Patent application number | Description | Published |
20110277033 | Identifying Malicious Threads - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for identifying and processing malicious threads In one aspect, a method includes identifying a memory heap block; identifying threads that reside in the memory heap block; determining whether at least one of the identified threads in the memory heap block is a malicious thread; and in response to determining that at least one of the identified threads is a malicious thread, terminating each of the identified threads | 11-10-2011 |
20130247182 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING HIDDEN OR MODIFIED DATA OBJECTS - A system, method, and computer program product are provided for detecting hidden or modified data objects. In use, a first set of data objects stored in a device is enumerated, where the enumeration of the first set of data objects is performed within an operating system of the device. Additionally, a second set of data objects stored in the device is enumerated, where the enumeration of the second set of data objects is performed outside of the operating system of the device. Further, the first set of data objects and the second set of data objects are compared for identifying hidden or modified data objects. | 09-19-2013 |
20130312095 | IDENTIFYING ROOTKITS BASED ON ACCESS PERMISSIONS - A method for monitoring for malware includes, during a boot process on an electronic device, determining a portion of memory, determining that the portion of memory is reserved for exclusive access by an entity on the electronic device, and, based on the determination that a portion of memory is reserved for exclusive access during the boot process, determining that the reservation is indicative of malware. | 11-21-2013 |
20130312098 | NEGATIVE LIGHT-WEIGHT RULES - A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system resources of the electronic device. The method also includes identifying the first attempt and second attempt as representing a potential malware attack, comparing the sequence of the first attempt and second attempt against a first anti-malware rule, and, based on the comparison of the sequence of the first attempt and second attempt against the first anti-malware rule, allowing the second attempt. The first attempt and second attempt originate from code of the same operating entity. The first anti-malware rule includes a requirement of a sequence of attempts including the first attempt followed by the second attempt. | 11-21-2013 |
20130312099 | Realtime Kernel Object Table and Type Protection - A method for detecting malware includes determining one or more object-oriented components of an electronic device, trapping at a level below all of the operating systems of the electronic device an attempt to access an object-oriented component of the electronic device, determining an entity causing the attempt, accessing one or more security rules, and, based on the security rules, the entity causing the attempt, and the object-oriented component, determining whether the attempted access is indicative of malware. | 11-21-2013 |
20140115652 | Real-Time Module Protection - Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections. | 04-24-2014 |
Patent application number | Description | Published |
20100187848 | BUS STRETCHER CONVERSION KIT - A framework for supporting stretchers and method of assembling includes a sub-frame having an adjustable length header bar assembly and adjustable height outer frame legs connected to opposing ends of the header bar assembly. A secondary stretcher support is positioned laterally interior of and parallel with each outer frame leg, each of the secondary stretcher support and outer frame leg including stretcher holders. Interframe connectors are transversely positioned between pairs of sub-frames and pairs of secondary stretcher supports. Stretcher handles seat in the stretcher holder and the secondary stretcher support. The framework is configured to fit within varying dimensions of a mass transit vehicle and can be a component of a vehicle conversion kit. The kit can further include tools for assembling the framework, assembly instructions, and a crate for storing and transporting at least the framework, supports, tools, and assembly instructions. | 07-29-2010 |
20110198877 | BUS STRETCHER CONVERSION KIT - A framework for supporting stretchers and method of assembling includes a sub-frame having an adjustable length header bar assembly and adjustable height outer frame legs connected to opposing ends of the header bar assembly. A secondary stretcher support is positioned laterally interior of and parallel with each outer frame leg, each of the secondary stretcher support and outer frame leg including stretcher holders. Interframe connectors are transversely positioned between pairs of sub-frames and pairs of secondary stretcher supports. Stretcher handles seat in the stretcher holder and the secondary stretcher support. The framework is configured to fit within varying dimensions of a mass transit vehicle and can be a component of a vehicle conversion kit. The kit can further include tools for assembling the framework, assembly instructions, and a crate for storing and transporting at least the framework, supports, tools, and assembly instructions. | 08-18-2011 |
20120153657 | BUS STRETCHER CONVERSION KIT - A framework for supporting stretchers and method of assembling includes a sub-frame having an adjustable length header bar assembly and adjustable height outer frame legs connected to opposing ends of the header bar assembly. A secondary stretcher support is positioned laterally interior of and parallel with each outer frame leg, each of the secondary stretcher support and outer frame leg including stretcher holders. Interframe connectors are transversely positioned between pairs of sub-frames and pairs of secondary stretcher supports. Stretcher handles seat in the stretcher holder and the secondary stretcher support. The framework is configured to fit within varying dimensions of a mass transit vehicle and can be a component of a vehicle conversion kit. The kit can further include tools for assembling the framework, assembly instructions, and a crate for storing and transporting at least the framework, supports, tools, and assembly instructions. | 06-21-2012 |
Patent application number | Description | Published |
20100303205 | System and Method for Radiation Therapy Imaging and Treatment Workflow Scheduling and Optimization - External beam radiotherapy treatment workflow scheduling and optimization. The system and method provides for determining a workflow metamodel, receiving a treatment plan, determining a treatment schedule corresponding to the workflow metamodel and treatment plan, taking into account saftety by determining alternative treatment schedules, computing a safety index, and selecting one alternative treatment schedule that satisfies a safety threshold and that provides an optimal schedule. | 12-02-2010 |
20120022689 | System and Method for Robot Safety and Collision Avoidance - A system and method for developing an intrusion detection zone substantially surrounding mobile components of a robot, training a model of the robot to accept selected intrusions into the intrusion detection zone, and, during application operations, triggering an application interrupt upon detecting an unexpected intrusion. | 01-26-2012 |
20120101613 | Method and Apparatus for Integrated Simulation - In an automated system which includes a robot manipulator, a workcell, and a control system implemented on a hardware platform based on a programmable logic controller (“PLC”), a method and apparatus for performing integrated simulation that does not require the presence of both the robot manipulator and the workcell. If one component is real, the other component is simulated so as to be sufficiently responsive to responses from the real component such that the real component is unable to discern that the other component is not also real. A computing device simultaneously displays simulacra of both the components, real and simulated, and visualizations of the responses provided by each. | 04-26-2012 |
20120290130 | Method to Model and Program a Robotic Workcell - An improved method to model and program a robotic workcell. Two-dimensional (2D) images of a physical workcell are captured to facilitate, in part, initial integration of any preexisting three-dimensional (3D) component models into a 3D model workcell. 3D models of other essential workcell components are synthesized and integrated into the 3D workcell model. The robot is then configured and programmed. The resultant 3D workcell model more faithfully reflects the “as-built” workcell than a traditional model that represents the “as-designed” workcell. | 11-15-2012 |
Patent application number | Description | Published |
20080282494 | Modular robot - A coverage robot including a chassis, multiple drive wheel assemblies disposed on the chassis, and a cleaning assembly carried by the chassis. Each drive wheel assembly including a drive wheel assembly housing, a wheel rotatably coupled to the housing, and a wheel drive motor carried by the drive wheel assembly housing and operable to drive the wheel. The cleaning assembly including a cleaning assembly housing, a cleaning head rotatably coupled to the cleaning assembly housing, and a cleaning drive motor carried by cleaning assembly housing and operable to drive the cleaning head. The wheel assemblies and the cleaning assembly are each separately and independently removable from respective receptacles of the chassis as complete units. | 11-20-2008 |
20090007366 | Coverage Robot Mobility - An autonomous coverage robot includes a body having at least one outer wall, a drive system disposed on the body and configured to maneuver the robot over a work surface, and a cleaning assembly carried by the body. The cleaning assembly includes first and second cleaning rollers rotatably coupled to the body, a suction assembly having a channel disposed adjacent at least one of the cleaning rollers, and a container in fluid communication with the channel. The container is configured to collect debris drawn into the channel. The suction assembly is configured to draw debris removed from the work surface by at least one of the cleaning rollers into the channel, and the container has a wall common with the at least one outer wall of the body. | 01-08-2009 |
20120173064 | Modular Robot - A coverage robot including a chassis, multiple drive wheel assemblies disposed on the chassis, and a cleaning assembly carried by the chassis. Each drive wheel assembly including a drive wheel assembly housing, a wheel rotatably coupled to the housing, and a wheel drive motor carried by the drive wheel assembly housing and operable to drive the wheel. The cleaning assembly including a cleaning assembly housing, a cleaning head rotatably coupled to the cleaning assembly housing, and a cleaning drive motor carried by cleaning assembly housing and operable to drive the cleaning head. The wheel assemblies and the cleaning assembly are each separately and independently removable from respective receptacles of the chassis as complete units. | 07-05-2012 |
Patent application number | Description | Published |
20080229415 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 09-18-2008 |
20080262990 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 10-23-2008 |
20080262991 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 10-23-2008 |
20120017262 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 01-19-2012 |
20120240185 | SYSTEMS AND METHODS FOR PROCESSING DATA FLOWS - A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks. | 09-20-2012 |
Patent application number | Description | Published |
20080208806 | Techniques for a web services data access layer - Techniques for a web services data access layer are described. An apparatus may comprise a client device having an application program, a data access layer, and a client data store. The data access layer may comprise a cache manager component and a queue manager component. The application program may request an operation for an office business entity, with the cache manager component to perform the operation using data stored by the client data store. The queue manager component may store the operation in an operational queue. Other embodiments are described and claimed. | 08-28-2008 |
20080222654 | Techniques to manage event notifications - Techniques to manage event notifications are described. An apparatus may comprise a server having an event notification component. The event notification component may have an event agent component to receive a message indicating a change event for line of business (LOB) data, and convert the change event to a defined LOB entity event. The event notification component may have a notification service component to generate a LOB event message for the entity event. The event notification component may have an event database to store the event message in a user event queue. Other embodiments are described and claimed. | 09-11-2008 |
20120303632 | COMPUTERIZED SEARCHABLE DOCUMENT REPOSITORY USING SEPARATE METADATA AND CONTENT STORES AND FULL TEXT INDEXES - A computerized searchable repository stores documents as structured metadata parts and unstructured content parts using single instancing. A full text index used for keyword searching includes a metadata index and a content index. A linking structure includes metadata-to-content (MD to CT) links and content-to-metadata (CT to MD) linking entries, with each MD to CT link linking a metadata part of a document to each content part of the document, and each CT to MD linking entry having one or more CT to MD links collectively linking a content part to the metadata parts of the documents that include the content part. Indexing includes metadata indexing a metadata part, conditionally content indexing a content part, and updating the linking structure. Content indexing is performed only if the content part does not match a content part already stored and indexed. Index entries each associate a key word or key value with corresponding metadata or content parts containing the key word or key value. Updating the linking structure includes generating new MD to CT and CT to MD links between the metadata part and either the new content part or an existing matching content part if present. | 11-29-2012 |
20130290266 | DOCUMENT-TYPE AND CAPTURE METHOD AGNOSTIC VERSIONING OF AN ARCHIVED DOCUMENT - Versioning of an archived document having at least one of a first element, a second element, and a third element, is managed. The first element is mapped to a source set identifier, the second element is mapped to a first source identifier, and/or the third element is mapped to a second source identifier. The source set identifier, the first source identifier, and the second source identifier are agnostic to a type of the document and a method in which the document is captured. A determination is made as to whether the document comprises a copy of an existing document in an archive, a new version of an existing document in the archive, or a new document to be stored in the archive based upon an analysis of the mapped at least one of the source set identifier, the first source identifier, and the second source identifier. | 10-31-2013 |
20130290334 | MANAGING STORAGE OF DATA ACROSS DISPARATE REPOSITORIES - In a method for managing storage of data across a plurality of disparate repositories, a partitioning strategy for storing the data into a plurality of partitions in at least one of a plurality of disparate repositories is acquired based upon a characteristic of the data. In addition, global metadata that, describes the partitioning strategy is acquired and the global metadata is implemented in a plurality of disparate repositories to enable performance of the partitioning strategy in storing the data in the plurality of partitions across the plurality of disparate repositories in a location agnostic manner. | 10-31-2013 |
Patent application number | Description | Published |
20140182683 | EXHAUST FLOW MODIFIER, DUCT INTERSECTION INCORPORATING THE SAME, AND METHODS THEREFOR - A duct intersection comprising a first duct portion and a second duct portion extending laterally from a side of the first duct portion. At least one flow modifier is mounted inside one of the first and second duct portions. The flow modifier is a contoured duct liner and/or the flow modifier includes at least one turning vane. The duct intersection may also include a transition portion extending between the first and second duct portions, wherein the transition portion has a length extending along a side of the first duct portion and a depth extending away from the side of the first duct portion, wherein the length is greater than a diameter of the second duct portion. | 07-03-2014 |
20140183023 | SYSTEMS AND METHODS FOR CONTROLLING AIR DISTRIBUTION IN A COKE OVEN - The present technology is generally directed to systems and methods for controlling air distribution in a coke oven. In a particular embodiment, a coke oven air distribution system comprises an oven chamber having an oven floor configured to support a coal bed, a plurality of sidewalls extending upward from the oven floor, and an oven crown covering a top portion of the oven chamber. The air distribution system further includes an air inlet positioned above the oven floor and a distributor proximate to the inlet. The inlet is configured to introduce air into the oven chamber and the distributor is configured to at least one of preheat, redirect, or spread air within the oven chamber. | 07-03-2014 |
20140183024 | NON-PERPENDICULAR CONNECTIONS BETWEEN COKE OVEN UPTAKES AND A HOT COMMON TUNNEL, AND ASSOCIATED SYSTEMS AND METHODS - The present technology is generally directed to non-perpendicular connections between coke oven uptakes and a hot common tunnel, and associated systems and methods. In some embodiments, a coking system includes a coke oven and an uptake duct in fluid communication with the coke oven. The uptake duct has an uptake flow vector of exhaust gas from the coke oven. The system also includes a common tunnel in fluid communication with the uptake duct. The common tunnel has a common flow vector and can be configured to transfer the exhaust gas to a venting system. The uptake flow vector and common flow vector can meet at a non-perpendicular interface to improve mixing between the flow vectors and reduce draft loss in the common tunnel. | 07-03-2014 |
20140262139 | METHODS AND SYSTEMS FOR IMPROVED QUENCH TOWER DESIGN - The present technology describes methods and systems for an improved quench tower. Some embodiments improve the quench tower's ability to recover particulate matter, steam, and emissions that escape from the base of the quench tower. Some embodiments improve the draft and draft distribution of the quench tower. Some embodiments include one or more sheds to enlarge the physical or effective perimeter of the quench tower to reduce the amount of particulate matter, emissions, and steam loss during the quenching process. Some embodiments include an improved quench baffle formed of a plurality of single-turn or multi-turn chevrons adapted to prevent particulate matter from escaping the quench tower. Some embodiments include an improved quench baffle spray nozzle used to wet the baffles, suppress dust, and/or clean baffles. Some embodiments include a quench nozzle that can fire in discrete stages during the quenching process. | 09-18-2014 |
Patent application number | Description | Published |
20130116584 | Biometric front-end recorder system - A stethoscope front-end recorder device (also referred to as Sleeve) for the chest piece of a stethoscope, which is easily installed and removed. The Sleeve covers the circumference of the chest piece of a stethoscope. The Sleeve contains sensors for acquiring biosensor parameters such as electrocardiogram, body temperature, heartbeat, heart rhythm, heart rate variability, heart rate turbulence, heart sounds, respiration, cardiac index and blood flow. The Sleeve has Bluetooth interface communicating with a mobile device with software component, interfacing with a back-end server with the capability to capture, analyze and save patient information. | 05-09-2013 |
20130158423 | Mobile wellness device - The invention is directed to a system for acquiring electrical footprint of the heart, electrocardiogram (EKG or ECG) and heart rate variability monitoring, incorporated into a mobile device accessory. The ECG signal is conveniently acquired and transmitted to a server via the mobile device, offering accurate heart rate variability biofeedback measurement which is portable and comfortable during normal daily life. The invention provides a reliable tool for applications such as wellness, meditation, relaxation, sports and fitness training, and stress-relief therapy where accurate heart rate variability measurement is desired. | 06-20-2013 |
20150057512 | Wearable heart failure monitor patch - The invention is directed to a system for acquiring electrical footprint of the heart, electrocardiogram (EKG or ECG), heart sound, heart rate, nasal airflow and pulse oximetry incorporated into a mobile device accessory. The ECG and heart sound signals are conveniently acquired and transmitted to a server via the mobile device, offering accurate heart failure analysis, and sleep disorder breathing indication. | 02-26-2015 |
20150065814 | Mobile front-end system for comprehensive cardiac diagnosis - A stethoscope front-end recorder device (also referred to as Sleeve) for the chest piece of a stethoscope, which is easily installed and removed. The Sleeve is attached to the chest piece of a stethoscope for comprehensive diagnosis of heart issues. The Sleeve contains sensors for acquiring biosensor parameters such as electrocardiogram, body temperature, heartbeat, heart rhythm, heart rate variability, heart rate turbulence, heart sounds, respiration, cardiac index and blood flow. The Sleeve has Bluetooth interface communicating with a mobile device with software component, interfacing with a back-end server with the capability to capture, analyze and save patient information. | 03-05-2015 |
Patent application number | Description | Published |
20130046959 | METHOD AND APPARATUS FOR PERFORMING LOGICAL COMPARE OPERATION - A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. | 02-21-2013 |
20130046960 | METHOD AND APPARATUS FOR PERFORMING LOGICAL COMPARE OPERATION - A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. | 02-21-2013 |
20130166883 | METHOD AND APPARATUS FOR PERFORMING LOGICAL COMPARE OPERATIONS - A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. | 06-27-2013 |
20130166884 | METHOD AND APPARATUS FOR PERFORMING LOGICAL COMPARE OPERATIONS - A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. | 06-27-2013 |
20130227253 | METHOD AND APPARATUS FOR PERFORMING LOGICAL COMPARE OPERATIONS - A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location. | 08-29-2013 |
Patent application number | Description | Published |
20080298483 | Apparatus and method for symbol alignment in a multi-point OFDM/DMT digital communications system - A multi-point communications system is set forth herein. The communications system comprises a head end unit disposed at a primary site and a plurality of receivers disposed at remote sites. The head end unit includes a transmitter for transmitting OFDM/DMT symbols over a predetermined number of bins across a transmission medium. The OFDM/DMT symbols are transmitted in periodically occurring formatted symbol frames. The cyclic prefix includes a predetermined periodic signal superimposed thereon. The receivers receive the OFDM/DMT symbols over a subset of the predetermined number of bins from the transmission medium and use the superimposed signals to attain symbol alignment. Preferably, the superimposed signal is an impulse signal that varies in polarity throughout the transmission cycle and which is superimposed on one or more symbols occurring during a cyclic prefix of the formatted symbol frames. In accordance with a further aspect of the present invention, the receivers apply a predetermined incremental phase shift to received samples corresponding to the received OFDM/DMT symbols to thereby compensate for phase shifts resulting from the cyclic prefix. The multi-point communications system may include a similar system for aligning symbols transmissions from a remote service unit having a transmitter. Such a system includes a plurality of remote service units each including a transmitter for transmitting OFDM/DMT symbols over a predetermined number of bins across a transmission medium. Each of the plurality of remote service units is operable in a symbol alignment mode in which the transmitter transmits a broad band periodic signal. The head end unit includes a receiver for receiving the OFDM/DMT symbols, including the broad band periodic signal, from the transmission medium. The head end unit uses the time position of the broad band periodic signal to align the symbol transmissions of the remote service unit with other ones of the remote service units. | 12-04-2008 |
20100104035 | Apparatus and method for clock synchronization in a multi-point OFDM/DMT digital communications system - A multi-point communications system is set forth herein. The communications system comprises a transmitter for transmitting OFDM/DMT symbols over a predetermined number of bins across a transmission medium. The OFDM/DMT symbols are generated using at least one timing signal. At least one of the predetermined number of bins includes a pilot tone sub-symbol having a frequency corresponding to the clock signal. The communications system also includes a receiver for receiving the OFDM/DMT symbols from the transmission medium. The receiver demodulates the received symbols using at least one timing signal. The receiver has a first pilot tone search mode of operation in which the receiver adjusts its timing signal to scan the frequency range of the predetermined number of bins looking for the pilot tone sub-symbol and identifies the bin including the pilot tone sub-symbol. The receiver further has a subsequent second pilot tone acquisition mode in which the receiver adjusts the timing signal to receive the identified bin containing the pilot tone sub-symbol and measures phase differences between successive pilot tone sub-symbols to thereby perform a further adjustment of the timing signal so that the pilot tone sub-symbol is received within a frequency range sufficient for subsequent phase locked loop processing thereof. | 04-29-2010 |
20120219044 | APPARATUS AND METHOD FOR CLOCK SYNCHRONIZATION IN A MULTI-POINT OFDM/DMT DIGITAL COMMUNICATIONS SYSTEM - A multi-point communications system is set forth herein. The communications system includes a transmitter for transmitting OFDM/DMT symbols over a predetermined number of bins across a transmission medium. The OFDM/DMT symbols are generated using at least one timing signal. At least one of the predetermined number of bins includes a pilot tone sub-symbol having a frequency corresponding to a clock signal. The communications system may also include a receiver for receiving the OFDM/DMT symbols via the transmission medium. The receiver demodulates the received symbols using at least one timing signal. | 08-30-2012 |
20140112402 | APPARATUS AND METHOD FOR SYMBOL ALIGNMENT IN A MULTI-POINT OFDM/DMT DIGITAL COMMUNICATIONS SYSTEM - A multi-point communications system is set forth herein. The communications system comprises a head end unit disposed at a primary site and a plurality of receivers disposed at remote sites. The head end unit includes a transmitter for transmitting OFDM/DMT symbols over a predetermined number of bins across a transmission medium. The OFDM/DMT symbols are transmitted in periodically occurring formatted symbol frames. The cyclic prefix includes a predetermined periodic signal superimposed thereon. The receivers receive the OFDM/DMT symbols over a subset of the predetermined number of bins from the transmission medium and use the superimposed signals to attain symbol alignment. As such, the receivers are designed to process substantially fewer bins than the entire number of bins transmitted by the head end unit. | 04-24-2014 |
Patent application number | Description | Published |
20110321017 | COMPUTER CODE DEBUGGING METHOD AND APPARATUS PROVIDING EXCEPTION BREAKPOINTS - A computer method and apparatus for debugging program code provides exception breakpoints with exception notification. Through a user interface, a user associates one or more exception breakpoints with respective different certain lines of code. A computer processor is configured to execute the subject program code in debug mode. During the executing, for each of the different certain lines of code, the processor: (a) pauses to pre-evaluate and determine tendency to throw an exception or spawn an interrupt, and (b) at the certain line of code, stops execution of the subject program code only if the pre-evaluating determined existence of a would-be exception or run-time interrupt. | 12-29-2011 |
20120005683 | Data Processing Workload Control - Data processing workload control in a data center is provided, where the data center includes computers whose operations consume power and a workload controller composed of automated computing machinery that controls the overall data processing workload in the data center. The data processing workload is composed of a plurality of specific data processing jobs, including scheduling, by the workload controller in dependence upon power performance information, the data processing jobs for execution upon the computers in the data center, the power performance information including power consumption at a plurality of power-conserving states for each computer in the data center that executes data processing jobs and dispatching by the workload controller the data processing jobs as scheduled for execution on computers in the data center. | 01-05-2012 |
20120102469 | DETERMINISTIC APPLICATION BREAKPOINT HALTING BY LOGICALLY RELATING BREAKPOINTS IN A GRAPH - An operating system or virtual machine of an information handling system (IHS) initializes a debugger tool for breakpoint management of an application during debugging operations. The operating system or virtual machine initializes a directed acyclic graph (DAG) tool that employs a graphical user interface (GUI) or command line interface (CLI) for breakpoint generation and manipulation. A programmer generates breakpoints and breakpoint conditions that support the debug of application software during design, development and test. The programmer constructs one or more DAGs for use by the debugger and DAG tool. The programmer initializes the application for debugging operations. When the debugger encounters a breakpoint, the DAG tool interprets the breakpoint. If the encountered breakpoint is part of any DAG, the DAG tool determines eligibility for the encountered breakpoint to either break or not break depending on the rules of the DAG construct. The programmer may modify and add new breakpoints during debug and runtime operations of the application. | 04-26-2012 |
Patent application number | Description | Published |
20080281788 | Hierarchical structured abstract file system - A method in a data processing system of searching a plurality of electronic files identified by filenames in a first hierarchical file structure that is on a recordable medium of the data processing system. A user-defined metalabel is assigned to each of the electronic files. The electronic files are organized as a function of the metalabels into a second hierarchical file structure existing simultaneously with the first hierarchical file structure on the recordable medium of the data processing system. A search query is received from a user and the metalabels of the second hierarchical file structure are searched as a function of the query. Each electronic file having a metalabel matching the query is returned to the user as a search result. | 11-13-2008 |
20120239658 | HIERARCHICAL STRUCTURED ABSTRACT DATA ORGANIZATION SYSTEM - A method in a data processing system and apparatus for organizing files, web pages, or web site members organized in a traditional first hierarchical file structure that is on a recordable medium of a data processing system. A user-defined metalabel is assigned to each of the electronic files, web pages, or web site members. The electronic files, web pages, or web site members are organized as a function of the metalabels into a second hierarchical file structure existing simultaneously with the first hierarchical file structure on the recordable medium of the data processing system. The files, web pages, or web site members can be organized or grouped by the metalabels for efficient searching or following conversations of group members on social networking sites. | 09-20-2012 |
20140122529 | HIERARCHICAL STRUCTURED DATA ORGANIZATION SYSTEM - A method in a data processing system and apparatus for organizing files or web pages, structured or unstructured, of multiple users stored across one or more server computers into hierarchical file structures on a recordable medium of a data processing system. A user-defined metalabel is assigned to each of the electronic files or web pages. The electronic files or web pages are organized as a function of the metalabels into the hierarchical file structures. | 05-01-2014 |
20150074562 | HIERARCHICAL STRUCTURED DATA ORGANIZATION SYSTEM - A method in a data processing system and apparatus for organizing files or web pages, structured or unstructured, of multiple users stored across one or more server computers into hierarchical file structures on a recordable medium of a data processing system. A user-defined metalabel is assigned to each of the electronic files or web pages. The electronic files or web pages are organized as a function of the metalabels into the hierarchical file structures. | 03-12-2015 |
Patent application number | Description | Published |
20110132169 | HIGH-PRECISION MICRO/NANO-SCALE MACHINING SYSTEM - A high precision micro/nanoscale machining system. A multi-axis movement machine provides relative movement along multiple axes between a workpiece and a tool holder. A cutting tool is disposed on a flexible cantilever held by the tool holder, the tool holder being movable to provide at least two of the axes to set the angle and distance of the cutting tool relative to the workpiece. A feedback control system uses measurement of deflection of the cantilever during cutting to maintain a desired cantilever deflection and hence a desired load on the cutting tool. | 06-09-2011 |
20110252930 | HARD TURNING MICRO-MACHINE TOOL - A micro-scale apparatus for supporting a tool for hard turning comprises a base, a pivot coupled to the base, an actuator coupled to the base, and at least one member coupled to the actuator at one end and rotatably coupled to the pivot at another end. A tool mount is disposed on the at least one member. The at least one member defines a first lever arm between the pivot and the tool mount, and a second lever arm between the pivot and the actuator. The first lever arm has a length that is less than a length of the second lever arm. The actuator moves the tool mount along an arc. | 10-20-2011 |
20140353406 | ATOMIZING-BASED CUTTING FLUID DELIVERY SYSTEM AND METHOD - An atomizing cutting fluid system. The system includes a common chamber terminating in a shaped droplet nozzle and including a nozzle section immediately behind the shaped droplet nozzle. An atomizer creates spray directly within the common chamber behind the nozzle section. A cutting fluid supply line provides cutting fluid to the atomizer. A high velocity gas nozzle within the nozzle section and behind the droplet nozzle is configured to provide a high velocity gas to entrain the flow of droplets. The nozzle section and droplet nozzle are configured to produce a fully developed droplets-gas flow at a predetermined distance from the droplet nozzle. In a cutting system, the spray system provides a uniform film for a macro or micro cutting operation at sufficient flow rates. | 12-04-2014 |
20140366663 | AEROSTATIC AIR BEARING, ASSEMBLING METHOD THEREOF, AND AEROSTATIC LEAD SCREW ACTUATOR USING THE SAME - Disclosed is an aerostatic air bearing. The disclosed aerostatic air bearing includes: an aerostatic nut, said aerostatic nut including a housing having an air inlet disposed therein, a helical plenum chamber disposed in said housing, said helical plenum chamber being fluidly connected to the air inlet and fluidly interconnecting a plurality of openings, said openings being disposed in a helical pattern, and a plurality of porous media, each of said porous media being disposed in one of the plurality of openings respectively; and a lead screw coupled to said aerostatic nut, said lead screw including a threaded surface separated from each of the plurality of porous media. | 12-18-2014 |
Patent application number | Description | Published |
20090276696 | HIGH-FIDELITY RENDERING OF DOCUMENTS IN VIEWER CLIENTS - Tools and techniques are described for high-fidelity rendering of documents in viewer clients. Methods provided by these tools and techniques may detect whether client systems have a plug-in installed for rendering high-fidelity content. in response to detecting that a given client system has installed the rendering plug-in, these methods may select a first high-fidelity format compatible with the plug-in for rendering the content on the client system. However, in response to detecting that the client system has not installed the rendering plug-in, the methods may select a second high-fidelity format for rendering the content on the client system, without installing the plug-in on the client system. These methods may also request document pages for rendering on the client system in the selected format, and may receive at least a subset of the document pages in the selected format. | 11-05-2009 |
20100229086 | CONTENT RENDERING ON A COMPUTER - Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed. | 09-09-2010 |
20120331377 | Content Rendering on a Computer - Portions of content are transformed into portions of rendered content. While the portions of the content are being transformed into portions of the rendered content, each discrete portion of the rendered content can be provided to the application program after that portion is completed. | 12-27-2012 |
20130080603 | Fault Tolerant External Application Server - A fault tolerant external application server. The external application server is a web based system that allows a user of a client computing device to work with a file over a network via a general client application communicating with a host. The host brokers the functionality and provides a platform for interacting with the external application server. The external application server is implemented as a server farm. A fault tolerant farm system combines latent configuration replication between farm members, interchangeable farm members, and optional health monitoring to allow the external application server farm to provide on-the-fly configuration while maintaining full functionality without requiring a real time state management database. | 03-28-2013 |
Patent application number | Description | Published |
20120009896 | ABOVE-LOCK CAMERA ACCESS - Apparatus and methods are disclosed for allowing smart phone users to “capture the moment” by allowing easy access to a camera application when a mobile device is in an above-lock (or locked) mode, while also preventing unauthorized access to other smart phone functionality. According to one embodiment of the disclosed technology, a method of operating a mobile device having an above-lock state and a below-lock state comprises receiving input data requesting invocation of an camera application when the mobile device is in the above-lock state and invoking the requested camera application on the device, where one or more functions of the requested application are unavailable as a result of the mobile device being in the above-lock state. | 01-12-2012 |
20120071149 | PREVENTION OF ACCIDENTAL DEVICE ACTIVATION - The present application allows wake-up and unlock operations to occur using a single event, such as a single keystroke. Additionally, a check is made to ensure that activation was caused by human touch, not an object. In one embodiment, an area of a mobile device is designated as a wake-up area, which is separate from the touch screen. A user can touch the wake-up area to both activate the mobile device from a sleep mode and unlock the mobile device. In another embodiment, the wake-up area can be integrated into the touch screen, so that there is not an appearance of a separate button. Fingerprint checking and/or proximity sensors can also be integrated into the mobile device. | 03-22-2012 |
20150050916 | ABOVE-LOCK CAMERA ACCESS - Apparatus and methods are disclosed for allowing smart phone users to “capture the moment” by allowing easy access to a camera application when a mobile device is in an above-lock (or locked) mode, while also preventing unauthorized access to other smart phone functionality. According to one embodiment of the disclosed technology, a method of operating a mobile device having an above-lock state and a below-lock state comprises receiving input data requesting invocation of an camera application when the mobile device is in the above-lock state and invoking the requested camera application on the device, where one or more functions of the requested application are unavailable as a result of the mobile device being in the above-lock state. | 02-19-2015 |
Patent application number | Description | Published |
20110225128 | CLEAN STORE FOR OPERATING SYSTEM AND SOFTWARE RECOVERY - Systems, methods and apparatus for automatically identifying a version of a file that is expected to be present on a computer system and for automatically replacing a potentially corrupted copy of the file with a clean (or undamaged) copy of the expected version. Upon identifying a file on the computer system as being potentially corrupted, a clean file agent may perform an analysis based on the identity of the file and one or more other properties of the system to determine the version of the file that is expected to be present on the system. Once the expected version is identified, a clean replacement copy of the file may be obtained from a clean file repository by submitting a version identifier of the expected version. The version identifier may be a hash value, which may additionally be used to verify integrity of the clean copy. | 09-15-2011 |
20120144489 | Antimalware Protection of Virtual Machines - The subject disclosure is directed towards protecting virtual machines on guest partitions from malware in a resource-efficient manner. Antimalware software is divided into lightweight agents that run on each malware-protected guest partition, a shared scanning and signature update mechanism, and a management component. Each agent provides the scanning mechanism with files to scan for malware, such as by running a script, and receives results from the scanning mechanism including possible remediation actions to perform. The management component provides the scanning mechanism with access to virtual machine services, such as to pause, resume, snapshot and rollback guest partitions as requested by the scanning mechanism. | 06-07-2012 |
20120151582 | Offline Scan, Clean and Telemetry Using Installed Antimalware Protection Components - The subject disclosure relates to antimalware scanning, and more particularly to offline antimalware scanning of a host environment via an alternate, known safe operating system. An offline scanning product obtains data previously written by the host environment online antimalware scanning tool, e.g., configuration data and antimalware signatures in shared data stores accessible to the offline and online products, and uses that data to perform the offline antimalware scan. The offline scanning product writes results information and any quarantined files to other shared data stores, whereby the online environment, when rebooted, has access to the information, such as for review and to upload telemetry information to an online service for analysis. Also described is offline replacement of operating system files that cannot be cleaned or removed when online. | 06-14-2012 |
20120297488 | Discovering Malicious Input Files and Performing Automatic and Distributed Remediation - The subject disclosure is directed towards detecting malware or possible malware in an input file by allowing the input file to be opened, and by monitoring for one or more behaviors corresponding to the open file that likely indicate malware. Only certain executable files and/or file types opened thereby may be monitored, with various collected event data used for antimalware purposes when improper behavior is observed. Example behaviors include writing of a file to storage, generation of network traffic, injection of a process, running of script, and/or writing system registry data. Telemetry data and/or a sample of the file may be sent to an antimalware service, and malware remediation may be performed. Data (e.g., the collected events) may be distributed to other nodes for use in antimalware detection, e.g., to block execution of a similar file. | 11-22-2012 |
20120324579 | CLOUD MALWARE FALSE POSITIVE RECOVERY - Methods, systems, and computer program products are provided for recovering from false positives of malware detection. Malware signatures that are defective may be causing false positives during software scanning for malware. Such defective malware signatures may be detected (e.g., by user feedback, etc.) and revoked. Computers that are using the malware signatures to detect malware may be notified of the revoked signatures, and may be enabled to re-scan content identified as containing malware using malware signatures that do not include the revoked malware signatures. As such, if the content is determined during the re-scan to not be infected, the content may be re-enabled for usage on the computer (e.g., may be restored from quarantine storage). | 12-20-2012 |
20130160126 | MALWARE REMEDIATION SYSTEM AND METHOD FOR MODERN APPLICATIONS - A system is described for remediating a malicious modern application installed on an end user device. In an embodiment, the system includes an antimalware program executing on the end user device that can detect and attempt to remediate the malicious modern application, an operating system executing on the end user device that is configured to interact with the antimalware program for the purpose of facilitating the establishment of a connection between the end user device and an application support system in response to determining that the antimalware program has detected and attempted to remediate the malicious modern application, and the application support system that can perform remediation operations beyond those that can be performed by the antimalware program. | 06-20-2013 |
20130167235 | AUGMENTING SYSTEM RESTORE WITH MALWARE DETECTION - An anti-malware program monitors the behavior of a system after a system restore to determine the likelihood of a hidden infection of malicious code still existing after the system restore. The anti-malware program observes the dynamic behavior of the system by monitoring conditions that are likely to signify the possibility of an infection thereby necessitating the need to initiate anti-malware detection. The anti-malware program may observe the restoration history, system settings, malware infection history, to determine the likelihood of an existing hidden infection after a system restore. | 06-27-2013 |
20140137249 | Dynamic Selection and Loading of Anti-Malware Signatures - An anti-malware system dynamically loads and unloads additional malware detection signatures based on a collection of data sources that indicate what signatures are relevant to a host machine in its current environment. A signature selector component determines what relevant signatures should be loaded. The signature selector component uses a variety of data sources either individually, or in combination, to determine relevancy of the available malware detection signatures. The anti-malware system dynamically determines which of the available malware detection signatures and classes of signatures are relevant and should be provided to a machine based on available information. The malware detection signatures are obtained and loaded automatically from one or more sources when a threat becomes relevant. A program or application may be blocked from accessing files until the relevant malware detection signatures have been loaded onto the machine. | 05-15-2014 |