deterministic finite state machine results in a branching of a processing thread. | 2014-08-28 |
20140244555 | Method And Apparatus For A Predictive Tracking Device - A predictive tracking method and apparatus utilizing objective and subjective data in order to predict user states is provided herein. For example, some such embodiments may allow a user to track their mood or health symptoms in relation to retrieved data regarding their environmental in order to reveal patterns that can help forecast and proactively manage mood or health symptoms. | 2014-08-28 |
20140244556 | METHODS FOR AND APPARATUS GENERATING AUTOMATED PHARMACO GENETICS CORRELATION - The present invention provides methods and apparatus for generating human readable output with a correlation between one or more genetic traits and one or more medicaments. | 2014-08-28 |
20140244557 | APPARATUS AND METHODS FOR RATE-MODULATED PLASTICITY IN A SPIKING NEURON NETWORK - Apparatus and methods for activity based plasticity in a spiking neuron network adapted to process sensory input. In one approach, the plasticity mechanism of a connection may comprise a causal potentiation portion and an anti-causal portion. The anti-causal portion, corresponding to the input into a neuron occurring after the neuron response, may be configured based on the prior activity of the neuron. When the neuron is in low activity state, the connection, when active, may be potentiated by a base amount. When the neuron activity increases due to another input, the efficacy of the connection, if active, may be reduced proportionally to the neuron activity. Such functionality may enable the network to maintain strong, albeit inactive, connections available for use for extended intervals. | 2014-08-28 |
20140244558 | METHOD FOR MATCHING SPARKLE APPEARANCE OF COATINGS - This disclosure is directed to a process for producing one or more predicted target sparkle values of a target coating composition. An artificial neural network can be used in the process. The process disclosed herein can be used for color and appearance matching in the coating industry including vehicle original equipment manufacturing (OEM) coatings and refinish coatings. A system for producing one or more predicted target sparkle values of a target coating composition is also disclosed. | 2014-08-28 |
20140244559 | Data structure and method for performing mishap risk of a system - A computer-implemented method is provided for performing mishap risk assessment within a system. The method includes providing a first set of data including risk information associated with at least one hazard within the system, correlating all input first set of data with a second set of data defined as a plurality of mishaps of the system such that the hazard correlates with each mishap to assess mishap potential, storing the correlated first and second sets of data, and performing mishap risk assessment within the system based the correlated data including the first and second sets of data. | 2014-08-28 |
20140244560 | Engagement and Experience Based Ranking - A method, computer program product, and computer system for identifying, by one or more computing devices, online posts authored by a user. The online posts are clustered according to one or more topics of the online posts authored by the user. Inputs associated with the online posts authored by the user are determined. A first score of the user is generated according to the one or more topics based upon a first portion of the inputs associated with the online posts authored by the user. A second score of the user is generated according to the one or more topics based upon a second portion of the inputs associated with the online posts authored by the user. A rank of the user according to the one or more topics is determined based upon the first and second score. | 2014-08-28 |
20140244561 | PROVIDING RECOMMENDATIONS TO MEMBERS OF A SOCIAL NETWORK - Systems and methods for providing career recommendations to a member of a social network are described. In some example embodiments, the systems and methods receive input associated with a professional or aspirational goal from a member of a social network, determine a recommendation based on information stored by the social network, and provide the recommendation to the member of the social network, among other things. | 2014-08-28 |
20140244562 | SYSTEMS AND METHODS FOR PROVIDING RECOMMENDATIONS BASED ON COLLABORATIVE AND/OR CONTENT-BASED NODAL INTERRELATIONSHIPS - In selected embodiments a recommendation generator builds a network of interrelationships between venues, reviewers and users based on their attributes and reviewer and user reviews of the venues. Each interrelationship or link may be positive or negative and may accumulate with other links (or anti-links) to provide nodal links the strength of which are based on commonality of attributes among the linked nodes and/or common preferences that one node, such as a reviewer, expresses for other nodes, such as venues. The links may be first order (based on a direct relationship between, for instance, a reviewer and a venue) or higher order (based on, for instance, the fact that two venue are both liked by a given reviewer). The recommendation engine in certain embodiments determines recommended venues based on user attributes and venue preferences by aggregating the link matrices and determining the venues which are most strongly coupled to the user. | 2014-08-28 |
20140244563 | OPERATION INFORMATION PREDICTION COMPUTER, OPERATION INFORMATION PREDICTION METHOD AND PROGRAM - An operation information prediction computer collects operation information from the at least one apparatus, and predicts future operation information on the at least one apparatus based on the collected operation information. The operation information prediction computer collects, from the at least one apparatus, state information including the operation information and configuration information on the at least one apparatus when the operation information is collected. The operation information prediction computer stores the operation information and the configuration information the storage area. The operation information prediction computer calculates a correlation value for associating past operation information stored in the storage area with current configuration information. The operation information prediction computer calculates a future operation prediction value based on the past operation information and the calculated correlation value. | 2014-08-28 |
20140244564 | PATTERN-RECOGNITION PROCESSOR WITH MATCHING-DATA REPORTING MODULE - Disclosed are methods and devices, among which is a device that includes a pattern-recognition processor. The pattern-recognition processor may include a matching-data reporting module, which may have a buffer and a match event table. The buffer may be coupled to a data stream and configured to store at least part of the data stream, and the match event table may be configured to store data indicative of a buffer location corresponding with a start of a search criterion being satisfied. | 2014-08-28 |
20140244565 | Systems And Methods For Customized Advice Messaging - Included are embodiments for customized advice messaging. Some embodiments include registering a patient for receiving customized advice messaging, receiving, via a first electronic message from a message sender, a current question regarding a medical symptom of the patient, and utilizing the patient information to determine whether a previous question has been received that is similar to the current question. In some embodiments, in response to determining that a previous question that is similar to the current question was received, a previous answer to the previous question may be automatically retrieved for answering the current question. The accuracy of the previous answer as a current answer to the current question with a medical expert may be verified, and the previous answer may be sent to the message sender via a second electronic message. | 2014-08-28 |
20140244566 | Accurately Estimating the Audience of Digital Content - A method, system, and computer-readable storage medium are disclosed for accurately estimating the audience of digital content. A plurality of user interactions occurring on a digital device are received, wherein digital content is displayed on the digital device. Based on the plurality of user interactions, a total number of unique viewers of the digital content on the digital device is estimated. | 2014-08-28 |
20140244567 | SYSTEMS AND METHODS FOR PREDICTION OF TRIPS - A system is disclosed. The system includes a processing subsystem that receives component data signals corresponding to a plurality of parameters of a device, wherein the processing subsystem generates one or more sets of state category component data by allocating the component data signals into respective one or more sets of state category component data, determines a plurality of first dynamic thresholds and a plurality of second dynamic thresholds corresponding to at least one of the one or more sets of state category component data based upon a respective set of state category component data in the one or more sets of state category component data and a respective parameter in the plurality of parameters, and determines an impending trip of the device utilizing the plurality of first dynamic thresholds and the plurality of second dynamic thresholds. | 2014-08-28 |
20140244568 | COLLABORATIVE INTELLIGENCE AND DECISION-MAKING IN AN IOT DEVICE GROUP - The disclosure relates to collaborative intelligence and decision-making in an Internet of Things (IoT) device group. In particular, various IoT devices in the group may be interdependent, whereby a decision that one IoT device plans may impact other IoT devices in the group. Accordingly, in response to an IoT device planning a certain decision (e.g., to transition state or initiate another action), the IoT devices in the group may collaborate using distributed intelligence prior to taking action on the planned decision. For example, a recommendation request may be sent to other IoT devices in the group, which may then analyze relationships within the group to assess potential impacts associated with the planned decision and respond to approve or disapprove the planned decision. Based on the responses received from the other IoT devices, the IoT device may then determine whether to take action on the planned decision. | 2014-08-28 |
20140244569 | ADAPTIVE WAREHOUSE DATA VALIDATION TOOL - Techniques for data validation may include dynamically generating one or more database queries to be performed on a target data warehouse and a baseline data warehouse based on warehouse model metadata for the target data warehouse and the baseline data warehouse. The techniques may further include executing the one or more database queries against the target data warehouse and the baseline data warehouse to receive one or more data sets from the baseline data warehouse and one or more data sets from the target data warehouse. The techniques may further include comparing the one or more data sets from the baseline data warehouse and the one or more data sets from the target data warehouse to validate target data in the target data warehouse against baseline data in the baseline data warehouse. | 2014-08-28 |
20140244570 | OPTIMIZING AND MANAGING EXECUTION OF HYBRID FLOWS - Disclosed herein are techniques for optimizing and managing the execution of hybrid flows. An execution plan is generated for each hybrid flow based at least partially on attributes associated therewith. The execution of each hybrid flow is managed in accordance with the execution plan. | 2014-08-28 |
20140244571 | BRIDGE EVENT ANALYTICS TOOLS AND TECHNIQUES - Two selected checkpoints define a group of paths represented in an analytics database. One or more events which appear between the two checkpoints on each of a plurality of the paths are identified as common bridge events. Path analysis information is then output, such as a bridge event analysis including a list of website visitor common bridge events that are ranked by their frequency of appearance, the frequencies calculated without regard to where each visitor event appears on a given path. | 2014-08-28 |
20140244572 | Qualification of website data and analysis using anomalies relative to historic patterns - Tools and techniques are provided to assist detection of invalid clicks in website activity data. A system calculates or otherwise obtains a historic click quality characterization based on historic web analytics data. The system then identifies a click quality anomaly in the website activity data, namely, a departure from the historic click quality characterization. The identified anomalies may then be used to help guide searches for invalid clicks. | 2014-08-28 |
20140244573 | DATA WAREHOUSE WITH CLOUD FACT TABLE - A data warehouse includes plurality of master data tables, a plurality of dimension tables and a fact table. The master data tables including surrogate identifiers. The dimension tables use the surrogate identifiers to link to the master data table domains within the master data tables. The fact table stores dimension identifiers that provide links to the master data tables. A cloud storage area includes a plurality of cloud dimension tables and a cloud fact table. Each cloud dimension table stores summary characteristics. Each cloud dimension table associates a separate cloud identifier with each entry of summary characteristics. The cloud fact table stores aggregated data representing key performance indicators. The cloud fact table includes a plurality of cloud identifier columns in which cloud identifiers are stored. Each cloud identifier column is dedicated to a single associated cloud dimension table from the plurality of cloud dimension tables, so that each cloud identifier column only stores cloud identifiers for a single cloud dimension table. | 2014-08-28 |
20140244574 | ENABLING DYNAMIC POLYMORPHIC ASSET CREATION AND REUSE - An asset within a repository can be identified. The asset can be an electronic file. The asset can include an asset content and an asset metadata. The asset content can include a static content and a dynamic content. The asset can be semantically disassembled into one or more assemblies. The assemblies can each include an asset data and an assembly data. The assembly data can include an assembly identifier, an assembly rule, or an asset data source. A data container format associated with the asset content can be determined. The data container can be a computing data structure. The asset content can be dynamically presented within a different data container format in accordance with the request. | 2014-08-28 |
20140244575 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR MANAGING DATA REPRESENTATIVE OF THE PERSONAL EXPERIENCE OF A USER ON AN EXERCISE EQUIPMENT - Method, system and program product for managing data representative of the personal experience of a user on an exercise equipment. During the execution of a client software application launched by the user of the exercise equipment, when the client software application sends a request of updating data representative of the state of the client software application to a database remotely disposed with respect to the exercise equipment, updated data representative of the state of the client software application are retrieved, associated to a user identification code and temporarily stored in a first memory unit of the exercise equipment. When a procedure of logout of the user on the exercise equipment is performed, the updated data representative of the state of the client software application associated with said user identification code are stored in a second memory unit of the exercise equipment and sent to the remote database. | 2014-08-28 |
20140244576 | SYSTEM CAPABLE OF PROVIDING MULTIPLE DIGITAL CONTENTS AND METHOD USING THE SYSTEM - The preferences of users using various contents are properly estimated. A system according to one embodiment includes a service control unit for controlling a whole service for providing digital contents, an information storage device, a determination unit for determining a user satisfying a predetermined condition concerning a usage history of musical pieces of the same artist to be a fan of that artist, a user information updating unit for storing a determination result in the information storage device, a posting accepting unit for accepting a post from a terminal device and storing the post in the information storage device, a feed information transmitting unit for extracting and transmitting feed information, and a recommended user information transmitting unit for choosing recommended users from other users determined to be fans of an artist of whom the user has been determined as a fan and transmitting information about the recommended users. | 2014-08-28 |
20140244577 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR PARTIALLY SYNCHRONOUS AND PARTIALLY ASYNCHRONOUS MOUNTS/UNMOUNTS IN A MEDIA LIBRARY - Systems, methods and computer program products for determining completion of commands in a library system and providing an indication of the completion to a component of the media library system so that other commands which are dependent upon the completion can be efficiently issued and executed. In one embodiment, a tape is mounted in a drive of the library and a filesystem mount command is issued to initiate a filesystem mount operation. Diagnostic information generated by the operating system for this operation is communicated to the media library management application. When the filesystem mount process is completed, a corresponding diagnostic message is communicated to the media library management application. Until this message is received by the media library management application, commands that are dependent upon the completion of the filesystem mount process are inhibited, and afterward these dependent commands are allowed to be issued. | 2014-08-28 |
20140244578 | HIGHLY AVAILABLE MAIN MEMORY DATABASE SYSTEM, OPERATING METHOD AND USES THEREOF - A highly available main memory database system includes a plurality of computer nodes, including at least one computer node that creates a redundancy of the database system. The highly available main memory database system further includes at least one connection structure that creates a data link between the plurality of computer nodes. Each of the computer nodes has a synchronization component that redundantly stores a copy of the data of a database segment assigned to the particular computer node in at least one non-volatile memory of at least one other computer node. | 2014-08-28 |
20140244579 | METHOD FOR SYNCHRONIZATION AND MANAGEMENT FO SYSTEM ACTIVITIES WITH LOCALLY INSTALLED APPLICATIONS - The present invention will enable an attendee/user to download a presentation from a host system location, synchronize the local user version of the presentation with the current location slide of the host presentation. In the present invention, an attendee/user can enter a command to the host system location of the presentation that will synchronize the local user version of the presentation with the current location of the host system presentation. | 2014-08-28 |
20140244580 | PREDICTIVE STORAGE SERVICE - A predictive storage application selectively determines files from a computing system to send to a predictive storage service that makes the files available for use in another computing system. The predictive storage application may receive events indicating a use of files. The predictive storage application may determine that a file has enough importance and send it to a predictive storage service. Other aspects of the disclosure are described in the detailed description, figures, and claims. | 2014-08-28 |
20140244581 | SYSTEM AND METHOD FOR LOG CONFLICT DETECTION AND RESOLUTION IN A DATA STORE - A system that implements a data storage service may store data on behalf of storage service clients. The system may maintain data in multiple replicas that are stored on respective computing nodes in the system. Updates to the stored data and to the membership of replica groups are propagated as replicated log records. A replica receiving a log record may compare metadata in the received log record to corresponding metadata in a log record that was previously appended to its log to determine a response. The metadata may include a sequence number, a lock generation identifier, an epoch identifier, or an indication of an epoch change. The replica may append the received log record to its log, drop the received log record, or cache the received log record for future use. If a log conflict indicates an invalid log stream branch, one or more log records may be deleted. | 2014-08-28 |
20140244582 | Apparatus and Methods for Selective Location and Duplication of Relevant Data - Apparatus and methods are provided for performing a digital forensic investigation. Aspects of the apparatus and methods determine the location of forensically relevant data on a data source and copy this relevant data to a storage device in a forensically sound manner. Information related to the location of the relevant data may also be stored on the storage device. | 2014-08-28 |
20140244583 | Method of Processing File changes and Electronic Device Thereof - A method of processing files changes includes obtaining a change list of a designate folder, wherein the designate folder includes a plurality of sub-files changed in a time segment and the change list indicates filenames, pathnames and change times corresponding to the plurality of sub-files, determining whether a system time minus a last change time indicated by the change list is greater than a time threshold, and executing a process of determining file actions according to the change list to store a process result in a file action list when the system time minus the last change time indicated by the change list is greater than the time threshold. | 2014-08-28 |
20140244584 | SYSTEM AND METHOD FOR IMPLEMENTING CACHE CONSISTENT REGIONAL CLUSTERS - When multiple regional data clusters are used to store data in a system, maintaining cache consistency across different regions is important for providing a desirable user experience. In one embodiment, there is a master data cluster where all data writes are performed, and the writes are replicated to each of the slave data clusters in the other regions. Appended to the replication statements are invalidations for cache values for the keys whose values have been changed in the master data cluster. An apparatus in the master data cluster logs replication statements sent to the slave databases. When a slave database fails, the apparatus extracts the invalidations intended for the failed database and publishes the invalidations to a subscriber in the region of the failed database. The subscriber sends the invalidations to the local caches to cause stale data for those keys to be deleted from the caches. | 2014-08-28 |
20140244585 | DATABASE SYSTEM PROVIDING SINGLE-TENANT AND MULTI-TENANT ENVIRONMENTS - A database service may provide multi-tenant and single-tenant environments in which tables may be maintained on behalf of clients. The service (or underlying system) may create database instances and tables in either or both types of environments (e.g., by default or according to various parameter values specified in requests to create the instances or tables). When receiving and servicing requests directed to a table hosted in a single-tenant environment, the system may elide at least some of the authentication or metering operations that would be performed when servicing requests directed to tables hosted in a multi-tenant environment. Tables may be moved from a single-tenant environment to a multi-tenant environment, or vice versa, automatically by the system (e.g., dependent on an observed, expected, or desired throughput) or in response to an explicit request from a client to do so (e.g., to increase throughput or reduce cost). | 2014-08-28 |
20140244586 | SYSTEMS AND METHODS FOR CONTINUOUS DATA REPLICATION - Systems and methods for intelligent data replication are provided, which may include the identification and use of consistency points in application data, such that one or more replication volumes may be created using an “application aware” replication process that allows the system to intelligently replicate data or other information (e.g., metadata) relating to a particular process, application or specified set of data. | 2014-08-28 |
20140244587 | SYSTEMS AND METHODS FOR PERFORMING STORAGE OPERATIONS IN A COMPUTER NETWORK - Methods and systems are described for performing storage operations on electronic data in a network. In response to the initiation of a storage operation and according to a first set of selection logic, a media management component is selected to manage the storage operation. In response to the initiation of a storage operation and according to a second set of selection logic, a network storage device to associate with the storage operation. The selected media management component and the selected network storage device perform the storage operation on the electronic data. | 2014-08-28 |
20140244588 | CLOUD PLATFORM FOR MANAGING DESIGN DATA - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving a first source file, the first source file including one or more first computer-aided design models; converting the first source file into a first plurality of files; generating a first snapshot, the first snapshot including the first source file, the first plurality of files, and a first version; receiving a second source file, the second source file having the first format that is readable by the first application, the second source file including one or more second models, the second source file being an updated version of the first source file; converting the second source file into a second plurality of files; generating a second snapshot; and associating the second snapshot with the first snapshot, where the second snapshot being a more recent version than the first snapshot. | 2014-08-28 |
20140244589 | SERVER, BACKUP SYSTEM AND BACKUP METHOD - A server includes: a first data storage device that stores therein data for use in service provided by the server; a backup data storage device that stores therein backup data for data stored in a second data storage device of another server; a service provision unit that provides the service by using the data stored in the first data storage device and by using the backup data stored in the backup data storage device; an update information creation unit that creates update information representing a content of the updating of the first data storage device; an update information transmission unit that transmits the created update information to the another server; and an update information reception unit that receives update information which is transmitted from the another server, and reflects the content of updating of the second data storage device on the backup data stored in the backup data storage device. | 2014-08-28 |
20140244590 | HYBRID DATA BACKUP IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. | 2014-08-28 |
20140244591 | FLEXIBLY MANAGING RECORD RETENTION VIA A RECORDS MANAGEMENT SOFTWARE PROGRAM - Program code determines whether a retention base, defined as a property within a disposition schedule has a value, wherein the disposition schedule defines additional properties and instructions for disposal of a record, and wherein the additional properties include a retention period. The program code identifies a change to at least one of the retention base and the retention period. The program code generates a point in time to perform the disposal of the record based on the change that is identified, wherein the disposal is an action defined for a phase of the disposition schedule. | 2014-08-28 |
20140244592 | SYSTEMS AND METHODS FOR DATA ARCHIVAL - The present subject matter discloses a system and a method for data archival. A data archiving system comprises a processor and a compression module coupled to the processor and configured to compress an original data file to generate, for each level of lossy compression, a compressed base file and a patch file. The base file is generated using a lossy compression technique. The patch file for a particular level of lossy compression is generated using information lost at the particular level of lossy compression. The data archiving system further comprises a data archiving module coupled to the processor. The data archiving system is configured to save a last base file and a plurality of patch files corresponding to each level of lossy compression, where the last base file is the base file corresponding to a last level of lossy compression. | 2014-08-28 |
20140244593 | Method, System, and Program for Archiving Files - Provided are a method, system, and program for archiving files. A hierarchical file system having directories is provided. An archival retention policy is associated with at least one of the directories in the hierarchical file system, wherein the retention policy applies to files included in the associated directory, and wherein the retention policy specifies a retention time indicating a time period during which a file is subject to the retention policy. | 2014-08-28 |
20140244594 | COMPUTER-IMPLEMENTED METHOD OF DETERMINING VALIDITY OF A COMMAND LINE - Provided is a method of determining command line validity, including: a step of maintaining a block network address database including block network address information; a step of receiving a command line from a terminal of a user; a step of extracting network address information included in the command line; a step of determining whether the network address information is the block network address information, with reference to the block network address database; a step of generating log information associated with the command line in case that the network address information is not the block network address information as the result of the determination, in which the log information comprises at least one of the network address information included in the command line, input time point information with respect to the input time point of the command line, and request content information; a step of recording the log information in a log database; and a step of determining the validity of the command line by using the log information. | 2014-08-28 |
20140244595 | CONTEXT-AWARE TAGGING FOR AUGMENTED REALITY ENVIRONMENTS - A method for tag-based search includes capturing an image, extracting a tag from the image, identifying a location associated with the captured image, and querying stored content for information that matches the location and the tag. Local storage is checked for the information first, and remote storage may be checked subsequently. Any located information may be used to augment the image. Information located in the remote storage may be saved in the local storage until it reaches a certain age, until it fails to be accessed for a threshold period of time, or until the location moves outside a threshold radius associated with a location of the information located in the remote storage. | 2014-08-28 |
20140244596 | CONTEXT-AWARE TAGGING FOR AUGMENTED REALITY ENVIRONMENTS - A method for tag-based search includes capturing an image, extracting a tag from the image, identifying a location associated with the captured image, and querying stored content for information that matches the location and the tag. Local storage is checked for the information first, and remote storage may be checked subsequently. Any located information may be used to augment the image. Information located in the remote storage may be saved in the local storage until it reaches a certain age, until it fails to be accessed for a threshold period of time, or until the location moves outside a threshold radius associated with a location of the information located in the remote storage. | 2014-08-28 |
20140244597 | HALLOWEEN PROTECTION IN A MULTI-VERSION DATABASE SYSTEM - Mitigating problems related to the Halloween problem including where update operations potentially allow the record to be visited more than once during the operation. A method includes accessing an instance of a data store operation statement. The instance of the data store operation statement is executed causing an update or delete to an old version of data store record or creation of a data store record resulting in a new version of the data store record in the case of an update or creation of a data store record and a deleted version of the data store record in the case of a delete in the data store. The instance of the data store operation statement is correlated with the new version of the data store record or the deleted version of the data store record. | 2014-08-28 |
20140244598 | INTEGRITY CHECKING AND SELECTIVE DEDUPLICATION BASED ON NETWORK PARAMETERS - An approach for managing a data package is provided. Network utilization is determined to exceed a threshold. A sender computer determines a hash digest of the data package by using a hash function selected based on central processing unit utilization. If the hash digest is in a sender hash table, then without sending the data package, the sender computer sends the hash digest and an index referring to the hash digest so that a recipient computer can use the index to locate a matching hash digest and the data package in a recipient hash table. If the hash digest is not in the sender hash table, then the sender computer adds the data package and the hash digest to the sender hash table and sends the data package and the hash digest to the second computer to check the integrity of the data package based on the hash digest. | 2014-08-28 |
20140244599 | DEDUPLICATION STORAGE SYSTEM WITH EFFICIENT REFERENCE UPDATING AND SPACE RECLAMATION - A deduplication storage system and associated methods are described. The deduplication storage system may split data objects into segments and store the segments. A plurality of data segment containers may be maintained. Each of the containers may include two or more of the data segments. Maintaining the containers may include maintaining a respective logical size of each container. In response to detecting that the logical size of a particular container has fallen below a threshold level, the deduplication storage system may perform an operation to reclaim the storage space allocated to one or more of the data segments included in the particular container. | 2014-08-28 |
20140244600 | MANAGING DUPLICATE MEDIA ITEMS - Systems, methods, devices, and computer-readable media for managing duplicate media items. The system first analyzes a first file from a first source, wherein the first file is a duplicate of a second file. Next, the system deduplicates the first file and the second file to yield a deduplicated file. The system then selects metadata associated with at least one of the first file or the second file to be assigned as metadata for the deduplicated file, the metadata being selected based on a priority preference. | 2014-08-28 |
20140244601 | GRANULAR PARTIAL RECALL OF DEDUPLICATED FILES - The subject disclosure is directed towards partially recalling file ranges of deduplicated files based on tracking dirty (write modified) ranges (user writes) in a way that eliminates or minimizes reading and writing already-optimized adjacent data. The granularity of the ranges does not depend on any file-system granularity for tracking ranges. In one aspect, lazy flushing of tracking data that preserves data-integrity and crash-consistency is provided. In one aspect, also described is supporting granular partial recall on an open file while a data deduplication system is optimizing that file. | 2014-08-28 |
20140244602 | SEMANTIC COMPRESSION OF STRUCTURED DATA - Systems and methods for the semantic compression of structured data include identifying attributes of elements in a collection structure, such as a table. The attributes may be grouped and the grouping used to consolidate attribute values used in the elements. An index of repeated attribute values may also be generated and used to replace the attribute values in elements of the structured data. | 2014-08-28 |
20140244603 | Multi-Level Memory Compression - According to one embodiment of the present disclosure, an approach is provided in which a processor selects a page of data that is compressed by a first compression algorithm and stored in a memory block. The processor identifies a utilization amount of the compressed page of data and determines whether the utilization amount meets a utilization threshold. When the utilization amount fails to meet the utilization threshold, the processor uses a second compression algorithm to recompresses the page of data. | 2014-08-28 |
20140244604 | PREDICTING DATA COMPRESSIBILITY USING DATA ENTROPY ESTIMATION - The subject disclosure is directed towards predicting compressibility of a data block, and using the predicted compressibility in determining whether a data block if compressed will be sufficiently compressible to justify compression. In one aspect, data of the data block is processed to obtain an entropy estimate of the data block, e.g., based upon distinct value estimation. The compressibility prediction may be used in conjunction with a chunking mechanism of a data deduplication system. | 2014-08-28 |
20140244605 | CONTENT VALIDATION FOR DOCUMENTATION TOPICS USING PROVIDER INFORMATION - At least one processor may determine one or more issues in one or more of a plurality of documentation topics that document at least one software functionality based at least upon applying one or more business rules to the one or more of the plurality of documentation topics. Responsive to determining the one or more issues, one or more entries may be inserted into an issues report, wherein the one or more entries include information regarding the one or more issues. | 2014-08-28 |
20140244606 | METHOD, APPARATUS AND SYSTEM FOR STORING, READING THE DIRECTORY INDEX - A method, apparatus and system for storing and reading the directory index and belongs to the field of computer technology is provided. The method includes: configuring all directories in the directory index with identifiers respectively; according to each directory identifier, splitting the directory index so as to obtain the directory split item corresponding to each directory identifier, wherein each directory split item and its corresponding directory identifier are stored as a record item, and each directory split item comprises at least corresponding sub-directory identifier and corresponding file storage address. By the configuration of the disclosure, the granularity of the directory index is refined, and access performance for the directory index is improved. | 2014-08-28 |
20140244607 | System and Method for Real-Time Media Presentation Using Metadata Clips - There is provided a system and method for real-time media presentation using metadata clips. There is provided a media device for providing one or more media files for a display, the media device including a memory and a processor. The memory includes a plurality of metadata clips, wherein each of the plurality of metadata clips references a referenced source media from the media files, a referenced start position, and a referenced end position. The processor can determine a playlist including some of the plurality of metadata clips for streaming segments of media files as defined by their referenced start and end positions. Flexible behaviors can also be added to enhance playback logic or to enforce access restrictions, and metadata clips and playlists may also be user generated. | 2014-08-28 |