Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


10th week of 2014 patent applcation highlights part 89
Patent application numberTitlePublished
20140068544OBTAINING METADATA SET BY IMPERATIVE STATEMENT - Aspects of the subject matter described herein relate to imperative attribution. In aspects, metadata of a managed runtime environment may be set by imperative statements included in code of a program executing in the managed runtime environment. A metadata consumer may request the metadata. A metadata identifier of the metadata requested may be provided implicitly or explicitly. A parameter that indicates how to obtain the metadata may also be provided. In response, the metadata may be obtained and provided. The metadata may be computed at parse time, run time, or another time and may be computed based on state available to a managed runtime environment at the time the metadata is computed.2014-03-06
20140068545Managing Social Process of Developing Application - A computer-implemented method for managing a social process of developing an application includes: making an integrated development environment accessible to a user; exposing a work product of the user in the integrated development environment to a selected group of users; receiving, in the integrated development environment, a first input regarding the work product from at least one of the selected group of users; and presenting the first input to the user in the integrated development environment.2014-03-06
20140068546Automated Deployment of a Configured System into a Computing Environment - Automatically deploying a configured system into a computing environment (such as a cloud computing environment) for execution therein comprises obtaining a configured architecture model describing the configured system, and iteratively evaluating the model to deploy pre-built components for the system and to create and enable a development environment in the computing environment for development of custom-built components needed for the system according to the model. The automated deployment processing further comprises automatically configuring the system; determining a proper installation sequence; allocating resources in the target environment; and installing the required tools and other software that will be needed for execution once the components of the system are deployed. Component metadata is used during the deployment, enabling automated consideration of various factors such as whether component dependencies, resource requirements, and compatibility issues are met.2014-03-06
20140068547SHARING APPLICATION CODE ACROSS PLATFORMS - Application functionality is separated into platform neutral components and platform specific components. An application model component defines the core logic of the application and includes interaction models for handling user input that is platform neutral and may be used across platforms. An application host component includes functionality for a specific platform but may be reused across different applications on the same platform (e.g. how to draw on a specific platform). An application user interface component includes functionality (e.g. specific UI for an application) that is platform specific and application specific. Platform neutral Application Programming Interfaces (APIs) are used by the developer to abstract functionality of the application such that the platform neutral code is portable across different platforms. The communication between the platform specific components and platform neutral components uses thread and memory isolation similar to a client-server architecture.2014-03-06
20140068548PARAMETER SETTING APPARATUS AND METHOD FOR AUTOMOTIVE OPEN SYSTEM ARCHITECTURE-BASED SOFTWARE - The present invention discloses a parameter setting apparatus and method for AUTOSAR-based software, which may lead a user to set parameters at suitable times depending on the variant attributes of parameters. In the parameter setting method, a selection of a variant attribute of a parameter of a metamodel defined to design AUTOSAR-based software is received from a user. If the variant attribute selected by the user corresponds to a variant-pre-compile attribute, setting of only a parameter having the variant-pre-compile attribute is allowed. If the variant attribute selected by the user corresponds to a variant-link attribute, setting of only a parameter having either one of the variant-pre-compile attribute and the variant-link attribute is allowed. If the variant attribute selected by the user corresponds to a variant-post-build attribute, setting of only a parameter having any one of the variant-pre-compile attribute, the variant-link attribute, and the variant-post-build attribute is allowed.2014-03-06
20140068549METHOD AND SYSTEM FOR PROVIDING CONTENT - A computer-implemented method for generating one or more applications, the method including the steps of: accessing a template for holding content; populating the template with the content; generating the one or more applications, configured for a plurality of computing platforms, based on the populated template; and making the applications available for distribution by a server.2014-03-06
20140068550SELECTING EXECUTION ENVIRONMENTS - Disclosed herein are techniques for selecting execution environments. Each operation in a sequence of operations is implemented using a selected execution environment. Each operation is converted into code executable in the selected execution environment. If some operations in the sequence were implemented in different execution environments, execution of the operations is coordinated.2014-03-06
20140068551Configuring Assembly of a System using Supplied Architectural Artifacts - The configuration of a system is programmatically determined. More particularly, these determinations are made using architecture artifacts that describe requirements of the system (which may be comprised of software, hardware, services, or some combination thereof), where these requirements are iteratively compared to characteristics of available components. A percentage of match is preferably computed, thus allowing for complete matches as well as partial matches. A weighting factor may be applied to attributes, effectively prioritizing attributes in view of their relative importance in the assembled system. When more than one component is a candidate for meeting a particular requirement, user input may be obtained to select one of the candidates. One or more attributes (such as cost information) of each candidate, including how well that candidate matched requirements, may be included for each candidate presented for user selection. The model may be updated and re-evaluated iteratively.2014-03-06
20140068552INFRASTRUCTURE FOR AUTOMATICALLY GENERATING BOILERPLATE CODE USING ANNOTATIONS AND CODE-GENERATORS - A method for generating boilerplate code is provided. The method may include scanning an initial source code file for an annotation identifying metadata of an element, scanning a generator module for instructions for processing the metadata of the element, and scanning the generator module for a template module that includes an indication of a location for inserting the processed metadata of the element in an output file. The method may further include processing the metadata of the element of the generator module according to the instructions, and inserting the processed metadata of the element at the indicated location in the output file.2014-03-06
20140068553Wireframe Recognition and Analysis Engine - A method and system for dynamically producing source code for a software application from a set of wireframe images is presented herein. A wireframe recognition and analysis engine receives a set of wireframe images from an end user's device over a network. The features that comprise each wireframe in the set of wireframe images are identified by comparing against a library of models, and saved to a data store. An inference engine, driven by a knowledge base of wireframe design rules, processes the contents of the data store to formulate a collection of wireframe components. A template engine dynamically produces source code for the software application using the collection of wireframe components and a set of source templates. All produced source code are compressed into a single archive file and provided to the end user's device to download.2014-03-06
20140068554Identifying a Defect Density - A technique to determine defect density in a portion or subset of code. Changes to code may be tracked. Defects in the code that are addressed by the changes may also be tracked. A defect density in a portion or subset of the code having a characteristic can be determined by identifying changes modifying the portion or subset of the code and that address a defect.2014-03-06
20140068555FAST DISPATCH PREDICATE FOR OVERLOADED FUNCTIONS WITH GENERIC TYPE HIERARCHIES THAT LACK CONTRAVARIANCE - The disclosed embodiments provide a system that facilitates the development and execution of a software program. During runtime of the software program, the system obtains a function call associated with an overloaded function and a generic type hierarchy that lacks contravariance. Next, the system determines an applicability of an implementation of the overloaded function to the function call. Finally, the system selects the implementation for invocation by the function call based on the determined applicability and a partial order of implementations for the overloaded function.2014-03-06
20140068556DISPATCH PREDICATE FOR OVERLOADED FUNCTIONS USING TYPE INTERVALS - The disclosed embodiments provide a system that facilitates the development and execution of a software program. During runtime of the software program, the system obtains a function call associated with an overloaded function and a generic type hierarchy. Next, the system determines an applicability of an implementation of the overloaded function to the function call. Finally, the system selects the implementation for invocation by the function call based on the determined applicability and a partial order of implementations for the overloaded function.2014-03-06
20140068557STRONGLY TYPED METADATA ACCESS IN OBJECT ORIENTED PROGRAMMING LANGUAGES WITH REFLECTION SUPPORT - Type safety is important property of any type system. Modern programming languages support different mechanisms to work in type safe manner, e.g., properties, methods, events, attributes (annotations) and other structures, but none of the existing, general purpose, programming languages which support reflection provide type safe type (class/structure) member metadata access. Existing solutions provide no or limited type safety which are complex and processed at runtime which by definition is not built-in type-safe metadata access, but only more or less type safe workarounds called “best practices”. Problem can be solved by introducing method for type safe type member metadata access which could be processed at compile time.2014-03-06
20140068558Displaying Dependent Files for Computer Code in a Tabbed-Application User Interface - A method for indicating a change to a dependent file includes receiving a change to a program file. The method further includes displaying, via a computing device, a first identifier for a first dependent file in a first text style, if the first dependent file is changed based on the change to the program file. The method further includes displaying, via the computing device, a second identifier, in a second text style, for a second dependent file. The program file is dependent on the first and the second dependent files. The first text style indicates the first dependent file has been changed based on the change to the program file. The first text style and the second text style are different styles.2014-03-06
20140068559ANNOTATION-BASED INFRASTRUCTURE FOR AUTOMATICALLY GENERATING "PREDICTABLE" IDS FOR VISUAL COMPONENTS IN A WEB-APPLICATION - A method for generating identifiers for software components is provided. A processing device scans source code for an annotation associated with generating an identifier for an object. The processing device generates, using the annotation, an identifier value for the object. When the object does not have a previously assigned value, the processing device assigns the identifier value to the object. When the object has a previously assigned value, the processing device concatenates the identifier value to the previously assigned value of the object and assigns the concatenated identifier value to the object. The processing device then recursively descends into the sub-object's hierarchy by repeating the steps of scanning, generating, and assigning or concatenating and assigning described above.2014-03-06
20140068560SYSTEMS AND METHODS FOR PARTITIONING COMPUTING APPLICATIONS TO OPTIMIZE DEPLOYMENT RESOURCES - Systems and methods for dynamic partitioning of computing applications that involves partitioning a computing application based on processing requirements and available hardware resources to optimize resource usage and security across multiple platforms, and handle interprocess communications across the platforms.2014-03-06
20140068561CONTROL SYSTEM HAVING AUTOMATIC COMPONENT VERSION MANAGEMENT - A component version management system for a machine is disclosed. The component version management system has a software driven component located on the machine, a data system located offboard the machine, and a data system controller in communication with the software driven component and the data system. The data system controller is configured to automatically collect at least one of a software and hardware version of the component, analyze the information for at least one of software and hardware mismatch, and generate a notification for display in the machine when software or hardware mismatch is detected.2014-03-06
20140068562Application Review - Techniques are disclosed to provide consolidated performance and other metrics for an application. In one embodiment, a package containing the application, target devices, and operating systems is received; tests are generated and run on the targeted devices and operating systems. Data is also collected from reviews of the application, and from people using the application. All of the results may be displayed in a dashboard, providing an overview of the applications subjective and objective properties.2014-03-06
20140068563COMPUTER SOFTWARE APPLICATION SELF-TESTING - Testing a computer software application by detecting an arrival of input data provided as input to a computer software application from a source external to the computer software application, modifying the detected input data to include test data configured to test the computer software application in accordance with a predefined test, thereby creating a modified version of the detected input data, and processing the modified version of the detected input data, thereby performing the predefined test on the computer software application using the test data.2014-03-06
20140068564SYSTEM AND METHOD FOR MERGING RESULTS FROM MULTIPLE RUNS BASED ON RUN INPUTS - The various embodiments herein provide a method for merging results from multiple runs based on run inputs in a source system. The method comprises performing a first run on a first input to receive a first result, performing a second run on a second input to receive a second result, aggregating the first result and second result based on a set of rules and a plurality of merge scenarios to obtain a final result. A method is also provided for merging cobertura coverage and a source code.2014-03-06
20140068565ANALYSIS AND TIMELINE VISUALIZATION OF THREAD ACTIVITY - Analyzing the performance of multi-threaded applications. An analysis and visualization of thread executions is performed on a graphical timeline using samples of thread execution. This allows users to understand when their application threads are executing, what they were executing, the degree of concurrency in thread execution, and the order in which work is performed in their application. The visualizations and analysis also allow users to sample thread execution contexts using a graphical user interface, as well as the generation of execution profile reports that may be filtered for a specific time range of execution and a subset of the threads running in the application.2014-03-06
20140068566MICROCODE UPGRADE IN A STORAGE SYSTEM - A method for upgrading microcode in a multi-module storage system may include selecting a first module from two or more modules and operating the first module using an upgraded microcode. The method may include monitoring the performance of the first module by a second module of the two or more modules and rendering an indication of performance of the first module. Further, the method may include determining whether the indication of performance of the first module is greater than or equal to a performance metric.2014-03-06
20140068567DETERMINING RELEVANT EVENTS IN SOURCE CODE ANALYSIS - In embodiments of determining relevant events in source code analysis, a computing device includes a key event manager that is implemented to traverse executable paths in source code of executable software instructions, log events along the executable paths in the source code, and determine a defect in the source code along an executable path in the source code. A state machine is implemented to traverse back through the logged events and determine relevant events that are associated with the defect in the source code. An analysis output of the relevant events can then be generated to indicate the defect in the source code and a cause of the defect.2014-03-06
20140068568SYSTEM AND METHOD FOR DYNAMICALLY DEBUGGING DATA IN A MULTI-TENANT DATABASE ENVIRONMENT - Methods and systems are provided for debugging application code in an on demand environment. The method includes executing the code on a server in the on demand environment; identifying a first location within the code having a suspected error; defining a first check point within the code corresponding to the first location; subsequently re-executing the code, including the first check point, on the server; creating a memory dump corresponding the first check point during re-execution of the code; and debugging the code based on the heap dump without suspending subsequent re-execution of the code.2014-03-06
20140068569USER DIRECTED PROFILING - A user can control when data sampling takes place, what data is collected and where in the code the data sampling profiler is invoked. By identifying a section of user code to the profiler, the profiler is instructed to dynamically instrument the identified user code executing in a target application process. The instrumentation invokes the profiler before or after or both before and after the identified section of user code is executed. By identifying an entry point of a component or technology external to the user code, the profiler is instructed to dynamically instrument the external component so that data sampling is logged when the user code calls the entry point of the external component. The data sampling process can be monitored and the sampling rate can be dynamically adjusted.2014-03-06
20140068570System and Method for Translating Software Code - A system and method for generating test code software utilized by a test system for testing a circuit card assembly is provided. A translator provides an automatic translation of a test code from a first computer language to a second computer language. One or more pinmap documents are provided to map the pins of the circuit card assembly.2014-03-06
20140068571FACILITY - A facility is disclosed including a firmware, which calculates at least one electrical variable, having measuring inputs at which analog electrical signals are present, having a hardware controlled by the firmware, and having data with a number of interfaces, which allow for data to be input and output and for communication. It is proposed in an embodiment that the hardware be used as a platform for an application which extends the facility by a functionality and is created as application software, which an interpreter converts into a machine-readable code prior to loading such that a mechanism transmits the code to the facility, such that transmitted application runs in a predetermined environment, which the application cannot leave, and that the application can access data, the inputs and outputs and the communication by way of a programming interface which are permitted by the programming interface to a limited degree.2014-03-06
20140068572JAVA NATIVE INTERFACE ARRAY HANDLING IN A DISTRIBUTED JAVA VIRTUAL MACHINE - A method for executing native code in a distributed Java Virtual Machine (JVM) is disclosed herein. The method may include receiving, in a first thread executing in a remote execution container, a first native code-generated call, such as a Java Native Interface (JNI) call, to a second thread, the first call including a first array write request. The first call may be stored in an instruction cache and bundled with a second native code-generated call and sent to the second thread. The calls are unbundled and executed in the second thread. An opaque handle to an array returned by the second call is bundled with corresponding array data and returned to the first thread. The array data of the bundle is stored in a data cache and retrieved in response to requests for the array data addressed to the second thread. A corresponding computer program product is also disclosed.2014-03-06
20140068573Error-code and exception-based function dispatch tables - A condition detected by a virtual routine may be treated by setting an error code or raising an exception, depending on circumstances. Enhanced vtable layouts promote availability of both error-ID-based and exception-based virtual routines, while maintaining compatibility. Compilers treat virtual routines based on their circumstances. One enhanced vtable includes error-ID-based routine pointers in a COM-layout-compatible portion and exception-based routine pointers in an extension. For a virtual routine not overridden by a derived class, a compiler generates a direct call. For an object instance of a specific type, the compiler generates a direct exception-based call for the object's routine. For a factory-sourced object's routine, the compiler generates a virtual exception-based call. When the virtual routine belongs to a component having an enhanced vtable, the compiler may generate a virtual call using the exception-based routine pointer. Code wrappers between COM and native format may also be used.2014-03-06
20140068574TYPE INFERENCE OF GENERIC TYPE PARAMETERS IN OVERLOADED FUNCTIONS USING TYPE INTERVALS AND INFERENCE DIRECTIONS - The disclosed embodiments provide a system that facilitates the development and execution of a software program. During operation, the system obtains a type interval for a generic type parameter of an implementation of an overloaded function. Next, the system selects an inference direction for the generic type parameter based on a variance of the generic type parameter, wherein the inference direction is an upward inference direction or a downward inference direction. Finally, the system uses the type interval and the inference direction to perform type inference on the generic type parameter.2014-03-06
20140068575METHOD AND SYSTEM FOR LOADING STATUS CONTROL OF DLL - Apparatus and methods are provided for controlling the loading status of DLLs. Specifically, a streaming program compiler is provided. The compiler includes operation modules for calling DLLs during streaming program execution; association table generating units for generating association tables according to user-defined rules, where the association table includes entries indicating (i) stream branches of the streaming program and (ii) an operation module corresponding to the stream branches; and a trigger generating unit for generating a trigger based on user-defined rules, where the trigger generating unit (i) determines which conditions for loading and unloading DLLs fit the streaming program, (ii) matches these conditions to a particular stream branch to identify a matched stream branch, and (iii) sends out triggering signals indicating the matched stream branch. This invention also provides a corresponding method and controller.2014-03-06
20140068576EXTENSIBLE EXECUTABLE MODELING - Methods, systems, and computer program products for generating executable computer code in an extensible format are provided. A computer-implemented method may include receiving computer source code for compilation and compiling the source code, to generate executable computer code in an extensible format that includes instructions for execution by a computer system configured to process the instructions in the extensible format.2014-03-06
20140068577Automatic Exploitation of Data Parallelism in Streaming Applications - An embodiment of the invention provides a method for exploiting stateless and stateful data parallelism in a streaming application, wherein a compiler determines whether an operator of the streaming application is safe to parallelize based on a definition of the operator and an instance of the definition. The operator is not safe to parallelize when the operator has selectivity greater than 1, wherein the selectivity is the number of output tuples generated for each input tuple. Parallel regions are formed within the streaming application with the compiler when the operator is safe to parallelize. Synchronization strategies for the parallel regions are determined with the compiler, wherein the synchronization strategies are determined based on the definition of the operator and the instance of the definition. The synchronization strategies of the parallel regions are enforced with a runtime system.2014-03-06
20140068578Automatic Exploitation of Data Parallelism in Streaming Applications - An embodiment of the invention provides a method for exploiting stateless and stateful data parallelism in a streaming application, wherein a compiler determines whether an operator of the streaming application is safe to parallelize based on a definition of the operator and an instance of the definition. The operator is not safe to parallelize when the operator has selectivity greater than 1, wherein the selectivity is the number of output tuples generated for each input tuple. Parallel regions are formed within the streaming application with the compiler when the operator is safe to parallelize. Synchronization strategies for the parallel regions are determined with the compiler, wherein the synchronization strategies are determined based on the definition of the operator and the instance of the definition. The synchronization strategies of the parallel regions are enforced with a runtime system.2014-03-06
20140068579JAVA NATIVE INTERFACE ARRAY HANDLING IN A DISTRIBUTED JAVA VIRTUAL MACHINE - A method for executing native code in a distributed Java Virtual Machine (JVM) is disclosed herein. The method may include receiving, in a first thread executing in a remote execution container, a first native code-generated call, such as a Java Native Interface (JNI) call, to a second thread, the first call including a first array write request. The first call may be stored in an instruction cache and bundled with a second native code-generated call and sent to the second thread. The calls are unbundled and executed in the second thread. An opaque handle to an array returned by the second call is bundled with corresponding array data and returned to the first thread. The array data of the bundle is stored in a data cache and retrieved in response to requests for the array data addressed to the second thread. A corresponding computer program product is also disclosed.2014-03-06
20140068580Visualization for Diversified Tamper Resistance - A computer-implementable method includes providing an instruction set architecture that comprises features to generate diverse copies of a program, using the instruction set architecture to generate diverse copies of a program and providing a virtual machine for execution of one of the diverse copies of the program. Various exemplary methods, devices, systems, etc., use virtualization for diversifying code and/or virtual machines to thereby enhance software security.2014-03-06
20140068581OPTIMIZED DIVISION OF WORK AMONG PROCESSORS IN A HETEROGENEOUS PROCESSING SYSTEM - A compiler implemented by a computer performs optimized division of work across heterogeneous processors. The compiler divides source code into code sections and characterizes each of the code sections based on pre-defined criteria. Each of the code sections is characterized as at least one of: allocate to a main processor, allocate to a processing element, allocate to one of a parameterized main processor and a parameterized processing element, and indeterminate. The compiler analyzes side-effects and costs of executing the code sections on allocated processors, and transforms the code sections based on results of the analyzing. The transforming includes re-characterizing the code sections for alternate execution in a runtime environment.2014-03-06
20140068582OPTIMIZED DIVISION OF WORK AMONG PROCESSORS IN A HETEROGENEOUS PROCESSING SYSTEM - A compiler implemented by a computer performs optimized division of work across heterogeneous processors. The compiler divides source code into code sections and characterizes each of the code sections based on pre-defined criteria. Each of the code sections is characterized as at least one of: allocate to a main processor, allocate to a processing element, allocate to one of a parameterized main processor and a parameterized processing element, and indeterminate. The compiler analyzes side-effects and costs of executing the code sections on allocated processors, and transforms the code sections based on results of the analyzing. The transforming includes re-characterizing the code sections for alternate execution in a runtime environment.2014-03-06
20140068583GENERATING NATIVE CODE FROM INTERMEDIATE LANGUAGE CODE FOR AN APPLICATION - Disclosed herein are representative embodiments of tools and techniques for installing, executing, and/or updating managed applications through generation of native code from code in an intermediate language. According to one exemplary technique, a computing device receives machine dependent intermediate language code (MDIL code) generated by an online provider for an application. Additionally, the computing device installs the application on the computing device by generating a native image for the application, which includes binding a portion of the MDIL code with one or more libraries on the computing device. Also, the native image is stored on the computing device for use in loading the application for execution.2014-03-06
20140068584DATABASE SOFTWARE UPGRADE USING SPECIFY-VALIDATE-EXECUTE PROTOCOL - A method, system, and computer program product for upgrading high-availability database systems. The method commences by specifying a subject database configuration state (e.g., an initial state) as well as an upgraded database configuration state (e.g., an upgraded state). Then, the method performs operations for compiling the specifications and validating the upgraded database configuration state with respect to the specified subject database configuration state. Compile errors are reported and a user can change the specifications. Once the compiler determines that the upgraded configuration state can be reached from the subject database configuration state, then the method generates an upgrade plan. The upgrade plan is executed by a computer-implemented controller. During execution of the plan, the controller pauses for accepting user intervention at key execution points. The controller monitors state changes to establish checkpoints. In the event of execution errors detected during execution of the plan, corrective action reports are output.2014-03-06
20140068585Secure Firmware Updates - A firmware update system is described that collectively handles secure firmware updates for hardware resources in a defined and consistent manner. The firmware update system may be configured to manage at least some firmware updates in a pre-boot environment (e.g., before an operating system is loaded). By doing so, the firmware update system exercises control over the updates and reduce entry points exposed to attackers. In one approach, update states are defined for hardware resources that are managed by the firmware update system. In a pre-boot environment, the update states for the managed hardware resources are set to enable firmware updates. The firmware update system may then detect and apply firmware updates available for the managed hardware resources. Update states may be set to disable before loading the operating so that firmware updates for managed resources are disabled outside of the secure pre-boot environment.2014-03-06
20140068586CALENDAR AWARE ADAPTIVE PATCHING OF A COMPUTER PROGRAM - Embodiments of the present invention provide a method, system and computer program product for calendar aware adaptive patching of a computer program. In an embodiment of the invention, a method for calendar aware adaptive patching of a computer program has been provided. The method includes selecting a patch for updating a computer program and accessing a calendar of events corresponding to an end user of the computer program. The method additionally includes restricting a time for installation of the patch according to events scheduled in the calendar of the identified end user. For instance, the installation of the patch can be restricted from a time from during which a meeting has been scheduled for the end user or from a time during which a presentation has been scheduled for the end user and when the computer program is associated with presentation management.2014-03-06
20140068587SYSTEM AND METHOD FOR EFFICIENT SOFTWARE REPLICATION - Systems and methods of efficient software replication are provided. This is accomplished by a first communication device that determines if a second communication device needs to have a software upgrade. In response to determining that the second communication device needs to have the software upgrade, the software upgrade is downloaded onto the second communication device. In response to downloading the software upgrade onto the second communication device, the second communication device determines if a third communication device needs to have the software upgrade. In response to determining that the third communication device needs to have the software upgrade, the second communication device downloads the software upgrade to the third communication device. This process can be repeated for any number of communication devices or the process may be completed in different orders.2014-03-06
20140068588FORCE UPGRADE OF A MOBILE APPLICATION VIA A SERVER SIDE CONFIGURATION FILE - Systems and methods which forces or automatically upgrades a mobile application installed on a mobile device for security, stability or any other concerns via a server-side configuration file are disclosed. In one embodiment, a configuration file including a list of build identifiers that have been banned or flagged is placed on a server, which can be a server providing cloud-based collaboration or file sharing services, for access by associated mobile applications and/or devices. A mobile application installed on a mobile device can download the configuration file and determine whether a build identifier of the mobile application is listed on the configuration file. If so, the mobile application can shut down, prompt or force an upgrade, or restrict operation of the mobile application in other ways.2014-03-06
20140068589Integrating Native Application into Web Portal - The present disclosure describes methods, systems, and computer program products for integrating native applications into web portals. One computer-implemented method includes connecting a business enterprise portal (BEP) with a mobile device, wherein the BEP provides web-based and native-application-based content; analyzing the mobile device with the BEP to identify a native application applicable to the BEP, the native application associated with the web-based and native-application-based content and locally operational in the mobile device; generating metadata associated with at least the native application; generating a data object representing the native application and the associated metadata; and launching, from the BEP, the native application using the generated metadata.2014-03-06
20140068590ELECTRONIC CONTROL SYSTEM FOR AUTOMOBILE - In an ECU, a flash ROM has a main storage area for storing a current version of an application program and a sub-storage area for storing update version program that includes updated points from the current version program. A rewriting tool executes program rewrite processing including: store processing of storing the update version program in the sub-storage area; and memory changeover processing in which, when the writing of the update version program in the sub-storage area has been done successfully, the sub-storage area where the storing of the update version program has ended is changed over to a new main storage area instead of a memory area currently being used as the main storage area. When the writing in the sub-storage area has failed, the changeover is not conducted.2014-03-06
20140068591Monitoring Software - A networked computer system comprises a source of usage data relating to usage of software installed on respective computers of the system, and a source of attribute data relating to attributes associated with the computers. A usage engine evaluates usage of the installed software based on the usage data. A mapping engine selects a mapping rule associated with the installed software in dependence on the evaluated usage data and the attribute data and provides an action to take in relation to an item of software in accordance with the selected rule. The action comprises, for at least some installed software, replacement of the software by alternative software selected by the rule.2014-03-06
20140068592ENABLING A WIRELESS DEVICE TO ACT AS A RELAY FOR UPGRADING AN ACCESSORY COUPLED TO THE WIRELESS DEVICE - A system and method for updating an accessory device is described. A software upgrade for upgrading an accessory device is received from a wireless network at a wireless device. In response whether the accessory device is in communication with the wireless device is automatically determined at the wireless device. Upon determining the accessory device is in communication with the wireless device, the software upgrade is forwarded from the wireless device to the accessory device to enable upgrade of the accessory device according to the software upgrade.2014-03-06
20140068593System and Method for Sharing Information in a Private Ecosystem - A system and method are disclosed for controlling a restricted ecosystem of software applications. The method may include originating software applications from a vendor, associating a collection of the software applications with a user, controlling the distribution of the collection of software applications to the user, controlling access to the collection of software applications based on user credentials, and controlling the installing and updating of the collection of software applications. The method may additionally include executing a first software application from the collection of software applications, executing a second software application, and transferring data from the first software application to the second software application. The method may additionally include transferring data from the first software application to a web service.2014-03-06
20140068594SECURE FIRMWARE UPDATES - A firmware update system is described that collectively handles secure firmware updates for hardware resources in a defined and consistent manner. The firmware update system may be configured to manage at least some firmware updates in a pre-boot environment (e.g., before an operating system is loaded). By doing so, the firmware update system exercises control over the updates and reduce entry points exposed to attackers. In one approach, update states are defined for hardware resources that are managed by the firmware update system. In a pre-boot environment, the update states for the managed hardware resources are set to enable firmware updates. The firmware update system may then detect and apply firmware updates available for the managed hardware resources. Update states may be set to disable before loading the operating so that firmware updates for managed resources are disabled outside of the secure pre-boot environment.2014-03-06
20140068595AUTOMATIC MOBILE APPLICATION UPDATES - Automatic application updates can be achieved by an application she executing on a mobile device. Upon startup when executed by a processing resource of the mobile device, the application shell attempts a connection to a developer service using a communication feature of the mobile device. Following a successful attempt, the application shell obtains non-native functional code for the application shell from the developer service via the connection. Following an unsuccessful attempt, the application shell obtains non-native functional code cached by the mobile device. However obtained, the application shell hosts the functional code such that, via the application shell, the functional code accesses a mobile device feature and provides a primary application function.2014-03-06
20140068596VEHICLE SOFTWARE UPDATE VIA VEHICLE ENTERTAINMENT UNIT - A vehicle software update system for updating software in vehicle modules coupled to a vehicle communication network. Software updates are processed through an entertainment unit (e.g. vehicle radio) configured to be coupled to the vehicle communication network. The entertainment unit is equipped with a software input means configured to receive a software update for a vehicle module, and transfer the software update to the vehicle module via the vehicle communication network. Software updates may be provided to the entertainment unit using a USB memory device plugged into a USB port in the entertainment unit, or communicated wireless via a WI-FI® or BLUETOOTH® transceiver.2014-03-06
20140068597MONITORING APPARATUS, MANAGEMENT SYSTEM, FIRMWARE UPDATING METHOD, AND PROGRAM THEREOF - A monitoring apparatus includes an inquiry unit configured to make an inquiry to a management apparatus, a reception unit configured to receive, as a response to the inquiry, an update instruction for updating firmware of the image forming apparatus to be monitored, a transmission unit configured to transmit to the image forming apparatus to be monitored, an instruction for performing communication with a distribution server to download the firmware based on the update instruction, a monitoring unit configured to monitor a state of the image forming apparatus corresponding to the update instruction, and a notification unit configured to notify the management apparatus of a result of monitoring performed by the monitoring unit, wherein the monitoring unit is configured to monitor whether the firmware has been updated in the image forming apparatus corresponding to the update instruction.2014-03-06
20140068598INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes a communication unit, a storage unit, and a controller. The communication unit is configured to be able to download arbitrary application data from a service on a network in which first application data encoded by a predetermined system and second application data encoded by another system or unencoded. The storage unit is configured to store decoding information for decoding the first application data. The controller is configured to be able to decode the first application data using the decoding information to install a first application obtained by decoding the first application data.2014-03-06
20140068599PACKAGED APPLICATION DELIVERY FOR CONVERGED INFRASTRUCTURE - A method and apparatus for deploying an application in a converged infrastructure is described. The application may be deployed according a model that specifies deployment of the application on resources allocated from the converged infrastructure. The model may be used to scale and adjust the deployment of the application according to pre-determined best practices and according to deployment-specific parameters provided by a system administrator.2014-03-06
20140068600PROVIDING A SEAMLESS TRANSITION FOR RESIZING VIRTUAL MACHINES FROM A DEVELOPMENT ENVIRONMENT TO A PRODUCTION ENVIRONMENT - A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node.2014-03-06
20140068601SYSTEM AND METHOD FOR LIVE COMPUTER FORENSICS - Embodiments of a system and method for live computer forensics are generally described herein. The system can include a first hypervisor configured to halt a computer system, the computer system including a central processing unit, a drive, a volatile memory, and a non-volatile memory. The first hypervisor can be configured to collect data representative of the state of the computer system at the time the computer system was halted. The data representative of the state of the computer system can include the contents of the volatile and non-volatile memory at the time the computer system was halted, wherein at least a portion of the collected data is representative of the state of the central processing unit and the contents of the drive, at the time the computer system was halted.2014-03-06
20140068602Cloud-Based Middlebox Management System - A virtual network virtual machine may be implemented on a cloud computing facility to control communication among virtual machines executing applications and virtual machines executing middlebox functions. This virtual network virtual machine may provide for automatic scaling of middleboxes according to a heuristic algorithm that monitors the effectiveness of each middlebox on the network performance as application virtual machines are scaled. The virtual machine virtual network may also locate virtual machines in actual hardware to further optimize performance.2014-03-06
20140068603AUTOMATIC PROCESSOR HOTPLUG IN VIRTUALIZED COMPUTER SYSTEMS - A system and method for allocating additional virtual processors to virtual machines (referred to as “automatic processor hotplug”) are disclosed. In accordance with one embodiment, a guest operating system of a virtual machine detects when a measure of system load exceeds a threshold. In response, the guest operating system transmits a request to a hypervisor for an additional virtual processor for the virtual machine.2014-03-06
20140068604DISPLAY POWER MANAGEMENT IN DISTRIBUTED VIRTUALIZED SYSTEMS - A system and method for display power management in a virtualized environment are disclosed. In accordance with one embodiment, a hypervisor that is executed by a first computer system receives a notification that a host operating system of a second computer system has received a command to dim a video display of the second computer system, and forwards the notification to a guest operating system of a virtual machine hosted by the first computer system. The hypervisor receives from the guest operating system a first signal that indicates that the hypervisor is to notify the host operating system to refrain from executing the command. The hypervisor then transmits a second signal that notifies the host operating system to refrain from executing the command.2014-03-06
20140068605HYPERVISOR HANDLING OF PROCESSOR HOTPLUG REQUESTS - A system and method are disclosed for determining whether to grant requests for additional virtual processors for a virtual machine (referred to as “processor hotplug requests”). In accordance with one embodiment, a hypervisor receives a request from a guest operating system of a virtual machine, where the request is for an additional virtual processor for the virtual machine. The hypervisor then determines whether or not to grant the request based on a policy.2014-03-06
20140068606ACTIVITY BASED DEVICE REMOVAL MANAGEMENT - Methods and systems for managing a removal of a device from a guest managed by a hypervisor in virtualized computing environment. A hypervisor maintains in a memory a last accessed state associated with a virtual machine executing a guest. The last accessed state is cleared by the hypervisor when the virtual machine is reset and the last accessed state is set when the hypervisor receives a request from the guest to access a device. The hypervisor receives a request to remove the device from the guest of the virtual machine and remove the device from the guest when the last accessed state is clear.2014-03-06
20140068607MANAGING SAFE REMOVAL OF A PASSTHROUGH DEVICE IN A VIRTUALIZATION SYSTEM - Methods and systems for managing a removal of a passthrough device from a guest managed by a hypervisor in virtualized computing environment. A hypervisor receives a request from the guest for access to a passthrough device. The hypervisor sets, in a memory, a last accessed state associated with a virtual machine executing the guest. The hypervisor forwards the request to the passthrough device and configures the host CPU to send a subsequent access request directly to the passthrough device. In response to a virtual machine reset, the hypervisor clears the last accessed state and instructs the host CPU to send a post-reset access request to the hypervisor.2014-03-06
20140068608Dynamic Virtual Machine Consolidation - At a first physical computing machine executing a plurality of virtual machines and connected to a network, one or more virtual machine metrics for each virtual machine are calculated. Each virtual machine metric represents a workload of a resource of the first physical computing machine due to the execution of a corresponding virtual machine. Additionally, one or more corresponding physical machine metrics that represent a total workload of the corresponding resource of the first physical computing machine due to the execution of the plurality of virtual machines are also calculated. Based on the one or more physical machine metrics, a determination is made that at least one of the plurality of virtual machines should be migrated to one of a plurality of other physical computing machines connected to the network. A first virtual machine is selected for migration to a selected second physical computing machine.2014-03-06
20140068609Resource Allocation in a Virtualized Computing Environment - Machines, systems and methods for deciding whether a plurality of virtual machines (VMs) may be hosted on a computing system with resources to support at least one of the VMs, the method comprising determining maximum permissible probability of infringement (maxPermInfrProb(v)) for a VM(v), wherein “v” is a value from 1 to n, such that n is the number of VMs in a set G, as stipulated by the VMs' SLA, wherein “v” is a value from 1 to n, such that n is the number of VMs in a set G; partitioning the set G into a plurality of groups G2014-03-06
20140068610METHOD AND SYSTEM FOR ADJUSTING THE OPERATING MEMORY USED BY A JAVA VIRTUAL MACHINE DURING RUNTIME - A method comprising executing an application on a JAVA virtual machine, the JAVA virtual machine executing on a computing device, the application having allocated memory, monitoring, by the JAVA virtual machine, memory consumed by the application during execution, determining, based on the consumed memory, that the allocated memory is to be adjusted; and adjusting, by the JAVA virtual machine, the allocated memory during runtime without restarting the execution of the application.2014-03-06
20140068611Mechanism for Automatic Scaling of Application Resources in a Multi-Tenant Platform-as-a-Service (PaaS) Environment in a Cloud Computing System - A mechanism for automatic scaling of application resources in a multi-tenant Platform-as-a-Service (PaaS) environment in a cloud computing system is disclosed. A method includes monitoring, by a load balancer executing on a computing device, an overall load measurement of containers associated with an application executed on virtual machines (VMs) in a multi-tenant Platform-as-a-Service (PaaS) system, wherein the overall load measurement is a summation of individual current loads at the containers, comparing, by the load balancer, the overall load measurement to an overall load threshold for the containers, and when the overall load measurement exceeds the overall load threshold, causing resources to be added to execute functionality of the application in the VMs of the multi-tenant PaaS system.2014-03-06
20140068612FACILITATING EXECUTION OF A SELF-MODIFYING EXECUTABLE - Trusted execution of a self-modifying executable is facilitated. An attempt to access a data portion of a self-modifying executable during execution of the self-modifying executable is detected. The self-modifying executable includes the data portion, for storing data to be accessed during execution of the self-modifying executable, and an instruction portion including instructions for execution of the self-modifying executable. The attempt to access the data portion is retargeted to a separate portion of memory space that is separate from another portion of memory space in which the self-modifying executable is loaded for execution. Meaningful measurability of the integrity of the self-modifying executable is thereby provided.2014-03-06
20140068613NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM, INFORMATION PROCESSING APPARATUS AND SCHEDULING METHOD - A storage unit stores load information indicating the load of an information processing apparatus by applying each of a plurality of update programs to each virtual machine. An operation unit obtains the load information from the storage unit, and determines, for each virtual machine, an order of applying the plurality update programs to the virtual machine within a predetermined time period on the basis of the load information and an upper load limit allowable for the information processing apparatus.2014-03-06
20140068614SECURE IDENTIFICATION OF EXECUTION CONTEXTS - A virtual-machine-based system that identifies an application or process in a virtual machine in order to locate resources associated with the identified application. Access to the located resources is then controlled based on a context of the identified application. Those applications without the necessary context will have a different view of the resource.2014-03-06
20140068615CORRECTING PACKET TIMESTAMPS IN VIRTUALIZED ENVIRONMENTS - A network capture element is embodied on a virtual machine, and a utility function is embodied on the actual device, preferably within the virtual machine manager. Both the utility function and the traffic capture element are configured to monitor communication events. To minimize the overhead imposed, the utility function is configured to merely store the time that the event occurred on the actual machine, corresponding to an identifier of the event. The network capture element, on the other hand, performs the time consuming tasks of filtering the communications, selectively storing some or all of the data content of the communications, characterizing the data content, and so on. Instead of storing the virtual time that the communication event occurred at the virtual machine, the network capture element uses the identifier of the communication event to retrieve the actual time that the communication event occurred on the actual machine.2014-03-06
20140068616DATE AND TIME FORMAT GENERATION METHOD, PROGRAM, AND SYSTEM - Computing a date and time format includes obtaining a UT value of a reference time; computing intermediate data including year, month, day, hour, minute, and second, from the UT value of the reference time; computing a difference between a conversion target UT value and the UT value of the reference time using a processor; computing values of hour, minute, and second, based on the difference between the UT values; and generating a character string format representing year, month, day, hour, minute, and second, by combining the intermediate data and the values of hour, minute, and second.2014-03-06
20140068617SYSTEM AND METHOD FOR RECEIVING ADVICE BEFORE SUBMITTING BATCH JOBS - Described herein are systems and methods for receiving a recommendation before submitting a work request. As described herein, an indication of a work request, a recommendation request and a set of application server properties are received at a recommendation engine. The recommendation engine processes the recommendation request, and based on the set of application server properties, determines a recommendation on whether to submit the work request and/or whether to schedule the work request for a later time. Thereafter, the recommendation engine generates a recommendation notification that indicates whether to submit/schedule the work request to provide for a proactive approach to submitting the work request.2014-03-06
20140068618AUTOMATIC BATCHING OF GUI-BASED TASKS - Described herein are techniques for automatically batching GUI-based (Graphical User Interface) tasks. The described techniques include automatically determining whether a user is performing batchable tasks in a GUI-based environment. Once detected, the described techniques include predicting the next tasks of a batch based upon those detected batchable tasks. With the described techniques, the user may be asked to verify and/or correct the predicted next tasks. Furthermore, the described techniques may include performing a batch and doing so without user interaction.2014-03-06
20140068619Scheduling in a multicore architecture - This invention relates to scheduling threads in a multicore processor. Executable transactions may be scheduled using at least one distribution queue, which lists executable transactions in order of eligibility for execution, and multilevel scheduler which comprises a plurality of linked individual executable transaction schedulers. Each of these includes a scheduling algorithm for determining the most eligible executable transaction for execution. The most eligible executable transaction is outputted from the multilevel scheduler to the at least one distribution queue.2014-03-06
20140068620TASK EXECUTION & MANAGEMENT IN A CLUSTERED COMPUTING ENVIRONMENT - Machines, systems and methods for task management in a computer implemented system. The method comprises registering a task with brokers residing on one or more nodes to manage the execution of a task to completion, wherein a first broker is accompanied by a first set of worker threads co-located on the node on which the first broker is executed, wherein the first broker assigns responsibility of execution for the task to the one or more worker threads in the first set of co-located worker threads, wherein in response to a failure associated with a first worker thread in the first set, the first broker reassigns the responsibility of execution for the task to a second worker thread in the first set, wherein in response to a failure associated with the first broker, a second broker assigns responsibility of execution for the task to one or more co-located worker threads.2014-03-06
20140068621DYNAMIC STORAGE-AWARE JOB SCHEDULING - Computer-implemented techniques for executing jobs on parallel processors using dynamic storage-aware job scheduling are disclosed. A network storage system is accessed along with a scheduling queue of pending job processes. The networked storage system is polled to determine the status of members of the storage system. These members comprise storage devices and storage shares. A database is created of metrics describing the status of the members of the networked storage system. Job processes are then dispatched to the networked storage system based on this database of metrics.2014-03-06
20140068622PACKET PROCESSING ON A MULTI-CORE PROCESSOR - A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are configured to include the capability to process packets belonging to a first set of one or more packet types, and a second set of one or more processing cores are configured to include the capability to process packets belonging to a second set of one or more packet types, where the second set of packet types is a subset of the first set of packet types. Packets belonging to the first set of packet types are processed at a processing core of either the first or second set of processing cores. Packets belonging to the second set of packet types are processed at a processing core of the first set of processing cores.2014-03-06
20140068623INFORMATION PROCESSING APPARATUS, COMPUTER PROGRAM, AND METHOD FOR CONTROLLING EXECUTION OF JOBS - An information processing apparatus submits jobs for execution on a server. Jobs are classified into a plurality of groups, and these groups are ranked in ascending order of workload that the groups of jobs impose on the server. A processor in the information processing apparatus counts ongoing jobs that are currently executed on the server and belong to a specified number of top-ranked groups. The processor designates pending jobs that belong to other groups than the specified number of top-ranked groups and suspends submission of processing requests of the designated pending jobs to the server, when the number of ongoing jobs is greater than or equal to a threshold and when there are one or more pending jobs that belong to the specified number of top-ranked groups.2014-03-06
20140068624QUOTA-BASED RESOURCE MANAGEMENT - Innovations for quota-based resource management are described herein. For example, quota-based resource management is implemented as part of an application layer framework and/or operating system of a computing device. With the quota-based resource management, a budget is established at design time for the resources of the computing device. Each type of workload primarily draws from resources dedicated to that type of workload in the budget, as enforced by the operating system. This can help provide acceptable performance for those workloads that are permitted to run, while preventing resources of the mobile computing device from becoming spread too thin among workloads. It can also help maintain a good overall balance among different types of workloads.2014-03-06
20140068625DATA PROCESSING SYSTEMS - A data processing system is described in which a hardware unit is added to a cluster of processors for explicitly handling assignment of available tasks and sub-tasks to available processors.2014-03-06
20140068626Direct Ring 3 Submission of Processing Jobs to Adjunct Processors - Transitions to ring 0, each time an application wants to use an adjunct processor, are avoided, saving central processor operating cycles and improving efficiency. Instead, initially each application is registered and setup to use adjunct processor resources in ring 3.2014-03-06
20140068627DYNAMIC RESOURCE SCHEDULING - Embodiments of the invention relate to a system and method for dynamically scheduling resources using policies to self-optimize resource workloads in a data center. The object of the invention is to allocate resources in the data center dynamically corresponding to a set of policies that are configured by an administrator. Operational parametrics that correlate to the cost of ownership of the data center are monitored and compared to the set of policies configured by the administrator. When the operational parametrics approach or exceed levels that correspond to the set of policies, workloads in the data center are adjusted with the goal of minimizing the cost of ownership of the data center. Such parametrics include yet are not limited to those that relate to resiliency, power balancing, power consumption, power management, error rate, maintenance, and performance.2014-03-06
20140068628STORAGE MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING DEVICE - A non-transitory computer-readable recording medium storing a program causing a computer to execute a process, the process includes starting N (two or more) processes from a first program; and controlling variation in the number of processes for which a second program is deployed, depending on a load on the processes for which the second program is deployed, within a range of the N processes by deploying the second program to a storage area corresponding to one process of the N processes and undeploying the second program deployed to the storage area.2014-03-06
20140068629Event-Driven Approach for Collecting Monitoring Data of Messaging Systems - The present disclosure relates to software, computer systems, and computer implemented methods for providing centralized process integration (PI) domain alert monitoring. One process includes identifying at least one alert rule at a central rules repository, the at least one alert rule associated with at least one message inter-communication within a process integration (PI) domain, where the PI domain includes at least one PI component, and where the message inter-communications within the PI domain occur between PI components. At least one alert consumer registration associated with at least one alert consumer system for an identified alert rule is identified. Information associated with the at least one identified alert rule from the central rules repository is distributed to the corresponding PI component associated with the message inter-communication linked to the alert rule and to the at least one registered alert consumer system.2014-03-06
20140068630Messaging Infrastructure Integration - Techniques for integrating a messaging infrastructure with an existing application computing system include integrating an enterprise service bus (ESB) with an existing application computing system, the application computing system including one or more processing modules providing one or more functionalities; receiving, by the integrated ESB, one or more messages from one or more client computing devices communicatively coupled with the application computing system; managing, by the integrated ESB, the application computing system such that the application computing system communicates with the one or more client computing devices; and transferring, by the integrated ESB, the one or more received messages between the application computing system to one or more of the one or more client computing devices by utilizing the one or more processing modules and the one or more functionalities of the application computing system.2014-03-06
20140068631APPLICATION REGISTRATION WITH A NON-OS SERVICE - Systems, methods, and apparatuses are directed to application registration with a non-OS service. In one embodiment, logic may be configured to provide an installation indication that an installation of an application has been initiated on an operating system of the communication device to a service configured to run on the operating system. The logic may also be configured to provide, to the application, a registration request that is initiated by the service based on receipt of the installation indication by the service and that notifies the application to register with the service. The logic may further be configured to provide registration information associated with the application to the service based on receipt of the registration request by the application. In another embodiment, the service may be a non-OS service configured to maintain registration information for a plurality of applications installed on the operating system.2014-03-06
20140068632DISABLING THE SELF-REFERENTIAL APPEARANCE OF A MOBILE APPLICATION IN AN INTENT VIA A BACKGROUND REGISTRATION - Systems and methods for disabling the self-referential appearance of a mobile application in an Intent via a background thread are disclosed. On the Android platform, an application such as a mobile application for providing access to a cloud environment or cloud based service including cloud-based storage and/or collaborative services, can serve as both a source and a target for a given Intent. In one implementation, such a mobile application that can receive and send the same Intent, can include a background service that detects when the Intent is about to be issued, and unregisters the application to prevent the application from receiving the Intent. When a target application for handling the Intent is identified, the background service re-registers the application to receive the Intent.2014-03-06
20140068633MULTI PROCESSING SYSTEM - In a multi processing system, packet routing units are arranged in respective middleware layers in first nodes corresponding to memory spaces connected to plural processor cores and perform routing of a packet among parent nodes and child nodes in a tree. The child nodes are user nodes that are objects of respective application layers in the memory spaces. The first nodes are the parent nodes. The user nodes, the first nodes, and a second node in the tree are assigned addresses that identify parent-child relationship of nodes in the tree. The second node is a parent node of the first nodes. The packet routing unit (a2014-03-06
20140068634DATA TRANSFER CONTROLLING APPARTUS, SYSTEM AND METHOD - A data transfer controlling apparatus includes a first controlling unit that performs a broadcast transfer to a plurality of nodes connected to a first route switching device, and requests a second node representing nodes connected to a second route switching device that is connected to the first route switching device to perform a broadcast transfer when the first controlling unit receives a request of the broadcast transfer from a first node connected to the first route switching device, and a second controlling unit that performs the broadcast transfer to all of nodes connected to the first route switching device when the second controlling unit receives a request of a broadcast transfer from the second node.2014-03-06
20140068635IN-ORDER MESSAGE PROCESSING WITH MESSAGE-DEPENDENCY HANDLING - The disclosure generally describes computer-implemented methods, software, and systems for modeling and deploying decision services. One computer-implemented method includes operations for identifying a sequence number of a first message, the sequence number indicating a position of the first message within a first sequence of messages. If a second message positioned prior to the first message in the first sequence is in a final processing state and the second message in the first sequence is a parent message, a plurality of child messages associated with the second message are identified. Each child message is associated with a sequence number indicating a position of the child message within a second sequence associated with the plurality of child messages. The computer-implemented method determines whether a child message positioned at the end of the second sequence is in a final processing state.2014-03-06
20140068636MULTICASTING OF EVENT NOTIFICATIONS USING EXTENDED SOCKET FOR INTER-PROCESS COMMUNICATION - A system is provided for multicasting an event notification from an event producer to multiple event listeners, where the event producer and event listeners exist within a computer operating system having a user space, a kernel space, a device space, and an event protocol handler located in the kernel space. The system generates an event indication from an event producer located in the user space, kernel space, or device space, and receiving the event indication in the event protocol handler and generating an event notification. The event producer and the event listeners interface with the event protocol handler to send the event indication and receive the event notification. The event listeners may be located in the user space, kernel space, or device space.2014-03-06
20140068637Method and Apparatus for Data Linkage between Heterogeneous Platforms - The present invention provides a method for data linkage driven by an event, used for data interaction between a first platform and a second platform. The second platform stores shared information and the method comprises: determining which platform the received event is from; forwarding a data packet from the second platform to the first platform for logical operation processing when the received event is from the second platform; when the received event is information from the first platform that at least includes a shared information operation instruction resulting from logic operation processing of data packets in the first platform, returning a shared information operation instruction completion message to the first platform, meanwhile forwarding the shared information operation instruction to the second platform so as to complete the shared information operation on the second platform. Therefore, the first platform acquires data synchronously without waiting for feedback of the second platform.2014-03-06
20140068638SYSTEM AND METHOD FOR APPLICATION LOADING - A method for selective application loading includes monitoring an element of an operating environment, determining whether the element of the operating environment corresponds to an execution condition, and executing an application corresponding to the execution condition. An application control system includes a condition controller to store an execution condition, to monitor an operating condition of a terminal, and to determine whether the operating condition meets the execution condition; and an event controller to execute a corresponding application if the operating condition meets the execution condition.2014-03-06
20140068639API Version Testing Based On Query Schema - In one embodiment, a method includes storing one or more first schemas associated with a first version of an Application Programming Interface (API), the API being used for retrieving data items stored in one or more hierarchical graphs, the first schemas comprise one or more definitions of one or more data types to which the data items belong; forming one or more second schemas associated with a second version of the API; and validating the second version of the API by comparing the second query schemas with the first query schemas.2014-03-06
20140068640CD PLAYER AND METHOD FOR EJECTION CONTROL THEREOF - A compact disc (CD) player and method for ejection control thereof is provided. The CD player has: a CD tray, an eject button, a front-end module, a back-end module, and a fast response eject module, wherein the front-end module and the back-end module are coupled to each other and integrated in an integrated circuit (IC). The fast response eject module has a second tray control module for detecting a status of the eject button, and a second ejection detection module for controlling the ejecting/inserting of the CD tray according to the detected status of the eject button after the CD player is powered up and before initialization of the first ejection detection module is completed. Accordingly, the CD player of the invention may quickly respond to the status of the eject button and control ejecting/inserting of the CD tray immediately after the CD player is powered up.2014-03-06
20140068641CASSETTE AND CHANGER APPARATUS FOR OPTICAL DISK - According to one embodiment, the cassette is provided with an outer shell, a plurality of trays, a shutter, and a lock mechanism. The outer shell has an upper wall and a lower wall each including a square shape and a circular shape, a side wall between edges of the square shapes, and an opening portion between edges of the circular shapes. A tray is an annular shape having a concave portion in which an optical disk is placed. The shutter is a semicircular shape, includes a gear on an outer peripheral wall and a plurality of shelves to support each of the trays on an inner peripheral wall, and rotates from a first position for closing an opening portion to a second position for opening the opening portion. The lock mechanism locks the shutter in the first position.2014-03-06
20140068642OPTICAL PICKUP AND OPTICAL DISC DEVICE - There is provided an optical pickup including a light source, an objective lens configured to focus light from the light source onto one signal face of an optical disc, the optical disc including two or more signal faces, each of the signal faces having a groove formed therein, a photodetector configured to receive returning rays from the optical disc, the photodetector having a light receiving face divided into four light receiving regions by a dividing line that is substantially parallel to a track direction of the optical disc and by a dividing line that is substantially perpendicular to the track direction, and a shading unit disposed at an incident side of the photodetector and configured to block, of returning rays from a signal face other than the one signal face of the optical disc, at least a diffracted ray that is diffracted by the groove.2014-03-06
20140068643SPINDLE MOTOR - Disclosed is a spindle motor, the spindle motor including a turntable coupled to a rotating shaft and supporting the rotating shaft and a disc, a centering unit fitted over the rotating shaft and supporting an inner circumference of the disc, and a coil spring interposed between the turntable and the centering unit to elastically support the centering unit, wherein a first end of the coil spring is brought into contact with a spring hanging portion protruding from a side surface of the centering unit, and a second end opposite to the first end of the coil spring is supported by a spring support portion formed in the turntable.2014-03-06
Website © 2025 Advameg, Inc.