Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


31st week of 2013 patent applcation highlights part 62
Patent application numberTitlePublished
20130198071MOBILE SERVICES REMOTE DEPOSIT CAPTURE - Systems and methods disclosed herein include a mobile solution to enable users to perform financial transaction over a network using a mobile device. These techniques allow users to maintain a single personal account identifier or number referred to as a (“PAN”) on the user's mobile device and to utilize it to access a plurality of linked financial accounts and sub-accounts. Any one of the accounts can be selected by a user on the mobile device to remotely deposit funds to that account based on an image of a financial payment instrument. In one embodiment, the image can be obtained using image capture technology on the user's mobile device. Users can then perform a financial transaction using the verified images over a network in order to conduct a remote financial transaction such as applying a deposit, a payment, or cash load to a designated account which is linked to the user's mobile account in real-time or near real-time.2013-08-01
20130198072PORTABLE SYSTEM PERFORMING BUSINESS CENTER OPERATIONS - The present disclosure discloses a portable business operations system having a multi-function device, a network interface and a user interface. Broadly, the multi-function device parses the content of one or more filled in application forms and verifies the completeness or accuracy of the forms. The network interface provides connectivity and communication between the portable system and one or more remotely located systems. Moreover, the user interface sends or receives electronic documents to and from one or more remotely located systems.2013-08-01
20130198073SYSTEM AND METHOD FOR EXECUTING CASH PAYMENTS VIA A COMPUTER NETWORK - The invention presented comprises a system and method for executing a cash payment via a computer network. A payor computing device communicates over a computer network with payee computing devices via a P2P server. The P2P server is operative to receive a payment request from the payor computing device and process the payment by debiting a financial instrument specified by a payor utilizing the payor computing device. The payment request is transmitted from the P2P server to a cash payment server operative to receive the payment request and translate the request into the native format of an ATM control server, the native format of the P2P server and ATM control server not being interoperable. The ATM control server is operative to generate a PIN code, which is transmitted along with the received payment instructions to an ATM.2013-08-01
20130198074SYSTEM AND METHOD FOR PRE-PURCHASING GASOLINE - A method is provided for permitting a consumer to purchase gasoline without contemporaneously taking delivery of the gasoline. The method includes establishing a credit of a purchase of gasoline at a specified price per unit, without delivery. The method further includes authenticating a purchase of a certain number of units of gasoline at a certain price per unit, with delivery, from a gas retailer. The purchase is compared with the credit to determine if the credit may be redeemed with the sale. If so, the sale amount is adjusted to reflect an adjusted sale amount, and the adjusted sale amount is then cleared as a final transaction. Advantageously, with the subject invention, a consumer may pre-purchase gasoline at an agreed-to price without delivery of the gasoline, with receiving credit at a subsequent purchase in a single transaction, even if the amount of gasoline exceeds the pre-purchase amount.2013-08-01
20130198075PROCESSING MONITOR SYSTEM AND METHOD - Systems and methods for monitoring transaction data and providing an indication regarding a performance parameter to a payment processing entity. Transaction data associated with a plurality of transactions conducted during a time interval is received. A server computer determines that the received transaction data meets a threshold. It is further determined whether a previous indication that the threshold has been met was provided to a payment processing entity, the previous indication being associated with a plurality of previous transactions conducted during a previous time interval. If the previous indication was not provided, an indication that the threshold has been met is provided to the payment processing entity, the indication including information regarding a performance parameter of the payment processing entity.2013-08-01
20130198076SYSTEMS AND METHODS TO PROVIDE CHECK-IN BASED PAYMENT PROCESSES - Systems and methods for providing check-in based payment processing are discussed. In an example, a method for check-in based payment processing can include receiving check-in data, generating a pre-approval, sending a one-time-use PIN, receiving a validated transaction, and processing a payment. The check-in data can include a merchant identifier and user information identifying a user registered with the check-in service and associated with a mobile device. The pre-approval can include a one-time-user PIN. The validated transaction can include the one-time-user PIN associated with the pre-approval.2013-08-01
20130198077SEEDING CHALLENGES FOR PAYMENT TRANSACTIONS - Systems, methods, and apparatus are provided for authenticating a consumer using challenge questions. A response to a challenge question is verified via seeding the challenge question, receiving response, and deductively determining the answer. The verified response and challenge question may then be used to authenticate a consumer as part of an authorization process.2013-08-01
20130198078SECURE GRAPHICAL CODE TRANSACTIONS - A method of making a payment using an encoded graphic by a user device may include acquiring an image of the encoded graphic, and determining payment information using information associated with the encoded graphic. The method may also include sending a request to an identity repository for a first signature for the payment. The method may additionally include receiving the first signature for the payment from the identity repository. The method may further include sending the payment information and the first signature to a payment gateway.2013-08-01
20130198079Verification of Online Transactions - Systems, methods and devices described herein enable improved identity verification during online financial transactions. In particular, the features of various implementations are used to enable identity verification of account holders of credit cards, debit cards, and other payment instruments during online transactions. For example, in some implementations systems, methods and devices are operable to compare one or more encoded and/or encrypted images of facial features obtained upon activation of the payment instrument or security measures with one or more encoded and/or encrypted images of facial features obtained during a subsequent online transaction to verify that the individual offering the payment instrument as a form of payment is the true and authorized user of the payment instrument. Additionally and/or alternatively, a voice print record and/or location information may be combined with the use of the encoded and/or encrypted images to provide additional security.2013-08-01
20130198080SYSTEM AND METHOD OF PROVIDING TOKENIZATION AS A SERVICE - Systems, devices, apparatuses, and methods for providing tokenization as a service are provided. Embodiments of the invention involve decoupling a “tokenization service” from other services offered by a merchant service provider, and offering the tokenization service as a stand-alone service. In accordance with an embodiment, a merchant service provider can receive payment data associated with a transaction between a consumer and a first entity. The merchant service provider can generate a payment token that represents the payment data and transmit a copy of the payment token to the first entity. The first entity can then transmit the payment token and order information to a second entity specified in the transaction. The merchant service provider can subsequently receive a request to complete the transaction from the second entity. The request can include the copy of the payment token from the second entity.2013-08-01
20130198081SYSTEMS AND METHODS FOR FACILITATING CARD PRESENT TRANSACTIONS - This disclosure describes systems and methods related to facilitating card present transaction. In one embodiment, a service provider system may receive a request from a merchant to initiate a card present transaction associated with a consumer. The service provider system may determine an identifier associated with a mobile device associated with the consumer. The service provider system may communicate to the mobile device, based at least in part on the identifier, a message that facilitates invocation of a transaction module associated with the mobile device. The service provider system may facilitate the car present transaction based at least in part on an interaction with the transaction module.2013-08-01
20130198082PAYMENT SERVICE THAT PROVIDES OPTION TO AUTHENTICATE WITH EXTERNAL AUTHENTICATION SERVICE - A system and associated methods are disclosed for enabling users to use third party account login information to make payments to merchants. A payment service receives a user's identifier in response to a user authentication request sent over a network to an authentication service of an information or credit service. The user authentication request includes login credentials of the user for the information service or credit and is associated with a payment page of a merchant that has an account with the payment service. The payment service receives the user identifier when the information or credit service validates the login credentials. Based at least in part on the user identifier, the payment service receives payment information from the information or credit service. The payment service provides the user with an option to use the retrieved payment information to make a payment to the merchant.2013-08-01
20130198083Systems, methods and devices for trusted transactions - The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.2013-08-01
20130198084UTILIZING PHRASE TOKENS IN TRANSACTIONS - A system and method for facilitating transactions utilizing phrase tokens are provided. Individual entities can be associated with unambiguous transaction phrase tokens, such as multiple word phrases. The transaction phrase tokens are associated with transaction accounts by a service provider such that the entities can complete a transaction without having to exchange transaction account information. In a transaction, a transaction phrase token is offered to an accepting party, which tenders the offered transaction phrase token to the service provider. The service provider processes the offered transaction phrase token according to configuration information specified for the transaction phrase token. The service provider can automatically process the transaction request or request additional information.2013-08-01
20130198085APPLICATION LICENSING FOR DEVICES - A method, system, and computer-readable storage media for licensing an application for a device are provided herein. The method includes providing a license for an application from a licensing service to a number of computing devices associated with a user, wherein the license includes credentials. The method also includes associating the credentials with each computing device and periodically determining a state of a subscription corresponding to the license on each computing device. Each computing device is configured to call the licensing service at configurable time periods in order to determine the state of the subscription.2013-08-01
20130198086TRUSTED SERVICE MANAGER (TSM) ARCHITECTURES AND METHODS - A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.2013-08-01
20130198087METHOD AND APPARATUS FOR PROVIDING SUPPORT FOR INTERNET-BASED SERVICES - A method and apparatus for providing support for an Internet-based service. One embodiment of the method comprises gathering user information related to one or more of user identification, user hardware, user software, or browsing session information, and displaying agent contact information and a PIN, the PIN associated with the user information to enable an agent to access the user information to support a user's interaction with the agent. The apparatus comprises a user computer for executing an applet for gathering user information related to one or more of user identification, user hardware, user software, or browsing session information. A web server for coupling agent contact information and a PIN to the user computer, the PIN associated with the user information to enable an agent to access the user information to support a user's interaction with the agent. The user computer displays the agent contact information and the PIN.2013-08-01
20130198088MANAGEMENT TOOLS FOR SIMULATION OF PERFORMANCE AND OUTCOME OF WINTER TRANSPORTATION INFRASTRUCTURE MAINTENANCE ACTIVITIES - An apparatus and system for evaluating winter transportation infrastructure maintenance operations includes a quantification component and a simulation component. Input data representative of collected winter transportation infrastructure maintenance data and observed transportation infrastructure data are modeled in a comprehensive data processing mechanism to measure and carry out effective and efficient winter maintenance planning and operations.2013-08-01
20130198089Method And System For Recycling Electronic Devices In Compliance with Second Hand Dealer Laws - A method and system for reselling electronic devices in compliance with second hand dealer laws is disclosed herein. The system includes a kiosk, a network and a server with a database. The kiosk preferably includes an external camera, a fingerprint reader and an identification (card) reader.2013-08-01
20130198090ENFORCING RULE COMPLIAINCE WITHIN AN ONLINE DISPUTE RESOLUTION SESSION - An online dispute resolution (ODR) engine can be able to facilitate a caucus within an alternative dispute resolution of an online dispute resolution session between a neutral participant, a caucused participant, and a non-caucused participant. The alternative dispute resolution can be associated with at least one legal case. A data store can be configured to persist one or more rules associated with the alternative dispute resolution, a legal case, and a compliance artifact. The rules can be a law and a legally binding requirement. The legal case can be a civil or criminal case. The compliance artifact can include a mandatory item associated with the rules and the legal case.2013-08-01
20130198091SYSTEM OF ALTERNATIVE DISPUTE RESOLUTION IMPLEMENTED THROUGH A GLOBAL COMPUTER NETWORK AND METHODS THEREOF - A computer-implemented method for alternative dispute resolution is provided. In exemplary embodiments, the method may comprise, at a computing device having one or more processors and memory storing one or more programs for execution by the one or more processors, receiving a legal claim and an associated data profile from a first user, receiving first user merit data from the first user, the first user merit data comprising data associated with the merits of the legal claim, receiving second user merit data from a second user, the second user merit data comprising data associated with the merits of the legal claim, generating a settlement number for the first user based on the first user merit data, generating a settlement number for the second user based on the second user merit data, and notifying the first user and the second user that settlement is likely if the settlement number for the first user and the settlement number for the second user are within an acceptable range.2013-08-01
20130198092COMPUTER-ASSISTED PATENT APPLICATION PREPARATION - Techniques for computer-assisted patent application preparation are described. Some embodiments provide a Patent Application Preparation System (“PAPS”) that facilitates the automatic generation of patent applications (or portions thereof) based on logical claim definitions. The PAPS may receive one or more claim definitions that each define a single patent claim. From these claim definitions, the PAPS may generate claims, figures, written description corresponding to the figures, summary sections, and the like. When a drafter modifies a claim definition, the application portions may be automatically regenerated, so that any changes (e.g., to claim position or terminology) are reflected in the resulting patent application.2013-08-01
20130198093DATA MINING AND LOGIC CHECKING TOOLS - Data mining and logic-checking tools provided by a service to a client organization enable fractal data comparison and analysis and a logic-based data derivation. The tools are configured to interface with websites which have data that typically is 1) required and missing from a client organization's database, 2) used to validate pre-existing data in a user's database, or 3) used to derive new data for a user's database. For data acquisition, the tools interface with sources of data which, typically, do not offer an application programming interface (API) for non-human access to the data. The tools may execute routines to validate the acquired data to ensure its completeness and logical accuracy as well as enrich the data with data from other sources or data that is derived from the acquired data. The processed data is organized and transformed into specified end states and routed to appropriate recipients.2013-08-01
20130198094SYSTEM AND METHOD FOR REGULATION COMPLIANCE - The system and method herein disclosed is an online tool for reaching regulatory compliance. It uses a database of requirements by device, country, and agency necessary for licensing and marketing. Further databases include the compliance documents themselves, provided by given users concerning given devices. Still further databases include lists of domain experts, who may be called upon to review and edit these compliance documents. Expert systems running on a server associated with the system and method herein disclosed guide the user along the route to reaching compliance by means of aiding classification, prompting for missing documents, suggesting workarounds, submitting documents and payments automatically, and the like. Regulatory agencies may be given access to parts of the databases of the system and method herein disclosed to allow them to peruse and evaluate the compliance documents.2013-08-01
20130198095Method and Device for Automatically Evaluating a Delivery System - A method for automatically evaluating a delivery system with respect to the energy efficiency and emissions efficiency thereof, may include: determining a service level for the delivery system according to an energy intensity and an evaluation relevance of the particular delivery system, detecting energy data and emissions data of the delivery system corresponding to the determined service level of the delivery system, and calculating at least one indicator based on the detected energy data and emissions data and/or based on data for the energy management and environmental management of the delivery system for evaluating the delivery system with respect to the energy efficiency and emissions efficiency thereof.2013-08-01
20130198096METHOD AND SYSTEM FOR SHIPPING VIA A SOCIAL NETWORK - Systems and methods for shipping to be executed within the framework of a social networking system or social network using information managed within the social networking system through interfaces to carriers that perform the shipping are provided. Shipping registration information for a first user of a social networking system is received, wherein the shipping registration information includes a physical address and at least one authorized payment mechanism. A request by the first user to ship a physical item to a second user of the social networking system is received at the social networking system. Shipping information including a physical address is obtained from the second user. A shipping label for shipping the physical item is generated and provided to the first user for shipping the physical item to the second user.2013-08-01
20130198097COMPENSATION PLAN SYSTEM WITH CROSS REFERENCING - One embodiment is directed to a computer program embodied on a computer readable medium. The computer program is configured to control a processor to execute instructions. The instructions include identifying, in a compensation system comprising a plurality of compensation plans, employee data that needs to be imported from at least one other compensation plan into a referring compensation plan. Each of the compensation plans comprises a plurality of columns. The instructions may further include selecting at least one column of the referring compensation plan that will receive the imported employee data from the at least one other compensation plan, and configuring details of the referring compensation plan using at least one property of the selected at least one column.2013-08-01
20130198098SYSTEM AND METHOD FOR CREATING A DYNAMIC CUSTOMIZED EMPLOYMENT PROFILE AND SUBSEQUENT USE THEREOF - A system and method for dynamically generating a customized profile for a company for a selected profile type, the customized profile including a set of attribute types, each of the attribute types having a customized attribute range. The system comprises a receipt module for receiving a predefined profile having predefined attribute types corresponding to the set of attribute types. Each of the predefined attribute types has a predefined attribute range representing a range of attribute values for the selected profile type, and for receiving personal assessments of individuals related to the company. Each of the personal assessments has questions related to attributes. Each of the questions has a value assigned by the respective related individual.2013-08-01
20130198099Intelligent Job Matching System and Method including Negative Filtration - A job searching and matching system and method is disclosed that gathers job seeker information in the form of job seeker parameters from one or more job seekers, gathers job information in the form of job parameters from prospective employers and/or recruiters, correlates the information with past job seeker behavior, parameters and behavior from other job seekers, and job parameters and, in response to a job seeker's query, provides matching job results based on common parameters between the job seeker and jobs along with suggested alternative jobs based on the co-relationships and based on ratings and preferences provided by the job seeker and provides negative filtration of undesirable jobs based on job seeker input and in response to queries from the system in order to efficiently and accurately accommodate job seeker perception.2013-08-01
20130198100CUSTOMER CONTROLLED MANAGEMENT OF SHIPMENTS - Systems, methods, apparatus, and computer program products are provided for customer controlled management of shipments. For example, in various embodiments, a customer can provide information prior to a first delivery attempt of an item by a carrier to receive messages regarding shipment of the item and to have the item delivered in accordance with the provided information.2013-08-01
20130198101METHOD FOR OPERATING AUTOMATIC STORAGE SYSTEMS FOR DISTRIBUTING OBJECTS TO A PLURALITY OF PERSONS, AND AUTOMATIC STORAGE SYSTEM DESIGNED IN A CORRESPONDING MANNER - The invention relates to a method for operating automatic storage systems (2013-08-01
20130198102METHOD AND APPARATUS FOR APPROVING A TRANSACTION - A method and apparatus that improves treasury management functionality for a cash positioning and reporting system is provided. Several portions of the payment process may be improved. The approval process may be streamlined by providing supplemental contact information at each stage of the approval process. Confirmation of payments made via a wire transfer may be sent to a payee. A reference number from the wire transfer may be included in the confirmation. The reference number may permit tracking of the payment by the payee. Likewise, supplemental wire transfer information may be provided to the general ledger system to improve reconciliation of payments and invoices.2013-08-01
20130198103Mapping Between Different Delta Handling Patterns - A received delta message of a first kind, expressed in one interchange format, may be used to modify business record(s) in accordance with the processing of a delta message of a second kind expressed in a different interchange format. Conversely, a delta message of the first kind may be generated to express modifications made to a business record, where the modifications are specified in accordance with a delta message of the second kind.2013-08-01
20130198104SYSTEMS AND METHODS FOR MANAGING ELECTRONIC CONTRACTS AND DATA - The present invention relates to systems and methods for managing electronic contracts and data. Specifically, the present invention relates to a computer system for generating and managing secondary contracts. The computer system may comprises a memory, a communication device operatively coupled to the memory to receive primary contract data from a secure document repository and at least one processor. The at least one processor may be operatively coupled to the communications device for extracting customer data from the primary contract and generating a secondary contract by populating a form contract with the customer data extracted from the primary contract; wherein the secondary contract is stored to the secure document repository and reconciled with data received from a third party to ensure data accuracy.2013-08-01
20130198105Site Information and Management - In one preferred form there is provided a site information system. The site information system comprises: a management system including a team facility and a receiver facility. The team facility is associated with a number of teams; and the receiver facility is for receiving information from portable electronic devices associated with team members of the teams.2013-08-01
20130198106SYSTEMS AND METHODS TO CREATE, COMPARE, CUSTOMIZE, PROMOTE, TRACK, OPTIMIZE AND SHOP FOR PORTFOLIOS OF SECURITIES THAT INCLUDES FRACTION SHARES - A system and method for conducting security transactions provides a system with a client device with a client interface, an inventory account and a trading engine. The trading engine processes a client buy, sell, sell short or buy to cover order. The trading engine enables a trading of fraction shares in real time as well as reduces a frequency of orders sent to market by executing principal trades against the inventory account.2013-08-01
20130198107SYSTEMS AND METHODS WITH A TARGETS ENGINE TO CREATE, COMPARE, CUSTOMIZE, PROMOTE, TRACK, OPTIMIZE AND SHOP FOR PORTFOLIOS OF SECURITIES - A system and method for conducting security transactions includes a client device with a client interface. A host server is coupled to the client device and executes logic resources for carrying out portfolio transactions for a client. An inventory account and a pricing engine are provided. A targets engine calculates a target number of long and short shares of a stock to be included in the inventory account to meet present and future buy, sell, sell short, and buy to cover client orders.2013-08-01
20130198108Systems and methods to create, compare, customize, promote, track, optimize and shop for portfolios of securities using social networks - A system and associated method for conducting security transactions includes a client device with a client interface configured to receive a client buy, sell, sell short, or buy to cover order from a client. The client is associated with a social media network and has at least one social network friend. A host server is coupled to the client device and executes logic resources for carrying out transactions for the client. A pricing engine and an inventory account are included. A targets engine determines a target number of long and shorted shares of a security to be held by the inventory account. A social networking engine allows clients to share information for at least one of, portfolios, orders and investment ideas. The social networking engine allows users to execute securities transactions based on the shared information.2013-08-01
20130198109Municipal bond tracking and evaluation system - The present invention relates to a web-application that gathers raw data and meta data, matches debt related data with corresponding meta data, marks the debt data so that the resulting data stream can be used to create various analytical reports on variable rate securities for Users.2013-08-01
20130198110METHOD FOR BUYING AND SELLING STOCKS AND SECURITIES - A computer-based method and system for buying and selling stocks and other securities. In general, the method creates an indicator for the purchase point or period and selling point or period for a stock. The method uses various technical indicators that converge to form zones, roughly in the form of triangles when viewed in a graphical display. A buy, sell, or take no action indicator is then determined based upon the comparison of price linear regression data to the other indicators described above. When the linear regression line or data at a point or for a period is greater than (i.e., above) all of the other indicators, this results in a buy indication. When the linear regression line or data at a point or for a period is lower than (i.e., below) all of the other indicators, this results in a sell indication.2013-08-01
20130198111COMPUTER SYSTEM AND METHOD FOR PRODUCT ALLOCATION VISUALIZATION - Information is received regarding retirement assets to be invested by a retiree planning for retirement. Based on the information, a plurality of product allocation options are selected to be presented to the retiree. The product allocations comprise different allocations of the retirement assets to different types of products. A depiction is generated that simultaneously shows the plurality of product allocation options. The depiction compares income predicted to be derived from each of the plurality of product allocation options.2013-08-01
20130198112Capacity Management Methods and Systems - An exemplary method includes a capacity management subsystem 1) receiving identification of a first computing subsystem included in a plurality of computing subsystems, 2) receiving identification of a plurality of services provided by the first computing subsystem, the plurality of services utilized in a product flow for providing a product to end users, 3) receiving data defining, for each service included in the plurality of services, an apportioned capacity of the first computing subsystem to provide the service, wherein each apportioned capacity of the first computing subsystem comprises a portion of an overall resource capacity of the first computing subsystem, 4) receiving data defining an overall operating cost of the first computing subsystem, and 5) determining an operating cost of providing each service included in the plurality of services by the first computing subsystem. Corresponding methods and systems are also disclosed.2013-08-01
20130198113METHOD AND TECHNIQUE TO CREATE SINGLE INTELLIGENT COLLABORATION PLATFORM SPANNING ACROSS WEB, MOBILE AND CLOUD - A method that knits together and logically sequences diverse services such as, but not limited to, social networks, financial services, news feeds, email services, calendar services, analytical platforms and Business-to-consumer (B2C) services to create a state full cohesive end-to-end user experience on a single intelligent collaboration platform spanning across web, mobile and cloud.2013-08-01
20130198114Classifying Activity Using Probabilistic Models - A method, an apparatus and an article of manufacture for classifying customer activity in an automated customer support system. The method includes obtaining input from the automated customer support system, wherein the input comprises an observable measurement of customer activity in the automated customer support system, computing a probability that the input corresponds to one of one or more probabilistic models, and using the computed probability to classify the customer activity in the automated customer support system by considering the probabilistic model corresponding to a highest computed probability.2013-08-01
20130198115CLUSTERING CROWDSOURCED DATA TO CREATE AND APPLY DATA INPUT MODELS - The collection and clustering of data input characteristics from a plurality of computing devices is provided. The clustered data input characteristics define user groups to which users are assigned. Input models such as language models and touch models are created for, and distributed to, each of the user groups based on the data input characteristics of the users assigned thereto. For example, an input model may be selected for a computing device based on a current context of the computing device. The selected input model is applied to the computing device during the current context to alter the interpretation of input received from the user via the computing device.2013-08-01
20130198116LEVERAGING USER-TO-TOOL INTERACTIONS TO AUTOMATICALLY ANALYZE DEFECTS IN IT SERVICES DELIVERY - An approach is presented for identifying related problem tickets in an information technology (IT) environment. User interactions with a computer program are stored. The user interactions include inputs to the computer program to search for problem tickets issued in the IT environment that have the same characteristics. One or more user interaction patterns within the user interactions are recognized. A user interaction pattern of the one or more user interaction patterns is selected based on an evaluation of effectiveness of each of the one or more user interaction patterns. Based on the user interaction pattern, a rule is generated for determining which problem tickets in the IT environment share a common characteristic. The rule is applied to additional problem tickets issued in the IT environment to identify which of the additional problem tickets share the common characteristic.2013-08-01
20130198117SYSTEMS AND METHODS FOR SEMANTIC DATA INTEGRATION - Embodiments of the present invention relate to a system for data integration and information retrieval by bringing semantically related data together for a given context. As described, the integration of data may include the building of an ontology, the mapping of one or more processes, semantic maps and concept dictionaries in the ontology to one or more data sources, tagging the data sources in accordance with the ontology, providing a query interface for accepting an input query from a user, the mapping of the input query to one or more concepts in the ontology, and deriving one or more subqueries thereby, and the querying of data sources in accordance with the composed one or more subqueries, wherein the data sources queried are tagged with one or more concepts from the ontology. Additionally, the tracking of data across data sources in accordance with a defined data value chain is disclosed.2013-08-01
20130198118ANNOTATION OF A BIOLOGICAL SEQUENCE - A computer-implemented method for annotation of a biological sequence, comprising: applying a classifier to determine a label for the first segment of a first biological sequence of a first species based on an estimated relationship between second segments in a training set and known labels of the second segments in the training set. The classifier is trained using the training set to estimate the relationship, and the second segments are of a second biological sequence of a second species that is different to, or a variant of, the first species. This disclosure also concerns a computer program and a computer system for annotation of a biological sequence.2013-08-01
20130198119APPLICATION OF MACHINE LEARNED BAYESIAN NETWORKS TO DETECTION OF ANOMALIES IN COMPLEX SYSTEMS - According to one embodiment, in response to a set of data for anomaly detection, a Bayesian belief network (BBN) model is applied to the data set, including for each of a plurality of features of the BBN model, performing an estimate using known observed values associated with remaining features to generate a posterior probability for the corresponding feature. A scoring operation is performed using a predetermined scoring algorithm on posterior probabilities of all of the features to generate a similarity score, wherein the similarity score represents a degree to which a given event represented by the data set is novel relative to historical events represented by the BBN model.2013-08-01
20130198120SYSTEM AND METHOD FOR PROFESSIONAL CONTINUING EDUCATION DERIVED BUSINESS INTELLIGENCE ANALYTICS - The present disclosure relates to non-linear analytics engine derived business intelligence. More particularly, the present disclosure describes methods and systems that use content associated with a medical professional continuing education event as a data source for a non-linear analytics engine. The content, which relates to the content creation, content delivery, follow-ups, evaluations, attendee interactions, and administrative tasks associated with medical professional continuing education event, is extracted from a learning management system and subsequently transmitted to the non-linear analytics engine to create business intelligence.2013-08-01
20130198121MULTI-COMPARTMENT NEURON SUITABLE FOR IMPLEMENTATION IN A DISTRIBUTED HARDWARE MODEL BY REDUCING COMMUNICATION BANDWIDTH - Embodiments of the present invention provide a neural module comprising a multilevel hierarchical structure of neural compartments. Each neural compartment is interconnected to one or more neural compartments of a previous level and a next hierarchical level in the hierarchical structure. Each neural compartment integrates spike signals from interconnected neural compartments of a previous hierarchical level, generates a spike signal in response to the integrated spike signals reaching a threshold of said neural compartment, and delivers a generated spike signal to interconnected neural compartments of a next hierarchical level. Each neural compartment is further interconnected to one or more external spiking systems, such that said neural compartment integrates spike signals from interconnected external spiking systems, and delivers a generated spike signal to interconnected external spiking systems. The neural compartments of a neural module include one soma compartment and a plurality of dendrite compartments. Each neural compartment is excitatory or inhibitory.2013-08-01
20130198122SYSTEM AND METHOD FOR OPTIMIZING TEAMS - A system, method and program product for optimizing a team to solve a problem. The system includes: a team building system for building a fundamental analytic team from a database of analysts to solve an inputted problem, wherein the fundamental analytic team includes at least one cluster of analysts characterized with specificity and at least one cluster of analysts characterized with sensitivity; and a problem analysis system that collects sensor data from the fundamental analytic team operating within an immersive environment, wherein the problem analysis system includes a system for evaluating the sensor data to identify a bias condition from the fundamental analytic team, and includes a system for altering variables in the immersive environment in response to a detected bias condition.2013-08-01
20130198123HIERARCHICAL INFORMATION EXTRACTION USING DOCUMENT SEGMENTATION AND OPTICAL CHARACTER RECOGNITION CORRECTION - Systems, methods, and media for extracting and processing entity data included in an electronic document are provided herein. Methods may include executing one or more extractors to extract entity data within an electronic document based upon an extraction model for the document, selecting extracted entity data via one or more experts, each of the experts applying at least one business rule to organize at least a portion of the selected entity data into a desired format, and providing the organized entity data for use by an end user.2013-08-01
20130198124METHOD AND SYSTEM FOR MULTI-IED EVENT ZONE IDENTIFICATION IN AN ELECTRICAL GRID - A method of identifying at least one event zone subject to an event in a substation environment of an electrical grid. Thereby, data from multiple intelligent electronic devices can be synthesized in real-time whereby an operator can be presented with a single conclusion describing the event attributes thereby helping the operator to determine the mitigation actions as needed. The method includes receiving first event related data from the intelligent electronic devices, and based on the first event related data, determining whether the at least one monitoring zone subject to the event is a primary monitoring zone of at least one of the intelligent electronic devices or a non-primary monitoring zone for all of the intelligent electronic devices using ensemble decision making and probabilistic methods. It is also presented a system for carrying out the method.2013-08-01
20130198125SYSTEMS, METHODS, AND ARTICLES OF MANUFACTURE TO MEASURE ONLINE AUDIENCES - Methods and apparatus to monitor media content at a content display site are described. An example method includes obtaining panelist data corresponding to a plurality of panelists accessing web pages at measured locations, classifying the panelist data according to demographic information of the panelists, generating a virtual panel based on an estimate of web page access at unmeasured locations, and classifying page view data associated with the unmeasured locations based on data corresponding to the virtual panel.2013-08-01
20130198126SYSTEM AND METHOD FOR PRIORITIZING RESUMES BASED ON A JOB DESCRIPTION - A method for prioritizing one or more of resumes based on a job description is provided. The method includes (i) processing the job description to extract one or more keywords and a first period, (ii) extracting, from a first resume and a second resume of the one or more resumes, one or more section, one or more events, a first date range, and a second date range, (iii) obtaining a second period and a third period, (iv) comparing, is the first resume and the second resume, the one or more keywords with the one or more events and the first period with the third period to obtain a relevant event and a relevant section, (v) computing a first weight for the first resume and a second weight for the second resume, and (vi) prioritizing the first resume and the second resume based on the first weight and the second weight.2013-08-01
20130198127SYSTEMS AND METHODS FOR MANAGING WIDE AREA NETWORKS - Systems and methods described herein provide automatic generation of one or more application fingerprints which may be used to identify and recommend one or more technologies and/or technical instructions for use within a WAN environment. Input data describing and an application fingerprint for one or more applications currently used within a network environment, such as a WAN environment, is received and executed against a set of rules by a rules engine. Based on the results, one or more recommendations may be provided that identifies various technologies and/or technical procedures the network manager may implement and/or perform.2013-08-01
20130198128CONTEXT-AWARE APPARATUS AND METHOD FOR IMPROVING REASONING EFFICIENCY THEREOF - Techniques for reasoning in a context-aware apparatus are provided. The context-aware apparatus includes least an input, an input selector, and a reasoning component. The information selector selects input information that satisfies a particular condition from among the information received by the input of the context-aware apparatus. The reasoning component performs context-aware reasoning based on the selected input information that satisfies the particular condition.2013-08-01
20130198129METHOD FOR BUILDING AND MAINTAINING TRUSTED SUPPLIER RECORDS - An Enterprise Network includes a master data management (MDM) system that is linked to two or more data sources each of which include means for storing local management information. The MDM system builds a master management information database that is comprised of some or all of the management information stored by the data sources. The master database in the MDM includes master records each of which is comprised of one or more attributes. The MDM system is configured to only update particular master record attributes with selected management information received from a trusted data source.2013-08-01
20130198130SECURE DATA MIGRATION IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module identifying a candidate dispersed storage (DS) unit of a dispersed storage network (DSN). In response to a data migration request, the method continues with the DS processing module receiving a migration receptiveness message from the candidate DS unit. In response to a data migration reference message, the method continues with the DS processing module receiving, from another DS unit of a set of DS units, a migration reference response that includes an indication of storage utilized by the other DS unit. The method continues with the DS processing module determining a storage utilization of the candidate DS unit based on the migration reference response and when the determined storage utilization compares favorably to the reported storage utilization, enabling transfer of data from a DS unit of another set of DS units to the candidate DS unit.2013-08-01
20130198131Parallel Agents and Manager Method - A system having an agent manager and a plurality of parallel agents for assisting a user in reaching a conclusion is provided in at least one embodiment. In at least one embodiment, the system is in communication with at least one database housing information to be analyzed by at least one of the agents. Further embodiments include the operation of the system and its interaction with the at least one database. In at least one further embodiment, the method includes the development and publication of the agents.2013-08-01
20130198132MINIMAL EXTENSIONS REQUIRED FOR MULTI-MASTER OFFLINE AND COLLABORATION FOR DEVICES AND WEB SERVICES - The claimed subject matter provides a system and/or a method that facilitates managing data consistency in connection with a plurality of devices. A collection of devices can be associated with a user. A web service can receive a portion of data from at least one device via an interface component, wherein the web service can host and relate the portion of data with an account for the user. A master sync component can leverage a computing resource from at least one device in order to maintain data consistency between at least one of the following: two or more devices within the collection of devices associated with the user; or the account hosted by the web service and two or more devices within the collection of devices associated with the user.2013-08-01
20130198133PARALLEL PROCESSING APPARATUS AND METHOD IN DATABASE MANAGEMENT SYSTEM FOR SYNCHRONOUS REPLICATION - A parallel-processing apparatus and method provide for synchronous replication in a database management system (DBMS). During synchronous replication into the active node and the standby node in the DBMS, replications of transactions are parallelized in units of transactions, thereby improving a performance of the DBMS, guaranteeing atomicity and consistency of the transaction, and solving the deadlock state which may occur in parallel-processing.2013-08-01
20130198134ONLINE VERIFICATION OF A STANDBY DATABASE IN LOG SHIPPING PHYSICAL REPLICATION ENVIRONMENTS - Techniques are disclosed for performing an operation for determining whether a standby database is synchronized with a primary database in a log shipping physical database replication environment. In one embodiment, the operation may include receiving a transaction log at the standby database from the primary database. The transaction log may specify a first one or more checksum values for a first set of pages on the primary database. The operation may also include calculating a second one or more checksum values for a second set of pages on the standby database. The operation may also include determining whether the standby database is synchronized with the primary database by comparing the first one or more checksum values with the second one or more checksum values.2013-08-01
20130198135PROTECTING DATA SEGMENTS IN A COMPUTING ENVIRONMENT - Exemplary method, system, and computer program product embodiments for protecting data segments by a processor device in a computing environment, are provided. In one embodiment, by way of example only, a history table is configured to accompany data segments for consultation during a replication operation. If the history table indicates an ownership conflict, the replication operation is inhibited.2013-08-01
20130198136DATABASE MIGRATION - A technique for converting a first version of a database to a second version is disclosed. The technique includes determining available translation steps, selecting a translation path from the first version of the database to the second version, and executing the selected translation steps in the translation path. The translation path includes selected translation steps from among the available translation steps.2013-08-01
20130198137DATA BACKUP AND RESTORAL APPARATUS, SYSTEM, AND METHODS - A method for maintaining local and remote backups of a target file on a local device. The method includes identifying the target file to be backed up; modifying a first backup data structure on a local backup apparatus to backup the target file; and modifying a second backup data structure in a remote backup system to backup the target file.2013-08-01
20130198138MODEL FOR CAPTURING AUDIT TRAIL DATA WITH REDUCED PROBABILITY OF LOSS OF CRITICAL DATA - An aspect of the present invention provides for capturing of audit trail data related to processing of requests. In an embodiment, the received requests are classified into a first category and a second category. For each request in the first category, the corresponding audit trail data is stored directly into non-volatile storage upon processing of the request. On the other hand, for each request in the second category, the audit trail data is first stored into a volatile memory upon processing of the request, and then later copied from the volatile memory to non-volatile storage. Thus, the audit trail data corresponding to both categories of requests is eventually available stored on non-volatile storage.2013-08-01
20130198139DURABILITY IMPLEMENTATION PLAN IN AN IN-MEMORY DATABASE SYSTEM - A database durability implementation records only committed transactions in a log file. A pair of log files and a pair of snapshot files are maintained. When a snapshot of the database is completed, the ‘current’ log becomes the ‘prior’ log and the other log becomes the ‘current’ log. After the next snapshot is completed, the prior log and prior snapshot may be deleted. Transactions that are not committed are not recorded in the current log, thereby avoiding the need to undo aborted transactions. If a given change is reflected in a completed snapshot, it does not appear in either of the logs; if the change is not yet reflected in a completed snapshot, it is guaranteed to be stored in one of the logs. During recovery, the system assesses both snapshots. The most recent of the completed snapshots is used, and the corresponding log(s) is (are) applied.2013-08-01
20130198140METHOD OF AND SYSTEM FOR ENHANCED DATA STORAGE - A method of and system for enhanced storage allows more data to be backed up than would otherwise be possible. Instead of storing uncompressed base images and incremental images, differentials of non-current base images are compressed and stored. Furthermore, incremental images that are older than the current base image are removed. By only saving differential base images that are compressed, aside from the newest base image, and deleting older incremental images, a significant amount of space is saved. A removable drive is used as temporary storage in the process of generating a compressed differential base for previous base images. Additionally, a process ensures that previous base images are differentials of the most recent base image and not each other.2013-08-01
20130198141TECHNIQUES FOR LEVERAGING REPLICATION TO PROVIDE ROLLING POINT IN TIME BACKUP WITH SIMPLIFIED RESTORATION THROUGH DISTRIBUTED TRANSACTIONAL RE-CREATION - Techniques to leverage replication to provide rolling point in time backup are described. Some embodiments are directed to techniques to provide rolling point in time backup with simplified restoration through distributed transactional re-creation. In one embodiment, for example, a technique may comprise creating a plurality of availability copies of a primary set of data; designating at least one of the plurality of availability copies as a backup copy; creating a log file that indicates changes to the primary set of data; updating the plurality of availability copies from the log file in near real time, without updating the backup copy; and restoring at least one of: the primary set of data and an availability copy using the backup copy and content resubmitted from a content contributor when an error occurs in at least one of: the primary set of data and an availability copy. Other embodiments are described and claimed.2013-08-01
20130198142MIRRORING FILE DATA - High availability and disaster recovery can be achieved within a database management system by detecting which parts of a file have changed and sending the changed parts to secondary servers, without sending the entire file that has experienced the changes. A log cracker reads data from a transaction log that stores records from a database and a separately maintained file system. The log cracker sends mirror commands with some of the transaction log data to the file system to initiate mirroring of the data from the file system to secondary servers. The log data is then subsequently sent to the secondary servers as well, to enable identification of changed data without having to transfer the entire file that has been changed.2013-08-01
20130198143DOCUMENT MANAGEMENT SERVER AND DOCUMENT MANAGEMENT METHOD - A document management server according to the present invention acquires entity data of a plurality of content documents specified to be downloaded by the client, and stores the acquired entity data of each of the plurality of content documents in a different folder generated in an archive file when there are content documents having a same name among the specified plurality of content documents. Further, the document management server generates an information file in which path information in the document management server and path information in the archive file with respect to each of the plurality of content documents specified to be downloaded are described in association with the corresponding content document, and stores the generated information file in the archive file. Further, the document management server transmits the archive file storing the entity data of each of the plurality of content documents and the information file to the client.2013-08-01
20130198144Method And System For Removing And Transferring Data From A Recycled Electronic Device - A method and system for removing and transferring data from a recycled electronic device such as a mobile phone is disclosed herein. The system includes a kiosk, a network and a server with a database. Further, the system includes a client device and a new electronic device to receive the transfer data from the recycled electronic device.2013-08-01
20130198145TRACKING CHANGES RELATED TO A COLLECTION OF DOCUMENTS - Changes to a collection of documents are tracked by generating content information for the collection of documents identifying initial content within the collection of documents and assigning an indicator a value indicating absence of changes to the collection of documents. A change to the collection of documents is detected and the value of the indicator is adjusted in accordance with the detected change to indicate an amount of the initial content within the modified collection of documents.2013-08-01
20130198146MANAGING LARGE DATASETS OBTAINED THROUGH A SURVEY-DATA-ACQUISITION PROCESS - The invention generally relates to enabling the management of survey data. One embodiment includes providing an upload description that describes characteristics of survey data to be uploaded, assigning a thread to process a group of files that store aspects of the survey data, dividing the file into data chunks, deriving from a given data chunk a corresponding data-integrity value and respectively associating the same with the given data chunk, communicating the data chunks to a remote storage device, utilizing the corresponding data-integrity values to ensure successful communication of the data chunk, and spatially storing the survey data such that it is retrievable upon a request that describes a geographic area of interest.2013-08-01
20130198147DETECTING STATISTICAL VARIATION FROM UNCLASSIFIED PROCESS LOG - A system and associated method for detecting a statistical variation of a process from a textual log of the process as performed by a process behavior analysis (PBA) system for monitoring the process operating in an Information Technology (IT) delivery system. The PBA system includes a PBA engine and a data storage storing exception rules used by the PBA engine. The PBA engine merges entities appearing in the textual log into one or more groups based on similarities of respective time series of the entities. Control charts are generated for merged entities and the PBA engine subsequently analyzes process behavior of the process by use of the control charts for exceptions defined in the stored exception rules. The PBA engine generates a PBA report for the process pursuant to the analysis result of the textual log with detailed information including to what type of exceptions had or had not occurred.2013-08-01
20130198148ESTIMATING DATA REDUCTION IN STORAGE SYSTEMS - Embodiments of the present invention provide a system, method and computer program products for estimating data reduction in a file system. A method includes selecting a sample of all data from data files in the file system, wherein said sample represent a subset of all the data in the file system. The method further includes estimating a data reduction ratio by data deduplication for the file system based on said sample. The method further includes estimating a data reduction ratio by data compression for the file system based said sample. The method further includes generating a combined data reduction estimate for the file system based on said data compression estimate and said data deduplication estimate.2013-08-01
20130198149AUTOMATED CORRUPTION ANALYSIS OF SERVICE DESIGNS - Methods and arrangements for conducting corruption analysis of service designs. A service design is accepted. Corrupting factors within the service design are assessed, and a corruption susceptibility score is generated. An alternative service design is generated responsive to a corruption susceptibility score fulfilling predetermined criteria.2013-08-01
20130198150FILE-TYPE DEPENDENT DATA DEDUPLICATION - A memory system comprises a pre-processor that receives a data file and determines a type of the data file, a chunking module that chunks the data file to produce a plurality of chunks, a hash engine that generates a hash value for a chunk among the plurality of chunks, a finger print detector that determines whether the hash value matches an entry within a portion of an index table corresponding to the type of the data file, and a storage medium that stores the chunk or a pointer to the chunk according to a result of the determination performed by the finger print detector.2013-08-01
20130198151METHODS FOR FILE SHARING RELATED TO THE BIT FOUNTAIN PROTOCOL - An embodiment relates to distributing media over a peer-to-peer network by employing a digital fountain coding. Accordingly, the file is separated into file portions and the portions are combined to obtain encoded portions which are then transmitted. A file portion may form a part of a plurality of the encoded and transmitted file portions. The portions may be pieces and/or blocks of the file, wherein a piece includes a plurality of blocks. An embodiment further provides mechanisms for efficient block-request-transmission approaches in which the initial requests for blocks in the file are transmitted and additional requests for some random blocks are transmitted. The additional requests may be transmitted after each piece or after the entire file blocks have been requested, or both.2013-08-01
20130198152SYSTEMS AND METHODS FOR DATA COMPRESSION - In one example embodiment, an updated version of a file is encoded via differential encoding from an original version of the file (2013-08-01
20130198153AUTOMATED CORRUPTION ANALYSIS OF SERVICE DESIGNS - Methods and arrangements for conducting corruption analysis of service designs. A service design is accepted. Corrupting factors within the service design are assessed, and a corruption susceptibility score is generated. An alternative service design is generated responsive to a corruption susceptibility score fulfilling predetermined criteria.2013-08-01
20130198154METHOD AND SYSTEM FOR MANAGING DATABASE APPLICATIONS - A method for processing a database application component modification request includes receiving a request to modify a database application component of a database application, initiating the database application component modification, sending a response including instructions for accessing a database application component definition including the database application component modification, wherein the database application component definition is provided as a locally accessible temporary copy of the database application component.2013-08-01
20130198155Identifier Compression for File Synchronization Via Soap Over HTTP - As changes are made to a document, each change may be assigned an extended identifier comprising a globally unique identifier (GUID) component and an integer component. Upon determining that the same GUID component is used in identifiers for multiple changes, the GUID component may be mapped to a range of indices. Each index of the range of indices may then be used to represent the same GUID component in each extended identifier.2013-08-01
20130198156Methods and Systems for an Action-Based Interface for Files and Other Assets - An “asset-based” user interface can be provided based on consulting metadata with an asset and presenting an interface to allow selection of actions associated with that particular asset. By presenting a listing of actions in response to a single command, the user can be spared the need to navigate through contextual menus to determine available services. The interface can be presented in a file selection interface provided by an operating system, e.g., in response to an “open” command in a folder. A method can comprise identifying a command referencing an asset and accessing metadata associated with the asset. The accessed metadata can comprise a unique metadata record for the asset available locally and/or accessible from a remote computing system. The method may further comprise determining one or more actions available for use with the referenced asset and providing an interface for selecting one or more of the determined actions.2013-08-01
20130198157Parallel Agents and Manager System - A system having an agent manager and a plurality of parallel agents for assisting a user in reaching a conclusion is provided in at least one embodiment. In at least one embodiment, the system is in communication with at least one database housing information to be analyzed by at least one of the agents. Further embodiments include the operation of the system and its interaction with the at least one database. In at least one further embodiment, the method includes the development and publication of the agents.2013-08-01
20130198158Enhanced Content and Searching Features Provided by a Linked-To Website - Methods and systems are disclosed that allow a linked-to web page to be provided using information about a linked-from web page. The linked-to web page, for example, may be provided with enhanced content, additional content, suggestion features, or searching features. Certain of the methods are useful in the context of a user using a search engine web page to search for and link to other web pages. An exemplary method can be performed by a server that provides such a linked-to web page. The server receives a request to provide the linked-to web page and parses the request to identify information, such as, search terms that were entered on the search engine web page. The server can use the search terms or other information associated with the linked-from web page to determine what content should be provided or how it should be provided for the linked-to web page.2013-08-01
20130198159SYSTEMS AND METHODS FOR PERFORMING GEO-SEARCH AND RETRIEVAL OF ELECTRONIC POINT-OF-INTEREST RECORDS USING A BIG INDEX - Methods and systems for providing a geo-search engine capability for large point-of-interest record datasets are disclosed. These methods and systems employ a Partition-by-Query index containing key-values pairs corresponding to keys reflecting concept-ordered geo-search phrases and values reflecting ordered lists of point-of-interest record references that are responsive to the concept-ordered geo-search phrase in a corresponding key. A large Partition-by-Query index may be partitioned across multiple servers depending on the size of the index, or the size of the index may be reduced by compressing query-references pairs into clusters. The methods and systems described herein may provide suggestions and spelling corrections to the user, thereby improving the user's geo-search engine experience while meeting user expectations for geo-search quality and responsiveness.2013-08-01
20130198160SOURCING TERMS INTO A SEARCH ENGINE - Information may be presented to a user by receiving a selection of one or more terms passively displayed in a document, loading the terms to a search configuration, generating first results responsive to a user's predicted interest as expressed in the search configuration, and enabling display of the first results.2013-08-01
20130198161MONITORING CONTENT REPOSITORIES, IDENTIFYING MISCLASSIFIED CONTENT OBJECTS, AND SUGGESTING RECLASSIFICATION - Provided is a technique for organizing content objects in an enterprise content management system. Auditing of the content objects is performed to identify one or more content objects that are to be re-classified. A content object is selected. A first category associated with the content object is obtained. A relevancy score is obtained for the first category. A list of candidate categories and relevancy scores for each of the candidate categories are obtained. In response to determining that the first category does not correspond to a candidate category or that the relevancy score does not exceed a threshold, the content object is identified as improperly categorized, and the candidate categories that have associated relevancy scores that exceed the threshold are provided in an audit report.2013-08-01
20130198162METHODS FOR SEARCHING ONE OR MORE BUSINESS ENTITIES UTILIZING A WEB SERVICE AND A BROWSER PLUG-IN APPLICATION - A plurality of methods for searching one or more business entities utilizing a web service and a browser plug-in application based on one or more keywords, a domain name or a user's geographic location and displaying the relevant business entities. The one or more keywords will be based on selected text entered into a web service and a browser plug-in application. The search process is initiated based on selecting one or more keywords from a text, double-clicking on the one or more keywords, selecting a right-click context menu option and clicking on a browser extension button. The server receives the request and carries out a search in a database in communication with the web service. The search is based on which relevant business entities are found and a result is created, which is sent back to the browser, where the received search results are displayed in a browser pop-up window.2013-08-01
20130198163SYSTEM AND METHOD FOR STORING DATA IN A RELATIONAL DATABASE - In a method for storing data in a relational database system using a processor, a collection of values is assigned to a structure dictionary, each of the values represents the value of a row for an attribute and has a unique ordinal number within the collection. and the structure dictionary contains structures defined based on at least one of interaction with a user of the system via an interface, automatic detection of structures occurring in data, automatic detection of frequencies of values occurring in data, analysis of a history of queries, and predetermined information about structures relevant to data content that is stored in the system. For each structure, forming a structure match list from ordinal numbers of values matching the structure, and a structure sub-collection from values matching the structure, using the processor. An outlier match list is formed from ordinal numbers of values that are not null and do not match any structure in the structure dictionary, and an outlier sub-collection is formed from values that are not null and do not match any structure in the structure dictionary. The collection of values is stored in the relational database in a form of structure match lists, structure sub-collections, outlier match list and outlier sub-collection.2013-08-01
20130198164Executing CASE Expressions Containing Subqueries - Methods and apparatus, including computer program products, implementing and using techniques for executing a query in a computer to retrieve data from a relational database stored on a data storage device. A query is received that contains a CASE expression having one or more subqueries. A query execution plan is generated. The query execution plan uses a parameterized union all operator to keep the semantics of the CASE expression, and a nested loop join operator to drive data across the section of the query execution plan that executes the CASE expression without performing any join operations. The generated query execution plan is executed in the computer to retrieve data from the relational database.2013-08-01
20130198165GENERATING STATISTICAL VIEWS IN A DATABASE SYSTEM - Techniques are disclosed for generating statistical views in a database system. In one embodiment, a request is received to execute a database workload. One or more constraints pertaining to executing the database workload is retrieved. The database workload is evaluated to generate multiple statistical view candidates. The statistical view candidates are refined based on the one or more constraints. One or more statistical views are then generated based on the refined statistical view candidates.2013-08-01
20130198166REUSING EXISTING QUERY PLANS IN A DATABASE SYSTEM - A system and method for executing query plans preprocesses a user's queries to identify and extract select parameters of the query, creates a skeletal query with reference to the extracted parameters, creates and compiles an executable version of the skeletal query, then executes the compiled version of the skeletal query using the particular parameters in the current query. The compiled version of the parameterized skeletal query is stored, and when another query is submitted that matches the skeletal query (but with potentially different parameters), the previously compiled skeleton query is executed with the parameters of this latter query.2013-08-01
20130198167SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR DECODING VEHICLE IDENTIFICATION NUMBERS - A vehicle identification number (VIN) decoder (VDC) implementing a unique VIN decoding method may, for a given VIN, shorten the VIN and form a stem and a leaf therefrom. Utilizing the stem, the VDC may operate to find matching leaf values, if any, from a set of look up tables. Depending upon a match outcome, one or more trim identification code (TIC) values can be assigned to the VIN and a candidate list can be constructed utilizing the assigned TIC value(s). The candidate list, which can be optimized, may contain one or more candidate trims for the VIN. For each candidate trim, a confidence score and match probability can be generated. The VDC may provide decoded information containing trim data associated with at least one of the one or more candidate trims for the VIN to a client device over a network connection.2013-08-01
20130198168DATA STORAGE COMBINING ROW-ORIENTED AND COLUMN-ORIENTED TABLES - A data storage system includes a query manager to identify storage engines to execute a query. A first storage engine may execute a portion of the query on a row-oriented table and a second storage engine may execute a second portion of the query on a column-oriented table.2013-08-01
20130198169Authorization and Authentication Based on an Individual's Social Network - In particular embodiments, a method includes accessing a graph structure comprising a plurality of nodes and edges where each node represents a user, receiving a search query from a first user, identifying content of one or more second users corresponding to the search query, and generating search results comprising all the identified content of second users that are connected to the first user in the graph structure through a series of edges and nodes that does not comprise an unauthorized node.2013-08-01
20130198170MOBILE TERMINAL MANAGEMENT SERVER, AND MOBILE TERMINAL MANAGEMENT PROGRAM - A mobile terminal management server in which ERP runs provides a search condition designation screen (for example, a slip search screen) used to designate a search condition, including a search condition representing code information taken in the mobile terminal, in response to the request from mobile terminals; receives a search condition designated through the search condition designation screen on which selection item arrangement circle display regions to display selection item arrangement circles, in each of which a plurality of selection items selectable to designate the search condition are arranged substantially on a circumference, are provided from the mobile terminals; searches for report data satisfying the received search condition by referring to a process flow table; and provides search result data (a search result list display screen) representing the searched report data to the mobile terminals as a search result.2013-08-01
Website © 2025 Advameg, Inc.