35th week of 2012 patent applcation highlights part 52 |
Patent application number | Title | Published |
20120221436 | INSTRUCTOR-CURATED ELECTRONIC TEXTBOOK SYSTEMS AND METHODS - An electronic textbook system allows instructors to create custom coursebooks by integrating various materials from disparate sources. Instructors can arrange the materials, format them, provide tables of contents and indices. Payment mechanisms as well as policies for the components are integrated automatically so that the final book satisfies policy requirements for each of its component parts. | 2012-08-30 |
20120221437 | Systems and Methods to Automate Social Networking Activities - Systems and methods are provided to automate certain social networking activities in response to payments processed via mobile communications. In one aspect, a system includes a data storage facility to store social networking preferences with a phone number of the user and an interchange coupled with the data storage facility. The interchange includes a common format processor and a plurality of converters to interface with a plurality of different controllers of mobile communications. The converters are configured to communicate with the controllers in different formats; and the converters are configured to communicate with the common format processor in a common format. The common format processor is configured to communicate with a third party social networking site in accordance with the social networking preferences on behalf of the user, during processing of the payment, such as posting a message about a purchase, checking the user in at a location of the merchant, etc. | 2012-08-30 |
20120221438 | INTERACTIVE EXPLODED VIEW DIAGRAM ORDERING TOOL - The present invention provides a method and computer-readable medium for executing a method of placing an order for a sub-component (part) of a product, including generally three steps: displaying a diagram depicting sub-components of a product in an exploded view on a user screen; receiving a user selection of a sub-component to be ordered; and processing the selection of a sub-component to be ordered. Optionally, the method may allow the user to selectively view further information pertinent to displayed sub-components, such as their prices and specifications, or to selectively zoom in on and zoom out of the exploded view or to scroll the exploded view. The method thus assists the user when attempting to identify and/or order a sub-component for the product. The method may also be implemented in a stand-alone computer system. | 2012-08-30 |
20120221439 | SHOPPING CONTEXT ENGINE - A system receives context data associated with a context and a user. The system then associates the context data to a user identifier and retrieves data associated with the context. The system then filters the data according to the context data to create result data. In another embodiment, the system also receives context data from a plurality of users, where the context data pertains to one or more attributes of a context. The system then using the context data ranks the one or more attributes of the context to create ranked data and generates a user interface based on the ranked data. In yet another embodiment, the system communicates context data associated with a context and a user to a server, and receives result data created by the server filtering data retrieved based on the context data. The system then generates a user interface based on the result data. | 2012-08-30 |
20120221440 | METHOD FOR BUYING AND SELLING GOODS AND SHOPPING SUPPORT SYSTEM SUPPORTING THE SAME - Provided are a goods buying and selling method for buying goods through offline shopping and a shopping support system supporting the same. A buyer collects delivery information for delivery of bought goods based on short-range wireless communication using his or her own terminal. The collected delivery information includes any one of information about a destination to which bought goods are to be delivered and buyer identifier information, and information about the bought goods, and at least one of a payment terminal, a merchant server and a relay server requests delivery of the bought goods from a delivery server based on the collected delivery information. In addition, the buyer collects goods purchase information recorded in recording media arranged in an offline store using his or her own terminal, and pays for desired bought goods based on the collected goods purchase information. | 2012-08-30 |
20120221441 | IDENTIFYING AND USING BIBLIOGRAPHICAL REFERENCES IN ELECTRONIC BOOKS - An electronic book system recognizes patterns in texts that correspond to bibliographical references. User selection of a bibliographical reference causes a digital copy of the work referenced to be made available to the user. Factors such as price, reference format and user feedback are used to select a source from which the digital copy of the work is obtained. | 2012-08-30 |
20120221442 | MULTI-VARIABLE PRODUCT RANK - Methods, systems, and computer-readable media for ranking products using multiple data sources are provided. A computerized ranking system includes a ranking engine, loaders, and a presentation component. The ranking engine calculates a score for each product based on multiple counts logged by data sources. Loaders communicatively connected to the ranking engine provide the counts to the data sources. The presentation component generates a ranked product list for display on client devices in response to requests for a list of popular products. | 2012-08-30 |
20120221443 | Method and Apparatus for Providing Production Information - Methods and apparatus are described for comparing and validating information provided by a manufacturer of an individual product item against information provided by a trusted third-party. The information provided by the manufacturer includes an identifier of the individual product item. The information provided by the manufacturer is stored and associated with the information provided by the trusted third-party in a database. When a request for information that includes data representing the identifier is received from a potential purchaser of the individual product item, information associated with the individual product item is looked up in the database using the identifier. At least part of the information associated with the individual product item is transmitted to the potential purchaser. Upon purchase of the individual product item, the identifier can be used to link ownership information provided by the purchaser to the individual product item in the database. | 2012-08-30 |
20120221444 | MESSAGE QUEUE BASED PRODUCT ASSET MANAGEMENT AUDITING SYSTEM - A server detects a product asset management operation and generates an event message corresponding to the product asset management operation. The event message includes data describing the product asset management operation. The server sends the event message to one or more message queues. One or more listeners that are associated to the one or more message queues can obtain the event message to perform an auditing action that indicates to a user an occurrence of the product asset management operation. | 2012-08-30 |
20120221445 | METHOD AND APPARATUS FOR DETECTING DUPLICATE ACCOUNTING RECORDS IN DISTRIBUTED NETWORK - A method for processing accounting requests (ACRs) to account for service provided by a network element (NE) of a service provider network may include receiving an ACR from a NE at a charging collection function (CCF) server, the CCF server in a charging system comprising a plurality of CCF servers, the ACR representative of a corresponding portion of service provided by the NE in conjunction with a communication session served by the service provider network, determining the ACR is a potential duplicate ACR for the portion of service; and storing ACRs received by the CCF server from the NE for the communication session in a retransmission buffer for subsequent detection and reconciliation of duplicate ACRs from the NE for the communication session by the charging system. The CCF server may include a network communication module, a retransmission status module, and a storage device that includes the retransmission buffer. | 2012-08-30 |
20120221446 | E-RECEIPTS COLLECTION AND MANAGEMENT SYSTEM - In general, embodiments of the present invention concern the collection and management of a consumer's detailed receipt information in electronic form and the storage of the electronic receipts in a platform accessible to the consumer online or through the consumer's mobile device. | 2012-08-30 |
20120221447 | MULTIPLE BALANCE STATE ACCOUNT PROCESSING - A computer based system and method for processing financial accounts. Each account is defined by multiple daily account balance records. Each daily account balance record is defined by a daily account balance record posting state that defines the types of transactions that may be posted to the daily account record balance at any one time. The various daily account balance records defining a single account may have different daily account balance record posting states, thereby allowing different types of transactions for different account days to be posted to the same account simultaneously. The resulting account processing system and method provides customers greater flexibility in transferring money between accounts and provides banking entities greater flexibility in account processing timing and reducing operational costs. | 2012-08-30 |
20120221448 | METHOD AND SYSTEM FOR DETECTING AND ADDRESSING INVOICING ANOMALIES - Methods, systems and computer-readable medium for enabling an information technology system to detect pricing anomalies and present detected anomalous pricing to a human operator. A price value digitally stored in an electronic memory associated with a part number and included in an invoice process is compared with one or more price ranges. When the price value fall outside of at least one price range, the price value is provided to a human administrator for deletion, approval or modification, prior to the issuance of an invoice and wherein the human administrator may direct the computer, or a networked computer, to halt generating or transmitting the invoice or to generate a modified invoice. A modified invoice may be issued with one or more line items deleted and or modified as directed by the human administrator. The computer may additionally be configured to detect associations of part numbers with defined kits. | 2012-08-30 |
20120221449 | SYSTEM AND METHOD FOR PRESENTATION CREATION - A system and method are provided for a network-based content management system (CMS) for creating and sharing presentation objects, and for generating revenue based on providing access to tools by which the presentation objects are created, stored and managed. In the system, a content management service includes a database that stores a presentation object, and a Web server stores a Web page including a link to the presentation object. When the Web page is displayed on a computing device that accesses the Web page via the Web, the presentation object appears as an embedded presentation. | 2012-08-30 |
20120221450 | METHOD AND APPARATUS FOR GENERATING SERVICE MESSAGE - Embodiments of the present invention provide a method for generating a service message, including: receiving a service message sent by a service provider SP device and content sent by a content provider CP device; generating a service message including corresponding content, according to a preset corresponding relation between the service and the content, or according to a preset corresponding relation between the SP and the CP, or according to both the corresponding relation between the service and the content and the corresponding relation between the SP and the CP; and sending the service message including the corresponding content to a user. Through the method according to the present invention, the generation efficiency and configuration flexibility of the service message may be improved. | 2012-08-30 |
20120221451 | Method and System for a Contract Option - This invention provides a novel method and system for instantiating a data structure comprising a contract option including a disjunctive capability, of especial utility in enabling a new way of selling commodities or services. Rather than being a right to buy a unit of a type of item at a specified price, as is known to the prior art, the present invention enables one to secure a right to buy at least one unit of one of n-types of items at a predetermined legal consideration. | 2012-08-30 |
20120221452 | DETERMINING COMMERCIAL SHARE OF WALLET - Commercial size of spending wallet (“SoSW”) is the total business spend of a business including cash but excluding bartered items. Commercial share of wallet (“SoW”) is the portion of the spending wallet that is captured by a particular financial company. Commercial Soft is a modeling approach that utilizes various data sources to provide outputs that describe a company's spend capacity. These outputs can be appended to data profiles of customers and prospects and can be utilized to support decisions involving prospecting, new account evaluation, and customer management across the lifecycle. Company financial statements are utilized to identify and calculate total business spend of a company that could be transacted using a commercial credit card. A spend-like regression model may then be developed to estimate annual commercial SoSW value for customers and prospects within a credit network. | 2012-08-30 |
20120221453 | INTELLIGENT ORDER MATCHING PLATFORM FOR ANONYMOUSLY NEGOTIATING AND TRADING FINANCIAL INSTRUMENTS - This software enables a financial institution acting as a clearing agent to offer a liquidity pool where their clients can anonymously submit orders for a financial instrument. Many financial markets suffer from reduced liquidity, the causes for which include: 1) fragmentation across multiple markets, 2) fragmentation across a large instrument universe and 3) attempting to trade an illiquid instrument. The software has been developed to uniquely improve available liquidity using crossing algorithms that intelligently identify orders for similar instruments as relevant execution opportunities, and applies a quantitative scoring of their propensity to trade on which clients can anonymously negotiate and execute. As crossing algorithms are not constrained by the conventional restriction that orders must be for identical instruments, the system is able to increase liquidity by identifying execution opportunities that existing markets cannot, while employing an anonymous negotiation process that minimizes information leakage to mitigate disruption to market prices. | 2012-08-30 |
20120221454 | SYSTEMS AND METHODS FOR GENERATING MARKETPLACE BROKERAGE EXCHANGE OF EXCESS SUBSCRIBED RESOURCES USING DYNAMIC SUBSCRIPTION PERIODS - Embodiments relate to systems and methods for generating a marketplace brokerage exchange of excess subscribed resources using dynamic subscription periods. A set of aggregate usage history data can record consumption of processor, software, or other resources subscribed to by a set of users, in one cloud or across multiple clouds. An entitlement engine can analyze the usage history data to identify a subscription margin for the subscribed resources, reflecting collective under-consumption of resources by the set of users on a collective basis, over different and/or dynamically updated subscription periods. In aspects, the set of estimated resource contributions of different users can be aggregated over one or more dynamic resource contribution intervals to generated a bundled brokerage resource tender, in which the processor, operating system, and/or other resources of multiple users are combined to be offered to a cloud marketplace for one or more contribution interval. The bundled resource offer can be structured to contain at least a threshold amount of resources over a minimum or other defined contribution interval, after which resources are released back to the contributing users. | 2012-08-30 |
20120221455 | Complex Order Generation for Trading Financial Instruments Using Order Template Method - The present invention discloses a system for generating trading orders in a simple way and without the need of programming. The system comprises a user input module adapted to receive user input for an order strategy; a trigger generation module adapted to generate trigger signals and an order management module for generating trading orders based on the trigger signals and the user input. The user input module comprises a user interface using an order template provided in a table format to allow a user to input a trigger for generating the trading order. The system supports automatic mode and manual mode which are switchable by the user. | 2012-08-30 |
20120221456 | SYSTEM AND METHODS FOR FACILITATING OPTIONS AND/OR FUTURES - Some embodiments may include allowing users to define and/or trade in binary options and/or other financial instruments. Various methods and apparatus are described. | 2012-08-30 |
20120221457 | Computerized Method and System for Trading Credit Default Swap Combinations - A computerized trading system comprises a multi-instrument trading platform including a matching engine and a price feed. The matching engine trades credit default swaps as well as the reference instruments from which they are derived. A price feed generates a spot reference price for a leg of a CDS combination such as a roll or a tailor made switch. The price feed receives indicative pricing data from an external pricing source and uses this data to generate the spot reference price together with last trade data and best bid and best offer data for the reference instrument provided by the matching engine. | 2012-08-30 |
20120221458 | APPARATUSES, METHODS AND SYSTEMS FOR A LOCKED-IN TRADE FACILITATION ENGINE - The APPARATUSES, METHODS AND SYSTEMS FOR A LOCKED-IN TRADE FACILITATION ENGINE (“LITF ENGINE”) provides and facilitates delivery of open futures positions, upon or before expiry, into financial instruments, such as currency-denominated fixed income market positions. The LITF ENGINE facilitates cash trade transactions produced upon expiration of currency-denominated interest rate and fixed income futures contracts such as U.S. Treasury futures. In one embodiment, the LITF ENGINE provides a delivery process for U.S. Treasury futures, where contracts that remain open after the close of trading on the last trading day of the delivery month may be automatically submitted as locked-in trades in the underlying U.S. Treasury securities eligible for settlement on a delivery vs. payment (DVP) basis on the next business day. | 2012-08-30 |
20120221459 | System And Method For Regulating Order Entry In An Electronic Trading Environment - A system and method are provided for defining slop parameters to an individual spread order or a customized group of orders. The system and method may be used to, for example, define inside slop, outside slop, and/or adjustable range parameters to one or more orders. The inside slop, outside slop, and/or adjustable range parameters may be input by a trader, and, among other things, allow a trader to prioritize orders, set parameters so that some orders are re-priced more aggressively than other spread orders. Alternatively, slop parameters associated with a spread order may also apply more restrictive slop parameters to orders within the same adjustable range. Slop parameters associated with a spread order can also be configured and modified by a trader based on the trader's preferences. Other features and advantages are described herein. | 2012-08-30 |
20120221460 | METHOD AND SYSTEM FOR FACILITATING SECURED COMMERCIAL TRANSACTIONS THROUGH TRUSTED AGENTS - The present invention discloses a member-based trade management system for facilitating trade among consumers and producers by utilizing an agent service. The system comprises a network-based communications module for storing and providing profile information about consumers, producers, and third-party service providers; a member matching service module for presenting candidates for a transaction group; a member research service module for examining credentials of candidates for the transaction group; a transaction service module for tracking a transaction workflow; a financial service module for ensuring exchange of financial values between consumers and producers; a platform management service module for mediating disputes arising from activities related to the trade transaction; and one transaction service facilitation unit for allowing consumer and producer agents to access data in the trade platform, wherein the customer and producer agents, located in close proximity of the customers and producers, to facilitate the completion of the trade transaction. | 2012-08-30 |
20120221461 | SYSTEM AND METHOD FOR IMPLEMENTING PUSH TECHNOLOGY IN A WIRELESS FINANCIAL TRANSACTION - A method for executing a trade is provided that includes communicating financial information to a handheld device via a network, the financial information being associated with a trade that can be initiated by the handheld device. The handheld device is connected to the network via a Push to Trade™ protocol. The method also includes executing the trade on behalf of the end user. | 2012-08-30 |
20120221462 | METHOD AND SYSTEM FOR TRADING - An instrument is traded in an automated exchange system. A first order for the instrument on a first side of a market and a second order for the instrument on a second side of the market are received. The first and second orders are evaluated regarding the possibility for a match between the first and the second orders. If such a match is possible, a preliminary trade is created using the first and the second orders. A third order for the instrument on the first side of the market is received and compared with the first order. If the third order is better than the first order, then the preliminary trade is modified. A final trade is created using the orders currently part of the preliminary trade. | 2012-08-30 |
20120221463 | LOCATION-BASED AUTOMATIC PAYMENT SYSTEM - A method for making a location-based automatic payment includes receiving an automatic payment instruction that designates a payee account. The automatic payment instruction is associated with a payer account in a database. A payment location is received and associated with the automatic payment request in the database. A payer device that is associated with the payer account is determined to be in the payment location and, in response, a payment request is sent over a network to make a payment from the payer account to the payee account. | 2012-08-30 |
20120221464 | COMMUNICATIONS SYSTEM FOR PERFORMING SECURE TRANSACTIONS BASED UPON MOBILE WIRELESS COMMUNICATIONS DEVICE PROXIMITY AND RELATED METHODS - A communications system may include a plurality of mobile wireless communications devices configured to determine proximity between one another. At least one of the mobile wireless communications devices may also be configured to generate a secure transaction request based upon the determined proximity. The system may further include a transaction terminal configured to receive the secure transaction request and perform a secure transaction based thereon. | 2012-08-30 |
20120221465 | CLEARINGHOUSE SYSTEM FOR MONETARY AND NON-MONETARY TRANSFERS OF VALUE - A clearinghouse system facilitates the transfer of value of various forms, including monetary transfers, between parties as well as the monitoring and control of such transfers. The clearinghouse system may include a global framework that defines the operation of regional implementations of the system such that they may interoperate with a global hub of the system. The regional implementations may communicate with value exchange environments and client devices to facilitate, monitor, or control value transfers. A pending payments system is provided as well to effectuate direct transfers of value, including currency, between a consumer and merchant. | 2012-08-30 |
20120221466 | METHOD FOR IMPROVED FINANCIAL TRANSACTIONS - Disclosed are methods and processing techniques for modifying or changing a financial transaction that is being processed, such as for the purchase of goods or services. Methods of the present invention, in particular, relate to methods including the ability to use fixed or variable data, as such data is sent to a financial transaction processor, in order to modify the transaction, and thus changing the financial transaction that is being processed or the method of processing the financial transaction. The modifications that are made to the transaction enhance security to the buyer by disclosing less data during the transaction for others to potentially gain access. | 2012-08-30 |
20120221467 | MOBILE PAYMENT SYSTEM AND METHOD - A mobile payment system and method are disclosed. A message is generated by, and received from, a first mobile device. The message includes a payment code, an amount of a payment, and a receiver designator representing a receiver of the payment. A confirmation message is then from the receiver of the payment. An amount of the payment and a fee is debited from a first account associated with the first mobile device. A second account associated with the receiver of the payment the amount of the payment is then credited. The message, and transaction, is a text message. | 2012-08-30 |
20120221468 | DIRECT CONNECTION SYSTEMS AND METHODS - Embodiments of the invention are directed to passing a plurality of communications directly from a merchant to a payment processing network. A first communication may include payment information in an authorization request, while a second transaction may include non-payment transaction data. The communications may be linked with a transaction identifier. In other embodiments, a capture file process is disclosed where capture files are generated by the payment processing network, and transactions are subsequently cleared and settled. | 2012-08-30 |
20120221469 | DYNAMIC HOLD DECISIONING - Embodiments of the present invention relate to methods and apparatuses for determining, communicating, and/or executing hold decisions for deposit items. For example, a method is provided that includes: (a) receiving information associated with a deposit item; (b) determining a deposit amount for the deposit item; (c) determining a payee account to receive the deposit item; (d) determining a hold limit for the payee account; and (e) determining a hold decision for the deposit item based at least partially on a comparison of the deposit amount to the hold limit. In some embodiments, the hold limit is based at least partially on (a) an account balance associated with the payee account, and (b) one or more other characteristics associated with the payee account. | 2012-08-30 |
20120221470 | USER AUTHENTICATION AND SECURE TRANSACTION SYSTEM - A system, method, and apparatus to minimize fraud at the user, merchant, and/or financial institution level. A control computer provides authentication and/or transaction processing. The control computer has access to databases comprising user, merchant, enrollment, transaction, duplicate, and fraudulent activity data. Parties may enroll in the system via an enrollment computer and conduct transactions through the system via a merchant computer. Users are issued hardware identification keys containing an encrypted user code. Access keys can be required in addition to an authorized user key to conduct certain actions. Keys are copy protected and can comprise a computer operating system. The hardware profile of client devices can be recorded. Parties may specify minimum and/or maximum security levels and restrict transactions. Transactions with parties can be authenticated without sending user personal data to the parties. Users can control transfer of information from their personal communication device to other devices. | 2012-08-30 |
20120221471 | Electronic System for Selecting the Best Card from a Collection of Consumer Credit, Debit and Discount Cards - A method, system and computer program product for enabling completion of purchase transactions by retrieving purchase card information from an electronic database of consumer cards and applying the appropriate card to the transaction. The database, managed by a central card authority, stores client account information for cards such as debit, credit, phone, and discount cards, which are accessible via a unique, secure login/access credential, such as a username and password combination. During registration with the central card authority, a client classifies key/important factors to consider when performing purchases. The central card authority is accessed by the client during purchases from a retail facility and/or other purchasing environment. The central card authority automatically selects the best card to utilize during a purchase, after weighing the important purchasing factors related to the credit, debit, phone, and discount cards registered with the central card authority. | 2012-08-30 |
20120221472 | SYSTEM AND METHOD FOR FACILITATING A FINANCIAL TRANSACTION WITH A DYNAMICALLY GENERATED IDENTIFIER - Instead of a PIN which is associated with an account and provides access to an account, a dynamically generated card identifier (dynamic CID) is used to verify that the consumer currently possesses the transaction card at the time of purchase and/or is the true card owner. At the time of purchase, a token generates a dynamic CID, which changes with each transaction. A consumer enters the dynamic CID into a pre-existing CID field in an electronic order form. The merchant then sends the dynamic CID to a card authorization system within an authorization request. The card authorization system issues a response to a merchant system via a pre-existing authorization message indicating that the transaction card and dynamic CID have been validated, thereby adjusting the fraud risk associated with the transaction. | 2012-08-30 |
20120221473 | Method and System for Using a Mobile Device for Secure Access to Electric Vehicle Supply Equipment - A systems and method are to allow a wireless telephone or any terminal to reserve and activate an electric vehicle charger using a web site or server computer system. An access control system is provided that includes a server and an access device. The access device includes an electrical vehicle charger. A reservation request is accepted from a first terminal using the server. A reservation certificate is provided to a mobile second terminal in response to the request using the server. The reservation certificate is accepted from the mobile second terminal using the access device and a communications technique like Bluetooth. The reservation certificate is determined to be authentic using the access device. The electric vehicle charger is activated in response to accepting an authentic reservation certificate using the access device. | 2012-08-30 |
20120221474 | Secure Electronic Ticketing using Mobile Communication Devices over the Internet - The invention consists of a method and system for secure mobile ticketing through the use of a mobile device with display output and data input capabilities. The system utilizes a cryptographic security string appended to a URL and embedded in a 2D barcode to securely create an electronic ticket which is displayed on the mobile device display for redemption, redeem the displayed electronic ticket by means of optical scanning, and optionally register and authenticate a ticket scanning unit. The system utilizes real-time internet communication with a remote server for ticket distribution, redemption and ticket scanning unit registration and authentication to restrict unauthorized creation or redemption of electronic tickets and to reduce queuing. | 2012-08-30 |
20120221475 | MOBILE TRANSACTION DEVICE SECURITY SYSTEM - Embodiments of the invention include apparatuses, methods, and computer-program products that provide for a unique financial transaction security system. In one embodiment, the financial transaction security system receives a security protocol from a user. The security protocol includes instructions for allowing transactions without authentication and security features for the user if authentication is necessary. The system then determines that the user is conducting a transaction, evaluates the instructions, and determines whether the transaction can occur without authentication. If the user is required to authenticate his identity, the system requests input from the user, compares the input to the security feature, and determines if the user is authenticated. The user is able to customize both the instructions and the security features to provide greater control over financial transaction security. | 2012-08-30 |
20120221476 | Medical Job Bidding System - An electronic job auction system for medical professionals. The system considers the unique needs of a medical professional and healthcare facility and medical group's (FMG) emphasis for qualification and license. In a bidding process, medical professionals are grouped into groups according to a FMG's preference, and a FMG has the option to choose the bidding winner from any of the bidding groups or bidding medical professional with the highest matching score. Thus, the most qualified medical professional doesn't have to compromise his bidding position. Conversely, a medical professional is able to post his/her job preferences and availability, and have a FMG bid for the medical professional. Similarly, FMGs are grouped into bidding groups according to a medical professional's preference, and a medical professional has the option to choose the bidding winner from any of the bidding groups or the bidding FMGs who has the highest matching score. | 2012-08-30 |
20120221477 | INTERNET-BASED METHOD AND APPARATUS FOR CAREER AND PROFESSIONAL DEVELOPMENT VIA SIMULATED INTERVIEWS - Methods and apparatus for generating feedback, reviewing feedback, and conducting interviews by use of VMocks are provided. A VMock, or Virtual Mock, is a virtual profile of a candidate that includes resume, text, video and a document. VMock profiles may be created that have one or more VMocks. Contacts associated with the VMock profile may be managed. Feedback may be requested from the contacts concerning the one or more VMocks, who may then generate the requested feedback. The feedback may then be reviewed. This feedback process may be performed in the context of interviews for employment opportunities and in other similar situations. | 2012-08-30 |
20120221478 | TARGETED INFORMATION DISSEMINATION BASED ON AIRPORT GATE-SPECIFIC UTILIZATION - Implementing targeted information dissemination based on gate-specific utilization includes collecting gate-specific utilization characteristics for an airport gate, the airport gate associated with a display device. Traveler data is collected for the airport gate and is aggregated. The implementation of targeted information dissemination includes identifying a pattern from aggregated traveler data, and disseminating information to the display device. The pattern is designated with an association with the information for dissemination. | 2012-08-30 |
20120221479 | Web site, system and method for publishing authenticated reviews - The present invention provides a system and method for authenticating and publishing reviews of service providers. In particular, a third-party website receives information from a reviewer pertaining to a prior purchase and receipt of services from a service provider by the reviewer, and queries a database of the service provider to confirm that the information corresponds to a prior purchase in the database. If the information provided by the reviewer matches the service provider database, the review is accepted and posted online. If the information provided by the reviewer does not match the service provider database, the review is rejected and not published. | 2012-08-30 |
20120221480 | Methods of Identifying Environmentally Friendly Businesses or Individuals - This disclosure relates to techniques for a computer-implemented method which receives user input that specifies values for predetermined questions provided in an environmental questionnaire, identifies environmentally friendly businesses or individuals by analyzing the user input values and determining those businesses or individuals that meet predetermined minimum requirements, and stores a list of the identified businesses or individuals within a database. | 2012-08-30 |
20120221481 | System and Method for Variable Annuity Financial Product Illustrations - System and methods for variable annuity financial product illustrations are provided. A computer system generates user interface screen(s) allowing the user to specify information about a variable annuity financial product to be illustrated, and a desired start date for a financial illustration. An illustration server receives the information and desired start date from the computer system. Historical performance data relating to at least one portfolio of the variable annuity financial product is obtained, and the variable annuity financial product is modeled to produce a first illustration for the variable annuity financial product. The variable annuity financial product is also modeled with a benefit associated with the variable annuity financial product, to produce a second illustration for the variable annuity financial product. An illustration report is created, allowing the user to compare performance of the variable annuity financial product during the illustration period with and without the benefit. | 2012-08-30 |
20120221482 | Methods and Systems for Creating and Trading Derivative Investment Products Based on a SKEW Index - Systems and methods for creating and disseminating a SKEW index based on a statistical property reflecting the skewness of an underlying asset and creating and trading derivative investment products based on the SKEW index are disclosed. In one aspect, a SKEW index associated with an underlying asset is calculated. The SKEW index is accessed and a SKEW derivative is created based on the SKEW index. Information associated width the SKEW derivative is then transmitted for display. | 2012-08-30 |
20120221483 | SINGLE-POT MARGINING WITH DIFFERING LIQUIDATION PERIODS - A computer-implemented method for determining a margin for a clearinghouse member position including both securities and derivatives. One example method includes receiving data at a margin calculation computer server on a securities position maintained by a clearing member and a derivatives position maintained by the clearing member. The method may further include calculating using the margin calculation computer server a single margin requirement for the member for both the securities position and the derivatives position using a first liquidation period for the securities position and a second different liquidation period for the derivatives position in the calculation of the margin requirement. | 2012-08-30 |
20120221484 | DIVERSIFICATION MEASUREMENT AND ANALYSIS SYSTEM - This disclosure details methods for measuring and analyzing diversification of portfolio of assets. A dimension is a logical and quantitative means to measure diversification. As the number of dimensions increases so does diversification. Strong asset correlations among each other detract from the notion of independence. A positive correlation increases risks and is therefore undesirable. Assets are embedded into a high dimensional Euclidean vector space. The entire portfolio is interpreted as a set of points whose ambient dimension is the number of assets in the portfolio. The Karhunen-Loève expansion is used to quantify the KL dimension of the geometric object induced by a portfolio. The associated dimension is taken as the measure of diversification accounts for both the number of assets and the commonality within them. This ensures that measuring diversification as a dimension accounts for the complete diversification affect of the portfolio and is thus a valuable portfolio management tool. | 2012-08-30 |
20120221485 | METHODS AND SYSTEMS FOR RISK MINING AND FOR GENERATING ENTITY RISK PROFILES - A computer implemented method for mining risks includes providing a set of risk-indicating patterns on a computing device; querying a corpus using the computing device to identify a set of potential risks by using a risk-identification-algorithm based, at least in part, on the set of risk-indicating patterns associated with the corpus; comparing the set of potential risks with the risk-indicating patterns to obtain a set of prerequisite risks; generating a signal representative of the set of prerequisite risks; storing the signal representative of the set of prerequisite risks in an electronic memory; and aggregating potential risks linked to an entity to an entity risk profile (ERP). A computing device or system for mining risks includes an electronic memory; and a risk-identification-algorithm based, at least in part, on the set of risk-indicating patterns associated with a corpus stored in the electronic memory. | 2012-08-30 |
20120221486 | METHODS AND SYSTEMS FOR RISK MINING AND FOR GENERATING ENTITY RISK PROFILES AND FOR PREDICTING BEHAVIOR OF SECURITY - A computer implemented method for mining risks includes providing a set of risk-indicating patterns on a computing device; querying a corpus using the computing device to identify a set of potential risks by using a risk-identification-algorithm based, at least in part, on the set of risk-indicating patterns associated with the corpus; comparing the set of potential risks with the risk-indicating patterns to obtain a set of prerequisite risks; generating a signal representative of the set of prerequisite risks; storing the signal representative of the set of prerequisite risks in an electronic memory; aggregating potential risks linked to an entity to an entity risk profile (ERP); and predicting a movement in a security associated with an entity. | 2012-08-30 |
20120221487 | SYSTEM AND METHOD FOR PROCESSING DATA RELATING TO ANNUITIES - A system for administering an insurance account includes a processor; a memory in communication with the processor; the processor being adapted to: access data indicative of a value of an index calculated based on a formula including as factors prices of individual equity securities; access data indicative of dividend yield; access data indicative of an asset value of an insurance account having a value based on the index; determine an updated asset value of the insurance account based on change in the index and on the dividend amount paid; store the determined updated asset value in the memory; and provide an output signal indicative of the determined updated asset value. | 2012-08-30 |
20120221488 | Distribution of Market Data - Systems and methods are provided for communicating and processing market data. The market data may comprise quotes, orders, trades and/or statistics. A messaging structure allows for adding, re-ordering and/or expanding data, within the printable character set of any language. One or more delimiters are defined and used to delimit data elements within the message structure. The data is interpreted based on templates which may be disseminated prior to the sending of messages and used as an abstraction so that the meaning of data need not be conveyed in the message. | 2012-08-30 |
20120221489 | Methods and Systems for Providing Partially Redeemable Offering Notes - In one aspect, the invention comprises a method comprising: (a) creating a partially redeemable offering note; (b) pricing the note; (c) issuing the note; and (d) redeeming the note. In another aspect, the invention comprises a method comprising: (a) buying a partially redeemable offering note issued by an issuer; and (b) receiving a first payment from the issuer for a first fraction between 0 and 1 of a notional amount of the note. In another aspect, the invention comprises a note with terms comprising: (a) a notional amount; (b) a schedule of two or more redemption dates; and (c) options for redeeming a percentage of the notional amount on at least two of the two or more redemption dates. | 2012-08-30 |
20120221490 | SYSTEM, METHOD AND PROGRAM TO ESTIMATE COST OF DISTRIBUTING SOFTWARE - Estimating the cost of an ESD for software and subsequent updates for the software. First program instructions determine a cost of the ESD associated with packaging together components of the software. Second program instructions receive a selection from an operator whether to push or pull the subsequent updates to a customer, and determine a cost for distributing the subsequent updates based on the selection. Third program instructions estimate a cost of the ESD associated with a type of program used by the customer to create images of the software. Fourth program instructions estimate a cost of the subsequent updates associated with distributing the updates to a remote distribution site. | 2012-08-30 |
20120221491 | ELECTRIC POWER INTERCHANGE SYSTEM - In a power interchange system, an electric power generated by a power generation device is interchanged between power consuming dwellings in a multi-family house. Each power consuming dwelling generates the power by using the power generation device and receives a commercial AC power supply via a shared power supply wiring. The amount of electric power supplied to each power consuming dwelling is managed by a power management device. The power management device manages a surplus power amount of one power consuming dwelling and a required electric power amount of another power consuming dwelling and supplies the surplus power from the former power consuming dwelling to the latter power consuming dwelling via the power supply wiring. | 2012-08-30 |
20120221492 | MODEL HOME AND METHODS OF USE THEREOF - A model home can include common features with one or more homes being offered for sale. Typically, the common features are energy-efficient features. The model home can include one or more partially exposed features configured to reveal to prospective buyers the common features of the model home and the homes being offered for sale. The partially exposed features can include, for example, exposing the interior construction of portions of the model home, such as the interior construction of one or more walls. The partially exposed features of the model home can assist the prospective buyers understand the benefits that the common features provide, thereby encouraging the prospective buyers' interest in the homes being offered for sale. | 2012-08-30 |
20120221493 | USER BEHAVIOR-BASED REMOTELY-TRIGGERED AUTOMATED ACTIONS - An action is triggered by receiving information related to a predicted destination of a user, accessing a library that maps user actions to destinations, determining that at least one of the destinations in the library corresponds with the predicted destination of the user and at least one of the destinations in the library, identifying a user action, within the library, that is associated with the destination determined to correspond with the predicted destination of the user, and triggering the user action. | 2012-08-30 |
20120221494 | REGULAR EXPRESSION PATTERN MATCHING USING KEYWORD GRAPHS - Expanding a regular expression set into an expanded expression set that recognizes a same language as the regular expression set and includes more expressions than the regular expression set, with less operators per expression includes: logically connecting the expressions in the regular expression set; parsing the expanded expression set; transforming the parsed expanded expression set into a Glushkov automata; transforming the Glushkov automata into a modified deterministic finite automaton in order to maintain fundamental graph properties; combining the modified DFA into a keyword graph using a combining algorithm that preserves the fundamental graph properties; and computing an Aho-Corasick fail function for the keyword graph using a modified algorithm to produce a modified Aho-Corasick graph with a goto and a fail function and added information per state. | 2012-08-30 |
20120221495 | DIGITAL WEIGHT LOSS AID - A health management system provides instantaneous feedback as to the relationship of food items and exercise to one's fitness level, including one's weight. The health management system does not require the user to count calories, either on the intake or expenditure side of the weight loss paradigm. Rather, the health management system may use icons and graphic displays, without units, to provide a user-friendly interface. The health management system can integrate weight, food intake and activity and can learn the individual's unique response to each element to predict the direction of weight gain or loss. | 2012-08-30 |
20120221496 | Text Classification With Confidence Grading - A computer implemented method and system is provided for classifying a document. A classifier is trained using training documents. A list of first words is obtained from the training documents. A prior probability is determined for each class of multiple classes. Conditional probabilities are calculated for the first words for each class. Confidence thresholds are determined. Confidence grades are defined for the classes using the confidence thresholds. A list of second words is obtained from the document. Conditional probabilities for the list of second words are determined from the calculated conditional probabilities for the list of first words. A posterior probability is calculated for each of the classes and compared with the determined confidence thresholds. Each class is assigned to one of the defined confidence grades based on the comparison. The document is assigned to one of the classes based on the posterior probability and the assigned confidence grades. | 2012-08-30 |
20120221497 | Regular Expression Processing Automaton - A method and corresponding apparatus are provided implementing a stage one of run time processing using Deterministic Finite Automata (DFA) and implementing a stage two of run time processing using Non-Deterministic Finite Automata (NFA) to find the existence of a pattern in a payload, such as the payload portion of an Internet Protocol (IP) datagram, or an input stream. | 2012-08-30 |
20120221498 | AGGREGATING AND NORMALIZING ENTERTAINMENT MEDIA - Disclosed are methods for making disparate entertainment media content (e.g., television or movies) from multiple sources available through a single interface of a user device. Content of varying data formats from multiple data sources are aggregated. Classifications of the media data are created which can include assigning content into clusters. The data are normalized, and attributes of the data are curated. Features also are provided to automatically synchronize, obtain, and update media content on the media sources and on client devices. Various ways of handling data aggregation and normalization issues associated with compiling media data also are described. | 2012-08-30 |
20120221499 | WORKLOAD LEARNING IN DATA REPLICATION ENVIRONMENTS - A method for replicating I/O performance in data replication environments, such as PPRC environments, is described. In selected embodiments, such a method includes monitoring I/O workload at a primary storage device over a period of time, such as a period of hours, days, or months. The method then generates learning data at the primary storage device describing the I/O workload over the selected time period. The learning data is replicated from the primary storage device to a secondary storage device. The method uses the learning data to optimize the secondary storage device to handle the I/O workload of the primary storage device. This will enable the secondary storage device to provide substantially the same I/O performance as the primary storage device in the event a failover occurs. | 2012-08-30 |
20120221500 | SYSTEMS AND METHODS FOR VALIDATING INTERPOLATION RESULTS USING MONTE CARLO SIMULATIONS ON INTERPOLATED DATA INPUTS - Embodiments relate to systems and methods for validating interpolation results using Monte Carlo simulations on interpolated data inputs. A database can store sets of operational data, such as financial, medical, climate or other information. For given data, a portion of the input data can be known or predetermined, while for a second portion can be unknown and subject to interpolation. The interpolation engine can generate a conformal interpolation function and interpolated input sets that map to a set of target output data. In aspects, in order to test the interpolated input data, the operator can initiate a Monte Carlo or other variational analysis using access a validation dialog. The Monte Carlo process can apply randomized perturbations to the values of the interpolated input variables, and track the results of that perturbation on the other interpolated inputs. A set of validation rules can be applied to those randomized results, to determine whether the remaining interpolated variables remain in conformance with expected ranges or values or demonstrate anomalous responses. | 2012-08-30 |
20120221501 | MOLECULAR PROPERTY MODELING USING RANKING - Methods and articles of manufacture for modeling molecular properties using data regarding the partial orderings of compound properties, or by considering measurements of compound properties in terms of partial orderings are disclosed. One embodiment provides for constructing such partial orderings from data that is not already in an ordered form by processing training data to produce a partial ordering of the compounds with respect to a property of interest. Another embodiment of the invention may process the modified training data to construct a model that predicts the property of interest for arbitrary compounds. | 2012-08-30 |
20120221502 | APPARATUSES, METHODS AND SYSTEMS FOR A DIGITAL CONVERSATION MANAGEMENT PLATFORM - The APPARATUSES, METHODS AND SYSTEMS FOR A DIGITAL CONVERSATION MANAGEMENT PLATFORM (“DCM-Platform”) transforms digital dialogue from consumers, client demands and, Internet search inputs via DCM-Platform components into tradable digital assets, and client needs based artificial intelligence campaign plan outputs. In one implementation, The DCM-Platform may capture and examine conversations between individuals and artificial intelligence conversation agents. These agents may be viewed as assets. One can measure the value and performance of these agents by assessing their performance and ability to generate revenue from prolonging conversations and/or ability to effect sales through conversations with individuals. | 2012-08-30 |
20120221503 | SYSTEMS AND METHODS FOR GENERATING INTERPOLATION DATA TEMPLATE TO NORMALIZE ANALYTIC RUNS - Embodiments relate to systems and methods for generating an interpolation data template to normalize analytic runs. A database can store sets of operational data, such as financial, medical, climate or other information. For given data, a portion of the input data can be known or predetermined, while for a second portion can be unknown and subject to interpolation. The interpolation engine can generate a conformal interpolation function and interpolated input sets that map to a set of target output data. In aspects, an interpolation history database can stores results of a variety of interpolation studies or results, from which a set of interpolation templates can be derived. The templates can reflect trends or patterns discovered or displayed in the historical interpolation results, for instance, to produce expected values for different variables based on averages, thresholds, or other criteria applied to the historical results. New interpolation studies can apply data-selected templates chosen to match their operative data, and produce normalized data as the interpolation results themselves, or provide a starting point for further interpolation processing. | 2012-08-30 |
20120221504 | COMPUTER IMPLEMENTED INTELLIGENT AGENT SYSTEM, METHOD AND GAME SYSTEM - A Computer Implemented Intelligent Agent System, Method and Game System are disclosed. Intelligent agent systems are configured to have a long-term and a short term memory in a data repository. The data repository encodes data on a plurality of behavioural attributes for the intelligent agent, each of the plurality of behavioural attributes comprising a value within a predetermined range, the relative position of the value in the range defining the relative behavioural state of the intelligent agent. A processor is configured to execute computer program code to execute an artificial intelligence module, including computer program code configured to receive an input, computer program code configured to access the data repository in dependence on the input to obtain a state of the intelligent agent with respect to the input and, computer program code configured to process the input in dependence on the obtained state and determine an output. | 2012-08-30 |
20120221505 | Recommendation network - A recommendation network is described. In some embodiments, the recommendation network includes recommenders that explicitly or implicitly recommend, rate or refer items and recommendation receivers that receive the recommendations. In some embodiments, the recommenders can be recommendation receivers, and vice versa. In some embodiments, recommendation receivers assign rust ratings to recommenders. The recommendation receiver can assign separate trust ratings to individual topics for which the recommendation receiver trusts the recommender. The separate trust ratings represent the recommendation receiver's amount of trust in the recommender to makes valuable recommendations for the specific topic. The recommendation network can use the separate trust ratings, along with ratings provided by the recommender, to rank recommendations per the separate topics. The recommendation receiver can assign the recommender to different bundles, topics, channels, etc. to which other recommendation receivers can subscribe. | 2012-08-30 |
20120221506 | Method for quantifying amplitude of a response of a biological network - One or more measurement signatures are derived from a knowledge base of casual biological facts, where a signature is a collection of measured node entities and their expected directions of change with respect to a reference node. The knowledge base may be a directed network of experimentally-observed casual relationships among biological entities and processes, and a reference node represents a perturbation. A degree of activation of a signature is then assessed by scoring one or more “differential” data sets against the signature to compute an amplitude score. The amplitude score quantifies fold-changes of measurements in the signature. In one particular embodiment, the amplitude score is a weighted average of adjusted log-fold changes of measured node entities in the signature, wherein an adjustment applied to the log-fold changes is based on their expected direction of change. In an alternative embodiment, the amplitude score is based on quantity effects. | 2012-08-30 |
20120221507 | DECLARATIVE UPDATE TO A LIVE SYSTEM - A live system manager may retrieve a current state of the live system, allow a user to edit the state, and generate a set of incremental commands that modify the current state into a desired state. The set of incremental commands may be then executed to create the desired state. In some embodiments, the set of incremental commands may be executed as a transaction. The live system manager may compare the current state to a desired state to generate the incremental commands, and may perform various validation operations during operation. A user may be presented options at various points to disambiguate the user's intentions. | 2012-08-30 |
20120221508 | SYSTEMS AND METHODS FOR EFFICIENT DEVELOPMENT OF A RULE-BASED SYSTEM USING CROWD-SOURCING - Described herein are methods, systems, apparatuses and products for efficient development of a rule-based system. An aspect provides a method including accessing data records; converting said data records to an intermediate form; utilizing intermediate forms to compute similarity scores for said data records; and selecting as an example to be provided for rule making at least one record of said data records having a maximum dissimilarity score indicative of dissimilarity to already considered examples. | 2012-08-30 |
20120221509 | DETERMINING A DATA MAPPING RELATIONSHIP BETWEEN DATABASE TABLES - A method and apparatus for determining a data mapping relationship between a source database table and a target database table are included. The method includes obtaining attribute values of an attribute other than a primary key and corresponding primary key value sets from plural rows of data in a source database table, and obtaining attribute values of a specific attribute other than a corresponding primary key and corresponding primary key value sets from plural rows of data in the target database table. A determination is made as to whether the attribute of the source database table and the specific attribute of the target database table have a potential data mapping relationship. If the determination is affirmative, a data mapping relationship is determined therebetween. | 2012-08-30 |
20120221510 | METHOD AND SYSTEM FOR VALIDATING DATA - A method and system for validating data. Warehouse data is generated by transforming source data via an ETL transformation model. A data cube is generated by transforming the warehouse data via an OLAP transformation model. A report dataset (MDS | 2012-08-30 |
20120221511 | SYSTEM AND METHOD FOR ANALYZING DATA IN A REPORT - A method and a system for analyzing a data value of interest in a multidimensional database. The data value of interest is first identified in a structured report. The data source for the structured report is retrieved. A context for the data value of interest in the data source is collected, for example, by extracting a slicer from the structured report, by extracting members of master-detail pages, or by extracting a default measure from the structured report. An analysis specification based on the collected context is then built, and the data value of interest is analyzed using the analysis specification. The result from analyzing the data value of interest may be presented in an analysis view. | 2012-08-30 |
20120221512 | DYNAMIC DATABASE DUMP - Controlling a dump for a database by determining a state of a diagnosis flag associated with the structured query language (SQL) statement in response to a SQL statement being executed for the database. The diagnosis flag is used to indicate if a database dump should be performed. A database dump is performed for the SQL statement in response to determining that the diagnosis flag indicates that a dump is to be performed. | 2012-08-30 |
20120221513 | TRANSACTIONALLY CONSISTENT REPLAY OF APPLICATION WORKLOADS - A database system providing transactionally consistent replay of application workloads. In a database system, a method providing transactionally consistent replay of application workloads comprises the steps of: during a replay phase in which a plurality of application requests that were previously submitted to an application server system during a capture phase are being replayed, receiving, at a database server, a database request to execute a database command against a database. The database request specifies an application request identifier that identifies a particular application request of the plurality of application requests. The particular application request caused the database command to be executed previously during the capture phase. In response to receiving the database request, determining, based on the application request identifier in the database request, whether to delay execution of the database command at least until a particular replay-phase database transaction has been committed. | 2012-08-30 |
20120221514 | METHOD FOR IMPROVING THE RESPONSIVENESS OF A CLIENT DEVICE - A method for improving the responsiveness of a client application by providing that application with a local database which is a replicated subset of a database held on a remote server. | 2012-08-30 |
20120221515 | SYNCHRONIZATION METHODS AND SYSTEMS - Synchronization architectures, methods, systems, and computer readable media are described. One exemplary embodiment includes a first software component configured to cause retrieval and storage of structured data for a first data class from a first store on a device, such as a first data processing system, and configured to synchronize structured data for the first data class in the first store with structured data of the first data class in a second store on a host, such as a second data processing system. The first software component is separate from an application software which provides a user interface to allow a user to access and edit the structured data. The first software component synchronizes the structured data through a second software component which interfaces with the host and the device and which controls an order of synchronizing and a plurality of data classes including the first data class. | 2012-08-30 |
20120221516 | CONTINUOUSLY AVAILABLE PROGRAM REPLICAS - A method for replicating a program and data storage according to one embodiment comprises sending program replication data from a first program to a second program, the second program having an application program that is a replica of an application program of the first program; sending data storage requests from the first program to a first storage system; and replicating data stored in the first storage system in a second storage system. Additional methods, systems, and computer program products are disclosed. | 2012-08-30 |
20120221517 | Temporary Session Data Storage - A system according to an embodiment includes at least one server located at one or more distributed locations, one or more processors, and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the system to: store data in the at least one server as time based data for a predetermined duration; and allow retrieval of the stored data; wherein if the time based data is accessed within the predetermined duration, at least one time operation is triggered, and if the time based data is not accessed within the predetermined duration, the time based data is removed, wherein a primary copy of the data is stored in a primary server and a secondary copy, which is a replicate of the primary copy, is stored in zero or more secondary server(s). | 2012-08-30 |
20120221518 | DYNAMICALLY REDIRECTING A TARGET LOCATION DURING A FILE I/O OPERATION - A file I/O operation is initiated to store a result of a file I/O operation in a destination file. In response to the file I/O operation being in progress, an amount of the file I/O operation currently completed is monitored. In response to determining that the amount of the file I/O operation currently completed is less than a threshold amount, another destination file is specified through a user interface, in which to store a result of file I/O operation not yet completed. The file I/O operation stores the remaining result of the file I/O operation at the another destination file. A single file handle is updated for the result of the file I/O operation to reference the destination file comprising the portion of the result and the another destination file comprising the remaining result. | 2012-08-30 |
20120221519 | APPLICATION WORKLOAD CAPTURE AND REPLAY SYSTEM - An application workload capture and replay system with a transactionally consistent application workload replay feature is provided. More particularly, the feature includes capture-phase components for capturing and recording a real application workload submitted to a production web application system and includes replay-phase components for replaying the captured application workload against a test web application system in a transactionally consistent manner. The feature provides guarantees about the order of database transactions that are caused when the workload is replayed such that there is a consistency between the replay-phase order of the database transactions and the order of those transactions that occurred when the workload was captured. These consistency guarantees facilitate a faithful reproduction of database changes observed in the production web application system in the test web application system using a captured real application workload. Significantly, this faithful reproduction may be accomplished without having to create a synthetic application workload that approximates or emulates the transactional behavior of the real application workload. Instead, a real application workload may be used as or substantially as it is captured. | 2012-08-30 |
20120221520 | SOCIAL NETWORKING CONTENT MANAGEMENT - A machine-controlled method may include receiving a file in a designated shared folder on a local device, automatically providing access to the file to a social networking website or service, and directing the social networking website or service to make the file available to users that are allowed to access a particular user account at the social networking website. | 2012-08-30 |
20120221521 | WORKLOAD LEARNING IN DATA REPLICATION ENVIRONMENTS - A method for replicating I/O performance in data replication environments, such as PPRC environments, is described. In selected embodiments, such a method includes monitoring I/O workload at a primary storage device over a period of time, such as a period of hours, days, or months. The method then generates learning data at the primary storage device describing the I/O workload over the selected time period. The learning data is replicated from the primary storage device to a secondary storage device. The method uses the learning data to optimize the secondary storage device to handle the I/O workload of the primary storage device. This will enable the secondary storage device to provide substantially the same I/O performance as the primary storage device in the event a failover occurs. A corresponding system and computer program product are also disclosed and claimed herein. | 2012-08-30 |
20120221522 | SYNCHRONIZATION OF DATA BETWEEN SYSTEMS - A computer hardware system for synchronization of data between a first data system and a second data system includes an event propagation processor. Both data systems are modeled as a collection of representation state transfer (REST) resources. The event propagation processor is configured to integrate data between the first and second data systems for events about data changes in the data systems. The processor includes an adaptation layer in the form of an HTTP (Hypertext Transfer Protocol) facade to represent REST resources. The adaptation layer includes a provider component configured to provide access to data resources in one of the data systems, and an initiator component configured to emit events corresponding to data changes in one of the data systems. | 2012-08-30 |
20120221523 | Database Backup and Restore with Integrated Index Reorganization - According to an embodiment of the present invention, a method for reorganizing a source index tree of a database table resulting in a target index tree of the database table is provided. A backup process reads source leaf pages of the source index tree in a logical order defined by a sequence of index keys. The logical order can be different from a physical order of the source leaf pages defined by a sequence of respective storage locations. The backup process constructs target leaf pages of the target index tree maintaining the logical order. A restore process constructs target non-leaf pages of the target index tree based on the distribution of the index keys among the constructed leaf pages and stores the target leaf and non-leaf pages. | 2012-08-30 |
20120221524 | STORAGE OF DATA WITH COMPOSITE HASHES IN BACKUP SYSTEMS - In one example, a method may include performance of a hash function on a digital sequence so as to generate a hash value that corresponds to the digital sequence. Next, the digital sequence may be broken into data pieces, and each data piece hashed to produce a corresponding hash value for each data piece. Then, a recipe may be produced that includes instructions which, when executed, may generate the digital sequence from the data pieces referenced by their corresponding hash values included in the recipe. Among other things, the hash values may enable reutilization of redundant data sequences by serving as pointers to the data pieces that the hash values respectively represent. | 2012-08-30 |
20120221525 | AUTOMATIC SELECTION OF SOURCE OR TARGET DEDUPLICATION - Techniques for selecting between source and target deduplication include analyzing resource information related to resources available for deduplication, analyzing backup metadata of a backup job containing formation related to backup of data from the source to the target, and selecting between deduplication on the source or the target based on the analyzed resource information and the backup metadata. | 2012-08-30 |
20120221526 | SYSTEM AND METHOD FOR PROVIDING SERVER APPLICATION SERVICES WITH HIGH AVAILABILITY AND A MANY-TO-ONE HARDWARE CONFIGURATION - A suite of network-based services, such as the services corresponding to the server application distributed by Microsoft® SharePoint™, may be provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, help and help search functions, and/or other functions. A plurality of computing devices functioning as servers may be backed up by a single computing device. | 2012-08-30 |
20120221527 | Multiplex Backup Using Next Relative Addressing - According to one embodiment of the present disclosure, a method for multiplex backup using next relative addresses may be provided. The method may include receiving a first chunk and a second chunk that are each associated with a first file. A next relative address may be appended to the first chunk. The next relative address may indicate a position in a storage device. The first chunk with the next relative address may be written to the storage device at a first address. The method may further include writing the second chunk to the storage device at the position indicated by the next relative address of the first chunk. | 2012-08-30 |
20120221528 | LOGGING SCHEME FOR COLUMN-ORIENTED IN-MEMORY DATABASES - According to some embodiments, a column-oriented in-memory database structure may be established. The database structure may, for example, include a main store and a dictionary compressed delta store. Moreover, the delta store may comprise a value identifier vector and a delta dictionary associated with a column of the database. A transaction associated with the column may then be received and recorded within the delta store. According to some embodiments, entries associated with the transaction may be added to a value log of the value identifier vector and, independently, to a dictionary log of the delta dictionary. | 2012-08-30 |
20120221529 | VIRTUAL MACHINE DATA REPLICATION - Disclosed is a method and system for selectively restoring file-level data from a disk image backup. In embodiments, a virtual machine backup may be performed by dividing a virtual machine virtual disk file into a plurality of discrete fixed-sized data blocks sharing a common index file that is stored on a backup medium, such as a hard drive, to form a backup set. Upon restoration of data from the backup set, individual blocks of the data set are compared to corresponding blocks of the target virtual machine fide. Redundant data and unchanged blocks are skipped, and only those block which have changed are restored to the target file. In this manner network bandwidth and processor resources are conserved, and replication times decreased. | 2012-08-30 |
20120221530 | METHOD AND APPARATUS FOR VERIFYING STORED DATA - According to one aspect of the present invention, there is provided a method of verifying stored data that is associated with an owner. The method comprises selecting stored data to verify, generating, for an item of the selected data a unique key, associating the generated key with the corresponding data item and sending a communication to the owner associated with a selected data item, the communication including the generated key associated with that selected data item. The method further comprises receiving a response to the communication, the response identifying a key, determining from the response whether the data associated with the received key is valid; and associating the determination with the data in the database. | 2012-08-30 |
20120221531 | BOTTOM-UP OPTIMISTIC LATCHING METHOD FOR INDEX TREES - Methods, systems and computer program products for concurrency control in a hierarchical arrangement of nodes of a data structure by traversing a single search path in a hierarchical arrangement of nodes of a data structure, recording a version number for each node in the search path, identifying at least one node in the search path to be updated, latching the at least one node, reading a version number of the latched at least one node and comparing the recorded version number of the latched at least one node to the read version number of the latched at least one node. | 2012-08-30 |
20120221532 | INFORMATION APPARATUS - The present invention enables a unified way of accessing files generated by application programs configured to store contents in files in different formats, without using a conversion program. | 2012-08-30 |
20120221533 | HIERARCHICAL DATA COMPRESSION TESTING - A hierarchical compression tester and associated method stored in a computer readable medium employs a grid-based storage capacity wherein a storage unit is defined by a grouping of data blocks. Each data block is stored in one of a plurality of storage devices. Each stored data block has a data portion and a data integrity field (DIF) including a data reliability qualifier (DRQ) indicating whether the respective data portion is valid. The tester also has a logical device allocation map that includes a storage unit descriptor array that identifies one or more storage units corresponding to a selected logical address. The logical device allocation map has a DIF array that identifies whether any of the data blocks in the one or more storage units corresponding to the selected logical address includes invalid data. | 2012-08-30 |
20120221534 | DATABASE INDEX MANAGEMENT - Managing database indexes includes creating a main index and creating at least one service index that is configured for recording a change to a node to be updated in the main index. Managing database indexes also includes detecting whether an operation that involves the main index and is performed on the database appears in the database, and maintaining the main index using at least one service index in response to the operation that involves the main index and is performed on the database, appearing in the database. The maintaining is performed based on changes to a node to be updated in the main index that are recorded in the at least one service node. | 2012-08-30 |
20120221535 | Auditing Database Access In A Distributed Medical Computing Environment - Methods, systems, and computer program products are provided for auditing database access in a distributed medical computing environment including receiving from a user a query of one or more databases within the distributed medical administration computing environment; determining by an audit manager in dependence upon audit policies for the medical computing environment whether any of the results of the query require auditing access; and if any of the results of the query require auditing access, creating an audit record and storing the audit record in an audit database. | 2012-08-30 |