Patent application number | Description | Published |
20080250419 | METHOD AND SYSTEM FOR MANAGING RESOURCE CONNECTIONS - Methods and system for managing resource connections are described. In one embodiment, a user request associated with a centralized resource may be received. Availability of a connection to the centralized resource may be determined. A stagger delay for connection creation may be determined. The stagger delay may define a delay for creation of a new connection. The new connection to the centralized resource may be created based on the determining of whether the connection to the centralized resource is available and the delay interval. The new connection may be utilized to process the user request. | 10-09-2008 |
20090271625 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY GENERATION AND USE FOR SERVICE ACCESS - A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link. | 10-29-2009 |
20100180208 | SERVER SIDE DATA CACHE SYSTEM - In an example embodiment, a system and method to store and retrieve application data from a cache and a database are provided. The example method may comprise receiving location data associated with application data from a user device, using the location data to determine a cache or database on which the application data is stored, and requesting application data from the cache or database. The system and method may further include monitoring requests for application data associated with instructions having a set of characteristics, identifying application data as associated with the instructions having the set of characteristics, and requesting the application data based on receiving subsequent instructions sharing the same set of characteristics. | 07-15-2010 |
20110087645 | METHOD AND SYSTEM FOR A TRANSPARENT APPLICATION OF MULTIPLE QUERIES ACROSS MULTIPLE DATA SOURCES - According to a fourth aspect there is provided a system to receive a request to search for the data. The system performs a search of a logical table based on a single criterion to identify a plurality of rows in the logical table. The system generates a first plurality of tuples based on the plurality of rows to identify a first plurality of physical tables that are mapped to the logical table, the first plurality of tuples including a first and second tuple, the first tuple identifies a first server and a first physical table that is accessed via the first server, the second tuple identifies a second server and a second physical table that is accessed via the second server. Next, the system queries at least two data sources for the data to generate results that include the data. The at least two data sources are at least partially identified by utilizing the first plurality of tuples. Finally, the system communicates the data in response to the request to search for the data. | 04-14-2011 |
20110208793 | METHOD AND SYSTEM FOR MANAGING DATA TRANSACTION REQUESTS - In various embodiments, a system, method, and related computer-related medium to process data transactions are provided. In one example, a system is arranged to process data transactions in a data store including a plurality of databases. The system includes a computer interface module to receive a data transaction request from at least one requesting computer and a data access layer having one or more processors to identify at least one database in the plurality of databases. The data access layer is to define an abstraction layer between a computer interface module and the plurality of databases. | 08-25-2011 |
20120179720 | METHOD AND SYSTEM FOR DYNAMIC TEMPLATIZED QUERY LANGUAGE IN SOFTWARE - A system to automatically generate query language in software is described. The system receives a request for data that is persistently stored in a database. The system selects a predefined query template from a number of query templates based on the request. The system utilizes the query template to receive content from at least one different source, the first source being a prototype data object. The system generates a query statement based on the query template that includes the content. Finally the system queries the database using the query statement to retrieve the requested data. | 07-12-2012 |
20120221599 | METHOD AND SYSTEM FOR A TRANSPARENT APPLICATION OF MULTIPLE QUERIES ACROSS MULTIPLE DATA SOURCES - According to a fourth aspect there is provided a system to receive a request to search for data. The system performs a search of a logical table based on a criterion to identify a plurality of rows in the logical table. The system generates fetch levels including a first and second plurality of tuples based on the plurality of rows. Each fetch level includes a plurality of tuples that identify servers and physical tables that may store the data. The system further queries at least two data sources for the data based on the first plurality of tuples and communicates the data. | 08-30-2012 |
20130041919 | MANAGING DATA TRANSACTION REQUESTS - In various embodiments, a system, method, and related computer-readable storage medium to process data transactions are provided. In one example, a system is arranged to process data transactions in a data store including a plurality of databases. The system includes a computer interface module to receive a data transaction request from at least one requesting computer and a data access layer having one or more processors to identify at least one database in the plurality of databases. The data access layer is to define an abstraction layer between a computer interface module and the plurality of databases. Other embodiments are disclosed. | 02-14-2013 |
20130042065 | CUSTOM CACHING - Methods and systems are presented for custom caching. Application threads define caches. The caches may be accessed through multiple index keys, which are mapped to multiple application thread-defined keys. Methods provide for the each index key and each application thread-defined key to be symmetrical. The index keys are used for loading data from one or more data sources into the cache stores on behalf of the application threads. Application threads access the data from the cache store by providing references to the caches and the application-supplied keys. Some data associated with some caches may be shared from the cache store by multiple application threads. Additionally, some caches are exclusively accessed by specific application threads. | 02-14-2013 |
20130219403 | METHOD AND SYSTEM FOR MANAGING RESOURCE CONNECTIONS - Methods and system for managing resource connections are described. In one embodiment, an initial user request to access data stored at a resource is received. The initial user request is generated by an application of a plurality of applications having access to the resource. An existing connection from the application is utilized to provide the data to the application. A current user request to access data stored at the resource is received. Based on a determination that the existing connection is unavailable, the current user request is assigned to a waiter queue. A number of requests assigned to the waiter queue during a pre-defined time period is determined to exceed a threshold. A new connection from the application to the resource is created based on the availability of a further connection to the resource and the exceeding of the threshold. | 08-22-2013 |
20130282724 | METHOD AND SYSTEM TO AUTOMATICALLY GENERATE SOFTWARE CODE - There is provided a method to automatically generate software code. The method receives a request for the data, queries at least two data sources for the data based on the request; and receiving results that include the data that is populated to at least one data object. | 10-24-2013 |
20130282758 | METHOD AND SYSTEM FOR A TRANSPARENT APPLICATION OF MULTIPLE QUERIES ACROSS MULTIPLE DATA SOURCES - There are provided systems and methods to respond to a request for data. The system receives a request to search for the data based on a criterion and to populate data objects with the data. The request is further used to identify columns that determine data sources to query. The system performs a search of a logical table based on the criterion to identify a plurality of rows in the logical table. The system further generates a first plurality of tuples based on the plurality of rows to identify a first plurality of physical tables that are mapped to the logical table. The first plurality of tuples includes a first tuple and a second tuple. The system further queries the data sources for the data to generate results by using the first plurality of tuples. The queries of the data sources are partially successful. | 10-24-2013 |
20140250095 | MANAGING DATA TRANSACTION REQUESTS - In various embodiments, a system, method, and related computer-readable storage medium to process data transactions are provided. In one example, a system is arranged to process data transactions in a data store including a plurality of databases. The system includes a computer interface module to receive a data transaction request from at least one requesting computer and a data access layer having one or more processors to identify at least one database in the plurality of databases. The data access layer is to define an abstraction layer between a computer interface module and the plurality of databases. Other embodiments are disclosed. | 09-04-2014 |
20140337484 | SERVER SIDE DATA CACHE SYSTEM - In an example embodiment, a system and method to store and retrieve application data from a cache and a database are provided. The example method may comprise receiving location data associated with application data from a user device, using the location data to determine a cache or database on which the application data is stored, and requesting application data from the cache or database. The system and method may further include monitoring requests for application data associated with instructions having a set of characteristics, identifying application data as associated with the instructions having the set of characteristics, and requesting the application data based on receiving subsequent instructions sharing the same set of characteristics. | 11-13-2014 |
20150039896 | SYSTEM AND METHOD FOR POOL-BASED IDENTITY GENERATION AND USE FOR SERVICE ACCESS - A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link. | 02-05-2015 |
20150134839 | METHOD AND SYSTEM FOR REDUCING CONNECTIONS TO A DATABASE - A system automatically maintains a plurality of client connections associated with a plurality of clients, the plurality of client connections including active and idle connections. A first server receives a request from a client of the plurality of clients to access a second server of a plurality of second servers communicatively coupled to the first server, the plurality of second servers having varying communication protocols. The first server then identifies a first communication protocol associated with the second server and activating a link between the first server and the second server using the first communication protocol. | 05-14-2015 |
Patent application number | Description | Published |
20100094919 | METHOD AND SYSTEM FOR MANAGING DATA TRANSACTION REQUESTS - In one embodiment, a method is provided for processing data transactions in a data store that includes databases. In this method, a data transaction request is received from a requesting computer. Different databases are then identified from the databases using a data access layer that defines an abstraction layer. The data transmission request is then split into multiple data transaction requests, and a part of these requests is then communicated to at least one of the identified databases. | 04-15-2010 |
20100095270 | METHOD AND SYSTEM TO AUTOMATICALLY REGENERATE SOFTWARE CODE - According to a second aspect there is provided a method and system to automatically regenerate software for an object to relational mapping system. The system automatically regenerates a first set of classes. For each class, the system reads class information; reads meta-data based on the class information; and automatically regenerates the class based on the meta-data without overwriting associated custom code. The first set of classes includes base code that is associated with the custom code. The first set of classes and the base code are utilized by the object to relational mapping system to enable access todata that is persistently stored in a database. | 04-15-2010 |
20100268749 | METHOD AND SYSTEM FOR TRANSPARENT APPLICATION OF MULTIPLE QUERIES ACROSS MULPTILE SOURCES - There is provided a system to respond to a request for data. The system receives a request for the data, queries at least two data sources for the data based on the request and receives results that include the data that is populated to at least one data object. | 10-21-2010 |
20110137914 | CUSTOM CACHING - Methods and systems are presented for custom caching. Application threads define caches. The caches may be accessed through multiple index keys, which are mapped to multiple application thread-defined keys. Methods provide for the each index key and each application thread-defined key to be symmetrical. The index keys are used for loading data from one or more data sources into the cache stores on behalf of the application threads. Application threads access the data from the cache store by providing references to the caches and the application-supplied keys. Some data associated with some caches may be shared from the cache store by multiple application threads. Additionally, some caches are exclusively accessed by specific application threads. | 06-09-2011 |
Patent application number | Description | Published |
20150113461 | Methods and Systems for Indicating Application Data Use and Providing Data According to Permissions - Methods and systems for indicating application data use and providing data according to permissions are described. An example method may include providing for display, by a computing device that includes one or more processors, a representation of a first indicator and the first indicator indicates a sensor of the computing device is collecting sensory data from an ambient environment of the computing device. The first indicator is configured to change states so as to further indicate an application running on the computing device is receiving and processing the sensory data. The method further includes providing for display, by the computing device, a representation of a second indicator that identifies the application receiving the sensory data collected by the sensor of the computing device. | 04-23-2015 |
20150186509 | POWER-EFFICIENT MUSIC PLAYLIST IDENTIFICATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for power-efficient music playlist identification. In one aspect, a method includes the actions of receiving an audio recording of an item of media content. The actions further include determining, based on the audio recording, an identifier associated with the item of media content, and a timestamp. The actions further include determining, based on the identifier of the item of media content and the timestamp, an amount of remaining time that the item of media content has to play. The actions further include providing an indication for one or more components of a computing device to deactivate. The actions further include determining that the amount of time has elapsed. The actions further include providing an indication for the one or more components of the computing device to reactivate. | 07-02-2015 |
Patent application number | Description | Published |
20090258607 | TECHNIQUES FOR ENHANCED CO-EXISTENCE OF CO-LOCATED RADIOS - Techniques for enhanced co-existence for co-located radios are described. A mobile computing device may comprise a first radio module operative to communicate wirelessly across a first link using a first set of communications channels, a second radio module operative to communicate wirelessly across a second link using a second set of communications channels, and a coordination module operative to receive information regarding operation of the first and second radio modules, and modify a communications parameter for the first or second radio module based on the received information. Other embodiments are disclosed and claimed. | 10-15-2009 |
20100304794 | METHOD AND APPARATUS FOR ADAPTIVE POWER SAVING IN A MOBILE COMPUTING DEVICE - A mobile computing device is described that includes one or more wireless transceivers, a data traffic monitor module operative to monitor one or more wireless communications parameters, and a power management module operative to select a power mode for the mobile computing device based on the one or more wireless communications parameters. In various embodiments, the power mode comprises an extended power save mode wherein the one or more wireless transceivers are disabled during a plurality of consecutive wireless beacon events. Other embodiments are described and claimed. | 12-02-2010 |
20110153805 | TECHNIQUES TO MANAGE A MOBILE DEVICE BASED ON NETWORK DENSITY - Techniques to manage a mobile device based on network density are described. An apparatus may comprise a mobile computing device having a radio module operative to receive radio signals, a resource detector operative to collect a sample for one or more wireless resources based on the received radio signals, a network density module operative to estimate a network density for an operating environment of the mobile computing device based on the sample and a probability density function, and a parameter management module operative to manage one or more operational parameters of the mobile computing device based on the estimated network density. Other embodiments are described and claimed. | 06-23-2011 |
20120302286 | TECHNIQUES FOR ENHANCED CO-EXISTENCE OF CO-LOCATED RADIOS - Techniques for enhanced co-existence for co-located radios are described. A mobile computing device may comprise a first radio module operative to communicate wirelessly across a first link using a first set of communications channels, a second radio module operative to communicate wirelessly across a second link using a second set of communications channels, and a coordination module operative to receive information regarding operation of the first and second radio modules, and modify a communications parameter for the first or second radio module based on the received information. Other embodiments are disclosed and claimed. | 11-29-2012 |