Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


15th week of 2009 patent applcation highlights part 47
Patent application numberTitlePublished
20090094521METHOD AND APPARATUS TO AUTOMATE CONFIGURATION OF NETWORK ENTITIES - A method and apparatus for automating the configuration of network entities with a network management system. More particularly, a graphical user interface incorporates a template to allow administrators to configure attributes of network entities. The graphical user interface and template reduce the number of blocks required to configure network entities and also minimize user errors. The graphical user interface also allows an administrator to add and manage templates for future use. The method and apparatus are also for monitoring the progress of configuring network entities and generating an operation log.2009-04-09
20090094522Interactive presentation and distribution of web content - A data module for display in web content on a webpage is disclosed, along with a method of presenting the web content. The module includes data content for display on a webpage having publisher content, an advertisement coupled to the data content, and a link in the data content for allowing a viewer of the webpage to manipulate the data content. The method includes generating a data module by coupling an advertisement to data content, providing at least one link in the data module for allowing a viewer of the webpage to manipulate the data content, displaying the data module on a webpage having publisher content, and refreshing the webpage, in response to receiving a selection of the link from the viewer, to display the manipulated data content and advertisement in the data module on the webpage.2009-04-09
20090094523Methods and Systems for Maintaining Desktop Environments providing integrated access to remote and local resourcses - A method for maintaining a full-screen, integrated desktop environment on a remote machine for display to a user by a local machine includes monitoring, by a first agent on the remote machine, a desktop environment providing integrated access to a resource provided to a user of the local machine by the remote machine and a resource provided by the local machine to the user. The first agent generates a proxy window representing a window on the local machine displaying output data generated by the second resource and receives an identification of a change to the window on the local machine. The first agent modifies at least one data object in the desktop environment responsive to the change. The first agent transmits, to a second agent on the local machine, an identification of the modification. The second agent modifies attribute data associated with a data object displayed by the local machine.2009-04-09
20090094524INTERFACE FOR EXCHANGING CONTEXT DATA - A facility for exchanging context attributes is described. A characterization module receives an invocation request to provide an attribute value that was generated by a requesting attribute consumer. The received invocation request identifies the attribute whose value is to be provided. In response to receiving the invocation request, the characterization module provides a value for the identified attribute to the requesting attribute consumer.2009-04-09
20090094525SYSTEM AND METHOD FOR DYNAMIC MEDIA INTEGRATION INTO WEB PAGES - Systems and methods for dynamic media integration into networked content are disclosed. The system in an example embodiment includes components to insert a trigger into publisher media, receive a request for access to a graphical user interface from a publisher, receive, via the graphical user interface, publisher instructions for modifying publisher media, create an annotation corresponding to the publisher instructions, and edit publisher web pages as view by a client browser when the trigger is activated.2009-04-09
20090094526METHOD AND SYSTEM FOR PROVIDING AN EXTENSIBLE USER INTERFACE - Displaying a custom user interface in response to a determination that the application program is configured to display the custom user interface. To create the custom user interface, the end user can customize one or more default user interface files to create custom user interface files. The default user interface files can comprise one or more of a structure definition file, a content definition file, and a content display file. Additionally, the custom user interface can be associated with a program module function that can execute in connection with displaying the custom user interface.2009-04-09
20090094527Environment-Interactive Context-Aware Devices and Methods - Location-aware methods and systems are described. In one embodiment, a portable computing device determines its location by accessing one or more hierarchical tree structures each of which comprising multiple nodes that represent physical or logical locations, and traversing at least one node on the one or more hierarchical tree structures to ascertain the location. The device then acquires digital data associated with the determined location and that can permit the device to interact with a location environment. The device then enables interaction with the location environment based, at least in part, on the acquired digital data.2009-04-09
20090094528USER INTERFACES AND UPLOADING OF USAGE INFORMATION - A graphical user interface (GUI) can be used to provide information reflecting a user's interaction with a product using a stand-alone portable device. The user can respond to questions while interacting with the product. The responses are logged by the portable device and subsequently uploaded to the computer system, which forwards them via the Internet to a server. The computer system also forwards registration information to the server. The registration information identifies the user and the product. Based on information received from the server, the computer system generates a GUI that includes a report summarizing the information forwarded from the computer system, including the name of the product the user was interacting with, and that also includes names of additional products selected based on the forwarded information.2009-04-09
20090094529METHODS AND SYSTEMS FOR CONTEXT SENSITIVE WORKFLOW MANAGEMENT IN CLINICAL INFORMATION SYSTEMS - Certain embodiments of the present invention provide methods and systems for execution of clinical workflows via a clinical application system. Certain embodiments provide a clinical application system facilitating completion of clinical workflow tasks. The system includes a processor configured to associate tasks in a clinical workflow with external actors. The system also includes a user interface displaying clinical information to a user. The tasks are represented as links in the user interface. Each of the links triggers access to a corresponding external actor. Selection of at least one of the task links via the user interface triggers at least one of execution of and access to at least one of the external actors.2009-04-09
20090094530METHOD AND SYSTEM FOR REVIEWING A COMPONENT REQUIREMENTS DOCUMENT AND FOR RECORDING APPROVALS THEREOF - A method and system for reviewing and recording approvals for a component requirements document (CRD). A document link to a CRD and a chart link to a condensed version of the CRD are inserted into a review database table. The CRD describes changes required for a software application component. Prior to a review meeting, reviewers activate the document link to display the CRD. During the review meeting, the reviewers activate the chart link to display the condensed version of the CRD for a review of the required changes. An annotation is inserted into the review database table in response to completing the review. The annotation indicates a readiness for an approval process in which the CRD is approved by approvers. A comment link to a sign off comment is inserted into a sign off database table. The sign off comment indicates an approval of the CRD.2009-04-09
20090094531TELEPHONE CALL AS RENDEZVOUS MECHANISM FOR DATA SHARING BETWEEN USERS - A mechanism for transferring files that leverages the user-friendly process of making a phone call. The phone call provides sufficient context to enable the sharing of data. Conversely, selected data that was previously shared can initiate an alternative means of communication (e.g., a phone call, email, etc.). The mechanism separates data into a separate application from voice, and allows users to continue using the familiar telephone while obtaining all of the benefits that multimodal applications (voice and data) provide. By making a phone call, data sharing capability is activated between the call parties. Moreover, sharing can continue after the call ends. The phone call serves as an introduction mechanism for the sharing services, which are available from then on, regardless of when the phone call finishes.2009-04-09
20090094532DYNAMIC MEETING AGENDA GENERATION BASED ON PRESENTER AVAILABILITY - Embodiments of the present invention address deficiencies of the art in respect to C&S e-meeting scheduling and provide a method, system and computer program product for dynamic agenda updating in a C&S system. In an embodiment of the invention, a method for dynamic agenda updating based upon presenter participation in an e-meeting can be provided. The method can include creating a new e-meeting in a collaborative computing environment for attendees and presenters selected from amongst the attendees. The method also can include generating an invite with an agenda for the new e-meeting including a time block and time slots for presentations by different ones of the presenters. Finally, the method can include dynamically changing a view to the agenda for viewing ones of the attendees to reflect changes in the time slots resulting from replies to the invite received by individual ones of the presenters.2009-04-09
20090094533Method and Conference Server for Initializing Scheduled Conferences - Conference participants are selected via a network element in a network, the geographical area locations, for example, buildings of an enterprise, of the conference participants are determined and depending on the determined locations a geographical conference area, for example a conference room is determined for each conference participant. The conference area together with the conference information is communicated to the conference participants. The availability of the conference participants can be checked for the communication.2009-04-09
20090094534SERVER APPARATUS AND CONTROL METHOD OF SERVER APPARATUS - A server apparatus includes a unit for generating image information, a unit for generating a GUI image for designating time, a unit for compressing the image information and GUI image by coding, a storage unit for storing the compressed image information in association with time, a unit for transmitting the image information and GUI image to an information terminal, a unit for receiving operation information indicating a user's operation on the GUI image displayed on the screen of the information terminal, a converting unit for converting the operation information into time, and a unit for reading out image information corresponding to the converted time from the storage unit.2009-04-09
20090094535Suggested Actions Within a Virtual Environment - Embodiments of the invention provide techniques for suggesting actions to users of an immersive virtual environment based on previous user actions within the virtual environment. Generally, characteristics of actions performed by various users of the virtual environment may be stored in a searchable actions index. Subsequently, the actions index may be used to suggest actions based on similarity of the stored characteristics to those of a current user and/or actions. The suggested actions may be presented to the user as graphical indications visible within the user's view of the virtual environment.2009-04-09
20090094536SYSTEM AND METHOD FOR ADDING MEMBERS TO CHAT GROUPS BASED ON ANALYSIS OF CHAT CONTENT - A system, method, and program product is provided that selects an instant messaging message that includes one or more words in a text area. The instant message is a communication with an instant messaging participant that corresponds to an instant messaging participant identifier. A count is kept of the words that match keywords that are associated with a selected instant messaging group data store that is stored in a nonvolatile data area. If the count exceeds a particular threshold, the instant messaging participant identifier is added to the selected instant messaging group.2009-04-09
20090094537METHOD FOR ALLOWING USERS OF A DOCUMENT TO PASS MESSAGES TO EACH OTHER IN A CONTEXT-SPECIFIC MANNER - This invention relates to digital reading applications—specifically the ability to discuss documents contextually, in real time or asynchronously, in a virtual space within a document. The preferred embodiment of this method allows for discussions to take place inline, in parallel, or in any fashion wherein user conversations can be tied to the user's location within a document. This method has two possible core modules: a program that allows a free-flowing real-time conversation between people filtered according to relationship between the portion of the document they are looking at and the portion others are looking at (one embodiment of this could be an instant messaging program), and a context-based comment and response system linked to selections or parts or elements of the document (and taking place in real-time or archived formats), with the ability to make those comments visible relative to a user's motion through the document.2009-04-09
20090094538METHOD FOR CREATING TABLES IN ELECTRONIC FORMS - A form table system and method are disclosed, for creating fillable form tables that are part of electronic documents. The form tables may include an unlimited number of cell array vectors, e.g., rows or columns, confined to a limited space in the electronic document. The form table system enables a user to quickly and easily generate a form by placing a table object on a form page, populating the table object with other desired objects, and defining \characteristics, such as row height and number of visible rows for the form table. As the form is filled in with data, where the number of entered rows exceeds the number of visible rows, the form table extends such that the document is printed in its original form, but the additional information is still available both for viewing and for printing.2009-04-09
20090094539CONTROLLING A COMPUTER PERIPHERAL DEVICE USING A UNIVERSAL DRIVER AND DEVICE-GENERATED USER INTERFACE INFORMATION - In an embodiment, a computer peripheral device driver comprises logic operable to perform sending, from a computer to a peripheral device, a request for a user interface of the peripheral device; receiving from the peripheral device a description of the user interface that the peripheral device has created in at a time of the request and based upon then-current capabilities of the peripheral device; creating one or more graphical user interface (GUI) elements based upon the description of the user interface and causing displaying the GUI elements; receiving user input representing one or more selections of the GUI elements; creating a user interface ticket that describes the GUI elements that were selected as represented in the user input; sending the user interface ticket to the peripheral device.2009-04-09
20090094540METHODS AND SYSTEMS THAT MONITOR LEARNING PROGRESS - A graphical user interface (GUI) can be used to provide information reflecting a user's interaction with a product using a stand-alone portable device. The portable device, operable as a stand-alone device, logs inputs by a user who is interacting with a product using the portable device. Information from the portable device, including the inputs, is uploaded and then forwarded to a server. Registration information identifying the user and the product can also be sent to the server. A report specific to the user and summarizing the information forwarded to the server can be displayed, including the name of the product the user was interacting with, along with the names of additional products selected based on the forwarded information.2009-04-09
20090094541Methods, Systems and Computer Program Products for Scheduling Executions of Programs - A distributed computing system includes at least first and second distinct computers each having a different operating system. First processes are compatible with the first operating system and second processes are compatible with the second operating system. A third scheduling computer, coupled to the first and second computer via a communication network, includes a scheduler for scheduling the first processes and the second processes to execute respectively on the first and second computers. The scheduler accesses a master schedule that defines an executing sequence of the first processes and the second processes. The master schedule can define conditional inter-relationships between the first processes and the second processes.2009-04-09
20090094542Classification Tool - Disclosed is a method which, in one embodiment, enables a user to navigate the Harmonized Tariff Schedule (HTS). The method initially involves uploading a delimited HTS file, and using it to create a wizard which optionally allows the user to navigate a series of options menus, or alternatively, the entire menu hierarchy can be displayed on the same screen. The selections made at every menu is saved for future reference. The method also optionally enables the documentation of Export Control Classification Numbers, which are recorded along with applicable control information for the product.2009-04-09
20090094543Web service user experience without upfront storage expense - A method is provided for allocating resources for users of a service based on whether a user has expressed intent to fully utilize capabilities of the service. If the intent is expressed by a user, an infrastructure is created that enables the user to maintain, via a user interface, artifacts associated with an account of the user on the service. A user that has not yet expressed such intent is presented with a prospective user interface simulating the user interface without enabling the prospective user to maintain the artifacts associated with an account of the prospective user.2009-04-09
20090094544METHOD AND APPARATUS FOR SELECTING A LAYOUT FOR A USER INTERFACE TO DISPLAY ON AN ELECTRONIC DEVICE - The disclosure relates to a system and method of selecting a layout for a user interface for generation on a display of an electronic device. The method comprises the steps of: a) obtaining a representation of the interface; b) generating a plurality of parses of the interface; c) measuring the suitability of each parse; and d) choosing a parse with high suitability.2009-04-09
20090094545SYSTEM AND METHOD FOR IDENTIFYING PROCESS BOTTLENECKS - In some embodiments, a method includes defining a sequence of process resources. Each of the process resources is for performing at least one respective task on a work item. The method further includes calculating a resource utilization metric for each of the process resources. The method also includes displaying a representation of at least a portion of the sequence of process resources. The representation includes image elements that each have a dimension that is inversely proportional to the resource utilization metric for the process resource represented by the image element in question.2009-04-09
20090094546ALTERNATE PROGRESS INDICATOR DISPLAYS - Embodiments of the present invention are directed to novel techniques for showing the progress of an automated computer process, particularly through a graphical user interface (GUI). Graphical status displays are employed which show graphical time-based information, such as rate and estimated time to completion, as well as a completion portion of an automated computer process. A remaining time indicator can be shown as a time scale for the graphical completion indicator. Instantaneous and historical rate information may be graphically displayed in various novel displays.2009-04-09
20090094547Audio conferencing announcements - An audio conferencing facility has a database for storing user data relating to authorisation to use the facility, and provides storage for a name file to be stored as part of the user data, which may be retrieved for generation of an audio signal to be played to one or more of the participants to a communication connection whenever that participant uses the conferencing facility. The name may be generated as an audio recording by the user, or entered as text, or retrieved from a directory in text form. It may be stored either in audio form or as text, for conversion to audio using a speech synthesiser.2009-04-09
20090094548Information Processing Unit and Scroll Method - An information processing unit according to the present invention, includes: a display portion in which part of plural object display regions which function as an object when object data is displayed is displayed; an object data display control portion which allocates the object data to the plural object display regions so as to display the object data; and an object display region move control portion which scrolls the object display region displayed in the display portion in a scroll direction based on an inputted scroll direction while scrolling the object display region not displayed in the display portion so as to display the object display region in the display portion.2009-04-09
20090094549Display management in a multi-window display - Devices and methods for controlling displays in a multi-display environment are disclosed. An exemplary method may comprise the following steps. Initially, an exemplary method may continuously track and record currently active display surfaces. Next, the exemplary method may identify the display surface that is determined to have been active immediately prior to the newly invoked display. After updating the specification file for the newly invoked display to include the identity of the display surface just identified, the exemplary method may be completed by displaying the newly invoked display on the same display surface as previously identified. In the event that the newly invoked display is a critical display, both the newly invoked display and the display determined to have been active immediately prior to the invoked display may be assigned an always-on-top status.2009-04-09
20090094550ZOOMING METHOD OF DISPLAY IMAGE OF ELECTRONIC DEVICE - A zooming method of a display image of an electronic device for zooming in a designated area of a portable electronic device. The zooming method includes the following steps setting a hot key combination, and loading a trigger event of the hot key into a Windows operating system as a monitor event; detecting the trigger event of an input device; if the Windows operating system detects the trigger event of the hot key, the Windows operating system executing a zooming process of the Windows operating system, so as to zoom in or zoom out the display image. Thus, a same set of hot key signals can be used to zoom in/out the designated area in different applications.2009-04-09
20090094551ENHANCEMENTS TO PREVENT SPLIT ENTRIES IN THE EVENT OF A WINDOW FOCUS SHIFT - The present invention discloses a solution to prevent split entries in an event of a window focus shift while still permitting the focus shift event to occur. The solution utilizes a number of different configurable techniques to accomplish this goal, all of which are designed to permit a user to finish directing input to an original window element, when an automatic focus shift event occurs that directs focus to a different window element. Techniques for preventing split entries can include, but are not limited to, a pause-triggered target shifting technique, a pause-triggered focus shifting technique, a password control focus retention technique, a password control focus shift alter technique, an entry continuation blocking after focus shift technique, an entry continuation alert after focus shift technique, and an entry continuation buffering after focus shift technique. The solution is not to be construed limited to these enumerated techniques.2009-04-09
20090094552Guided Transition User Interfaces - A guided transition user interface may be used to transition from a first user interface to a second user interface. The guided transition user interface may include a representation of the second user interface as well as a description of a task to perform from the first user interface. The guided transition user interface may include a graphical image of the second user interface with annotated or highlighted areas that are related to the task. The guided transition user interface may be used for transitioning between areas of one application, transitioning between applications, and transitioning between interacting with different computing devices.2009-04-09
20090094553METHOD AND SYSTEM FOR ENVELOPING A GROUP OF TOOLBAR ICONS - A method of enveloping a group of toolbar icons. An application program displays a graphical user interface (GUI) that includes multiple toolbar icons. If a graphical cursor is in proximity to a first toolbar icon, the application displays a graphical border that surrounds the first icon and one or more additional related icons included in a pre-defined toolbar icon group. The application displays a first identification tab that includes a toolbar group name and an icon name. The first tab includes a graphical thumbtack icon that generates a moveable hover window that includes the border, the toolbar icon group, and at least the first tab. The first tab also includes a graphical close icon that removes the moveable hover window from view. The application also displays a second identification tab that includes an icon attribute field corresponding to a current setting of a function of the first icon.2009-04-09
20090094554METHOD AND SYSTEM FOR IDENTIFYING GROUPED TOOLBAR ICONS - A method of identifying grouped toolbar icons. An application program displays a graphical user interface (GUI) that includes multiple toolbar icons. The application iteratively determines whether or not a graphical cursor is in proximity to a first toolbar icon. If the cursor is in proximity to the first icon, the application identifies one or more additional related icons, which are currently displayed and are included in a same pre-defined toolbar icon group as the first icon, and displays a graphical border that surrounds the first icon and the related icons. If the related icons are not adjacent to each other, multiple separate borders are displayed. The application displays a first identification tab in close proximity to the border. The first tab includes a toolbar group name and an icon name of the first icon. The application may also display a second tab that includes descriptive properties of the first icon.2009-04-09
20090094555ADAPTIVE USER INTERFACE ELEMENTS ON DISPLAY DEVICES - An apparatus, method, and computer program product for providing adaptive user interface elements on display devices are provided. The apparatus includes a processing element configured to provide for a display of an image of a user interface element, where actuation of the user interface element invokes a certain operation. The processing element is also configured to monitor interaction with the user interface element and to provide for a modified image of the user interface element based on the interaction with the respective user interface elements. User interface elements may be modified in various ways to allow a greater portion of the display of the application to be seen and experienced. Furthermore, the interaction may be monitored in different ways, and a user input regarding presentation of the modified image may also be received.2009-04-09
20090094556USER DEFINED SCENARIOS IN A THREE DIMENSIONAL GEO-SPATIAL SYSTEM - A method, apparatus, and article of manufacture provide the ability to store user defined scenarios in a three-dimensional system. A 3D view of a real world scene is displayed, using a three-dimensional (3D) graphics application. Plug-ins are installed into the 3D graphics application. A user selects a subset of the plug-ins, defines settings for the subset of plug-ins, and defines a visualization trait for each plug-in in the subset. The user associates an identification of the selected subset, the settings, and the visualization trait with a scenario bookmark that is saved. The bookmark can be selected by a user to display a visualization of a scenario based on the selected subset, settings, and visualization trait.2009-04-09
20090094557SUN-SHADOW SIMULATION IN A GEOSPATIAL SYSTEM - A method, apparatus, and article of manufacture provide the ability to display a sun and shadow simulation in a 3D system. A 3D view of a real world scene is displayed, using a 3D graphics application, on a display device. A plug-in is installed into the application. A calendar period (e.g., a month, day, and year) is defined by the user. A timeline arc is displayed with the calendar period defining a radius of the arc, and starting stopping endpoints of the timeline arc defining an interval of time during the calendar period. A timeline slider is displayed on the arc that indicates a time of day within the calendar period. A visualization is displayed, in the 3D view, of shadows cast by a sun on objects in the 3D view. A position of the sun is based on the calendar period and the time of day.2009-04-09
20090094558Viewport overlays to expose alternate data representations - A method, apparatus, and article of manufacture provide the ability to display (using a 3D graphics application) an overlayed window containing an alternate data representation in a three-dimensional system. A first 3D view of a real world scene (that includes a first set of data layers) is displayed on a display device. The user selects a set of entities that together define an alternate representation of the first 3D view. The alternate representation is a second set of data layers that is different than the first set of data layers. An overlayed window is displayed on top of the first 3D view and displays the alternate representation.2009-04-09
20090094559MANAGING A RELATIONSHIP NETWORK - This disclosure provides various embodiments of systems, methods, and software for the management of relationship networks. In one implementation, the software identifies an electronic communication, parses the electronic communication into a first communication attribute and a second communication attribute, and stores the first and second communication attributes in an attribute repository. Based on this persisted information, the software calculates one or more relationship indicators based on at least one of the first and second communication attributes and, perhaps in response to a request, communicates at least a subset of the relationship indicators to an interface for presentation as a graphical relationship network.2009-04-09
20090094560HANDLE FLAGS - The claimed subject matter provides techniques to effectuate and facilitate efficient and flexible selection of display objects. The system can include devices and components that acquire gestures from pointing instrumentalities and thereafter ascertains velocities and proximities in relation to the displayed objects. Based at least upon these ascertained velocities and proximities falling below or within threshold levels, the system displays flags associated with the display object.2009-04-09
20090094561Displaying Personalized Documents To Users Of A Surface Computer - Methods, apparatus, and products are disclosed for displaying personalized documents to users of a surface computer, the surface computer comprising a surface, surface computer capable receiving multi-touch input through the surface and rendering display output on the surface, that include: registering a plurality of users with the surface computer; assigning, to each registered user, a portion of the surface for interaction between that registered user and the surface computer; selecting a user profile for each registered user; creating, for each registered user from a content repository, personalized display content for that registered user in dependence upon the user profile selected for that registered user; and rendering the personalized display content for each registered user on that user's assigned portion of the surface.2009-04-09
20090094562MENU DISPLAY METHOD FOR A MOBILE COMMUNICATION TERMINAL - A mobile terminal comprising a display module to display a tag and to display a menu screen image related to the tag at one portion of a background image as the tag is dragged, the menu screen image being displayed according to a dragging direction and a dragging distance; an input unit to detect a touch input with respect to the display module or the tag to determine the dragging direction and the dragging distance; and a controller to expose or hide the menu screen image according to the dragging direction the dragging distance of the inputted touch.2009-04-09
20090094563Method and System for Enhanced Verification By Closely Coupling a Structural Satisfiability Solver and Rewriting Algorithms - A method, system and computer program product are disclosed. The method includes initializing a first variable to limit a rewrite time for rewrite operations with respect to an initial design by a rewriting module, a second variable to limit a time for satisfiability solver operations with respect to said initial design by a satisfiability solver module and a third variable to limit a maximum number of rewrite iterations with respect to said initial design. A timer is called to track said rewrite time and a local logic rewriting operation is run on said initial design with said rewrite module. In response to determining that all of all targets for said initial design netlist are not solved, whether a rewrite time is expired is determined. In response to determining that said rewrite time is not expired, AND refactoring is run. In response to determining that said rewrite time is not expired, XOR refactoring is run.2009-04-09
20090094564METHOD FOR RAPID RETURN PATH TRACING - A method for quickly tracing minimum-length conductive return paths through an electronic structure utilizes a raster based (cellular) memory model comprising individual grids for each layer of the structure. Each grid comprises a reduced resolution N×M cell representation of the conductive structures on that layer. Cellular methodologies are then used to determine, for each signal net, the shortest return path. This information can then be used for various purposes, including determining if the return path is sufficient to ensure adequate signal integrity.2009-04-09
20090094565METHOD AND DEVICE FOR SELECTIVELY ADDING TIMING MARGIN IN AN INTEGRATED CIRCUIT - A method, system, and integrated circuit including selectively added timing margin. The method, for integrating statistical timing and automatic test pattern generation (ATPG) to selectively add timing margin in an integrated circuit, includes identifying, while a chip is in design, paths that are unable to be robustly tested “at speed” during manufacturing test, running statistical timing to calculate a margin to be applied to the paths, updating design specifications for margin to be applied to the paths, and optimizing chip logic based on updated design specifications.2009-04-09
20090094566DESIGN STRUCTURE FOR CHIP IDENTIFICATION SYSTEM - Disclosed is a design structure for an on-chip identification circuitry. In one embodiment, pairs of conductors (e.g., metal pads, vias, lines) are formed within one or more metallization layers. The distance between the conductors in each pair is predetermined so that, given known across chip line variations, there is a random chance (i.e., an approximately 50/50 chance) of a short. In another embodiment different masks form first conductors (e.g., metal lines separated by varying distances and having different widths) and second conductors (e.g., metal vias separated by varying distances and having equal widths). The first and second conductors alternate across the chip. Due to the different separation distances and widths of the first conductors, the different separation distances of the second conductors and, random mask alignment variations, each first conductor can short to up to two second conductors. In each embodiment the resulting pattern of shorts and opens, can be used as an on-chip identifier or private key.2009-04-09
20090094567IMMUNITY TO CHARGING DAMAGE IN SILICON-ON-INSULATOR DEVICES - Method embodiments herein determine a connection order in which connections will be made to connect active devices to antennas within a given circuit design. The method also evaluates the possibilities that these connections to the antennas will cause charging damage in the devices that are connected to the antennas. Such possibilities are based on the connection order, the size of the antennas, and the likelihood that charges will flow from the antennas through insulators of the devices. If a significant possibility for damage exists, the method can reduce the size of the antenna.2009-04-09
20090094568Validation Of An Integrated Circuit For Electro Static Discharge Compliance - An aspect of the present invention validates ESD compliance by examining netlist data generated from a schematic level design of an integrated circuit. Routing and placement may be performed only after confirming that whether each protected circuit (having exposure to ESD current, without the protection circuit) is protected by an appropriate protection circuit. As a result, the design cycle time may be reduced. According to another aspect of the present invention, layout guidelines for each protection circuit is also considered in performing the routing and placement. As a result, the number of iterations in a design cycle may be reduced.2009-04-09
20090094569TEST PATTERN EVALUATION METHOD AND TEST PATTERN EVALUATION DEVICE - Provided are an evaluation method and device of a test pattern which enable an appropriate evaluation in a reliability test with a simulation time reduced and high accuracy. It is assumed that each possible internal state of a cell determined at least by a logic value or a voltage value of an input terminal is a cell state, and each possible state of a transistor determined by a voltage between terminals of the transistor is a transistor state. The method comprises steps of: verifying operation of a semiconductor integrated circuit at a gate level or higher; acquiring an appearance cell state continuously appearing for a predetermined time or more in the operation verification; acquiring an appearance transistor state using the corresponding appearance cell state in the operation verification for each transistor; and calculating a test activity ratio of the transistor using the corresponding appearance transistor state for each transistor.2009-04-09
20090094570Configurable Asic-based Sensing Circuit - A sensing circuit based on an application-specific integrated circuit (ASIC) sensor which includes a sensor portion and a processor portion which are integrated on an ASIC. The sensor portion outputs raw output in response to a stimulus. The output of the sensor portion is processed by the processor portion. The sensor portion and the processor portion together form at least two blocks which are configurable together by interconnections in two or more ways to produce differentiated sensing products.2009-04-09
20090094571Method and system for outputting a sequence of commands and data described by a flowchart - The present invention is a method and system for outputting a sequence of commands and data described by a flowchart. The method includes steps as follows. A flowchart describing a sequence of commands and data is received. The flowchart includes a plurality of flowchart symbols. Each of the plurality of flowchart symbols is assigned a ROM (read only memory) record. Assigned ROM records are stored in a ROM. A processor is generated to include the ROM, wherein the processor receives as input a CLOCK signal, a RESET signal, an ENABLE signal and N binary inputs x2009-04-09
20090094572Artifact sharing from a development environment - An identification of a multi-component development artifact to be shared is obtained in a development environment. A remote receiver with whom to share components of the artifact is designated. Components of the artifact are shared with the remote receiver by automatically locating the components and sending the located components in a package with associated type descriptions. After the package is received, a check for conflicts is made, and acceptable components are merged into the local development environment.2009-04-09
20090094573METHOD AND SYSTEM FOR DEFINING A SOFTWARE APPLICATION AS A SPECIFICATION - A method and system include capturing one or more process flow definitions that define, at least in part, a software application. One or more user interface definitions that define, at least in part, an interface to the software application are captured. One or more data definitions that define, at least in part, data used within the software application are captured. One or more rules for validating at least part of the software application are captured. A design definition is captured as a specification wherein the design definition includes: the one or more process flow definitions, the one or more user interface definitions, the one or more data definitions, and the one or more rules.2009-04-09
20090094574System and method for creating intelligent simulation objects using graphical process descriptions - An object-oriented, computer-based system for developing simulation models is provided. The system comprises one or more base objects and one or more graphical processes, wherein new objects are created from base objects by a user by assigning one or more graphical processes to the base object(s). New objects are created without the need for methods or computer programming. A model is built by creating objects that represent the physical components of the system being modeled into the model, and then running the model.2009-04-09
20090094575System and Method For Applying Model-Based Testing To Train Control Systems - A method for model-based testing of an industrial system includes modeling functionality of an industrial system using a modeling computer language, enhancing the model by adding functionality or refining existing functionality, generating test suites from the system model, and executing the test suites. The modeling computer language is the Unified Modeling Language (UML), wherein modeling includes defining UML use case diagrams to describe relationships among use cases specified for the system and actors who interact with the system according to the use cases, defining UML activity diagrams to model process logic of each use case, wherein the activity diagrams comprise a sequence of activities and transitions, and defining UML class diagrams to specify data categories and attributes that are inputs to the activities of the activity diagrams, wherein data categories relevant for a use case are modeled as test variables in the activity diagram.2009-04-09
20090094576Pattern-Based Development of Computer System Solutions - The problems that normally attend the development and deployment of a computer system solution are reduced by employing patterns and virtual images in the development and deployment process. When information had been acquired about a data processing need to be met, pattern representing a generalized solution to that need is selected. A set of previously-developed virtual images supporting the selected pattern is chosen. Once information representing the specific need is received, the selected pattern is modified to represent a specific solution. Parameters are obtained for the specific solution and a set of scripts integrating the parameters is generated. The scripts are used to reconfigure the virtual images. The reconfigured virtual images are combined into a computer system solution that can be loaded and run with little or no further configuration.2009-04-09
20090094577GENERATING DATA ACCESS OPERATIONS BASED ON A DATA MODEL USING A DATA SERVICES MODEL - Data access operations can be generated based on a data model, allowing an efficient implementation of accessing a data store storing persistent data. A description of the data model is received, the description including transactions on data objects and at least one interrelationship within the transactions. The transactions are converted into data access operations in accordance with a protocol defined by a data store, the conversion taking into account the at least one interrelationship.2009-04-09
20090094578SYSTEM AND METHOD FOR DESIGNING ARCHITECTURE FOR SPECIFIED PERMUTATION AND DATAPATH CIRCUITS FOR PERMUTATION - Computer-implemented systems and methods that provide an efficient technique for performing a large class of permutations on data vectors of length 22009-04-09
20090094579METHOD AND SOFTWARE FOR EDITING WEB DOCUMENTS - Disclosed is a method of editing text using a web-based text editor. The method comprises opening a document using a web-based text editor; receiving a first user input for selecting a block of text in the document; in reply to the first user input, inserting, into a source code of the document, a first temporary node before the selected block and a second temporary node after the selected block; receiving a second user input for applying an attribute to the selected block; and in reply to the second user input, adding an attribute node between the first and second temporary nodes of the source code so as to apply the attribute to at least part of the block of the document.2009-04-09
20090094580DISPLAYING COMMENT STATISTICS INFORMATION - A system, method and program product for statistically analyzing comments in one or more program code listings. A system is disclosed that includes a process for associating comments to blocks of code at different programmatic levels in a code listing; a process for assigning weights to different code blocks, and a process for generating a statistical analysis at the different programmatic levels of the comments in the code listing.2009-04-09
20090094581THREAD SWAP VISUAL INDICATION - A computer implemented method, apparatus, and computer usable program code for indicating thread swaps. A code is presented on a graphical user interface. A portion of the code is executed. A determination is made as to whether a change from an initial thread to a current thread occurred when execution of the portion of the code stops at a line of code in the portion of the code. A graphical indication is displayed identifying a thread swap in the graphical user interface in association with the line of code in which the thread swap occurred.2009-04-09
20090094582CHECKPOINT AND RESTARTABLE APPLICATIONS AND SYSTEM SERVICES - A computer implemented method, apparatus, and computer program product for checkpoint and restart of a process. In one embodiment, a process shell representing a restartable process is created on an arrival server in response to identifying a process on a departure server that is a restartable process. The process shell is frozen. A name of the restartable process, an identifier of the restartable process, and an identifier of a parent process of the restartable process is assigned to the process shell. The process shell is then unfrozen and exits. A parent process restarts the restartable process when the process shell exits.2009-04-09
20090094583SYSTEM AND METHOD FOR TESTING COMPUTER PROGRAMS - A method for testing computer programs includes the steps of identifying at least one code subsection of a computer program to be tested, ascertaining one or more other code subsections required for executing the identified subsection, determining one or more input arguments required for executing the identified subsection and the other subsections, prompting a developer to provide at least one of the input arguments, and executing the identified subsection using the provided input arguments.2009-04-09
20090094584NON-INTRUSIVE ASSET MONITORING FRAMEWORK FOR RUNTIME CONFIGURATION OF DEPLOYABLE SOFTWARE ASSETS - The present invention discloses a solution for metering, monitoring, and monetizing software assets. The solution can include a step of registering a software asset with a monitoring service. A unique identifying key for the software asset can be generated during registration. The software asset can then be instrumented for the monitoring service. The instrumentation can reference the software asset by the unique key. Specifics of the set of metrics that are to be monitored by the monitoring service for the software asset can be runtime, development time, and/or deployment time configurable. The instrumented software asset can convey transaction data to the monitoring server when used by clients. Analyzed results produced by the monitoring service pertaining to the software assets based upon the transaction data can be provided to authorize users of vendors associated with the software asset.2009-04-09
20090094585METHOD AND APPARATUS FOR ANALYZING EXPLOIT CODE IN NONEXECUTABLE FILE USING VIRTUAL ENVIRONMENT - Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code.2009-04-09
20090094586METHOD AND APPARATUS FOR PERFORMING NATIVE BINDING - A native binding technique is provided for inserting calls to native functions during translation of subject code to target code, such that function calls in the subject program to subject code functions are replaced in target code with calls to native equivalents of the same functions. Parameters of native function calls are transformed from target code representations to be consistent with native code representations, native code calling conventions, and native function prototypes.2009-04-09
20090094587INFORMATION PROCESSING TERMINAL AND PROGRAM - An information processing terminal capable of specifying function information of a Jar file not to read the function information from a Jad file in which the function information of the Jar file are described, and a program used to specify the function information of the Jar file are provided.2009-04-09
20090094588METHOD AND SYSTEM FOR PROGRAM TRANSFORMATION USING FLOW-SENSITIVE TYPE CONSTRAINT ANALYSIS - A method for analyzing a program is provided. The method includes, determining an object type that may exist at an execution point of the program, wherein this enables determination of possible virtual functions that may be called; creating a call graph at a main entry point of the program; and recording an outgoing function call within a main function. The method also includes analyzing possible object types that may occur at any given instruction from any call path for virtual calls, wherein possible object types are determined by tracking object types as they pass through plural constructs; and calling into functions generically for handling specialized native runtime type information.2009-04-09
20090094589OPTIMIZING HEAP MEMORY USAGE - This disclosure provides a computing system and method to profile a program for finding potential optimization in heap usage by reducing lag and drag in lifetimes of heap memory blocks. The process consists of three steps. First, an instrumentation engine analyzes a given program, and inserts additional code at interesting locations to collect needed information. Second, when the instrumented program is executed on a set of test cases, runtime data is collected. Third, since this data could be relatively large for a complex and long running program, data is processed to present it to a user in useful ways so that the programmer can improve the heap utilization in the program.2009-04-09
20090094590DETECTING CHANGE IN PROGRAM BEHAVIOR FOR ADAPTIVE CODE OPTIMIZATION - A computer implemented method, apparatus, and computer program product for generating an optimization insensitive behavior profile. In one embodiment, a source identifier is assigned to each instruction in an original control flow graph representing a program code prior to optimization. The identifiers identify a basic block associated with the instruction or a group of basic blocks. A source identifier in the set of source identifiers is assigned to instructions in an optimized control flow graph representing the program code after optimizing the program code. The instructions in the optimized control flow graph are mapped to the original control flow graph using the set of source identifiers to form a mapping transformation. Behavior profile data associated with the optimized program code is moved to basic blocks in the original control flow graph using the mapping transformation to form the optimization insensitive behavior profile.2009-04-09
20090094591SOFTWARE UPDATE VERIFICATION APPARATUS, METHOD AND PROGRAM - A software update verification apparatus which has an operating system (OS) that has a normal mode and a software update mode for calling a verification unit when being activated by a software update interface unit, a generating unit that operates on the OS in the normal mode and performs generating processing including call processing for calling a software update interface unit by a plurality of processes, a software update interface unit that activates the OS in the software update mode when being called by the generating unit, and a verification unit that performs verification processing for verifying the generating processing performed by the plurality of processes when being called by the OS in the software update mode.2009-04-09
20090094592System and Method for Replacing an Application on a Server - A system and method for controlling access to first and second applications in a shared storage. A first server requests from a first local storage a copy of an application identified by a first hierarchical directory. The first server request is redirected from the first local storage to the first application in the shared storage. The first application in the shared storage has a second, extended hierarchical directory comprising the first hierarchical directory plus a lower level qualifier. Subsequently, a second server requests from a second local storage a copy of an application identified by the first hierarchical directory. The second server request is redirected from the second local storage to the second application in the shared storage. The second application in the shared storage has a third, extended hierarchical directory comprising the first hierarchical directory plus a lower level qualifier different than the lower level qualifier of the second, extended hierarchical directory. The second application can be a more recent version of the first application. Also, there can be a proxy server which routed the request for the application identified by the first hierarchical directory to the first server, and further comprising the step of reconfiguring the proxy server to route subsequent requests for the application identified by the first hierarchical directory to the second server instead of the first server.2009-04-09
20090094593WIRELESSLY UPGRADING SOFTWARE IN A MOBILE COMPUTING DEVICE - A system comprises a wireless mobile computing device that executes software contained therein. The system also comprises a host system configured to wirelessly communicate with the wireless mobile computing device. The host system verifies that the wireless mobile computing device is authorized to receive a software upgrade and, if so, wirelessly transmits data to the wireless mobile computing device to upgrade the software.2009-04-09
20090094594BLADE-BASED MODULAR SYSTEM FOR SUPPORTING APPLICATION SPECIFIC FUNCTIONS - Blade-based systems and methods are provided that support a plurality of application-specific functions associated with data processing, communication and/or storage. Exemplary embodiments include a chassis for receipt of a plurality of blades. The blades are programmed/loaded with application-specific software, e.g., wireless communication software, that facilitates data-related operations. The chassis may also contain cooling vents, power supply modules and/or circuitry, and a backplane for requisite communications. Additional structural features and components may include mounting brackets, cooling/exhaust fans and detachable front/rear faces to facilitate mounting and/or service of associated components. The design and operation of the blade-based system and method offer significant advantages to entities involved in the manufacture, installation, maintenance and/or use of hardware and software applications by unifying the hardware and application software in a cost effective, reliable and efficient modular assembly.2009-04-09
20090094595Customized Software Documentation Based on Actual Configuration Values - A method for customizing end-user or administrative software documentation such as installation instructions is provided. A software provider first collects computer system information for multiple computer sub-systems used by a customer. The collected computer system information comprises sub-system descriptions of each of the multiple computer sub-systems, software descriptions of all software that is currently residing in each of the multiple computer sub-systems, and hardware descriptions of all hardware that are allocated to each of the multiple computer sub-systems. The software provider then receives, from the customer, the name of new software that is to be installed in a user-selected computer sub-system. Based on the collected computer system information, the software provider determines which specific device in the user-selected computer sub-system should have the new software installed. At run time, variables in the installation instructions are replaced with a device's name.2009-04-09
20090094596SYSTEMS AND METHODS FOR AN ADAPTIVE INSTALLATION - The present solution addresses conflicts and incompatibilities between an installation and the files or components existing on a computer at the time and point of installation. The adaptive installation technique of the present solution performs real-time cross referencing of the files and components to be installed with the current environment of the computer where the application is to be installed. In this manner, only actual or real conflicts at the point and time of installation and in view of the current environment are resolved. The present solution dynamically adapts the installation instructions of the installer at the installer's run time to prevent or avoid conflicts and incompatibilities that may exist on the computer targeted for the installation. This adaptive technique adapts the installation instructions specifically for the computer environment at the time of install and s suitable for this computer.2009-04-09
20090094597Portable firmware device - A method of providing new functionality to an electronic product is provided. The new functionality for the electronic product being installed via a new firmware load from a memory card. The new firmware load being released to the electronic product upon the provision of an authentication by the user of the electronic product that matches the authentification credentials stored within the memory card. In a further embodiment of the invention the authentication further supports the transfer of additional content relating to the authenticated user thereby providing the electronic device with a “personality” determined by the user. In another embodiment of the invention the new firmware load is “personalized” to the memory card such that it cannot be illegally duplicated or copied thereby allowing vendors to provide via the Internet new functionalities for electronic products on a procurement basis.2009-04-09
20090094598Method of Installing Application Programs and Computer Accessible Recording Medium Storing Installation Program - There is provided a method of installing an application program to an information processing device which is connected with a network to which an information processing server storing various pieces information are stored. The method includes the step of making the information processing device acquire setting information from the information server, the setting information being the information input through the information processing device when the application program was previously installed, the information processing device having the information processing server store the information, and the step of installing the application program based on the setting information which is acquired by having the information processing device acquire from the information processing server.2009-04-09
20090094599SYSTEM AND METHOD FOR OPTIMIZED TARGETING IN A LARGE SCALE SYSTEM - The system and method of the present invention utilize the attributes of the nodes to build a target list and filters are created based on the node attributes. The filters are installed on the mediators. Each mediator then applies that filter to its own local node list to create a local target list. This local target list will then contain the list of local nodes that need to have a targeted action applied, such as software installed, on them. The mediator then carries out the targeted action, such as software installation, on those nodes. By extending discovered node information with arbitrary attributes, the resolution of target lists defined by filters applied to the master node list is increased.2009-04-09
20090094600NETWORK DELIVERY OF ENTERTAINMENT SOFTWARE - A system and method for preparing entertainment software for reduced network delivery time includes analyzing entertainment software to identify a first stage implementing a subset of the functionality of the entertainment software such that the first stage is deliverable to an entertainment platform across a network more quickly than the delivery of the entire entertainment software, and preparing the identified first stage for download, such that the identified first stage may be downloaded and used on the entertainment platform.2009-04-09
20090094601METHOD AND DEVICE FOR PROTECTING SOFTWARE FROM UNAUTHORIZED USE - The present invention relation to a method and device for protecting a software program from unauthorized use, comprising a processor, a non-volatile memory, a content protection means, and a communication interface, wherein the non-volatile memory records and stores at least one functional fragment extracted from the said software program, wherein at least one transfer function is embedded into the remaining part of the software program for sending to the software protection device initial data and/or commands initiating execution of the extracted fragment to produce result data, and sending the result data to the programmable computer device, thus preventing hacking of the said software program. The software protection device can be implemented as an external or internal computer module.2009-04-09
20090094602Methods for Virally Distributing Location-Based Applications - A location-based messaging system and its methods of operation are disclosed, including methods for virally distributing location-based applications are also disclosed. Methods for sending geographic location information for a target address from a computing device to a receiving device that will enable the receiving device to display a map and/or directions from a geographic location of the receiving device to the geographic location of the target address, methods for processing and distributing location-based data, and methods for receiving and responding to location-based data. 2009-04-09
20090094603In-Place Conversion of Virtual Machine State - One embodiment of the present invention includes a method of making a bootable image for a computer, wherein the bootable image corresponds to a first virtual machine but is bootable on a target machine, the method comprising: (a) instantiating the first virtual machine within a virtualization system and executing computations thereof, the computations operating upon an encapsulation of virtual machine state for the instantiated virtual machine; and (b) introducing into the encapsulation, a boot loader that defines at least one transformation to be performed on the encapsulation to allow the target machine to boot from the virtual machine state.2009-04-09
20090094604VIRTUAL DEVICE MANAGEMENT METHOD AND MANAGEMENT APPARATUS - A management apparatus (2009-04-09
20090094605METHOD, SYSTEM AND PROGRAM PRODUCTS FOR A DYNAMIC, HIERARCHICAL REPORTING FRAMEWORK IN A NETWORK JOB SCHEDULER - The present invention employs a master node for each job to be scheduled and in turn the master node distributes job start information and executable tasks to a plurality of nodes configured in a hierarchical node tree of a multinode job scheduling system. The status of the various tasks executing at the leaf nodes and other nodes of the tree report status back up the same hierarchical tree structure used to start the job, not to a scheduling agent but rather to the master node which has been established by the scheduling agent as the focal point, not only for job starting, but also for the reporting of status information from the leaf and other nodes in the tree.2009-04-09
20090094606Method for fast XSL transformation on multithreaded environment - An XSLT method is used in a multi-thread environment. In the XSLT method, an XML file is analyzed in view of XSLT templates. Relationships between the transforming processes of the XSLT templates and the tree nodes of the XML file are built. Time for the execution of the transforming process of each of the XSLT templates and the number of a related one of the tree nodes are calculated. Threads are scheduled for the transforming processes of the XSLT templates. The transforming processes of the XSLT templates are executed.2009-04-09
20090094607PROCESSING REQUEST CONTROL DEVICE, RECORDING MEDIUM STORING PROGRAM, PROCESSING REQUEST CONTROL METHOD AND DATA SIGNAL - A processing request control device, which includes: a reception section that receives a processing request and information on a property of the processing request; a calculation section that calculates a processing time zone based on the processing request; a management section that manages the processing request and the processing time zone associated with each other; a processing implementation control section that controls to implement, based on the processing request, the processing from a processing start time; a specification section that, when a new processing request is received, specifies a processing request being managed whose processing time zone overlaps with a processing time zone of the newly received processing request; and a change section that changes at least one of the processing time zone of the specified processing request and that of the new processing request within a range based on the properties of the processing request.2009-04-09
20090094608METHOD AND APPARATUS FOR MOVING A SOFTWARE APPLICATION IN A SYSTEM CLUSTER - In one aspect, the invention is directed to a method for shutting down a first instance of an application and starting up a second instance of the application. The first instance of the application has associated therewith at least one first-instance support resource. The second instance of the application has associated therewith at least one second-instance support resource. The method includes: 2009-04-09
20090094609DYNAMICALLY PROVIDING A LOCALIZED USER INTERFACE LANGUAGE RESOURCE - Technologies are described herein for dynamically providing a localized user interface (“UI”) resource. A localization framework includes a resource manager, resource sets, and resource readers. The resource manager exposes an application programming interface (“API”) to application programs for requesting a localized UI resource from the resource manager. When the resource manager receives a request for a localized UI resource on the API, the resource manager queries the resource sets for the requested resource. If the first resource set is unable to provide the requested localized UI resource, another resource set may be queried. Multiple resource readers within each resource set may also be configured to provide flexibility in how UI resources are loaded and processed.2009-04-09
20090094610Scalable Resources In A Virtualized Load Balancer - In one embodiment, a load balancing system may include a first physical device that provides a resource. The first physical device may have a first virtual device running actively thereon. The first virtual device may have the resource allocated to it on the physical device. The first physical device may also have a virtual server load balancer running actively thereon. The server load balancer may be adapted to balance a workload associated with the resource between the first virtual device and a second virtual device. The second virtual device may be running in active mode on a second physical device, and in standby mode on the first physical device. The first virtual device may be in standby mode on the second physical device.2009-04-09
20090094611Method and Apparatus for Load Distribution in Multiprocessor Servers - A method and arrangement for handling incoming requests for multimedia services in an application server having a plurality of processors. A service request is received from a user, requiring the handling of user-specific data. The identity of the user or other consistent user-related parameter is extracted from the received service request. Then, a scheduling algorithm is applied using the extracted identity or other user-related parameter as input, for selecting a processor associated with the user and that stores user-specific data for the user locally. Thereafter, the service request is transferred to the selected processor in order to be processed by handling the user-specific data.2009-04-09
20090094612Method and System for Automated Processor Reallocation and Optimization Between Logical Partitions - A method and system for reallocating processors in a logically partitioned environment. The present invention comprises a Performance Enhancement Program (PEP) and a Reallocation Program (RP). The PEP allows an administrator to designate several parameters and identify donor and recipient candidates. The RP compiles the performance data for the processors and calculates a composite parameter. For each processor in the donor candidate pool, the RP compares the composite parameter to the donor load threshold to determine if the processor is a donor. For each processor in the recipient candidate pool, the RP compares the composite parameter to the recipient load threshold to determine if the processor is a recipient. The RP then allocates the processors from the donors to the recipients. The RP continues to monitor and update the workload statistics based on either a moving window or a discrete window sampling system.2009-04-09
20090094613METHOD OF MANAGING WORKLOADS IN A DISTRIBUTED PROCESSING SYSTEM - An embodiment of the present invention is a method for generating a simulated processor load on a system of CPU's, and introducing a controlled workload into the system that is spread evenly across the available CPU resources and may be arranged to consume a precise, controllable portion of the resources.2009-04-09
20090094614Direct synchronous input - Various technologies and techniques are disclosed for providing direct synchronous input. An input monitor determines where an input from a sender that is directed to a target element is about to be delivered. One example for providing an input monitor includes using a system hook. If the input monitor determines that the input is about to be delivered to the target element, the input is delivered to the target element, and the sender is notified that delivery to the target element succeeded. An interface for providing a direct synchronous input is also described. The interface has a start method for monitoring inputs being sent to target elements from a sender. The interface also has a received event for notifying the sender when a particular input is received by the target element.2009-04-09
20090094615Access Control Method, System and Device Using Access Control Method - In an access control method for performing access control on resources of a device, the access control method includes: activating a program management function, an access management function and a resource management function on a running embedded OS (Operating System); segmenting plural applications operating on the device to allocate a segment identifier to each of the segmented applications, by the program management function; if access to the resources from an application is requested, deciding enabling and disabling of the access to the resources from the application by referring to an access enabling and disabling list based on the segment identifier, by the access management function; and if the access is enabled, notifying the application of a method of referring to the resources in which a request for acquisition is made, through the access management function and the program management function, by the resource management function.2009-04-09
20090094616Comparing Middleware Configurations - A system and method for comparing middleware configurations on a plurality of data processing systems. A comparison manager organizes a first set of configuration objects into a first representative tree structure and a second set of configuration objects into a second representative tree structure. The comparison manager uniquely identifies (utilizing a key value) each configuration object in the first and second set of configuration objects. If at least two configuration objects have matching key values, the comparison manager compares the property values of the at least two configuration objects. The comparison manager then outputs the result of the comparison.2009-04-09
20090094617Container for Disparate Software Components - A computer readable medium embodying instructions executable by a processor to perform a method for hosting components implemented in different computer readable languages within one process. The method includes instantiating a container within a single process, creating a hosting environment for each of a plurality of components, and wherein loading the components by respective environments and wherein the hosting environments are objects instantiated within the container and within the one process, and wherein the plurality of components are implemented in respective a computer readable language, and instantiating a container communication framework object within the container and the one process for processing serialized messages of the components, wherein specific language adapters convert data types of the components to a common implementation, wherein the messages of the plurality of components are processed within the container.2009-04-09
20090094618SYSTEM AND METHOD FOR INFORMATION ASSURANCE BASED ON THERMAL ANALYSIS TECHNIQUES - Systems and methods for network security are disclosed. Embodiments of the present invention include a scalable, real-time solution to complement existing security systems and detect unusual activity. Embodiments of the present invention leverage the scale and complexity of networks and use the principles of statistical physics and thermodynamics to define thermal properties like entropy, temperature and energy for network states and changes in the properties as packets move through the network.2009-04-09
20090094619NONSTOP PROGRAM SYSTEM AND A METHOD OF CONTINUOUSLY RUNNING PROGRAMS BY SWITCHING BETWEEN PROGRAM SIDES - A nonstop program system includes program sides each including programs accomplishing the required function of the system and a dedicated variable area storing variables used for executing the program. Those programs are independent of each other and have the same contents. When the operational state of one program side is set to an ACT state, while using the one program side as the active side for executing the program in the one program side, the operational state of another program side is set to a HOT_SBY state, and a variable area of the other program side is synchronized with the variable area of the active side, thereby alternately and periodically switching the operational states of the program sides. When switching the active side, the operational state of the other program side is switched to the ACT state to cause the other program side as the active side to continuously execute the program.2009-04-09
20090094620HIGH DATA AVAILABILITY SAS-BASED RAID SYSTEM - A storage system includes two RAID controllers, each having two SAS initiators coupled to a zoning SAS expander. The expanders are linked by an inter-controller link and create a SAS ZPSDS. The expanders have PHY-to-zone mappings and zone permissions to create two distinct SAS domains such that one initiator of each RAID controller is in one domain and the other initiator is in the other domain. The disk drives are dual-ported, and each port of each drive is in a different domain. Each initiator can access every drive in the system, half directly through the local expander and half indirectly through the other RAID controller's expander via the inter-controller link. Thus, a RAID controller can continue to access a drive via the remote path in the remote domain if the drive becomes inaccessible via the local path in the local domain.2009-04-09
Website © 2025 Advameg, Inc.