03rd week of 2015 patent applcation highlights part 69 |
Patent application number | Title | Published |
20150019855 | System Platform Supporting Infrared Receiver/Transmitter and Operation Method Thereof - An operation method of a system platform includes steps of: transmitting, by an infrared receiver, a received infrared signal to a transmission interface; transmitting, by the transmission interface, an interrupt notification signal to an operation system power management agent (OSPM) through an advanced configuration and power interface (ACPI); receiving, by an infrared application program of an operating system, the interrupt notification signal from the OSPM, so as to generate a system management interrupt (SMI) in a universal extensible firmware interface (UEFI) basic input output system (BIOS) to execute a system management mode (SMM) program; and executing, by the UEFI BIOS, a decoding driver program, and receiving the infrared signal from the transmission interface, so as to decode the infrared signal into event data, and store the event data in a storage device. | 2015-01-15 |
20150019856 | SECURE DOWNLOAD AND SECURITY FUNCTION EXECUTION METHOD AND APPARATUS - A method and electronic device for executing secure download and security function is provided. The method includes storing a unique identifier (ID) of the electronic device, receiving a binary update request, determining whether the stored unique ID matches a unique ID signed to the binary, and downloading the binary depending on whether the unique IDs match. | 2015-01-15 |
20150019857 | METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE - Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application. | 2015-01-15 |
20150019858 | DATA LOSS PREVENTION TECHNIQUES - Data received through a proxy for a service is analyzed for compliance with one or more data policies, such as one or more data loss prevention policies. When data satisfies the criteria of one or more data policies, the data is manipulated at the proxy prior to transmission of the data to the service. In some examples, the manipulation of the data includes encryption. | 2015-01-15 |
20150019859 | TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK - Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided. According to one embodiment, a method is provided for delivering customized network services to subscribers of a service provider. Multiple virtual routers (VRs) are provided within each of multiple service processing switches of a service provider. Each VR is supported by an object group and each object of the object group supports a network service. One or more VRs are assigned to a subscriber of multiple subscribers of the service provider. Customized network services are provided to the subscriber by the one or more VRs assigned to the subscriber. | 2015-01-15 |
20150019860 | METHOD FOR PROVIDING DATA TO A PERSONAL PORTABLE DEVICE VIA NETWORK AND A SYSTEM THEREOF - Disclosed are a method and a system for synchronizing and providing data requiring digital rights protection, to a portable device, wherein a contents providing server is connected with a contents synchronization server to which the portable device is connected. | 2015-01-15 |
20150019861 | System and Method for Monitoring Secure Data on a Network - A system and method for monitoring secure digital data on a network are provided. An exemplary network monitoring system may include a network device in communication with a user and a network. Further, a server may be in communication with the network. A browser and monitoring program may be stored on the network device, and the network device may receive secure digital data from the network. The browser may convert the secure digital data or a portion thereof into source data, and the monitoring program may transfer the source data or a portion thereof to the server. In an exemplary embodiment, the monitoring program may include a service component and an interface program. | 2015-01-15 |
20150019862 | AVIONICS GATEWAY INTERFACE, SYSTEMS AND METHODS - Systems and methods are provided for FAA-certified avionics devices to safely interface with non-certified mobile telecommunications devices before, during, and after flight. Data transmitted to the certified devices do not affect functionality of the certified device unless and until a user acknowledges and/or confirms the data on the certified device. Thus, the integrity of the certified device is maintained. | 2015-01-15 |
20150019863 | METHOD OF HANDLING A CERTIFICATION REQUEST - In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the certification authority includes the object identifier, thereby allowing improved management of the identity certificate at the user device and elsewhere. | 2015-01-15 |
20150019864 | Secure Virtual Machine - An approach to securely distributing and running virtual machines is described that addresses the inherent insecurity of mobile virtual machines by authenticating a user before establishing a specialized virtualization runtime environment that includes a filesystem driver inserted into the host operating system to provide secure access to a virtual machine by authorized hypervisors only. Further described is the creation of a SecureVM package that includes the various components used to perform the operations of installation, user authentication and establishment of the specialized virtualization runtime environment. | 2015-01-15 |
20150019865 | SYSTEM AND METHOD FOR OBFUSCATING INITIATION VALUES OF A CRYPTOGRAPHY PROTOCOL - A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client computing device has a secure and approved version of content player software implemented for consuming downloaded copyright media content. With this technique, copyright media content providers are able to ensure that only secure and approved content players are implemented to access the content. | 2015-01-15 |
20150019866 | Systems and Methods for Automatically Generating Top Level Index Files - Systems and methods for automatically generating top level index files for use in adaptive bitrate streaming in accordance with embodiments of the invention are disclosed. One embodiment of the method of the invention includes receiving a request from a playback device at a playback server, where the request identifies a piece of content, retrieving a list of assets associated with the identified piece of content using the playback server, filtering the list of assets using at least one predetermined criterion using the playback server, generating a top level index file describing each asset in the filtered list of assets using the playback server, and sending the top level index file to the playback device using the playback server. | 2015-01-15 |
20150019867 | RESYNCHRONIZATION OF PASSIVE MONITORING OF A FLOW BASED ON HOLE DETECTION - Embodiments are directed towards resynchronizing the processing of a monitored flow based on hole detection. A network monitoring device (NMD) may be employed to passively monitor flows of packets for a session between endpoints. The NMD may receive copies of the monitored flow and perform processes on the monitored flow. In some situations, some copies of packets may not be fully processed by the NMD, creating a hole in the processing. If a hole is detected in the monitored flow and the processing of the monitored flow is desynchronized, then the NMD may suspend processing until it is resynchronized or for a remainder of the session. If the processing is desynchronized, then the NMD may resynchronize the processing by resuming the processing of the monitored flow at a downstream position of the monitored flow based on the detected hole. | 2015-01-15 |
20150019868 | PUBLIC ENCRYPTION METHOD BASED ON USER ID - A public encryption method based on user ID includes: setting, by a key generation server, at least one public parameter and master key used for generating a private key; receiving, by the key generation server, an inherent ID of a user from a receiving terminal, generating a private key based on the public parameter, the master key and the ID, and transmitting the generated private key to the receiving terminal; receiving, by a transmitting terminal, the public parameter and the ID from the key generation server, encrypting a message to generate a ciphertext, and transmitting the generated ciphertext to the receiving terminal; and receiving, by the receiving terminal, the ciphertext and the private key, and decrypting the ciphertext based on the received private key to obtain a message. | 2015-01-15 |
20150019869 | ONLINE IDENTIFICATION AND AUTHENTICATION - Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user. | 2015-01-15 |
20150019870 | MASTER KEY GENERATION AND DISTRIBUTION FOR STORAGE AREA NETWORK DEVICES - Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation request is received. It is determined that a master key can not be obtained from another cryptographic node in the data center. A master key is generated. The master key is included in a key hierarchy used to encrypt a data center key object, the data center key object corresponding to a data block maintained in a storage area network (SAN), where the data center key object includes a unique identifier, an encrypted key, and a wrapper unique identifier. The master key is split into N shares, with M shares required to recreate the master key, wherein M is less than N. The N shares are distributed to different entities. | 2015-01-15 |
20150019871 | CERTIFICATION METHOD AND ELECTRONIC DEVICE - A certification method comprises steps of: providing a reliable time clock on a first electronic device; when data of the digital file are generated on the first electronic device, reading a reliable time count from the reliable time clock and adding the reliable time count into the digital file; generating a first abstract code from the digital file; generating a signature of the digital file by encrypting the first abstract code; and, sending the digital file and the signature to a second electronic device. In addition, electronic devices corresponding to the certification method are also disclosed herein. | 2015-01-15 |
20150019872 | METHOD AND DEVICE FOR VERIFYING THE INTEGRITY OF PLATFORM SOFTWARE OF AN ELECTRONIC DEVICE - A method for verifying the integrity of platform software of an electronic device is provided, the method comprising accessing a module of said platform software, obtaining a signature (S), obtaining a verification key (VK), said verification key (VK) corresponding to a signing key (SK), verifying if said signature (S) was derived by signing said platform software module with said signing key (SK), by using said verification key (VK), and establishing a positive verification of said platform software module if said verification is successful. The invention also provides a method for providing a platform software module to perform the aforementioned method, and a device on which the aforementioned method can be performed. | 2015-01-15 |
20150019873 | SYSTEM FOR EMBEDDED BIOMETRIC AUTHENTICATION, IDENTIFICATION AND DIFFERENTIATION - An electronic device authenticates a user without requiring active input from the user. At least one user interface receives a plurality of user inputs to the electronic device that are unrelated to an active authentication action of the user of the electronic device. At least one biometric sensor extracts from the plurality of user inputs, biometric data identifying the user. A processor authenticates the user responsive to the extracted biometric data. | 2015-01-15 |
20150019874 | APPARATUS AND METHOD FOR GENERATING ELECTRONIC BOOK, AND APPARATUS AND METHOD FOR VERIFYING INTEGRITY OF ELECTRONIC BOOK - Disclosed are an apparatus and method for generating an electronic book (e-book) and an apparatus and method for verifying integrity of an e-book. An e-book including information for verifying the integrity of the e-book is generated, and the integrity of an e-book is verified from information included in the e-book to determine whether or not the e-book has been falsified. Accordingly, an e-book is generated to conform to the electronic publication (EPUB) standard and to include information for protecting the copyright of the e-book, so that the e-book market can be activated. | 2015-01-15 |
20150019875 | PORTABLE DEVICE FOR DATA ENCRYPTION/DECRYPTION AND/OR COMPRESSION/DECOMPRESSION - Portable integrated device ( | 2015-01-15 |
20150019876 | SUPPORT FOR SECURE OBJECTS IN A COMPUTER SYSTEM - A method and structure in a computer system, including a mechanism supporting a Secure Object that includes code and data that is cryptographically protected from other software on the computer system. | 2015-01-15 |
20150019877 | SCALABLE PRECOMPUTATION SYSTEM FOR HOST-OPAQUE PROCESSING OF ENCRYPTED DATABASES - A method, system, and computer program product to generate results for a query to an encrypted database stored on a host are described. The system includes a host comprising a storage device to store the encrypted database, and a a secure processor to generate indexes and index metadata from the encrypted database, each index identifying records of the encrypted database associated with a range of data for at least one field stored in the records of the encrypted database and the metadata indicating the range of data identified by the associated index. The system also includes an interface of the host to receive the query, and a host processor to generate a sub-query form the query for each field associated with the query. Based on sub-query results obtained through the index metadata, the secure processor searches a subspace of the encrypted database to generate the results of the query. | 2015-01-15 |
20150019878 | Apparatus and Method for Memory Address Encryption - An apparatus for encrypting an input memory address to obtain an encrypted memory address is provided. The apparatus comprises an input interface for receiving the input memory address being an address of a memory. Moreover, the apparatus comprises an encryption module for encrypting the input memory address depending on a cryptographic key to obtain the encrypted memory address. The encryption module is configured to encrypt the input memory address by applying a map mapping the input memory address to the encrypted memory address, wherein the encryption module is configured to apply the map by conducting a multiplication and a modulo operation using the cryptographic key and a divisor of the modulo operation, such that the map is bijective. | 2015-01-15 |
20150019879 | Optimal Re-Encryption Strategy for Joins in Encrypted Databases - Methods, systems, and computer-readable storage media for selecting columns for re-encryption in join operations. In some implementations, actions include determining a first column and a second column to be joined, receiving a first key corresponding to the first column and a second key corresponding to the second column, receiving a first rank associated with the first key and a second rank associated with the second key, selecting the second column for re-encryption based on the first rank and the second rank, and providing the first column, the second column, and the first key for performing a join operation, the second column being re-encrypted based on the first key. | 2015-01-15 |
20150019880 | ELECTRONIC DEVICE, SYSTEM FOR PAIRING ELECTRONIC DEVICES AND METHOD FOR PAIRING ELECTRONIC DEVICES - An electronic device includes: a data acquiring unit configured to detect an encryption apparatus in a preset distance range and to read preset data in the detected encryption apparatus; a data storage unit configured to store the preset data; and a connection establishing unit configured to establish power line communication connections, according to the preset data, with other electronic devices reading and storing the preset data. The disclosure further proposes a system for pairing electronic devices and a method for pairing electronic devices. With the technical solutions of the invention, power line communication connections between the electronic devices can be established rapidly, conveniently and more accurately. | 2015-01-15 |
20150019881 | ACCELERATED CRYPTOGRAPHY WITH AN ENCRYPTION ATTRIBUTE - Methods and systems for encrypting and decrypting are presented. In one embodiment, the method comprises encrypting one or more segments of a data with a key. The data is associated with at least one encryption attribute and having a plurality of segments. The encryption attribute includes information to identify one or more segments of the data to encrypt. The method further comprises encrypting the encryption attribute and storing the data including the partly encrypted data and the encrypted encryption attribute. | 2015-01-15 |
20150019882 | SWITCHING POWER SUPPLY WITH NOISE CONTROL - On embodiment of a device with a noise adaptive power supply includes a noise adaptation unit configured to receive a noise adaptation signal. The noise adaptation unit can provide processing, such as digital filter processing to reduce the effect of power supply noise. In one embodiment, a feedback signal is used to adjust the output voltage of the power supply. The noise adaptation signal can be similar to the feedback signal. The noise adaptation unit can provide the processing in response to the noise adaptation signal. | 2015-01-15 |
20150019883 | POWER SUPPLY CIRCUIT FOR CENTRAL PROCESSING UNIT - A power supply circuit for a central processing unit (CPU) includes a comparing circuit, first to third switch circuits, first and second compensation circuits, a pulse width modulation (PWM) controller, a first power circuit connected to a first output pin of the PWM controller, and a second power circuit connected to a second output pin of the PWM controller. When a motherboard operates normally, the comparing circuit outputs a first control signal to control the first and third switch circuits to be turned on. The second switch circuit is turned off. The first compensation circuit provides a compensation signal to the PWM controller. When the motherboard is powered off, the comparing circuit outputs a second control signal to control the first and third switch circuits to be turned off. The second switch circuit is turned on. The second compensation circuit provides a compensation signal to the PWM controller. | 2015-01-15 |
20150019884 | PD IN POE SYSTEM HAVING REDUNDANT PSE CHANNEL INPUTS - A Powered Device (PD) in a PoE system has two input channels, each being coupled to a separate Power Sourcing Equipment (PSE) for increased reliability. A first PD controller is coupled to the first channel to perform hand-shaking and closes a first Power Good (PWRGD) switch when the PoE voltage is detected on the first channel. A second PD controller is coupled to the second channel to perform hand-shaking and closes a second PWRGD switch when the PoE voltage is detected on the second channel. A diode bridge couples both channels to a single regulating power supply that supplies power to a load. Auxiliary switches are controlled by the PWRGD signals so that only the first channel or the second channel is coupled to the diode bridge in the event that both channels receive the respective PoE voltages. Therefore, hot standby is provided using only one power supply. | 2015-01-15 |
20150019885 | COUNTERMEASURE METHOD AND DEVICE FOR PROTECTING DATA CIRCULATING IN AN ELECTRONIC MICROCIRCUIT - The disclosure relates to a countermeasure method in an electronic microcircuit, comprising successive process phases executed by a circuit of the microcircuit, and adjusting a power supply voltage between power supply and ground terminals of the circuit, as a function of a random value generated for the process phase, at each process phase executed by the circuit. | 2015-01-15 |
20150019886 | INTEGRATED CIRCUIT, SEMICONDUCTOR MEMORY DEVICE, AND OPERATING METHOD THEREOF - An integrated circuit includes an internal circuit including a input/output unit suitable for inputting/outputting data, and a voltage supplying circuit suitable for supplying a first operating voltage to the internal circuit in response to a first control signal during a general operation, and supplying a second operating voltage that is higher than the first operating voltage to the input/output unit in response to a second control signal during an output of the data. | 2015-01-15 |
20150019887 | LOW POWER IDLE SIGNALING FOR GIGABIT MEDIA INDEPENDENT INTERFACES OPERATING IN LEGACY MODES - A method and apparatus for enabling low power idle (LPI) signaling for Ethernet transceivers operating in legacy modes are disclosed that allow a high speed transceiver to retain energy efficient Ethernet (EEE) functionality even when the transceiver is operating in a slower speed mode. In some embodiments, an Ethernet device may enter an LPI mode upon receiving a regular LPI signal when its media independent interface (MII) is operating at a first transmission rate, and may enter the LPI mode upon receiving a modified LPI signal when the MII is operating at a first speed operating at a second transmission rate that is slower than the first transmission rate. | 2015-01-15 |
20150019888 | SYSTEM, APPARATUS, AND METHOD FOR INFORMATION PROCESSING - A system includes apparatuses and a power collecting device for collecting power consumption information at power sources to which the apparatuses are connected, respectively. The apparatus includes a controller that sets the apparatus to a first state or a second state for a lower power consumption; a first obtaining unit that obtains, from the device, first associated information in which first information for identifying the sources is associated with second information indicating power consumption of the respective sources; a retaining unit that retains second associated information in which the first associated information is associated with the time when the first obtaining unit obtains the first associated information; a state determining unit that determines a state of the other apparatus; and a second obtaining unit that obtains third associated information corresponding to a period during which the apparatus is in the second state when the apparatus transits to the first state. | 2015-01-15 |
20150019889 | Virtualizing Battery Across a Group of Personal Mobile Devices - A system, method, and non-transitory computer readable medium for virtualizing battery in a personal mobile device or across a group of personal mobile devices controlled by a user are provided. The user specifies a set of power management policies for applications running in the personal mobile device(s). Battery usage per application is monitored and resources for the applications are scheduled based on the monitored battery usage and the power management policies. | 2015-01-15 |
20150019890 | CACHE ARRAY WITH REDUCED POWER CONSUMPTION - Embodiments of the disclosure include a cache array having a plurality of cache sets grouped into a plurality of subsets. The cache array also includes a read line configured to receive a read signal for the cache array and a set selection line configured to receive a set selection signal. The set selection signal indicates that the read signal corresponds to one of the plurality subsets of the cache array. The read line and the set selection line are operatively coupled to the plurality of cache sets and based on the set selection signal the subset that corresponds to the set selection signal is switched. | 2015-01-15 |
20150019891 | CONTROLLING POWER CONSUMPTION IN MULTI-CORE ENVIRONMENTS - Systems and methods of enabling modulation of a frequency of a first core in a multi-core environment include logic to determine a power limit assigned to the first core, logic to determine a stall count of the first core, and logic to modulate the frequency of the first core based at least on the power limit assigned to the first core and the stall count of the first core. The first core is included in a first tile of a socket in the multi-core computer environment. | 2015-01-15 |
20150019892 | LOW-POWER NEAR-FIELD COMMUNICATION AUTHENTICATION - This document describes techniques ( | 2015-01-15 |
20150019893 | STANDBY POWER INTERCEPTION APPARATUS FOR COMPUTER AND COMPUTER PERIPHERAL DEVICE - The present invention relates to a computer and a method for controlling same, in which power being supplied to a computer peripheral device is completely intercepted in a standby mode (power saving mode) or a monitor power-off mode during use of the computer, and power being supplied to the computer and to the computer peripheral device is completely intercepted when the power of the computer is turned ‘off’. Conventional computers have disadvantages that monitor screens are turned off but power is continuously supplied to monitors and computer peripheral devices that consume power in a standby mode (power saving mode) or a monitor power-off mode during use of the computer, and standby power of the computer is wasted when the power of the computer is turned ‘off’, and standby power of computer peripheral devices (monitor, printer, speaker, etc.) is continuously wasted. Such an unnecessary power waste may cause energy waste and generation of CO | 2015-01-15 |
20150019894 | Power Supply Control Device, Power Supply System and Electronic Device - An electronic device includes a power supply system and a load circuit connected to the power supply system. The load circuit mutually switches between the first mode and the second mode. In the first mode, the load circuit operates with electric power supplied from the power supply system. On the other hand, in the second mode, the load circuit is brought into the state where the electric power does not need to be supplied from the power supply system. In response to the fact that the mode of the load circuit is switched from the first mode to the second mode, a power supply control device causes an AC/DC converter to stop. | 2015-01-15 |
20150019895 | INFORMATION PROCESSING APPARATUS AND JUDGING METHOD - According to one embodiment, an information processing apparatus includes a processor, a non-volatile storage unit, a receiving unit, a judging unit, and a transmitting unit. The receiving unit receives from the processor an inquiry about accessibility of the storage unit. The judging unit judges, upon receipt of the inquiry, whether the storage unit is accessible on the basis of a start-up time period between starting power supply to the storage unit and activation of the storage unit. The transmitting unit transmits a judgment result obtained by the judging unit to the processor. | 2015-01-15 |
20150019896 | METHOD TO CONTROL THE NUMBER OF ACTIVE VECTOR LANES FOR POWER EFFICIENCY - The vector data path is divided into smaller vector lanes. The number of active vector lanes is controllable on the fly by the programmer to match the requirements of the executing program, and inactive vector lanes are powered down by the CPU to increase power efficiency of the vector processor. | 2015-01-15 |
20150019897 | COMMUNICATION SYSTEM, RELAY DEVICE, AND METHOD FOR CONTROLLING POWER SUPPLY - The present invention provides a communication system including a relay device that is capable of simplifying the configuration of a control device for controlling a device based on relay information and reducing cost of the whole system, the relay device and a method for controlling power supply. A GW device includes first to fourth communication parts respectively connected to communication buses, which are connected to ECUs respectively. The GW device receives a message transmitted from each of ECUs, extracts signal information S | 2015-01-15 |
20150019898 | DATA RECEPTION APPARATUS AND METHOD OF DETERMINING IDENTICAL-VALUE BIT LENGTH IN RECEIVED BIT STRING - A data reception apparatus calculates an integrated number of bits by integrating the number of bits in a received bit string; calculates an integrated number of samples by integrating the number of samples obtained by oversampling each bit; obtains a fitting line indicating correspondence between the integrated number of bits and the integrated number of samples based on a plurality of points of which each point corresponds to either only a rise edge or only a fall edge of each bit in the received bit string; and determines a bit length in the received bit string based on the fitting line. | 2015-01-15 |
20150019899 | MEMORY SYSTEM WITH IMPROVED BUS TIMING CALIBRATION - A method includes communicating between a memory controller and multiple memory devices over an interface that includes at least a control signal and an information signal. For each memory device, a respective individual skew parameter, which is indicative of a timing misalignment between the control signal and the information signal when communicating with that memory device, is produced. The respective individual skew parameter is stored coupled to each memory device. The timing misalignment is corrected at the memory device using the stored individual timing skew. | 2015-01-15 |
20150019900 | TOLERATING FAILURES USING CONCURRENCY IN A CLUSTER - A system, and computer program product for tolerating failures using concurrency in a cluster are provided in the illustrative embodiments. A failure is detected in a first computing node serving an application in a cluster. A subset of actions is selected from a set of actions, the set of actions configured to transfer the serving of the application from the first computing node to a second computing node in the cluster. A waiting period is set for the first computing node. The first computing node is allowed to continue serving the application during the waiting period. During the waiting period, concurrently with the first computing node serving the application, the subset of actions is performed at the second computing node. Responsive to receiving a signal of activity from the first computing node during the waiting period, the concurrent operation of the second computing node is aborted. | 2015-01-15 |
20150019901 | TOLERATING FAILURES USING CONCURRENCY IN A CLUSTER - A method is provided in the illustrative embodiments. A failure is detected in a first computing node serving an application in a cluster. A subset of actions is selected from a set of actions, the set of actions configured to transfer the serving of the application from the first computing node to a second computing node in the cluster. A waiting period is set for the first computing node. The first computing node is allowed to continue serving the application during the waiting period. During the waiting period, concurrently with the first computing node serving the application, the subset of actions is performed at the second computing node. Responsive to receiving a signal of activity from the first computing node during the waiting period, the concurrent operation of the second computing node is aborted. | 2015-01-15 |
20150019902 | OpenFlow Controller Master-slave Initialization Protocol - A method for network controller initialization that includes identifying a controller connected to a network as a primary controller that manages switches in the network. One or more other controllers connected to the network are identified as secondary controllers. A failover priority table is created. The failover table indicates an order that the one or more other controllers will replace the controller as the primary controller in the event that the controller enters a failure mode. The failover priority table is broadcast to the switches in the network. | 2015-01-15 |
20150019903 | ISOLATING A PCI HOST BRIDGE IN RESPONSE TO AN ERROR EVENT - Instead of disabling PCI communication between system resources in a host computing device and I/O devices when a PCI Host Bridge (PHB) is unable to function, the host computing device may include a redundant PCI communication path for maintaining communication between the system resources and the I/O devices after a first PHB experiences an unrecoverable error. In one embodiment, the redundant PCI communication path includes a second PHB that is maintained in a standby state so long as the first PHB is functioning normally. However, once the first PHB experiences an unrecoverable error, the second PHB is changed to the master state and assumes the responsibility for maintaining communication between the system resources and the I/O devices. | 2015-01-15 |
20150019904 | DATA PROCESSING SYSTEM AND OPERATING METHOD THEREOF - Provided is an operating method of a data processing system which includes a data storage device and a host device. The operating method includes reading data at the data storage device based on a request from the host device, and performing an error correction code (ECC) decoding operation on the read data, and performing an additional ECC decoding operation at the host device when the ECC decoding operation performed by the data storage device fails. | 2015-01-15 |
20150019905 | STALE DATA DETECTION IN MARKED CHANNEL FOR SCRUB - Embodiments relate to stale data detection in a marked channel for a scrub. An aspect includes bringing the marked channel online, wherein the computer comprises a plurality of memory channels comprising the marked channel and a remaining plurality of unmarked channels. Another aspect includes performing a scrub read of an address in the plurality of memory channels. Another aspect includes determining whether data returned by the scrub read from the marked channel is valid or stale based on data returned from the unmarked channels by the scrub read. Another aspect includes based on determining that the data returned by the scrub read from the marked channel is valid, not performing a scrub writeback to the marked channel. Another aspect includes based on determining that the data returned by the scrub read from the marked channel is stale, performing a scrub writeback of corrected data to the marked channel. | 2015-01-15 |
20150019906 | Transparent and Lightweight Recovery From Hardware Memory Errors - Systems and methods are disclosed that allow for transparently recovering from an uncorrected multi-bit error of arbitrary length located at a memory address. Storing one or more parity pages, for a set of pages in system memory, such that a page in the set of pages may be reconstructed using one of the parity pages is disclosed. Storing an indication of one or more page'disk location such that the one or more pages may be reconstructed by refilling the page from disk is also disclosed. | 2015-01-15 |
20150019907 | DYNAMIC ACCESSING OF EXECUTION ELEMENTS THROUGH MODIFICATION OF ISSUE RULES - Embodiments of the invention relate to dynamically routing instructions to execution units based on detected errors in the execution units. An aspect of the invention includes a computer system including a processor having an instruction issue unit and a plurality of execution units. The processor is configured to detect an error in a first execution unit among the plurality of execution units and adjust instruction dispatch rules of the instruction issue unit based on detecting the error in the first execution unit to restrict access to the first execution unit while leaving un-restricted access to the remaining execution units of the plurality of execution units. | 2015-01-15 |
20150019908 | PROVIDING NON-VOLATILE MEMORY FOR SUSPEND-TO-RANDOM ACCESS MEMORY - A mechanism for providing non-volatile memory for suspend-to-RAM in a computer system. A method includes searching for a checkpoint message in a memory upon receipt of notification of restoring of power in a system. The checkpoint message is a confirmation of storing of state of a storage device prior to loss of the power in the system. The method also includes determining whether the checkpoint message indicates that the system reached the power integrity checkpoint. The power integrity checkpoint is a confirmation of the storing of the state of other device prior to the loss of the power in the system. The other device is different from the storage device. The method further includes restoring operating conditions of the system when it is determined that the system has reached the power integrity checkpoint | 2015-01-15 |
20150019909 | SPECULATIVE RECOVERY USING STORAGE SNAPSHOT IN A CLUSTERED DATABASE - A system, and computer program product for recovery in a database are provided in the illustrative embodiments. A failure is detected in a first computing node, the first computing node serving the database in a cluster of computing nodes. A snapshot is created of data of the database. A subset of log entries is applied to the snapshot, the applying modifying the snapshot to result in a modified snapshot. An access of the first computing node to the data of the database is preserved. Responsive to receiving a signal of activity from the first computing node during the applying and after a grace period has elapsed, the applying is aborted such that the first computing node can continue serving the database in the cluster. | 2015-01-15 |
20150019910 | METHOD OF HANDLING AN EMAIL MESSAGING CAMPAIGN - A computer-implemented method of handling a current email messaging campaign to be broadcast to increase a deliverability parameter regarding a percentage of the campaign which has been successfully delivered is described. The email messaging campaign comprises a plurality of email messages with the same message content and a plurality of different email addresses to send the message content to. The method is implemented on a processor and comprises: receiving feedback data relating to a delivery error arising from a previous email messaging campaign previously broadcast to a plurality of recipients; categorising the feedback data into one of a plurality of categories to identify a type of error; selecting one of a plurality of predetermined corrective actions based on the category of the feedback data determined in the categorising step; and dynamically and automatically modifying the current outgoing email messaging campaign which has yet to be broadcast using the corrective action chosen in the selecting step. | 2015-01-15 |
20150019911 | ADAPTIVE QUIESCE FOR EFFICIENT CROSS-HOST CONSISTENT CDP CHECKPOINTS - A disaster recovery system, including a target datastore for replicating data written to source datastores, and a checkpoint engine (i) for transmitting, at multiple times, quiesce commands to a plurality of host computers, each quiesce command including a timeout period that is adjusted at each of the multiple times, (ii) for determining, at each of the multiple times, whether acknowledgements indicating that a host has successfully stopped writing enterprise data to the source datastores, have been received from each of the host computers within the timeout period, (iii) for marking, at each of the multiple times, a cross-host checkpoint in the target datastore and reducing the timeout period for the quiesce commands at the next time, if the determining is affirmative, and (iv) for increasing, at each of the multiple times, the timeout period for the quiesce commands transmitted at the next time, if the determining is not affirmative. | 2015-01-15 |
20150019912 | ERROR PREDICTION WITH PARTIAL FEEDBACK - A method for performing data processing through a pipeline of components includes receiving a set of training observations, each including partial user feedback relating to error in data output by the pipeline for respective input data. Some pipeline components commit errors for at least some of the input data, contributing to an error in the respective output data. A prediction model models a probability of a pipeline component committing an error, given input data. Model parameters are learned using the training observations. For a new observation which includes input data and, optionally, partial user feedback indicating that an error has occurred in processing the new input data, without specifying which pipeline component(s) contributed to the observed error in the output data, a prediction is made as to which of the pipeline components contributed to the error in the output (if any). | 2015-01-15 |
20150019913 | RANDOM EVENT CAPTURING MECHANISM FOR APPLICATION SYSTEMS - A device may receive a first alert from a first technology layer of an information technology system. The first alert may be associated with an occurrence of a first event within the first technology layer. The device may receive a second alert from a second, different technology layer of the information technology system. The second alert may be associated with an occurrence of a second event within the second technology layer. The device may determine that the first alert is related to the second alert. The device may generate, based on the first alert being related to the second alert, a third alert that includes information associated with the first alert and information associated with the second alert. The device may provide the third alert to at least one of the first technology layer or the second technology layer. | 2015-01-15 |
20150019914 | BASE PROTOCOL LAYER TESTING DEVICE - Embodiments relate to testing of a computing system using a base protocol layer testing device. An aspect includes, based on determining, by the base protocol layer testing device, that a current test comprises a test of a base protocol layer of the computing system, enabling a low level test assist device of the base protocol layer testing device for the current test, wherein the low level test assist device comprises a hardware device that is directly attached to an input/output (I/O) card of the computing system. Another aspect includes storing base protocol layer traffic that passes through the I/O card by the low level test assist device during performance of the current test by the base protocol layer testing device. Yet another aspect includes analyzing the stored base protocol layer traffic after completion of the current test to determine a result of the current test. | 2015-01-15 |
20150019915 | SYSTEMS AND METHODS OF ANALYZING A SOFTWARE COMPONENT - A particular method includes initiating, at an analyzer, execution of a software component at a first computing device. The first computing device includes hardware components and sensors. The sensors are external to the hardware components. A first hardware component of the hardware components is coupled to a second hardware component of the hardware components. A first sensor of the sensors is configured to monitor communications between the first hardware component and the second hardware component. The method also includes receiving monitoring data, from the first sensor, regarding a communication between the first hardware component and the second hardware component. The method further includes analyzing first effects of executing the software component on the first computing device based at least partially on the monitoring data. | 2015-01-15 |
20150019916 | SYSTEM AND METHOD FOR IDENTIFYING PROBLEMS ON A NETWORK - Aspects of the invention may involve systems, methods, and computer readable medium. In an embodiment, a telecommunications network may contain telecommunications probes capable of generating detailed records describing network events. The telecommunications probes may be coupled to computer processors and/or memory. The memory may store detailed records created by the probes and instructions executable by the processors. The instructions may be to: identify detailed records that indicate an event failure including error codes and associated subscriber identifiers; learn a distribution of error codes and associated subscriber identifiers; detect event failures that indicate an increase in the number of subscriber identifiers for an error code; analyze attributes of the detected event failures to identify common attributes between the detected event failures; prepare a report identifying a network issue based on the identified common attributes between the detected event failures; transmit the report; and receive feedback based on the report. | 2015-01-15 |
20150019917 | METHOD OF, AND APPARATUS FOR, ADAPTIVE SAMPLING - A method of sampling sensor data from a computing system is presented. The computing system includes a plurality of components and a sensor network for monitoring the computing system. The sensor network includes primary sensor nodes operable to obtain primary parameter data from a measurement of a primary parameter of the components, and secondary sensor nodes operable to obtain secondary parameter data from a measurement of secondary parameters of the components. The method includes: a) obtaining secondary parameter data from secondary sensor nodes relating to components; b) processing, in a computing device, the secondary parameter data; c) determining, based upon determined or pre-determined relationships between the secondary parameters and the primary parameter, a sample rate for the primary parameter data for the components; and d) obtaining primary parameter data from the primary sensor nodes relating to components at the determined sample rate. | 2015-01-15 |
20150019918 | Method and Apparatus for Reducing Read Latency - A method and an apparatus for reducing a read latency are provided. The method includes: when one or more flash chips corresponding to a read command are in a busy state, setting data read from the one or more flash chips in a busy state to wrong data; obtaining, according to the wrong data and data read from other flash chips, reconstructed correct data, and reporting the correct data. By using the present invention, data read from a flash chip is set to wrong data, and reconstructed correct data is obtained according to the wrong data and data read from other flash chips. In this way, when the flash chip is in a busy state, it can be avoided that a read operation is blocked by an erase operation or a write operation, thereby effectively reducing latency and improving a performance of a storage system. | 2015-01-15 |
20150019919 | STORAGE CONTROL DEVICE AND CONTROL DEVICE FOR DETECTING ABNORMALITY OF SIGNAL LINE - A controller module (CM) includes buffers that feed back signals output using respective signal lines used for mutual communication with other CM, and a first detecting unit and a second detecting unit that detect abnormality such that the levels of the signals output using the signal lines do not change from respective specific levels when each level of the fed-back signals does not coincide with an expected level being a level previously determined according to a predetermined timing. | 2015-01-15 |
20150019920 | CONNECTIVITY FAULT NOTIFICATION - Connectivity fault notification is provided by generating an alarm indication signal at a device that is logically adjacent to the fault, and forwarding the alarm indication signal upward through various levels to at least one client level entity. The alarm indication signal may be suppressed at any level for a service instance if service is restored at that level, or if a protection path prevents disruption of the service instance at that level, or auto-suppressed at an originating node based on number of times transmitted or elapsed time. The alarm indication signal may include a point of failure indicator such as the MAC address of the device that generates the alarm indication signal, or a failed resource identity such as an IEEE 802.1AB LLDP MAC Service Access Point (“MSAP”). Further, the alarm indication signal may be employed to trigger use of the protection path. | 2015-01-15 |
20150019921 | METHOD OF ENCODING DATA - Techniques for encoding data are described herein. The method includes receiving a block payload at a physical layer to be transmitted via a data bus. The method includes establishing a block header comprising an arrangement of bits, the block header defining two block header types, wherein a hamming distance between block header types is at least four. | 2015-01-15 |
20150019922 | Techniques for Adaptive Moving Read References for Memory Cell Read Error Recovery - Examples are given for generating or providing a moving read reference (MRR) table for recovering from a read error of non-volatile memory included in a storage device. In some examples, priorities may be adaptively assigned to entries included in the MRR table. The entries may be ordered for use based on the assigned priorities. In other examples, the MRR table may be ordered for use such that entries with a single MRR value for each read reference value may be used first over entries having multiple MRR values for each read reference value. For these other examples, the MRR table may be adaptively reordered based on which entries were successful or unsuccessful in recovering from a read error but may still be arranged to have single MRR value entries used first for use to recover from another read error. | 2015-01-15 |
20150019923 | NETWORK DEVICES WITH MULTIPLE FULLY ISOLATED AND INDEPENDENTLY RESETTABLE DIRECT MEMORY ACCESS CHANNELS AND METHODS THEREOF - A method, computer readable medium, and system independently managing network applications within a network traffic management device communicating with networked clients and servers include monitoring with a network device a plurality of applications communicating over a plurality of direct memory access (DMA) channels established across a bus. The network device receives a request from a first application communicating over a first DMA channel in the plurality of DMA channels to restart the first DMA channel. In response to the request, the first DMA channel is disabled with the network device while allowing other executing applications in the plurality of applications to continue to communicate over other DMA channels in the plurality of DMA channels. A state of the first DMA channel is cleared independently from other DMA channels in the plurality of DMA channels, and communications for the first application over the first DMA channel are resumed with the network device. | 2015-01-15 |
20150019924 | FAULT BITS SCRAMBLING MEMORY AND METHOD THEREOF - A fault bits scrambling memory and method thereof relate to a memory including at least one memory bank. The memory bank includes a memory module, a scrambling-logic unit, a self-testing unit and a scrambling code generating unit. The memory module includes a plurality of pages. Each page has a plurality of memory cells, and each memory cell has a physical address. The scrambling logic unit receives a scrambling code and the physical address to generate a mapping address by logical calculation, and outputs the mapping address to the memory module. The self-testing unit detects the faulty memory cells of each page. The scrambling code generating unit is applied to generate the scrambling code to maintain the number of the faulty memory cells corresponding to the mapping address of the same page is up to a maximum tolerance. | 2015-01-15 |
20150019925 | DATA STORAGE DEVICE AND FLASH MEMORY CONTROL METHOD - An identification technique for physically damaged blocks of a flash memory of a data storage device. In the data storage device, a controller coupled to the flash memory writes data into the flash memory with at least one time stamp corresponding to the data. The time stamp is taken into consideration by the controller to identify the physically damaged blocks of the flash memory, and thereby it is prevented from erroneously identifying a physically undamaged block as bad. Thus, the flash memory is prevented from being erroneously regarded as a write protected memory. The lifespan of the flash memory is effectively prolonged. | 2015-01-15 |
20150019926 | MANUFACTURING TESTING FOR LDPC CODES - An amount of time and an error rate function are received, where the error rate function defines a relationship between a number of iterations associated with iterative decoding and an error rate. A testing error rate is determined based at least in part on the amount of time. The number of iterations which corresponds to the testing error rate in the error rate function is selected to be a testing number of iterations; the testing error rate and the testing number of iterations are associated with testing storage media using iterative decoding. | 2015-01-15 |
20150019927 | TEST SYSTEM AND DEVICE - An aspect of the present invention is to provide a test system for detecting whether a continuity fault condition, e.g., a short or open condition, exists in the path between a tester and chips on a wafer during a wafer level burn-in testing. According to one embodiment of the present invention, the test system comprises a probe card and n chips. The probe card comprises m first signal contacts for receiving m test signals from the tester, n second signal contacts for providing n test results to the tester, and a contact array. The probe card is in contact with the chips on the wafer through a plurality of needles. In this manner, the test system can detect whether the continuity fault condition exists in the path between the tester and the chips on the wafer during the wafer level burn-in testing. | 2015-01-15 |
20150019928 | SEMICONDUCTOR TEST SYSTEM AND METHOD - A test controller applies test stimulus signals to the input pads of plural die on a wafer in parallel. The test controller also applies encoded test response signals to the output pads of the plural die in parallel. The encoded test response signals are decoded on the die and compared to core test response signals produced from applying the test stimulus signals to core circuits on the die. The comparison produces pass/fail signals that are loaded in to scan cells of an IEEE 1149.1 scan path. The pass/fail signals then may be scanned out of the die to determine the results of the test. | 2015-01-15 |
20150019929 | ALTERNATE SIGNALING MECHANISM USING CLOCK AND DATA - Control events may be signaled to a target system having a plurality of components coupled to a scan path by using the clock and data signals of the scan path. While the clock signal is held a high logic level, two or more edge transitions are detected on the data signal. The number of edge transitions on the data signal is counted while the clock signal is held at the high logic state. A control event is determined based on the counted number of edge transitions on the data signal after the clock signal transitions to the low logic state. | 2015-01-15 |
20150019930 | APPARATUS AND METHOD FOR DESIGNING QUANTUM CODE - Provided is an apparatus for designing a quantum code, which includes an analyzing unit for analyzing at least one quantum error generated in a quantum error channel as at least one binary error by using a standard form codeword stabilized quantum (CWS) code, a code generating unit for generating a binary error-correcting code which corrects the at least one binary error, a word operator generating unit for generating at least one word operator of the CWS code by using the at least one binary error-correcting code, and a codeword generating unit for generating at least one codeword including at least one entangled qubit (ebit) by using the at least one word operator. | 2015-01-15 |
20150019931 | ERROR CORRECTING DECODING APPARATUS FOR DECODING LOW-DENSITY PARITY-CHECK CODES | 2015-01-15 |
20150019932 | STORAGE DEVICE, CRC GENERATION DEVICE, AND CRC GENERATION METHOD - According to one embodiment, storage device, a CRC generator device and a CRC generation method includes A storage device includes: a storage unit | 2015-01-15 |
20150019933 | MEMORY CONTROLLER, STORAGE DEVICE, AND MEMORY CONTROL METHOD - A memory controller includes a control unit configured to determine a storage location on a nonvolatile memory every unit data having a constant data length to be written into the nonvolatile memory, a plurality of parity storage units, an access control unit configured to select one parity storage unit on the basis of the storage location, and an XOR operation unit that performs an XOR operation every bit location by using the input unit data and data stored in the selected parity storage unit and stores an operation result of the XOR operation into the selected parity storage unit. Unit data is written into the nonvolatile memory. If the number of unit data which are input has reached a predetermined number, the operation result of the XOR operation stored in the parity storage unit is written into the nonvolatile memory. | 2015-01-15 |
20150019934 | DATA STORAGE DEVICE, OPERATING METHOD THEREOF, AND DATA PROCESSING SYSTEM INCLUDING THE SAME - A data storage device and a method of operating the same. The method of operating the data storage device may include reading a first data group, detecting errors contained in the first data group and correcting the errors of the first data group, if the errors detected from the first data group can be corrected, and estimating a read retry estimation voltage based on error correction data generated based on the step of correcting the errors of the first data group. | 2015-01-15 |
20150019935 | EARLY DATA DELIVERY PRIOR TO ERROR DETECTION COMPLETION - A computer implemented method for early data delivery prior to error detection completion in a memory system includes receiving a frame of a multi-frame data block at a memory control unit interface. A controller writes the frame to a buffer control block in a memory controller nest domain. The frame is read from the buffer control block by a cache subsystem interface in a system domain prior to completion of error detection of the multi-frame data block. Error detection is performed on the frame by an error detector in the memory controller nest domain. Based on detecting an error in the frame, an intercept signal is sent from the memory controller nest domain to a correction pipeline in the system domain. The intercept signal indicates that error correction is needed prior to writing data in the frame to a cache subsystem. | 2015-01-15 |
20150019936 | ERROR DETECTION METHOD AND A SYSTEM INCLUDING ONE OR MORE MEMORY DEVICE - In accordance with various embodiments, a memory device and method of error detection and correction are disclosed. A memory device may include an input for receiving a command packet including an error detection code to facilitate command error detection. The memory device may include an error manager configured to detect, based on the error detection code, whether an error occurred in transmission of the command packet, a command register configured to store the command packet and configured to provide the command packet to the error manager, and an output to transmit the command packet to a subsequent device of the point-to-point ring topology. | 2015-01-15 |
20150019937 | ERASURE CODING AND REPLICATION IN STORAGE CLUSTERS - A cluster receives a request to store an object using replication or erasure coding. The cluster writes the object using erasure coding. A manifest is written that includes an indication of erasure coding and a unique identifier for each segment. The cluster returns a unique identifier of the manifest. The cluster receives a request from a client that includes a unique identifier. The cluster determines whether the object has been stored using replication or erasure coding. If using erasure coding, the method reads a manifest. The method identifies segments within the cluster using unique segment identifiers of the manifest. Using these unique segment identifiers, the method reconstructs the object. A persistent storage area of another disk is scanned to find a unique identifier of a failed disk. If using erasure coding, a missing segment previously stored on the disk is identified. The method locates other segments. Missing segments are regenerated. | 2015-01-15 |
20150019938 | IN-LINE PACKET PROCESSING - A method and apparatus for in-line processing a data packet while routing the packet through a router in a system transmitting data packets between a source and a destination over a network including the router. The method includes receiving the data packet and pre-processing layer header data for the data packet as the data packet is received and prior to transferring any portion of the data packet to packet memory. The data packet is thereafter stored in the packet memory. A routing through the router is determined including a next hop index describing the next connection in the network. The data packet is retrieved from the packet memory and a new layer header for the data packet is constructed from the next hop index while the data packet is being retrieved from memory. The new layer header is coupled to the data packet prior to transfer from the router. | 2015-01-15 |
20150019939 | DEVICE AND METHOD FOR IMPROVED LOST FRAME CONCEALMENT - A method and system are described herein that employ a lost frame concealment technique for processing data frames received during transmission over a communications channel. The lost frame concealment technique involves determining whether a current data frame is a bad frame, performing source decoding on the current data frame with one or more parameters that are limited by a first set of one or more values if the current data frame is a bad frame, and performing source decoding on the current data frame with one or more parameters that are not limited if the current data frame is a good frame. | 2015-01-15 |
20150019940 | SYSTEM AND METHOD FOR THE CREATION OF LANGUAGE-LED, COLLABORATIVE MULTIMEDIA DOCUMENTS - A system and related method are disclosed for the creation of language-led collaborative multimedia documents. The method includes receiving a first user's identification of at least one term, receiving an instruction from the first user or a second user linking that at least one term to an exhibit, and displaying the term to other users with a representation of the exhibit that, when selected, causes the exhibit to display. The first user can control who is invited to link an exhibit to a given term, and who can see which portions of a completed document, or exhibits attendant thereto. | 2015-01-15 |
20150019941 | Apparatus For Presence Documentation and Asset Chemistry! - Telling a story in general, and about one's present situation in particular, may involve the creation and arrangement of many kinds of media assets, including but not limited to text, images, videos, sounds. Especially when the story to be told involves documenting the fluctuating and shifting present state of the user, which medium is best suited to the moment may fluctuate and shift along with that user state. In some aspects, the present invention opens several streams of data collection simultaneously, allowing the user to rapidly and efficiently shift between modes of self expression and documentation of their environment. | 2015-01-15 |
20150019942 | FILE ATTACHMENT METHOD AND ELECTRONIC DEVICE THEREOF - A method for operating an electronic device includes attaching a file to a first application program; generating an image corresponding to the file; and inserting the image into the first application program. | 2015-01-15 |
20150019943 | HIERARCHICAL PAGE TEMPLATES FOR CONTENT PRESENTATION IN A DIGITAL MAGAZINE - A digital magazine server creates a section of a digital magazine including content items based on a page template describing the relative positioning and sizing of content items. A page template may include display regions specifying the size of content items as a percentage of a display area. Additionally, a display region in a page template may specify use of a sub-template for presenting content items. The sub-template includes display regions specifying the relative positioning of content items presented in the display region specifying use of the sub-template. To generate the section of the digital magazine, various page templates are scored and a page template is selected based on the scoring. One or more diversity policies may be enforced when selecting the page template to improve user interaction with the digital magazine. | 2015-01-15 |
20150019944 | HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS - The HYBRID APPLICATIONS UTILIZING DISTRIBUTED MODELS AND VIEWS APPARATUSES, METHODS AND SYSTEMS (“HAP”) transform hybrid application user inputs using HAP components into web-view secured data populated application views. In some implementations, the disclosure provides a processor-implemented method of providing distributed model views utilizing a hybrid application environment. | 2015-01-15 |
20150019945 | SYSTEMS, METHODS AND MACHINE READABLE MEDIUMS FOR DEFINING AND EXECUTING NEW COMMANDS IN A SPREADSHEET SOFTWARE APPLICATION - Systems, methods and machine-readable mediums for defining and executing new commands in a spreadsheet application are provided. A method may include receiving a declaration command in a first spreadsheet cell. The declaration command identifying a command name for the new command and operations performed for the command name based on a plurality of second spreadsheet cells. A system may include a processor programmed to evaluate the declaration command in the first spreadsheet cell according to the instructions stored in a storage device, receive the command name and at least two parameters identifying at least one input spreadsheet cell and at least one output spreadsheet cell of the spreadsheet application, create a new command for the spreadsheet application, and evaluate the new command as identified by the command name in a second spreadsheet cell for execution. The computer readable mediums provide instructions to cause the processor to perform the operations above. | 2015-01-15 |
20150019946 | INTEGRATED, CONFIGURABLE, SENSITIVITY, ANALYTICAL, TEMPORAL, VISUAL ELECTRONIC PLAN SYSTEM - An integrated, configurable, sensitivity, analytical, temporal, visual system for an electronic plan system including stored in a memory and configured to be executed by one or more processors. The programs include instructions to generate: an electronic plan including one or more row descriptors each including a plurality of row descriptor properties, one or more column descriptors each including a plurality of column descriptor properties, one or more cells mapped to one of the row descriptors by a unique row descriptor identifier and to one of the of one of the column descriptors by a unique column descriptor identifier, and each of the one or more cells including a numeric formula or a user-defined formula that references one or more other cells. An interpreter is configured to read each formula of the one or more cells and determine dependency data associated with each cell. A calculation engine responsive to the interpreter is configured to determine a numeric value of each of the one or more cells, and a sensitivity analyzer responsive to a configurable user-initiated change to a value of a start cell is configured to activate the calculation engine to calculate the value of dependent cells affected by said change and visually highlight the dependent cells affected by the change in a predetermined sensitivity format. | 2015-01-15 |
20150019947 | Multi-Client Collaboration to Access and Update Structured Data Elements - Tools and techniques for providing multi-client collaboration to access and update structured data elements are disclosed. Client systems may present user interfaces that provide libraries of published data elements that are available for collaboration. The clients may request selected data elements, while referencing unique identifiers associated with the selected data elements. Those clients that publish data elements for collaboration by others may present user interfaces that provide representations of candidate structured data elements, and receive selections of those data elements chosen for publication. The publishing clients may then send the selected data elements for publication. The client systems may interact with servers or collaboration services, which may receive structured data elements that the clients have published for access by others. The servers may define respective unique identifiers for the published data elements, and may send the structured data elements and corresponding unique identifiers to various client systems. | 2015-01-15 |
20150019948 | HUB APPARATUS AND METHOD OF USE THEREOF FOR UPDATING MICROSITES - The invention comprises a hub apparatus and method of use thereof for generating and/or updating a plurality of microsites. In one case, initially a controller updates a hub with a limited number of parameters common to a large number of microsites. Subsequently, the hub is used to update common parameters across a number of microsites. Updated parameters common to the microsites include: a string of text, microsite information, an image, an animation, a video, a banner, a background, a skin, a rendered image, hidden information, and/or any other microsite element. In another case, microsites are generated with user specific information, such as based on a user profile and/or commonalities between the user profile and products/services offered by a company. | 2015-01-15 |
20150019949 | SYSTEM AND METHOD FOR GENERATING A DIGITAL EDITION - A system and method to concurrently preview or publish a digital edition. The system comprises a compilation database and an assembler system. The assembler system includes: a receiving module to receive page edition data; a verification module to identify pages edited or created since a last successful compilation; a parser to determine whether the pages edited or created since the last successful compilation are error-free or error-generating pages and to generate replacement parsed page data or parsed page data accordingly; and a compiler. The compiler is configured to: compile the parsed page data and generate compiled page data for each of the pages edited or created since the last successful compilation; combine the compiled page data of the pages edited or created since the last successful compilation with compiled page data stored in the compilation database for unmodified pages; and generate compiled edition data. | 2015-01-15 |
20150019950 | DISPLAY OF USER COMMENTS TO TIMED PRESENTATION - A method and system to dynamically display a presentation of a time duration are described. The system includes a processor to receive comments associated with the presentation, the comments arranged in a first ordering, to identify a time reference comment among the comments, the time reference comment including a time reference referencing a time instant within the time duration of the presentation, and to dynamically change an ordering of the comments from the first ordering to a second ordering at the time instant. The system also includes a display device to display the presentation with the comments, the comments arranged according to the ordering. | 2015-01-15 |
20150019951 | METHOD, APPARATUS, AND COMPUTER STORAGE MEDIUM FOR AUTOMATICALLY ADDING TAGS TO DOCUMENT - A method and apparatus for automatically adding a tag to a document are provided. The method comprises: determining a plurality of candidate tag words corresponding to the document; determining a corpus comprising a plurality of texts; selecting commonly-used words from the corpus as characteristic words; determining, for each of the characteristic words and each of the candidate tag words, a probability for co-occurrence of the candidate tag word with the characteristic word; abstracting characteristic words from the document, and calculating a weight for each of the abstracted characteristic words; and calculating, in the corpus, a weighted probability for co-occurrence of each of the candidate tag words with all of the characteristic words abstracted from the document; selecting the candidate tag word with a high weighted co-occurrence probability as a tag word to be added to the document. | 2015-01-15 |
20150019952 | SYSTEMS AND METHODS FOR PROVIDING AND UTILIZING USER-SPECIFIC INFORMATION - Systems and methods for providing user-specific information and utilizing user-specific information for web applications are described. A user query is received and appended with a temporary ID which contains information related to the user. The appended user input is provided to an application. An indication that the application wishes to unlock the temporary ID is received. The temporary ID is unlocked and information about the user is sent to the application. An item of value may be provided for a valid temporary ID and/or to unlock the temporary ID. The temporary ID is changed and/or associated with a null value or inaccurate data. The application may then provide another item of value for a valid temporary ID and/or to unlock the temporary ID, in order to receive certain information related the user. | 2015-01-15 |
20150019953 | Adaptive Content Delivery - Methods and systems for providing and managing content are disclosed. An example method can comprise receiving at least a portion of a content item and determining a timing attribute associated with at least a portion of the content item. An example method can also comprise determining a delivery information attribute based on the timing attribute. The delivery information attribute can comprise at least one of a time duration to process at least a portion of the content item and a time duration to receive or transmit at least a portion of the content item. An example method can also comprise receiving an update to the content item based on the delivery information attribute. | 2015-01-15 |
20150019954 | SYSTEM AND METHOD FOR ORCHESTRATION OF CUSTOMIZATION FOR A USER EXPERIENCE - A system and method for orchestration of customization for a user experience is disclosed. The system in an example embodiment includes automatically producing user experience customization selections fur generating a webpage based on context information and a collection of user activity feedback from a community of users who previously interacted with the webpage. The user experience customization selections include a plurality of modules for inclusion in the web page, where each of the modules represent a user-interface element. One or more of the plurality of modules having input and output properties defining at least one application programming interface (API). The system in a further embodiment includes discovering dependencies between the one or more of the plurality of modules by extracting dependency information from the at least one API associated with the one or more of the plurality of modules. The system in another embodiment includes generating a dependency graph for the webpage based on the dependencies between the one or more of the plurality of modules and invoking the plurality of modules based on the dependency graph to generate the webpage. | 2015-01-15 |