06th week of 2015 patent applcation highlights part 67 |
Patent application number | Title | Published |
20150040095 | Method of Improving Timing Critical Cells For Physical Design In The Presence Of Local Placement Congestion - Optimizing circuits having a congested placement with a timing critical placement map includes identifying critical circuit components in the placement map and determining failing circuit components in the placement map; determining “non-critical” circuit components safe to be moved; removing selected non critical from the placement map; and optimizing the critical circuit components in a new partial placement image of said map; and reinserting the “non-critical” circuit components back into said placement image. The optimization is performed by circuit transformation operating in congested regions of the placement image enabling cell insertion and modifications that increase cell size. | 2015-02-05 |
20150040096 | EMULATION-BASED FUNCTIONAL QUALIFICATION - Techniques for emulation-based functional qualification are disclosed that use an emulation platform to replace simulation in mutation-based analysis. A method for functional qualification of an integrated circuit design includes receiving an integrated circuit design having one or more mutations. Emulation setup and activation simulation are performed in parallel to maximize computing resources. A prototype board can then be programmed according to the integrated circuit design and a verification module. A set of test patterns and response generated by a simulation of the integrated circuit using the set of test patterns are stored in a memory of the prototyping board allowing enumeration of mutants to occur at in-circuit emulation speed. | 2015-02-05 |
20150040097 | SYSTEMS AND METHODS FOR DEFINING A SIMULATED INTERACTIVE WEB PAGE - The system includes a novel software application interactive representation modeling language, a software application ( | 2015-02-05 |
20150040098 | SYSTEMS AND METHODS FOR DEVELOPING AND DELIVERING PLATFORM ADAPTIVE WEB AND NATIVE APPLICATION CONTENT - Systems and methods for developing and delivering platform-adaptive web and native application content are disclosed. A hierarchy of templates is provided in which each template includes content compatible with a device that has various associated characteristics, such as particular hardware and software configurations. At least one of the templates has an inheritance relationship with one or more other templates in the hierarchy. A request for content is received from a requesting device. The request includes a device identifier, such as a user agent string, indicative of one or more characteristics associated with the requesting device. One or more of the templates are then selected based on the device identifier and are used to generate content compatible with the requesting device. | 2015-02-05 |
20150040099 | EXTENSIBLE APPLICATIONS USING A MOBILE APPLICATION FRAMEWORK - In an example embodiment, a mobile application framework is provided. This includes a core component configured to expose one or more application program interfaces (APIs) that initialize the mobile application framework when executed. This also includes a user interface component configured to encapsulate a metadata-driven view for the mobile application. This also includes a data component configured to provide bindings to one or more business objects defining data for the mobile application. This also includes a configuration component configured to read and parse metadata in the one or more configuration files and transform the metadata to constructs native to the mobile application. | 2015-02-05 |
20150040100 | Creation and Deployment of RESTful Web Services in a Graphical Programming Language - Method and memory medium for generating a web service. A plurality of graphical data flow programs may be provided, and user input selecting one or more of plurality of graphical data flow programs for inclusion in a web service may be received, The web service may be generated based on the one or more graphical data flow programs. Each graphical data flow program may implement a respective web method, where each web method may implement or request a respective action. The web service may be deployable to a server for hosting, where the web service is invocable over a network to perform the corresponding one or more web methods. | 2015-02-05 |
20150040101 | Collaborative Awareness in Software Development - Methods, systems, and computer-readable storage media for supporting concurrent activities in distributed development processes. In some implementations, actions include providing source code for display to a first developer, receiving first status information associated with the source code, the first status information being received in response to a determination that a second developer is concurrently accessing the source code, and reflecting a first status of the source code, processing the first status information to provide first collaboration information, and providing the first collaboration information for display to the first developer. | 2015-02-05 |
20150040102 | SYSTEM AND METHOD FOR SOFTWARE INTEROPERABILITY - A software interoperability system includes at least one processor, at least one computer-readable tangible storage device, and program instructions stored on the at least one storage device for execution by the at least one processor. The program instructions include first program instructions configured to map a program operation of a first programming type to a programming operation of a second programming type. The program instructions further include second program instructions configured to generate a first programming type representation of an object associated with the program operation of the second programming type based on the map. The program instructions further include third program instructions configured to effect an invoked instance of the first programming type representation via an interface associated with the second program type. | 2015-02-05 |
20150040103 | DATA COMPONENT IN A MOBILE APPLICATION FRAMEWORK - In an example embodiment, one or more configuration files are defined for an extensible application, the one or more configuration files including metadata for the extensible application. Then code defining behavior of the extensible application is combined with a mobile application framework, the mobile application framework including a data component configured to obscure details of an underlying data source for the extensible application, the code including calls made to one or more of the generic components. The code is compiled and one or more of the configuration files can be uploaded to a mobile platform server for storage. Then the compiled code is uploaded to a platform server for distribution to one or more devices. One or more of the configuration files is configured to alter an aspect of the extensible application. Finally, the altered one or more configuration files is uploaded to the mobile platform server for storage. | 2015-02-05 |
20150040104 | TILES IN A MOBILE APPLICATION FRAMEWORK - In an example embodiment, a mobile application framework is added to a metadata-driven application. The mobile application framework includes generic libraries having one or more references to one or more configuration files stored on a platform server. Then the one or more configuration files can be updated to include one or more tiles, each tile comprising a user interface element or screen view, each tile being either a primitive tile or a tile embedding other nested tiles within it, thereby updating the metadata-driven mobile application without recompiling it. | 2015-02-05 |
20150040105 | SYSTEM AND/OR METHOD FOR COMPUTING INTERPROCEDURAL DOMINATORS - According to an aspect of some embodiments of the present invention there is provided a computerized method of analyzing code of a software program for dominance relationships between a plurality of functions of the software program, the method comprising: receiving source code of a software program, the source code having a plurality of functions; identifying a plurality of intraprocedural dominator graphs each for another of the plurality of functions; combining the plurality of intraprocedural dominator graphs to create an interprocedural dominance graph with edges that logically connect between nodes of the plurality of functions; identifying a plurality of interprocedural dominance relations between nodes in different functions of the plurality of functions using the interprocedural dominance graph; and analyzing the software program according to the plurality of interprocedural dominance relations. | 2015-02-05 |
20150040106 | Compiler and Method for Global-Scope Basic-Block Reordering - An embodiment method of global scope basic-block reordering includes profiling an application having a source code decomposable into a plurality of basic-blocks. The profiling yields a global basic-block sequence. The method also includes generating a hierarchical locality model according to the global basic-block sequence. The method also includes generating a target code according to the hierarchical locality model. | 2015-02-05 |
20150040107 | SOLVING AN OPTIMIZATION PROBLEM USING A CONSTRAINTS SOLVER - Systems and techniques are described for solving an optimization problem using a constraints solver. A set of constraints that correspond to the optimization problem can be generated. Next, a set of upper bound constraints can be added to the set of constraints, wherein the set of upper bound constraints imposes an upper bound on one or more variables that are used in an objective function of the optimization problem. Next, the embodiments can iteratively perform the following set of operations on a computer: (a) solve the set of constraints using the constraints solver; (b) responsive to the constraints solver returning a solution, decrease the upper bound; and (c) responsive to the constraints solver indicating that no solutions exist or that the constraints solver timed out, increase the upper bound. The solution with the lowest upper bound value can be outputted as the optimal solution for the optimization problem. | 2015-02-05 |
20150040108 | PARALLEL PROGRAM ANALYSIS AND BRANCH PREDICTION - Systems and methods for predicting execution paths of at least one target program of a plurality of programs that are run in parallel are described. In one method, execution flows of programs are generated by conducting a static analysis. In addition, the programs are executed to obtain debug logs from the programs. Further, communication messages transmitted between the execution flows are identified from the debug logs. A deduction that at least one conditional branch was taken in at least one given execution flow of the first execution flows by the target program is made based on the communication messages that are identified in the debug logs. Based on the deduction, at least one conditional branch that was not taken is removed from the given execution flow. In addition, modified execution flows that were modified in accordance with the removal are output to indicate predicted execution paths of the target program. | 2015-02-05 |
20150040109 | METHOD AND APPARATUS FOR GENERATING EXECUTABLE FILE OR MULTI-INSTANCE SERVICE - The present invention relates to a method and an apparatus for generating an executable file of a multi-instance service. The method includes: performing compilation for a source file corresponding to a multi-instance service, to obtain a first-class object file, where the multi-instance service includes N instances, and N is a natural number greater than or equal to 2; performing an object copy of the first-class object file N−1 times, to obtain N−1 new first-class object files; and performing linking to the first-class object file and the N−1 new first-class object files, to generate an executable file. In the present invention, an executable file is generated by performing mirroring and linking processing for an object file obtained by compilation, thereby reducing a development cost and a maintenance cost of software source code. | 2015-02-05 |
20150040110 | SYSTEMS AND METHODS FOR INCREMENTAL COMPILATION AT RUNTIME USING RELAXED GUARDS - Techniques provided herein facilitate just-in-time compilation of source code, such as a script, during execution. According to some embodiments, a tracelet is limited to a single basic block of code. The data types of variable values provided by one or more variables used in the single basic block of code are known by generalized categories, rather than only being known by specific data types. Accordingly, guard code associated with each tracelet, which ensures that variable values received by the tracelet though the variables are of the data types expected by the tracelet's associated code body, can use generalized data types. The tracelet can contain code body that can handle input values that meet those generalized data types. A generalized data type can be defined according to one or more common characteristics shared by two or more specific data types. | 2015-02-05 |
20150040111 | HANDLING PRECOMPILED BINARIES IN A HARDWARE ACCELERATED SOFTWARE TRANSACTIONAL MEMORY SYSTEM - A method and apparatus for enabling a Software Transactional Memory (STM) with precompiled binaries is herein described. Upon encountering an access operation in a transaction, an annotation field associated with a memory location referenced by the access is checked. In response to the memory location representing a previous similar access within the transaction, the access is performed without access barriers. However, if the annotation field is in a default state representing no previous access during a pendancy of the transaction, then a mode of the processor is determined. If the processor mode is in implicit mode, an access handler/barrier is asynchronously executed. Conversely, in an explicit mode, a flag is set instead of asynchronously executing the handler. In addition, during compilation convert explicit and convert implicit instructions are inserted to intelligently convert modes for precompiled and newly compiled binaries. Furthermore, new versions of newly compiled functions may be inserted to provide strong atomicity between previously and newly compiled functions. | 2015-02-05 |
20150040112 | Enabling Interoperability Between Software Applications By Utilizing Partial Binaries - Methods, devices, and systems for creating interoperability between applications that are not designed to be compatible by modifying a binary (or library binary) to encompass necessary functionality without an in-depth understanding of the additional content. A computing device may be configured to identify a function associated with a first binary that is missing from a second binary. In an aspect, the computing device may utilize error codes or diagnostic information from a loader/linker software. The computing device may analyze the first binary to identify a portion of code (or object) corresponding to the missing function, such as by evaluating related assembly code to identify a position-independent portion. The computing device may insert the identified portion of code into the second binary to generate a new binary. In an aspect, the computing device may utilize a dynamic linker configured to link to functions from both the first and second binaries. | 2015-02-05 |
20150040113 | OPERATING SYSTEM REPLACEMENT FOR IN-VEHICLE COMPUTING SYSTEM - Embodiments are disclosed for a method of replacing an original operating system with a new operating system. In one example embodiment, a method to selectively replace a first in-vehicle operating system includes receiving a temporary update including a second in-vehicle operating system for storage in a memory location of the first in-vehicle operating system and receiving a request to update the first in-vehicle operating system based on the temporary update. The method may further include triggering a reboot of the first in-vehicle operating system including installing the second in-vehicle operating system. | 2015-02-05 |
20150040114 | INFORMATION PROCESSING APPARATUS, SERVER APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a communication unit, a storage, and a controller. The communication unit is capable of communicating with a server. The storage is capable of storing data used for predetermined processing. The controller is capable of controlling the communication unit to receive notification information from the server, the notification information containing current version information and updated version information, the current version information indicating a current version of the data, the updated version information indicating an updated version of the current version of the data, and acquire the updated version from a predetermined storage location after waiting for a standby time optionally determined within a predetermined maximum standby time. Further, the controller is capable of controlling the storage to update the stored data to the acquired updated version after an elapse of the maximum standby time. | 2015-02-05 |
20150040115 | SYSTEM AND METHOD FOR ACCELERATED SOFTWARE UPGRADES - A method and apparatus of a device that updates a software image for a network element is described. In an exemplary embodiment, a device receives a signal to update the network element with the new software image, where the network element includes a plurality of hardware forwarding engines and a control plane. The device further boots the control plane with the new software image, where the booting is accomplished without restarting the control plane. In one embodiment, the device boots the control plane by chain booting from a current software image to the new software image. The device additionally restarts and reconfigures the plurality of hardware forwarding engines. In a further embodiment, the device additionally prefills one or more queues in the hardware forwarding engines with keep-alive messages. These keep-alive messages are transmitted during the time that the control plane is being restarted. In a further embodiment, the hardware forwarding engines are reconfigured without restarting them. | 2015-02-05 |
20150040116 | Method And System For Software Delivery Service - Provided herein are techniques for distributing software. An embodiment operates by receiving a software product request including a unique identification information, verifying the unique identification information, and distributing a software product associated with the unique identification information in response to the request. | 2015-02-05 |
20150040117 | Deploying Updates to an Application During Periods of Off-Peak Demand - Update preferences might be utilized to specify that an update to an application should not be applied until the demand for the application falls below a certain threshold. Demand for the application is monitored. The update to the application is applied when the actual demand for the application falls below the specified threshold. The threshold might be set such that updates are deployed during the off-peak periods of demand encountered during a regular demand cycle, such as a diurnal, monthly, or yearly cycle. | 2015-02-05 |
20150040118 | SYSTEM AND METHOD FOR AUTOMATICALLY UPDATING THE SOFTWARE OF A NETWORKED PERSONAL AUDIOVISUAL DEVICE - A method for automatically updating software executed by an electronic device is disclosed herein. The method includes receiving, at the electronic device, an update indication from a server that updated software is available for the electronic device. The method further includes modifying, in response to the update indication, a boot state of the electronic device and initiating operation of the electronic device in an update mode. The updated software is received, at the electronic device, during operation in the update mode. The method further includes initiating, upon determining the updated software has been correctly received, operation of the electronic device in a normal mode. | 2015-02-05 |
20150040119 | COMPUTER SYSTEM AND DEVICE DRIVER INSTALLATION METHOD - A computer system includes: storing a first file management table that stores a record associating a device driver that can be installed in the computer system with identification information of a logic area in which the particular device driver is stored; reading a second file management table stored in a recording medium placed in the drive, generating a third table by inserting the record in the first management table into the second management table, and generating a virtual file management table that associates the third table with the device driver stored in the first table as well as the device driver stored in the second table, and searching for the device driver requested, install the requested device driver. | 2015-02-05 |
20150040120 | METHOD AND SYSTEM FOR SELECTING A PROGRAM FOR DOWNLOAD - A system selects an application program for download. The system includes a host system, such as a personal computer, having a disk sub-system storing a plurality of application programs. The disk sub-system includes a file storing a plurality of identifiers, with each of at least some of the identifiers being associated with one or more of the application programs. A target system, such as a wireless handheld electronic device, includes a hardware identifier and a vendor identifier. A communications channel connects the host system and the target system. An application loader routine executes at the host system, communicates with the target system through the communications channel, requests the hardware and vendor identifiers as a received identifier from the target system over the communication channel, and employs the identifiers and the received identifier to select one of the application programs for download from the host system to the target system. | 2015-02-05 |
20150040121 | Bandwidth Control in Multi-Tenant Virtual Networks - Machines, systems and methods for managing quality of service (QoS) in a multi-tenant virtualized computing environment, the method comprising: collecting transmission rate statistics associated with data communicated in a virtual network, wherein at least one virtual switch monitors communications initiated by at least a virtual machine (VM) executed on a host machine serviced by the virtual switch; determining, by way of the virtual switch, profile parameters associated with a first communication initiated by the VM belonging to at least a first group, wherein a connection request is submitted by the virtual switch to a traffic controller to assist in establishing the first communication; classifying the connection request for establishing the first communication according to the profile parameters associated with the first communication; determining a first aggregated transmission rate associated with the VM that initiated the first communication based on the classifying. | 2015-02-05 |
20150040122 | AUTONOMIC VIRTUAL MACHINE SESSION LINGERING - Virtual machine sessions may be hosted by a virtualization computing platform. A portion of the virtual machine sessions that are inactive may be identified. The virtualization computing platform may continue to host the virtual machine sessions that are inactive. A determination may be made that utilization of one or more resources associated with the virtualization computing platform exceeds a threshold. Responsive to determining that utilization of the one or more resources associated with the virtualization computing platform exceeds the threshold, the virtualization computing platform may cease to host one or more of the portion of virtual machine sessions that are inactive. | 2015-02-05 |
20150040123 | METHOD AND SYSTEM FOR CREATING A VIRTUAL FILE SYSTEM FROM A UNIFIED ARCHIVE - A method for creating a virtual environment (VE) in a non-global zone (NGZ) from a unified archive (UA). An instruction is received to create a VE within a NGZ of a global zone (GZ) using an image file of the VE located in the UA. The contents of the UA are accessible via a virtual file system (VFS) having an index. A directory of the VFS corresponding to guest data of the UA is identified. The guest data is associated with the NGZ and includes the image file. A copy of the index including only portions of the index corresponding to the guest data is created. A guest VFS is created within the NGZ based on the copy. The guest VFS makes only the contents of the UA corresponding to the guest data accessible. The image file is accessed using the guest VFS and used to create the VE. | 2015-02-05 |
20150040124 | PARAVIRTULIZED CAPABILITY FOR DEVICE ASSIGNMENT - A hypervisor of a host detects a request by a guest or a hypervisor administrator to expose a device associated with the host to the guest. The hypervisor locates free space in a configuration space of the device. The hypervisor assigns a configuration space associated with the hypervisor to the located free space. The hypervisor notifies the guest of the configuration space associated with the hypervisor and a range of addresses associated with the free space. The hypervisor exposes the device to the guest. The configuration space associated with the hypervisor may be a message-signaled capability associated with the hypervisor. | 2015-02-05 |
20150040125 | ALLOWING MANAGEMENT OF A VIRTUAL MACHINE BY MULTIPLE CLOUD PROVIDERS - Embodiments of the present invention provide approaches for allowing management of a virtual machine (VM) by multiple cloud providers in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a system identifies a set of provisioned resources of a VM managed by a first cloud provider, generates a set of artifacts containing information for a second cloud provider to allow co-management of the VM by the first cloud provider and the second cloud provider, and provides access to the set of provisioned resources of the VM to the second cloud provider. As such, a single virtual machine may be managed by multiple (e.g., geographically distinct) cloud providers to cooperatively and selectively execute VM operations because the end product (i.e., VM) from the first and second cloud providers is the same. | 2015-02-05 |
20150040126 | Utilizing Multiple Memory Pools During Mobility Operations - A mechanism is provided in a data processing system for performing a logical partition migration utilizing multiple paths. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism allocates a plurality of memory pools and a plurality of threads from a mover service partition to the virtual machine monitor. The virtual machine monitor performs the logical partition migration operation utilizing each of the plurality of threads to transfer a corresponding one of the plurality of memory pools from the source system to the destination system to effect the logical partition migration operation. | 2015-02-05 |
20150040127 | VIRTUAL COMPUTING INSTANCE MIGRATION - A customer submits a set of preferences including hardware specifications for instantiating a virtual machine instance. The virtual machine instance may be instantiated in a physical host computer system that does not conform to the set of preferences. The virtual computer system service may be configured to evaluate the specifications of the available physical host computer systems to determine whether any of the available physical host computer systems conform to the set of preferences. Accordingly, the virtual computer system service may further evaluate the available physical host computer systems to determine whether available physical host computer systems comprise available slots for instantiating the existing virtual machine instance. If the one or more available physical host computer systems have available slots, the virtual computer system service may migrate the existing virtual machine instance to an available physical host computer system in order to fulfill the customer request. | 2015-02-05 |
20150040128 | Utilizing Multiple Memory Pools During Mobility Operations - A mechanism is provided in a data processing system for performing a logical partition migration utilizing multiple paths. Responsive to a virtual machine monitor initiating a logical partition migration operation to move a logical partition from a source system to a destination system, the mechanism allocates a plurality of memory pools and a plurality of threads from a mover service partition to the virtual machine monitor. The virtual machine monitor performs the logical partition migration operation utilizing each of the plurality of threads to transfer a corresponding one of the plurality of memory pools from the source system to the destination system to effect the logical partition migration operation. | 2015-02-05 |
20150040129 | SYSTEM AND METHOD FOR VIRTUAL MACHINE PLACEMENT AND MANAGEMENT IN CLUSTER SYSTEM - A system for virtual machine placement and management monitors information regarding states of physical machines and virtual machines operated in a subgroup, and relocates the virtual machines operated in the subgroup according to information regarding states of the physical machines operated in the subgroup and a placement policy of the virtual machines. | 2015-02-05 |
20150040130 | VIRTUAL HIGH PRIVILEGE MODE FOR A SYSTEM MANAGEMENT REQUEST - A computing system and a method of handling a system management request. The computing system includes a virtual high-privilege mode in a trusted domain managed by the virtual machine monitor. The virtual high-privilege mode handles the system management request. | 2015-02-05 |
20150040131 | CENTRAL PROCESSING UNIT RESOURCE ALLOCATION METHOD AND COMPUTING NODE - A method for allocating a central processing unit resource to a virtual machine, including determining, according to a change in the number of virtual machines in an advanced resource pool, the number of allocated physical cores in the advanced resource pool; and adjusting, according to the number of the allocated physical cores in the advanced resource pool, the number of allocated physical cores in a default resource pool, where the advanced resource pool and the default resource pool are resource pools that are obtained by dividing physical cores of a central processing unit according to service levels of the resource pools. | 2015-02-05 |
20150040132 | IDENTIFICATION OF VIRTUAL APPLICATIONS FOR BACKUP IN A CLOUD COMPUTING SYSTEM - Exemplary embodiments provide various techniques for identifying a virtual application for backup in a cloud computing system. A cloud service layer of the cloud computing system is queried for a listing of virtual applications. In response to the querying, an attribute associated with the virtual application is received from the cloud service layer. The attribute associated with the virtual application is then transformed into an attribute associated with a hypervisor-managed virtual machine, and this transformation of the attribute exposes the hypervisor-managed virtual machine associated with the virtual application such that the hypervisor-managed virtual machine is identifiable for backup. As a result, the virtual application can be backed up based on the attribute of the hypervisor-managed virtual machine. | 2015-02-05 |
20150040133 | MULTIPLE STAGE WORKLOAD MANAGEMENT SYSTEM - Provided are techniques for multiple stage workload management. A staging queue and a run queue are provided. A workload is received. In response to determining that application resources are not available and that the workload has not been previously semi-started, the workload is added to the staging queue. In response to determining that the application resources are not available and that the workload has been semi-started, and, in response to determining that run resources are available, the workload is started. In response to determining that the application resources are not available and that the workload has been semi-started, and, in response to determining that the run resources are not available, adding the workload to the run queue. | 2015-02-05 |
20150040134 | DISTRIBUTED STORAGE NETWORK WITH COORDINATED PARTIAL TASK EXECUTION AND METHODS FOR USE THEREWITH - A method includes receiving a task for execution by a plurality of distributed storage and task execution units A priority level is determined for the task. A plurality of coordinated partial task requests are generated and sent to the plurality of distributed storage and task execution units, wherein the plurality coordinated partial task requests indicate a plurality of coordinated partial tasks and the priority level. A plurality of partial task results are received in response to performance of the plurality of coordinated partial tasks by the plurality of distributed storage and task execution units. A task result for the task is generated based on the plurality of partial task results. | 2015-02-05 |
20150040135 | THRESHOLDING TASK CONTROL BLOCKS FOR STAGING AND DESTAGING - For thresholding task control blocks (TCBs) for staging and destaging, a first tier of TCBs are reserved for guaranteeing a minimum number of TCBs for staging and destaging for storage ranks An additional number of requested TCBs are apportioned from a second tier of TCBs to each of the storage ranks based on a scaling factor that is calculated at predefined time intervals. | 2015-02-05 |
20150040136 | SYSTEM CONSTRAINTS-AWARE SCHEDULER FOR HETEROGENEOUS COMPUTING ARCHITECTURE - Processors, systems, and methods are arranged to schedule tasks on heterogeneous processor cores. For example, a scheduler is arranged to perform a heuristics based function for allocating operating system tasks to the processor cores. The system includes a hint generator providing a system constraints-aware function that biases the scheduler to select a processor core depending on the change in one or more performance constraint parameters. | 2015-02-05 |
20150040137 | CO-ALLOCATING A RESERVATION SPANNING DIFFERENT COMPUTE RESOURCES TYPES - A system and method of reserving resources in a compute environment are disclosed. The method embodiment comprises receiving a request for resources within a computer environment, determining at least one completion time associated with at least one resource type required by the request, and reserving resources within the computer environment based on the determine of at least the completion time. A scaled wall clock time on a per resource basis may also be used to determine what resources to reserve. The system may determine whether to perform a start time analysis or a completion time analysis or a hybrid analysis in the process of generating a co-allocation map between a first type of resource and a second type of resource in preparation for reserving resources according to the generated co-allocation map. | 2015-02-05 |
20150040138 | Routing Workloads Based on Relative Queue Lengths of Dispatchers - Mechanisms for distributing workload items to a plurality of dispatchers are provided. Each dispatcher is associated with a different computing system of a plurality of computing systems and workload items comprise workload items of a plurality of different workload types. A capacity value for each combination of workload type and computing system is obtained. For each combination of workload type and computing system, a queue length of a dispatcher associated with the corresponding computing system is obtained. For each combination of workload type and computing system, a dispatcher's relative share of incoming workloads is computed used on the queue length for the dispatcher associated with the computing system. In addition, incoming workload items are routed to a dispatcher, in the plurality of dispatchers, based on the calculated dispatcher's relative share for the dispatcher. | 2015-02-05 |
20150040139 | Reducing computational load of processing measurements of affective response - Systems and methods for reducing the computational load of processing measurements of affective response of a user to content. A content emotional response analyzer (content ERA) receives a segment of content, analyzes it, and outputs an indication regarding whether a value related to a predicted emotional response to the segment reaches a predetermined threshold. Based on the indication, a controller selects a processing level, from among at least first and second processing levels, for a processor to process measurements of affective response. The first level may be selected when the value does not reach the predetermined threshold, while the second level may be selected when the value reaches it. The processor is configured to utilize significantly fewer computation cycles to process data operating at the first processing level, compared to the number of computation cycles it utilizes to process data operating at the second processing level. | 2015-02-05 |
20150040140 | Consuming Ordered Streams of Messages in a Message Oriented Middleware - A mechanism is provided for consuming ordered streams of messages in a message oriented middleware having a single queue. The mechanism provides a first consuming application thread to process a first message, locks the first message when available on the queue to the first application thread and locking all subsequent messages on the queue with the same stream identifier as the first message to the first application thread, and identifies any messages with different stream identifiers currently locked to the first application thread, and making available the further messages to other application threads; delivering the first message. The mechanism also provides a second consuming application thread to process a subsequent message, locks a next unlocked message when available on the queue to the second consuming application, and locks all subsequent messages on the queue with the same stream identifier as the next unlocked message to the second consuming application thread. | 2015-02-05 |
20150040141 | PROVIDING DISTRIBUTED ARRAY CONTAINERS FOR PROGRAMMING OBJECTS - Embodiments are directed to establishing registration objects for distributed processes, to managing memory on worker processes of a distributed software application and to using object serialization to communicate references to shim objects. In one scenario, a computer system accesses distributed process instances in a distributed runtime and creates a registration object for each of the process instances in the distributed runtime. The registration object includes a key value pair, where the key includes a unique identifier (ID) that identifies a distributed array instance associated with the distributed process, and the value includes a reference to a local portion of the distributed array instance. The computer system then maintains a mapping between the unique ID and the distributed array instance using the registration object. As such, the key value refers to the local portion of the same distributed array instance on each distributed process of the distributed runtime. | 2015-02-05 |
20150040142 | EFFICIENT DFA GENERATION FOR NON-MATCHING CHARACTERS AND CHARACTER CLASSES IN REGULAR EXPRESSIONS - A character class is detected in a regular expression and substituted with a pseudo character. A table is created with a bit vector for each pseudo character inserted into the regular expression. Each bit in the bit-vector represents one character of the alphabet from which the expression is generated. The status of the bits in a bit-vector indicates which characters of the alphabet are included in the character class. The pseudo character in the modified regular expression is used to construct a non-deterministic finite automaton (NFA). The NFA with the pseudo character is then used to construct a deterministic finite automaton (DFA). When constructing the DFA, the bit-vectors are used to determine if a certain transition should be constructed in the DFA. | 2015-02-05 |
20150040143 | METHOD AND SYSTEM FOR THE SUPPORT OF APPLICATION SPECIFIC POLICIES FOR CONVENTIONAL OPERATING SYSTEMS - The approaches described herein provide support for application specific policies for conventional operating systems. In an embodiment, a kernel module representing a kernel subsystem is executed within an operating system's kernel. The kernel subsystem may be configured to respond to particular requests with one or more default actions. Additionally, the kernel subsystem may define a number of sub-modules which represent application specific policies that deviate from the default actions. Each sub-module may define one or more sets of conditions which indicate when the sub-module is applicable to a request and one or more sets of corresponding actions to take when the conditions are met. When an application sends a request to the kernel subsystem, the kernel subsystem determines whether the request meets the conditions of a particular sub-module. If the particular sub-module's conditions are met, the kernel subsystem performs the corresponding actions of the particular sub-module. | 2015-02-05 |
20150040144 | PROGRAM, INFORMATION PROCESSING APPARATUS, AND EVENT PROCESSING METHOD - A storage unit stores rule information that includes information indicating a plurality of operations based on event data. A computing unit searches the rule information to find information indicating a first operation, information indicating an operation of a condition determination that is executable regardless of the result of the first operation, and information indicating a second operation that is associated with the condition determination and uses the result of the first operation. The computing unit generates control information for controlling the execution order of the operations such that the first operation is executed in accordance with the result of the condition determination and such that the second operation is executed after the first operation. When the event data is input, the computing unit executes an operation corresponding to the input event data, based on the control information. | 2015-02-05 |
20150040145 | INTER-APPLICATION COMMUNICATION ON MOBILE PLATFORMS - Applications executing in a mobile device utilize a protocol for inter-application communication to overcome restrictions of a sandboxed environment. Applications advertise their exposed capabilities using structured definition files, which are consumed by other applications. Applications can invoke the advertised capabilities by exchanging inter-application communication (IAC) messages in the form of URLs or other platform-specific mechanisms. URL messages are formatted according to parameters and URL schemes specified by the provided definition files. | 2015-02-05 |
20150040146 | MEMORY MANAGEMENT - At least certain embodiments of the present disclosure include a method for memory management of a view of an application displayed on a display of a device. The method includes constructing a data structure having a hierarchy of layers with at least one layer being associated with the view. The method further includes storing the data structure in memory. The method further includes maintaining a retained count of the number of references to the view from other objects. The method further includes deallocating the view from memory if the retained count is zero. As discussed above, the retained count of the view will be decremented if the layer is removed from the data structure. Removing the layer from the data structure may occur based on the view associated with the layer being removed from the display of the device. | 2015-02-05 |
20150040147 | PRESENTATION OF AN AVATAR IN ASSOCIATION WITH A MERCHANT SYSTEM - A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a user profile, cause a presentation device to present a user an avatar having characteristics that correlate to the user profile, detect one or more responses of the user, identify from the one or more responses a need to communicate with a merchant system, establish a communication session with the merchant system, receive a notification from the merchant system of a merchant avatar engine, establish communication with the merchant avatar engine, adapt the characteristics of the avatar at least in part according to instructions supplied by the merchant avatar engine, and cause the presentation device to present the user the adapted avatar. Other embodiments are disclosed. | 2015-02-05 |
20150040148 | Systems and Methods For Detecting Improper Use of Telecommunications Reception Device - Methods of detecting and verifying the unauthorized use of media content using a telecommunication reception device which, in one embodiment, comprises interrupting a user's use of or access to media content; informing the user that the interruption can be eliminated after the user verifies his or her information through an electronic device; detecting the user's location based on the user's use of the electronic device; verifying whether user's location is within area where the use of the media content is permitted; verifying whether the user is authorized by the content owner to receive the media content and allowing the user to resume the use of media content once the user passes the verification. | 2015-02-05 |
20150040149 | Reducing transmissions of measurements of affective response by identifying actions that imply emotional response - A system, method, and computer product for reducing volume of transmissions of measurements of affective response are described herein. In one embodiment, an interaction analyzer receives a description of an interaction of a user with a media controller that controls presentation of content to the user. The interaction analyzer identifies from the description an action that causes a deviation from a progression of presentation of the content that would have occurred had the action not taken place. A transmitter sends a request to transmit measurements of affective response, taken by a sensor, during a window during which the user likely expressed an affective response related to the action. In some embodiments, the request is received by a transceiver coupled to the sensor with memory sufficient to store measurements of affective response of the user taken since the start of the window, which precedes the time the request is sent. | 2015-02-05 |
20150040150 | METHOD AND SYSTEM FOR REMOTELY TRANSCODING CONTENT - A system and method for remotely transcoding content includes a set top box generating a playlist corresponding to content titles stored in a memory of the set top box. A user device is in communication with the cloud location and the set top box through a network. The user device reviews the playlist and selects a first content title from the playlist to form a selection. The cloud location includes a transcoder device transcoding content corresponding to the selection to form transcoded content. One of the cloud location and the set top box communicates the transcoded content to the user device. | 2015-02-05 |
20150040151 | PROGRAM STORAGE, RETRIEVAL AND MANAGEMENT BASED ON SEGMENTATION MESSAGES - Segmentation messages indicative of locations of upcoming events, such as the start and end of programs and program portions, and/or rights related to the programs and program portions, are used by cable systems and the like to store programs and program portions for later retrieval and transmission to customers on request. Storage, retrieval and management of programming is thereby facilitated. Methods and systems are disclosed. | 2015-02-05 |
20150040152 | Datum Displaying Method Applied to Smart Television - A datum displaying method applied to a smart television can utilize a camera and a microphone of the smart television to capture image and acoustic features for identification and comparison, or utilize an NFC module of the smart television to directly acquire identification information of the user, so as to determine whether the user passes the identification. If yes, the user can log in the smart television, and therefore, the smart television provide a convenient identification function. Furthermore, after the identification information of the login user is confirmed, the smart television can automatically display a corresponding personal user interface and then unlock the program with classified constraint according to authorization information of the login user, and therefore, the smart television provide a function of smoothly watching the program with the classified constraint. | 2015-02-05 |
20150040153 | TELEVISION BOX AND METHOD FOR CONTROLLING DISPLAY TO DISPLAY AUDIO/VIDEO INFORMATION - The present invention provides a TV box, where the TV box is connected to a display via lined connection or wireless connection, and the TV box includes a control unit, a network interface circuit and an output unit. The control unit connects to a first external server and an audio/video source via the network interface circuit, the control unit obtains a channel list from the first external server, and obtain audio/video information from the audio/video source by referring to a user inputted command and the channel list, where contents of the channel list is allowed to be edited by a user, and the control unit transmits the audio/video information to the display via the output unit. | 2015-02-05 |
20150040154 | METHOD AND TELECOMMUNICATIONS SYSTEM FOR REGISTERING A USER WITH AN IPTV SERVICE - A method for protecting privacy when a user logs into a secured personalized IPTV service includes: requesting a secured personalized IPTV service at an IPTV terminal; transmitting an address of the authentication service and a session identifier of the secured personalized IPTV service from the authentication service to the IPTV terminal; transferring the address of the authentication service and the session identifier of the secured personalized IPTV service to the mobile communications device; transmitting an authentication message that includes an authentication request and an identification number of the mobile communications device, from the authentication application of the mobile communications device to the authentication service; performing secure authentication between the authentication service and the mobile communications device; and logging the user into the secured personalized IPTV service. | 2015-02-05 |
20150040155 | CONDITIONAL ACCESS METHOD AND APPARATUS FOR SIMULTANEOUSLY HANDLING MULTIPLE TELEVISION PROGRAMMES - A method of operation of an audio/video content receiver having a content decoder capable of decoding an audio/video programme from a packetized data stream by using data packets defining decryption information comprises the steps of: receiving encoded audio/video content as a packetized data stream comprising one or more programmes having data packets identified by respective sets of one or more packet identifiers and comprising identification data mapping programmes to respective sets of the packet identifiers; selecting data packets from the packetized data stream for a required programme according to the set of packet identifiers defined by the identification data for that stream in respect of the required programme; selecting further data packets from the packetized data stream from which a programme is selected which have packet identifiers not included in the identification data for that packetized data stream; generating a composite packetized data stream from the selected packets; generating composite stream identification data indicating packet identifiers of packets included in the composite packetized data stream; and supplying the composite packetized data stream to the content decoder for decoding the programme from the composite packetized data stream according to the packet identifiers in the composite stream identification data. | 2015-02-05 |
20150040156 | METHOD AND APPARATUS FOR CONTROL OF CLOSED CAPTIONING - A system for performing closed captioning enables a caption prepared remotely by a captioner to be repositioned by someone other than the captioner, such as by a program originator. This capability is particularly useful when, for example, the program originator wishes to include a banner in a video but also wishes to avoid having a closed caption interfere with the banner. In one illustrative system, the program originator is a broadcast station that includes a conventional encoder and a broadcast station computer. In one arrangement, control data generated at the station computer is incorporated into the caption data by the station computer. In another arrangement, the control data is sent from the station computer to the captioner computer, which incorporates the control data into the caption data. | 2015-02-05 |
20150040157 | VIDEO DISPLAY DEVICE, VIDEO DISPLAY METHOD, AND PROGRAM - An AV playback device includes: an advertisement downloader which accesses a predetermined advertisement script server via the Internet, obtains, from the advertisement script server, an advertisement script including information indicating an address of one of advertisement data servers on the Internet, accesses the address on the Internet included in the obtained advertisement script, and obtains advertisement data located at the address; and an advertisement player which displays the advertisement data obtained by the advertisement downloader on an AV monitor. The advertisement data servers each stores an advertisement corresponding to a different advertising company. | 2015-02-05 |
20150040158 | RECEIVING DEVICE, TRANSMITTER AND TRANSMITTING/RECEIVING SYSTEM - According to one embodiment, a transmitting device transmits a data stream to a receiving device connected to the transmitting device via an MHL cable conforming to an MHL standard. The transmitting device includes a browser unit configured to generate a display screen comprising a character entry field for inputting characters. A stream output unit generates a data stream based on the display screen, and output the generated stream to the receiving device, a control signal receiving unit receives a control signal from the receiving device, and a character input unit generates a character string based on the control signal. | 2015-02-05 |
20150040159 | METHODS AND SYSTEMS FOR DISPLAYING SCHEDULED EVENTS IN A MEDIA GUIDANCE DISPLAY - Methods and systems are disclosed herein for a media guidance application that provides media guidance data in which media providers are filtered according to whether or not a media listing associated with the media provider corresponds to a scheduled event. For example, in response to a user request to view scheduled recordings, the media guidance application generates a media guidance display featuring only media providers associated with scheduled recordings. For those media providers, the media guidance application provides both media listings scheduled to be recorded and media listings not currently scheduled to be recorded. | 2015-02-05 |
20150040160 | SYSTEM AND METHODS FOR MODIFYING IMPROPERLY FORMATTED METADATA - Systems and methods are provided for modifying metadata associated with content that is improperly formatted. In one configuration a metadata pre-processor receives metadata from a remote source, determines whether the received metadata is properly formatted, and, if it is not, modifies the metadata based on information received from a second remote source. In one configuration the modified metadata is then used to identify information associated with the content. | 2015-02-05 |
20150040161 | PREVIEW IMAGE PROCESSING USING A BUNDLE OF PREVIEW IMAGES - In one embodiment, a method sends a request for a bundle of preview images for a video to a server. The video is played and a portion of the bundle of preview images for the video is received. The method decodes the portion of the bundle of preview images before the entire bundle of preview images is received. Then, an input from a user for a location in the video is received and the method determines if a preview image corresponding to the location has been decoded from the bundle of preview images. When the image corresponding to the location has been decoded, the preview image corresponding to the location is displayed as a preview image. | 2015-02-05 |
20150040162 | DYNAMIC SPLITTING OF EVOLVED MULTICAST BROADCAST MULTIMEDIA SERVICE (EMBMS) - A reporting server receives reports on unicast and/or broadcast multimedia content items being accessed by respective user equipment (UE) devices through a network. The reporting server determines, for each multimedia content item, a number of UE devices that are accessing the multimedia content item and whether it is being unicast or broadcast. The reporting server ranks the multimedia content items by the number of UE devices accessing each item. In several disclosed examples, a broadcast video provisioning system switches unicast transmissions to broadcast transmissions based on the ranked list, based on this ranking and possibly on the available unicast and broadcast bandwidth. | 2015-02-05 |
20150040163 | GRAPHICAL USER INTERFACE FOR TELEVISION APPLICATIONS - Graphical user interface for displaying a menu structure | 2015-02-05 |
20150040164 | Digital contents receiving apparatus - A television set is capable of receiving both broadcast program from television station and corresponding digital file of the same contents from a server station through internet. The television set keeps information of time limit for the server station to surely provide the file. The television set automatically downloads the file when the time limit comes close or the time limit information is failed to be kept. The television set keeps URL for the moving image program enjoyed upon turning-off of the television set until the next turning-on for instantly enjoying the moving image content provided at the URL. User who turning-on the television set or changing the channel with any program not in mind to feel interest in the program on display by chance can enjoy the program from the beginning by means of downloading corresponding digital file of the same contents through internet by an automatic link. | 2015-02-05 |
20150040165 | MULTI-SOURCE VIDEO NAVIGATION - A method of multi-source video navigation, comprising: receiving ( | 2015-02-05 |
20150040166 | CONTROL DEVICE, CONTROL METHOD, PROGRAM, AND CONTROL SYSTEM - Provided is a control device including a detector configured to detect use of an application on a communication terminal, and a controller configured to control recording processing related to content that is being output from a content output device associated with the communication terminal in accordance with a detection result obtained by the detector. | 2015-02-05 |
20150040167 | Systems and Methods for Networked Music Playback - Systems, methods, apparatus, and articles of manufacture to facilitate connection to a multimedia playback network are disclosed. An example method provides content to a local playback network. The example method includes identifying multimedia content from a content provider. The example method includes passing information regarding the multimedia content to a local playback system including one or more multimedia playback devices in response to a trigger. The example method includes facilitating play of the multimedia content via a local playback network associated with the local playback system. | 2015-02-05 |
20150040168 | Systems and Methods for Networked Music Playback - Systems, methods, apparatus, and articles of manufacture to facilitate connection to a multimedia playback network are disclosed. An example method provides content to a local playback network. The example method includes identifying multimedia content from a content provider. The example method includes passing information regarding the multimedia content to a local playback system including one or more multimedia playback devices in response to a trigger. The example method includes facilitating play of the multimedia content via a local playback network associated with the local playback system. | 2015-02-05 |
20150040169 | SYSTEM AND METHOD FOR ADVANCING TO A PREDEFINED PORTION OF A DECOMPRESSED MEDIA STREAM - A computer system generates a first decompressed media stream based on a first compressed media stream. While providing the first decompressed media stream to a presentation device, the computer system receives a content-transition indication for providing a second decompressed media stream to the presentation device instead of the first decompressed media stream. The content-transition indication corresponds to a request to display the second decompressed media stream starting at a respective point within a predefined portion of the second decompressed media stream. The computer system receives a second compressed media stream corresponding to the second decompressed media stream. In response to receiving the content-transition indication, the computer system generates the predefined portion of the second decompressed media stream and provides a subset of the predefined portion, that does not include content prior to the respective point, to the presentation device instead of the first decompressed media stream. | 2015-02-05 |
20150040170 | APPARATUS AND METHOD FOR COMMUNICATING MEDIA BETWEEN COMMUNICATION DEVICES - A system that incorporates teachings of the present disclosure may include, for example, a display device having a controller to wirelessly receive media; wirelessly receive control signals for presentation of the media from a mobile communication device; and selectively disable control by the display device over presentation of the media on the display device. Additional embodiments are disclosed. | 2015-02-05 |
20150040171 | LIMITING RECORDING DEMANDS - A method and system of limiting recording demands on digital video recorders and other media records. The limiting being facilitated through analysis of programs and other media available from one or more network resources associated with and/or having capabilities to provide media to the recording element. The network resources may be associated with provider resources, customer resources, and/or any other resource in communication with the recording element. | 2015-02-05 |
20150040172 | METHODS AND APPARATUS FOR ENHANCING NETWORK RELIABILITY AND/OR ENABLING PHASED DEPLOYMENT OF VIDEO SERVICES - Methods and apparatus for automatically transitioning program delivery/reception between alternative sources, e.g., from a non-IP channel to an IP video source or between two alternative IP sources are described. The transition maybe triggered by a detected problem with the delivery via the non-IP channel or because of scheduled service. The transition may be in response to a command sent to a device or because the receiving device detects a problem with one of the content sources triggering an automatic switch to the alternative content source. In at least some embodiments the different content sources corresponding to different coding methods, e.g., with MPEG-2 encoded and packetized content being delivered by a non-IP content delivery channel and MPEG-4 being delivered using unicast IP content delivery techniques. The methods facilitate deployment of new services with IP content delivery being deployed initially on a regional basis with non-IP content delivery gradually being rolled out. | 2015-02-05 |
20150040173 | PACKETIZED CONTENT DELIVERY APPARATUS AND METHODS - Apparatus and methods for delivery of content in a packetized network. In one embodiment, content and/or services can be associated with an IP address. The IP address may be assigned to multiple server devices disposed at geographically diverse locations. Delivery caches may advertise, via a routing protocol, one or more addresses to clients of the network. Route selection may be configured based on one or more rules such as geographical proximity, available bandwidth, server availability, server load, delivery cost, client subscription level, licensing rules, and/or other metric. Delivery caches may be configured to control their availability and/or load through IP address withdrawals and announcements. When the “closest” delivery cache may become unavailable (e.g., it is not announcing the IP address for the content the client is trying to obtain, a route to the next “closest” available delivery cache may be utilized. | 2015-02-05 |
20150040174 | SYSTEM AND METHOD FOR SYNCHRONIZING MEDIA PLATFORM DEVICES - Disclosed is a system and method for receiving a broadcast, associating the broadcast with a broadcast device and a time interval, transmitting the broadcast to the broadcast device during the time interval, transmitting a message to a user device during the time interval, receiving a response to the message from the user device during the time interval, and determining a match between the response and the transmitted broadcast. | 2015-02-05 |
20150040175 | METHODS AND APPARATUS FOR METERING MEDIA FEEDS IN A MARKET - Methods and apparatus for metering media feeds in a market are disclosed. An example method includes duplicating a first audio stream in a media feed to generate a second audio stream, encoding the first audio stream with a first breakout code, encoding the second audio stream with a second breakout code different from the first breakout code, combining the first audio stream, the second audio stream, and a video stream of the media to generate an encoded transport stream, and instructing, via a processor, a media receiver to tune to the transport stream and select the second audio stream for distribution to a media presentation location on a channel associated with the second breakout code. | 2015-02-05 |
20150040176 | METHODS AND APPARATUS THAT FACILITATE CHANNEL SWITCHING DURING COMMERCIAL BREAKS AND/OR OTHER PROGRAM SEGMENTS - Methods and apparatus that facilitate watching of programming content on a secondary channel during a program segment, e.g., commercial break or program portion which is not of interest to a user, on a primary channel are described. In various embodiments when a user switches to a secondary channel during a program segment, the switch is detected and the program on the primary channel continues to be received and buffered while the content from the secondary channel is output to the display. The program segment on the primary channel may be a commercial break including one or more commercials or a portion of a program identified as a segment in information communicated with the program or via out of band signaling. The end of the segment on the primary channel is detected and the user is notified or automatically switched back to the primary channel at the end of the segment. | 2015-02-05 |
20150040177 | SMART DISPLAY AND ASSOCIATED CONTROL METHOD - A smart display and its associated control method are provided. The smart display includes a communication interface, selectively electrically connected to an external host; an internal host, for adjusting an operation mode according to connection status between the communication interface and the external host; a video module, electrically connected to the communication interface and the internal host, for displaying video data from one of the external host and the internal host according to the connection status between the communication interface and the external host; a peripheral; and a switch, electrically connected to the internal host, the communication interface and the peripheral, for controlling the peripheral to execute control data transmitted by one of the external host and the internal host. | 2015-02-05 |
20150040178 | SYSTEM AND METHOD FOR PRE-CACHING A FIRST PORTION OF A VIDEO FILE ON A MEDIA DEVICE - A method includes determining an available bandwidth of a data interface connected to a media device. The method includes receiving a first portion of each of a plurality of video files and storing the first portion of each of the plurality of video files in a memory. A size of the memory to store each first portion is determined based on a pre-cache file size associated with a video file of the plurality of video files. The pre-cache file size is based on the available bandwidth. The method further includes, in response to detecting a change in the available bandwidth, adjusting the pre-cache file size associated with the video file, where the pre-cache file size decreases when the available bandwidth increases to a second available bandwidth. | 2015-02-05 |
20150040179 | Mobile Device Connection Control for Synchronization and Remote Data Access - Attempts by computing devices to access centralized data are managed according to device classification level rules. A request to access centralized data is received from an unclassified computing device. The unclassified computing device is classified into a specific one of the defined classes, based at least partially on information concerning the computing device read from the received request. Where a definition of the unclassified computing device has already been assigned to a specific class, the unclassified computing device is classified accordingly. Otherwise, the unclassified computing device is compared to multiple classified computing devices, and the unclassified computing device is classified according to the one that is most similar. Responsive to the classification of the computing device, the received request to access centralized data is governed according to a device classification level rule which specifies access policy for computing devices of the defined class. | 2015-02-05 |
20150040180 | INFORMATION FIREWALL - A data-firewall system blocks sensitive data from becoming available outside a protected space. During operation, the system can obtain an interest from a requesting entity. The requesting entity can include, for example, a software application running on a local computer, a computing device of an Enterprise environment, or a computing node of a computer cluster. Also, the interest can include a location-independent structured name associated one or more data items. When the system obtains the data associated with the location-independent structured name, the system proceeds to obtain a policy associated with the data, and to determine a context for the interest. Then, if the system determines that the requesting entity is within a protected space, as determined based on the policy and the context, the system forwards the data to the requesting entity. | 2015-02-05 |
20150040181 | MANAGING CONFIGURATIONS OF COMPUTING TERMINALS - Disclosed is a system for configuring a terminal by intercepting requests, such as Input/Output (IO) requests or registry requests, evaluating rules based on the intercepted requests during runtime, and performing actions based on the rule evaluations, such as passing the request through, redirecting the request, modifying the request, hiding resources, or performing other actions. The system can be implemented in one or more of the terminal's file system filter drivers and registry filter drivers. | 2015-02-05 |
20150040182 | SYSTEMS AND METHODS FOR ENFORCING SOFTWARE LICENSE COMPLIANCE WITH VIRTUAL MACHINES - A virtualization system supports secure, controlled execution of application programs within virtual machines. The virtual machine encapsulates a virtual hardware platform and guest operating system executable with respect to the virtual hardware platform to provide a program execution space within the virtual machine. An application program, requiring license control data to enable execution of the application program, is provided within the program execution space for execution within the virtual machine. A data store providing storage of encrypted policy control information and the license control data is provided external to the virtual machine. The data store is accessed through a virtualization system including a policy controller that is selectively responsive to a request received from the virtual machine to retrieve the license control data dependent on an evaluation of the encrypted policy control information. | 2015-02-05 |
20150040183 | NETWORK POLICY IMPLEMENTATION FOR A MULTI-VIRTUAL MACHINE APPLIANCE WITHIN A VIRTUALIZATION ENVIRONMENT - A networking policy implementation for a multi-virtual machine appliance that includes a method for selecting a network implementation by applying a network policy to existing network configurations within a virtualization environment of a computing device. A control program that executes within the virtualization environment, receives an event notification generated by a virtual machine in response to a lifecycle event. The control program, in response to receiving the notification, invokes a policy engine that applies a network policy to existing network configurations of the virtualization environment. This network policy can correspond to the virtual machine or to a network object connected to virtual interface objects of the virtual machine. The policy engine then identifies an existing network configuration that has attributes which satisfy the network policy, and selects a network implementation that satisfies the network policy and the network configuration. | 2015-02-05 |
20150040184 | Digital Enveloping for Digital Right Management and Re-broadcasting - Data files with digital envelops are used (1) for embedded identifiers for digital right management (DRM), and (2) as means delivering additional data or new information via repeated re-broadcasting process by many broadcasting service providers. The new DRM applications offer additional privacy and survivability while data is in storage and/or transported on cloud. Wavefront multiplexing/demultiplexing process (WF muxing/demuxing) embodying an architecture that utilizes multi-dimensional waveforms has found applications in data storage and transport on cloud. Multiple data sets are preprocessed by WF muxing before stored/transported. WF muxed data is aggregated data from multiple data sets that have been “customized processed” and disassembled into any scalable number of sets of processed data, with each set being stored on a storage site. The original data is reassembled via WF demuxing after retrieving a lesser but scalable number of WF muxed data sets. A customized set of WF muxing on multiple digital files as inputs including at least a data message file and a selected digital envelop file, is configured to guarantee at least one of the multiple outputs comprising a weighted sum of all inputs with an appearance to human natural sensors substantially identical to the appearance of the selected digital envelop in a same image, video or audio format. The output file is the file with enveloped or embedded messages. The embedded message may be reconstituted by a corresponding WF demuxing processor at destination with the known a priori information of the original digital envelope. In short, digital enveloping/de-enveloping can be implemented via WF muxing and demuxing formulations. WF muxed data featured enhanced privacy and redundancy in data transport and storage on cloud. On the other hand, data enveloping is in a different application domain from most of WF muxing applications as far as redundancy is concerned. Enveloped data is intended only for limited receivers who has access to associated digital enveloped data files with enhanced privacy for no or minimized redundancy. | 2015-02-05 |
20150040185 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 2015-02-05 |
20150040186 | APPARATUS, METHOD, AND COMPUTER-READABLE MEDIUM - An apparatus includes a memory; and a processor coupled to the memory and configured to: set an indicator so that the indicator indicates an access to data is allowed when a start time of time zone arrives, the access to the data being allowed when time is within the time zone; set the indicator so that the indicator indicates the access to the data is not allowed when an end time of the time zone arrives; and determine whether to allow the access to the data on the basis of the indicator when the access of the data is requested. | 2015-02-05 |
20150040187 | SERVICE PROVISION SYSTEM, SERVICE PROVISION METHOD, AND COMPUTER PROGRAM PRODUCT - A service provision system includes: a management information storage unit that stores management information for managing user identification information, device identification information, and service identification information in association with one another; an authentication information receiving unit that receives authentication information including user authentication information and device authentication information from a device connected via a network; a service specifying unit that specifies, when the authentication information is authenticated by an authentication unit, a service associated with the authentication information based on the authentication information and the management information; and a first execution unit that receives a use request of a mail distribution service from the first device connected via the network, composes a mail according to the use request of the mail distribution service received from the first device, and distributes the composed mail to a previously specified mail server connected to the service provision system via a network. | 2015-02-05 |
20150040188 | SERVICE PROVIDING SYSTEM AND DATA PROVIDING METHOD - A system providing a service to a service receiving apparatus includes a management information storage that stores management information including service identification information, user authentication information of a user, and device authentication information of the service receiving apparatus that are associated with each other; an authentication information receiving unit that receives, as authentication information, at least one of user authentication information and device authentication information from the service receiving apparatus; an authentication unit that performs authentication by referring to the management information storage based on the received authentication information; an obtaining unit that obtains process target data from an external service based on an entry request from the service receiving apparatus that has been successfully authenticated; and a conversion unit that converts the obtained process target data into output data with a data format that the service receiving apparatus is able to output. | 2015-02-05 |
20150040189 | SERVICE PROVISION SYSTEM, SERVICE PROVISION METHOD, AND COMPUTER PROGRAM PRODUCT - A service provision system that includes: a management information storage unit that stores management information for managing user identification information, device identification information, and service identification information in association with one another; a workflow storage unit that stores a workflow in association with the registered service; an authentication information receiving unit that receives authentication information including user authentication information and device authentication information from a device connected via a network; an authentication unit that executes authentication processing of the received authentication information; a service specifying unit that specifies, when the authentication information is authenticated, a service associated with the authentication information based on the authentication information and the management information; and an execution unit that receives a use request of a specified service from the device connected via the network and executes processing according to the workflow stored in association with the specified service. | 2015-02-05 |
20150040190 | SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS - A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider. | 2015-02-05 |
20150040191 | SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK - A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack. | 2015-02-05 |
20150040192 | GRADUATED ACCESS MULTI-PASSWORD AUTHENTICATION - Methods and systems for accessing computer data and systems require different sequential and serial passwords to drive a user into a tiered set of sub-accounts of graduated access. At the same time, the tiered hierarchy of access acts as a honey pot system where remote intruders would statistically tend to break through the slightly less secure passwords first, triggering the notification system upon entry into the restricted or firewalled honey pot or virtual systems. With this system, the system administrator can manage multiple sessions for each user where the passwords are of a different level of security based on commercially available password strength tools. The system administrator creates the less secure passwords and lower access sub-accounts and optionally allows users to have such lower levels. | 2015-02-05 |
20150040193 | Physical Interaction Style Based User Authentication for Mobile Computing Devices - System and method for performing multi-factor authentication of a mobile computing device. Information identifying a mobile computing device may be received over a network, where the mobile computing device has requested access to a resource, and where the mobile computing device has a registered user. The mobile computing device may be identified based on the information identifying the mobile computing device. Information regarding a current physical interaction style with respect to the mobile computing device may be received over the network. A confidence level may be determined based on the current physical interaction style, where the confidence level indicates a degree of confidence that mobile computing device is currently being operated by the registered user of the mobile computing device. The mobile computing device may be granted access to the resource in response to the confidence level meeting or exceeding a specified threshold value. | 2015-02-05 |
20150040194 | MONITORING OF SMART MOBILE DEVICES IN THE WIRELESS ACCESS NETWORKS - A method for smart mobile devices monitoring in wireless local area networks. The method includes installing a wireless security monitoring system or a wireless access system in a local area network. The method includes configuring the wireless security monitoring system or the wireless access system to communicate with a mobile device management (MDM) system. The method includes detecting a wireless client connecting to the wireless local area network and identifying the wireless client to be a smart mobile device. Moreover, the method includes receiving an indication at the wireless security monitoring system or the wireless access system from the MDM system regarding whether the wireless client is a managed device or not. The method also includes classifying the wireless client as approved or unapproved smart mobile device based at least upon the indication received from the MDM system. | 2015-02-05 |