35th week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150242395 | SYSTEMS AND METHODS FOR EQUIPMENT SHARING - A generic language is provided that can be translated to fit a configuration of a specific site to enable equipment sharing of a site provider with a user. A user can write a program using the generic language to describe an experiment. A central system can determine sites that are available to perform the experiment. Upon site selection and sample availability, a translation system translates the program into a set of operations to be performed based on a site-specific configuration. A schedule system may schedule the operations to be performed on the equipment according to constraints provided by the program, site operator, and/or equipment. A task manager may implement the operations as scheduled. A report describing operations performed and results obtained can be generated by the selected site upon completion of the set of operations. Products, samples and/or reports can then be returned to the user. | 2015-08-27 |
20150242396 | Translating method for translating a natural-language description into a computer-language description - A translating method for translating a natural-language description into a computer-language description includes composing a natural-language description in a natural-language, and parsing the natural-language description with a parser for translating the natural-language description into a parsed description in a computer-language according to context in the natural-language description and a lookup table. | 2015-08-27 |
20150242397 | METHOD, SERVER AND SYSTEM FOR MANAGING CONTENT IN CONTENT DELIVERY NETWORK - In one embodiment, a method for managing content in a content distribution network (CDN) is provided. The CDN includes a main controlling server, an edge node connected to the main controlling server, and an indexing system connected to the main controlling server. The method includes executing the following steps at the main controlling server: monitoring whether used storage space of the edge node exceeds a predetermined threshold value; acquiring a list of protected files (U1) from the indexing system if the used storage space exceeds the predetermined threshold value; performing directory traversal for the edge node to get a list of object files (U0) whose difference between latest modified time and the current time exceeds a predetermined time range; getting a list of files to be deleted U2=U0−U1; and deleting each of the file included in U2 from the edge node. | 2015-08-27 |
20150242398 | METHOD, APPARATUS, AND SYSTEM FOR PROCESSING MEDIA RESOURCE PLAYLIST IN LOCAL AREA NETWORK - A method for processing a media resource playlist in a local area network, where the local area network includes a media server and a media renderer, includes: updating a stored playlist and a stored playlist element table when determining that a state of the media server changes; and sending the updated playlist to the media renderer. In addition, a playlist processing apparatus and a communication system are provided correspondingly. | 2015-08-27 |
20150242399 | Media Fingerprinting and Identification System - The overall architecture and details of a scalable video fingerprinting and identification system that is robust with respect to many classes of video distortions is described. In this system, a fingerprint for a piece of multimedia content is composed of a number of compact signatures, along with traversal hash signatures and associated metadata. Numerical descriptors are generated for features found in a multimedia clip, signatures are generated from these descriptors, and a reference signature database is constructed from these signatures. Query signatures are also generated for a query multimedia clip. These query signatures are searched against the reference database using a fast similarity search procedure, to produce a candidate list of matching signatures. This candidate list is further analyzed to find the most likely reference matches. Signature correlation is performed between the likely reference matches and the query clip to improve detection accuracy. | 2015-08-27 |
20150242400 | Database Table Re-Partitioning Using Trigger-Based Capture and Replay - Partitioning of a source table of a database to a target table is initiated. Thereafter, a replay table is generated that is populated with triggers for database operations performed on the source table for subsequent replay for the target partitions. Data is later moved (e.g., asynchronously moved, etc.) from the source table to the target table. The database operations are replayed on the target table T subsequent to the moving of the data using the replay table. In addition, the source table is dropped when all of the data has been moved to the target table and there are no operations requiring replay. Related apparatus, systems, techniques and articles are also described. | 2015-08-27 |
20150242401 | NETWORK SEARCHING METHOD AND NETWORK SEARCHING SYSTEM - The present invention discloses a network searching method and a network searching system. The method comprises: extracting a webpage structure and an information type of a social networking site to form a database; searching according to a submitted keyword for webpage data relevant to the keyword; analyzing the searched webpage data relevant to the keywords according to the database to acquire description information of the webpage data, wherein the description information is corresponding to the information type of the social networking site; and presenting the description information along with the corresponding webpage data as a search result. According to the method and the system of the present invention, the website is formatted, detailed information in professional dimension is extracted, the description information of the type of social networking sites such as forums and blogs is finally acquired, and the description information special to forums and blogs as the search result is displayed. | 2015-08-27 |
20150242402 | PERSISTED ENTERPRISE GRAPH QUERIES - A computer search service can receive an enterprise graph query from a client computing device that is remote from the computer search service, with the enterprise graph query identifying an actor object set, a target object set, and a relationship between the actor object set and the target object set. The search service can return results of the enterprise graph query to the client device. The search service can receive from the client device an indication of user input instructing the search service to persist the enterprise graph query, with the indication of user input also instructing the search service to associate the persisted enterprise graph query with an entity. Moreover, in response to receiving the indication of user input, the search service can persist the enterprise graph query as well as associate the persisted enterprise graph query with the entity and/or enter a subscription entry for the query. | 2015-08-27 |
20150242403 | SOCIALLY INTEGRATED OPERATIONS LOG METHOD AND SERVICE - Embodiments relate to supporting development or maintenance of a product. An aspect includes identifying, by a computing device, a plurality of users. Another aspect includes establishing, by the computing device, an environment configured to provide substantially real-time collaboration between the identified users in connection with the product. The development or maintenance may be based on one or more interfaces or fields. | 2015-08-27 |
20150242404 | SELECTIVELY EMPHASIZING DIGITAL CONTENT - One or more embodiments increase the visual appeal and organization of presenting digital content items. In particular, one or more embodiments improve the visual appeal of a presentation of digital content items by emphasizing one or more digital content items within the presentation of digital content items. For instance, one or more digital content items may be emphasized within a graphical user interface including a gallery of digital content items. The emphasized digital content items can be selected based on a score reflecting a particular characteristic of the digital content item and/or a metric of user interest in the digital content item. Digital content items with relatively high scores as compared to other digital content items may be emphasized when presented in conjunction with the other digital content items. | 2015-08-27 |
20150242405 | METHODS, DEVICES AND SYSTEMS FOR CONTEXT-SENSITIVE ORGANIZATION OF MEDIA FILES - It is described a method determining context information of at least one media file stored in a media storage, and matching reference context information with the context information to determine at least one context-matching media file. | 2015-08-27 |
20150242406 | METHOD AND SYSTEM FOR SYNCHRONIZING, ORGANIZING AND RANKING CONTACTS IN AN ELECTRONIC DEVICE - A method and a system for synching, organizing, and ranking user contacts by obtaining user contacts profile from various data sources are provided. The method includes identifying at least one data item associated with each contact from the plurality of data sources, wherein each data item comprises at least one of an attribute, and a sub-attribute, and computing a degree of similarity between each contact of the user and each other contact of the user using the at least one identified data item. | 2015-08-27 |
20150242407 | Discovery of Data Relationships Between Disparate Data Sets - A system for synthesizing new datasets from a corpus of data sources is disclosed. The system analyzes attributes between the different datasets between the data sources to determine if there are possible relationships between the attributes. Where a possible relationship is identified, the system could generate a confidence metric between 0%-100% reflecting how likely it is that the attributes are related. The system could then synthesize a new dataset as a function of the generated confidence metric. | 2015-08-27 |
20150242408 | Relevance Ranking For Data And Transformations - A system for generating a new dataset gleans a corpus of datasets to find attributes that could be used to construct a new dataset. When an entity selects attributes, the system analyzes relationships between the selected attributes and unselected attributes in order to generate a ranked list of suggested attributes, with the most relevant attributes at the top of the list. The system could also use this system to suggest transformations to the attributes for use in the new dataset. The entity could then select additional attributes and/or transformations to apply to the new dataset before the new dataset is generated. | 2015-08-27 |
20150242409 | Automated Data Shaping - A system for synthesizing a data shape from a plurality of datasets with a plurality of attributes is provided. As a user entity selects one or more attributes, the system could determine the most relevant attributes and transformations that are related to the selected attributes. As the user selects more attributes and transformations, the data shape could take form with updated rankings, and the system could provide more relevant, targeted suggestions. The data shape could then be used to create a synthesized dataset among the plurality of datasets, and could be saved as a type of query for deriving future datasets. | 2015-08-27 |
20150242410 | TAG-BASED PERFORMANCE FRAMEWORK FOR CONTACT CENTER - An apparatus includes a processor and a memory. The memory stores instructions that when executed by the processor cause the processor to: identify a keyword from machine-readable text; identify a contact center resource based on the identified keyword; update a first group of keywords associated with the contact center resource based on the identified keyword; invoke an action based on analysis of the keyword associated with the contact center resource; monitor the action and report results in response; and update a second group of keywords according to analysis of the results. | 2015-08-27 |
20150242411 | Data File Processing for a Well Job Data Archive - A method, system, and apparatus, including a program encoded on computer-readable medium, for detecting duplicate data files to be stored in a well job data archive includes identifying a well job data file for storage in a well job data archive and performing an initial duplicate check and a secondary duplicate check to determine if the well job data file is a duplicate of a data file stored in the well job data archive, as well as a quality assurance test of the file data. At least one of the well job data file or one or more of the data files stored in the well job data archive is identified as a duplicate data file based on the initial and secondary duplicate checks, and the well job data file is stored in the well job data archive in accordance with the initial and secondary duplicate checks and the identification of a duplicate data file. | 2015-08-27 |
20150242412 | SYSTEM AND METHOD FOR ENHANCED PROCESS DATA STORAGE AND RETRIEVAL - The subject matter relates to data storage, and more particularly, a system and method to enhance data storage and retrieval. A method of assigning data to at least one region of a data storage device includes monitoring whether an apparatus has generated data. The method includes assigning one of a plurality of system configurations to the data based on at least one criterion. Each of the plurality of system configurations may define different storage locations for data. The method includes acquiring the data and sending the data to be stored on at least one of a plurality of storage devices according to the assigned system configuration. | 2015-08-27 |
20150242413 | INDEXING DATA UPDATES ASSOCIATED WITH AN ELECTRONIC CATALOG SYSTEM - Systems and methods are provided for efficiently indexing archived objects in an archive data store to allow for efficient and quick access to the archived objects. The systems and methods provided also allow alleviate the strain on a live data store and enable a requester wishing to retrieve updates to do so without knowledge of the location of the stored update on a live or archive data store. | 2015-08-27 |
20150242414 | Object Occlusion to Initiate a Visual Search - Methods and devices for initiating a search of an object are disclosed. In one embodiment, a method is disclosed that includes receiving video data recorded by a camera on a wearable computing device, where the video data comprises at least a first frame and a second frame. The method further includes, based on the video data, detecting an area in the first frame that is at least partially bounded by a pointing device and, based on the video data, detecting in the second frame that the area is at least partially occluded by the pointing device. The method still further includes initiating a search on the area. | 2015-08-27 |
20150242415 | DETECTING AND MANAGING ABNORMAL DATA BEHAVIOR - Methods and systems for providing destination-specific network management are described. One example method includes determining a normal data movement profile for a computing device based on observed normal data transfer behavior by the computing device; identifying a data movement rule associated with the computing device, the data movement rule including a deviation amount, and one or more actions to take when the computing device deviates from the normal data movement profile by more than the deviation amount; detecting a data movement associated with the computing device; determining that the detected data movement exceeds the deviation amount included in the data movement rule relative to the normal data movement profile for the computing device; and performing the one or more actions associated with the data movement rule upon determining that the data movement violates the data movement rule. | 2015-08-27 |
20150242416 | MANAGEMENT COMPUTER AND RULE GENERATION METHOD - There is provided a management computer comprising a processor and a storage resource. The processor acquires information on a type of the first management object and the second management object; traces association from the type of the second management object to the type of the first management object; generates a metarule including a condition part and a conclusion part; generates a method of acquiring information on a topology constructed by the association from the type of the second management object to the type of the first management object based on a method of the trace from the type of the second management object to the type of the first management object; acquires the information on the topology based on the generated method; generates an expanded rule from the generated metarule and the acquired information on the topology; and analyzes a detected new failure based on the generated expanded rule. | 2015-08-27 |
20150242417 | Techniques for Leveraging a Backup Data Set for EDiscovery Data Storage - Techniques for facilitating electronic discovery (eDiscovery) data storage in a backup environment are disclosed. In one particular embodiment, the technique(s) may be realized as a method of operating a computing system to facilitate electronic discovery (eDiscovery) data storage in a backup environment. The method may comprise storing, using electronic storage, a backup data set associated with an organization, processing, using at least one computer processor, the backup data set to extract metadata associated with data items in the backup data set, processing the metadata to identify a subset of the data items that are associated with eDiscovery, and generating an index of the metadata that identifies the subset of the data items in the electronic storage that are associated with the eDiscovery. | 2015-08-27 |
20150242418 | DEVICE-BASED IDENTIFICATION - A system and method to determine an identity of an individual carrying one or more devices configured to communicate with the system is described. The system includes an input interface to receive information from one or more of the one or more devices, and a database storing data related to the individual in correspondence with the information. The system also includes a processor to determine the identity of the individual based on the information when the information provides the identity directly and to determine the identity of the individual based on the data in the database when the information relates to the respective one or more of the one or more devices. The system may be within or outside of a second device of a second individual. | 2015-08-27 |
20150242419 | LOCALIZED SELECTABLE LOCATION AND/OR TIME FOR SEARCH QUERIES AND/OR SEARCH QUERY RESULTS - Briefly, embodiments of methods or systems providing a mobile device user with localized and/or time-selectable search query terms and/or search results are provided. | 2015-08-27 |
20150242420 | Location-Based Searching - A method includes receiving a search query from a user device, identifying a plurality of function records included in a data store based on the received search query, and determining a search location. Each function record includes an access mechanism specifying a state of an application, state information corresponding to the state of the application, and location data including a coordinate and a perimeter. The coordinate defines the location of a place corresponding to the state information and the perimeter defines a geographic area surrounding the coordinate. The method also includes determining whether the search location is located within the geographic area defined by the location data of the function record for each of the plurality of function records, selecting access mechanisms from function records that include location data defining a geographic area that includes the search location, and transmitting the selected access mechanisms to the user device. | 2015-08-27 |
20150242421 | Location-Based Searching - A method includes receiving a search query froth a user device and identifying a plurality of function records included in a data store based on the received search query. Each of the function records includes an access mechanism specifying a state of an application, state information describing the state of the application, and location data including a coordinate and a perimeter. The coordinate defines the location of a place corresponding to the state information and the perimeter defines a geographic area surrounding the coordinate. The method also includes determining a search location and a score for the function record based on where the determined search location is located relative to the geographic area defined by the location data for each of the identified function records. The method also includes selecting access mechanisms from the function records based on the scores and transmitting the selected access mechanisms to the user device. | 2015-08-27 |
20150242422 | Accessing Software Application Functionality In Search - A method includes transmitting a search query from a computing device to a search system configured to generate search results in response to a received search query, and receiving search results from the search system in response to transmitting the search query. The search results include an application access mechanism that references a native application and indicates one or more operations for the application to perform. The application performing the operations sets the application into an application state. The search results also include an application download address that indicates a location for downloading the application. The method also includes generating a user selectable link that includes the application access mechanism and the application download address, and displaying the user link. In response to receiving a user selection of the selectable link, the method also includes downloading, installing, launching, and causing the native application to perform the one or more operations. | 2015-08-27 |
20150242423 | SEARCH ENGINE AND INDEXING TECHNIQUE - A local search engine geographically indexes information for searching by identifying a geocoded web page of a web site and identifying at least one geocodable web page of the web site. The system identifies a geocode contained within content of the geocoded web page of the web site. The geocode indicates a physical location of an entity associated with the web site. The system indexes content of the geocoded web page and content of the geocodable web page. The indexing including associating the geocode contained within content of the geocoded web page to the indexed content of the geocoded web page and the geocodable web page to allow geographical searching of the content of the web pages. | 2015-08-27 |
20150242424 | SOCIAL WALLET - A system comprising a computer-readable storage medium storing at least one program and a computer-implemented method for providing social graph maintenance services is presented. Consistent with some embodiments, the method may include accessing a social graph of a subject user. The social graph may include a plurality of nodes representing objects to which the subject user has a relationship and a plurality of edges representing the relationships. The method may further include determining that a particular node lacks relevance to the subject user. In response to determining that the particular node lacks relevance to the subject user, the relationship with the particular node is eliminated. | 2015-08-27 |
20150242425 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing system includes a managing unit, a receiving unit, an acquiring unit, and a processing unit. The managing unit manages information about an object for which at least one of a parent and a child is defined. The receiving unit receives a request for a process including specification of an authorized object with which authority information is associated. The acquiring unit acquires a function object associated with the authorized object. The processing unit executes the function object to process the request. | 2015-08-27 |
20150242426 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing system includes a managing unit that manages objects for each of which at least one of a parent and a child is defined, an element name and an element value of an element composing content being associated with at least part of the objects in the managing unit; a receiving unit that receives a request for a process including specification of an authorized object with which authority information is associated; a setting unit that sets a target object on the basis of the authorized object and, if the element name specified in the request is not associated with the target object, repeats a process of setting a parent object of the target object as a new target object until a predetermined condition is met; and a responding unit that otherwise returns the element value associated with the target object as a response to the request. | 2015-08-27 |
20150242427 | DEVICE AND METHOD FOR RECOMMENDING CONTENT BASED ON INTEREST INFORMATION - A content recommending device includes a storage module configured to store a user profile as security information and non-security information, and a control module configured to receive portions of first content corresponding to the non-security information from a plurality of content providing servers, and extract at least one portion of second content corresponding to the security information from the portions of first content to recommend the at least one portion of second content. | 2015-08-27 |
20150242428 | SYSTEM AND METHOD FOR BACKING UP DATA - A hash-optimized backup system and method takes data blocks and generates a probabilistically unique digital fingerprint of the content of each data block using a substantially collision-free algorithm. The process compares the generated fingerprint to a database of stored fingerprints and, if the generated fingerprint matches a stored fingerprint, the data block is determined to already have been backed up, and therefore does not need to be backed up again. Only if the generated fingerprint does not match a stored fingerprint is the data block backed up, at which point the generated fingerprint is added to the database of stored fingerprints. Because the algorithm is substantially collision-free, there is no need to compare actual data content if there is a hash-value match. The process can also be used to audit software license compliance, inventory software, and detect computer-file tampering such as viruses and malware. | 2015-08-27 |
20150242429 | DATA MATCHING BASED ON HASH TABLE REPRESENTATIONS OF HASH TABLES - A data matching capability is presented herein. The data matching capability may be configured to support matching of a set of values of a set of data fields to a corresponding set of values of a corresponding set of data fields. The data matching capability may be configured to support matching of a set of values of a set of data fields to a corresponding set of values of a corresponding set of data fields based on use of the set of values of the set of data fields as an input and based on a hash table representation of a hash table storing the corresponding set of values of the corresponding set of data fields. The data matching capability may be used within various contexts including packet classification within telecommunication networks. | 2015-08-27 |
20150242430 | SPLITTING AND MERGING FILES VIA A MOTION INPUT ON A GRAPHICAL USER INTERFACE - Disclosed are a method and a computer system for splitting and merging files via a motion input on a graphical user interface. The method comprises determining existence of a motion input; splitting the file into split multiple partial files based on pre-configurations; and generating multiple partial file icons representing the split multiple partial files on the graphical user interface. The multiple partial files may be subsequently merged together. | 2015-08-27 |
20150242431 | COMPUTER SYSTEM LOG FILE ANALYSIS BASED ON FIELD TYPE IDENTIFICATION - A log file analysis computer includes a processor and a memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations include accessing a log file containing lines of data entries, and identifying which of the data entries in the log file are associated with which of a plurality of field types. A subset of the data entries in the log file are selected based on the associations between the data entries and the field types. A modified log file is generated based on the subset of the data entries. | 2015-08-27 |
20150242432 | Modified Memory Compression - A set of memory pages from a working set of a program process, such as at least some of the memory pages that have been modified, are compressed into a compressed store prior to being written to a page file, after which the memory pages can be repurposed by a memory manager. The compressed store is made up of multiple memory pages, and the compressed store memory pages can be repurposed by the memory manager after being written to the page file. Subsequent requests from the memory manager for memory pages that have been compressed into a compressed store are satisfied by accessing the compressed store memory pages (including retrieving the compressed store memory pages from the page file if written to the page file), decompressing the requested memory pages, and returning the requested memory pages to the memory manager. | 2015-08-27 |
20150242433 | DATA COMPRESSION APPARATUS AND DATA COMPRESSION METHOD - A memory stores a data string to be compressed, which is partitioned into a plurality of blocks, and further stores a plurality of pieces of address information that respectively represent a plurality of addresses within a first block among the plurality of blocks in an order of the plurality of data strings after being rearranged, the plurality of data strings respectively starting at the plurality of addresses within the first block. A processor searches for, in the first block, a first data string that matches a second data string on the basis of the plurality of pieces of address information. When the first data string is not included in the first block, the processor detects the first data string by referring to a second block among the plurality of blocks. The processor encodes and outputs the second data string on the basis of information of the detected first data string. | 2015-08-27 |
20150242434 | Scalable Current Leaderboard Using Delta-Encoded Updates - Systems and techniques are provided for providing a scalable current leaderboard. Entries may be received. The entries may include an identifier and a score. The entries may be sorted according to a sorting criterion to obtain a leaderboard. The entries may be ranked with a rank according to the position of the entry on the leaderboard. The entry may include the rank. The leaderboard may be divided into buckets. Each bucket may include consecutive entries from the leaderboard. One of the entries may be included at the end of a first buckets and at the beginning of a second buckets. The buckets may be ordered sequentially. The bucket may be updated with score versions to produce an updated bucket, where the score versions may include new versions and old versions. | 2015-08-27 |
20150242435 | SYSTEM AND METHOD FOR SYNCHRONIZING INFORMATION ACROSS A PLURALITY OF INFORMATION REPOSITORIES - A method includes importing a plurality of first information records from one or more information repositories into a central database. The method also includes establishing a link between each of the imported first information records and a corresponding second information record at an external information source. The method further includes, for each first information record, checking for changed information in the corresponding second information record, and when changed information is found, updating the first information record in the central database and updating the first information record in at least one of the one or more information repositories, based on the changed information. The information may include personal or professional contact information. | 2015-08-27 |
20150242436 | METHODS AND APPARATUSES FOR GENERATING DESKTOP CLOUD INSTANCES BASED UPON MOBILE DEVICE USER FILE SELECTIONS - A mobile device accepts a selection of a file for opening or editing or both. The file is associated with a file type. A mobile application on the mobile device identifies the file type associated with the file. A request message is constructed that is indicative of the file type and one or more user credentials. The request message is sent to a cloud server. The mobile device receives an address for a selected cloud image from the cloud server and, in response thereto, connects to a remote processing environment in the selected cloud image. | 2015-08-27 |
20150242437 | METHOD AND APPARATUS FOR READING DATA IN DISTRIBUTED FILE SYSTEM - Disclosed are a method and apparatus for reading data in a distributed file system in which a client and a server are separated. In the method and apparatus, a prefetching operation is performed to provide a continuous read function with high performance even in the distributed file system so that an optimum continuous read function of a local file system within the client may be effectively supported when an application program of the client requests continuous reading on a file (or chunk). | 2015-08-27 |
20150242438 | CREATION OF IMAGE DESIGNATING FILE AND REPRODUCTION OF IMAGE USING SAME - A technique for enabling scenario files and image files for supply to a scenario generating device to be created easily is provided. The scenario creating device creates a scenario file supplied to a scenario reproducing device capable of reproducing only image files of a predetermined format. The scenario creating device comprises: an input section including a pointing device; a display section; and a scenario creating section for creating the scenario file. The scenario creating section provides a display of an execution icon on the display screen for causing the scenario creating section to execute a process. When a file icon for a source file of a predetermined format including pagewise scenario information and image information is dragged and dropped on the execution icon by means of operation of the pointing device, a scenario file is created on the basis of the scenario information, and an image file of the predetermined format is generated on the basis of the image information. | 2015-08-27 |
20150242439 | AUTOMATICALLY RETRYING TRANSACTIONS WITH SPLIT PROCEDURE EXECUTION - Running a transaction against a database that allows the transaction to be automatically retried when the transaction fails such that certain transaction failures that cause the transaction to be automatically retried are not visible to an entity that receives data as a result of the execution of the transaction. A first set of statements of a transaction is identified by identifying statements that will cause a change in the database state. A second set of statements is identified, that result in data being generated to be sent to the entity. The method further includes executing the first set of statements to change the database. The method further includes running the second set of statements separately from the first set of statements to generate data to be sent to the entity. | 2015-08-27 |
20150242440 | COMPUTERIZED METHOD FOR TRANSFORMING AN IMAGE FROM AN IMAGE-SEARCHABLE DOMAIN TO A PIXEL-SEARCHABLE DOMAIN - Computerized methodology for organizing and/or retrieving pixel data for rendering digital images In one embodiment, the method may include transforming ( | 2015-08-27 |
20150242441 | Refinement Shape Content Search - Visual incongruity in search result sets may be reduced at least in part by searching an optimized visually significant subset of a category tree that categorizes a collection of content. The category tree may be optimized at build time at least in part by pruning with respect to visual coherence and by the size of the content collection subset referenced by particular categories. Content collection subset sizes both too large and too small can detract from the visual significance of a particular category. The visually significant subset of the category tree may be further optimized at query time by intersecting the visually significant subset with the query-associated sub-tree(s) and further pruning categories in the visually significant subset that have child categories in the visually significant subset. Searching with respect to the optimized visually significant subset can also improve search efficiency. | 2015-08-27 |
20150242442 | APPARATUS AND METHOD FOR PROCESSING IMAGE - An image processing apparatus and an image processing method thereof are provided. The image processing method includes: extracting at least one texture area from an input image according to at least one texture feature of an object; for each texture area of the extracted at least one texture area, processing the texture area using an image set value respectively corresponding to the texture area; and combining the at least one texture area that is processed by the processing and outputting the combined at least one texture area. | 2015-08-27 |
20150242443 | SYSTEMS AND METHODS FOR SELECTING CONTENT ITEMS TO STORE AND PRESENT LOCALLY ON A USER DEVICE - Systems, methods, and non-transitory computer readable media for dynamically selecting and sending content items to a user device based on various network and device conditions are provided. In some embodiments, a listing of images stored within a user account on a content management system may be generated, and a selection probability value may be assigned to each image within the listing. An available capacity level on the user device may be determined, and images may be dynamically selected to be sent to the user device based on the determined available capacity level and each image's selection probability value. In some embodiments, each image's selection probability value may be based on one or more factors. For example, images that have been recently viewed, recently added to a collection of images, and/or shared within a shared virtual space created by the user, may receive higher selection probability values than other images. In some embodiments, the selected images may be ranked in order of priority for transmission to the user device and sent to the user device in order of rank. | 2015-08-27 |
20150242444 | CODED IMAGE SHARING SYSTEM (CISS) - A system for collecting, creating, and distributing images and videos includes a smart application, executable on a smart device, the smart application providing for the control of the imaging and video capture device of the smart device. The system further includes a server, the server in communication with the smart application via the smart device, the smart application receiving a code, the code being associated with images generated by the smart device resulting in coded images through the control of the smart device by the smart application, the smart application uploading the coded images to the server, the server providing access to the coded images according to access preferences. | 2015-08-27 |
20150242445 | DEVICE FOR OPTICAL TIME-STAMPING, AND RELATED IMAGE-SENSING SYSTEM AND OPTICAL TIME-STAMPING METHOD - Disclosed is an optical time-stamping device, including an optical instrument with a retina having a field of view and being able to produce on the retina images of the field of view, and a high accuracy reference clock signal receive. The time-stamping device also includes: a lighting source at a distance from the retina of an optical instrument, and configured to emit a light signal in the direction of the retina of an optical instrument and in the field of view of an optical instrument, and a control unit connected to the reference clock signal receiver by a first connection and to the lighting source by a second connection, and configured for controlling the lighting source for emitting a light signal in a synchronized way with the reference clock signal. An associated image sensing system and optical time-stamping method are also disclosed. | 2015-08-27 |
20150242446 | COMPUTER SYSTEMS AND METHODS FOR THE QUERY AND VISUALIZATION OF MULTIDIMENSIONAL DATABASES - A computer displays a graphical user interface on its display. The graphical user interface includes a schema information region and a data visualization region. The schema information region includes a plurality of fields of a multi-dimensional database that includes at least one data hierarchy. The data visualization region includes a columns shelf and a rows shelf. The computer detects user actions to associate one or more first fields with the columns shelf and to associate one or more second fields with the rows shelf. The computer generates a visual table in the data visualization region in accordance with the user actions. The visual table includes one or more panes. Each pane has an x-axis defined based on data for the one or more first fields, and each pane has a y-axis defined based on data for the one or more second fields. | 2015-08-27 |
20150242447 | IDENTIFYING EFFECTIVE CROWDSOURCE CONTRIBUTORS AND HIGH QUALITY CONTRIBUTIONS - Systems and methods are disclosed for targeting effective contributors and identifying high quality contributions. For example, a method may include displaying an advertisement to a potential contributor via an advertising platform, receiving an indication that the potential contributor responded to the advertisement, generating a crowdsourcing exercise that is presented to the contributor, receiving a response (a conversion event) from the contributor to the crowdsourcing exercise, and notifying the advertising platform about the conversion event. As another example, a method may include determining a concept space for a new contribution, obtaining previously correct and incorrect contributions of the contributor in the concept space, and determining an expertise confidence score for the new contribution based on a comparison of the new contribution with the previously correct and incorrect contributions. The method may include automatically approving the new contribution for the crowdsourced repository based on the expertise confidence score. | 2015-08-27 |
20150242448 | SECURE AND LOSSLESS DATA COMPRESSION - A method for compressing a string of characters, initially defined by an original ordered sequence of characters each represented by an absolute number uniquely representing each character, according to an absolute coding table, comprising the steps of: parsing said original sequence into at least one first type sub | 2015-08-27 |
20150242449 | ENUMERATION OF TREES FROM FINITE NUMBER OF NODES - Embodiments of methods, apparatuses, devices and/or systems for manipulating hierarchical sets of data are disclosed. | 2015-08-27 |
20150242450 | METHOD AND/OR SYSTEM FOR MANIPULATING TREE EXPRESSIONS - Embodiments of methods and/or systems of manipulating tree expressions are disclosed. | 2015-08-27 |
20150242451 | Database Table Re-Partitioning Using Two Active Partition Specifications - Partitioning of source partitions of a table of a database to target partitions is initiated. Thereafter, a transition partition specification is specified that identifies the source partitions and the target partitions. Data is then moved (e.g., asynchronously moved, etc.) from the source partitions to the target partitions. Concurrently with the moving of the data, operates are handled using the transition partition specification. Subsequently, the source partitions are dropped when all of the data has been moved to the target partitions and there are no open transactions accessing the source partitions. Related apparatus, systems, techniques and articles are also described. | 2015-08-27 |
20150242452 | EARLY EXIT FROM TABLE SCANS OF LOOSELY ORDERED AND/OR GROUPED RELATIONS USING NEARLY ORDERED MAPS - According to embodiments of the present invention, methods, systems and computer-readable media are presented for scanning a plurality of storage regions within memory for a specified quantity of results, wherein each storage region is associated with an interval including first and second interval values indicating a value range for values within that storage region. The techniques comprise sorting the first interval values into an order, wherein the order of the first interval values determines a scanning order for the plurality of storage regions, determining a result value, wherein the result value is an upper bound, a lower bound, or is outside of the specified quantity of results, and examining the sorted first interval values and scanning corresponding individual storage regions in response to a comparison of the determined result value with the first interval value of that storage region. In some embodiments, scanning exits upon establishing that the specified quantity of results has been achieved and that a first interval value in a list of sorted first interval values is greater than the determined result value. | 2015-08-27 |
20150242453 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM HAVING STORED THEREIN DATA CONVERSION PROGRAM, AND DATA CONVERSION METHOD - An information processing apparatus includes a processor. The processor converts data of a hierarchical structure including a nested structure inputted in a first data format into a second data format representing the data using a plurality of tables and stores the converted data into a storing unit. The processor generates, for each information element of the inputted data, a first table including a value of the information element, and associates each of a plurality of the first tables with a corresponding another first table according to the nested structure of the data and generates a second table by integrating the first tables that satisfy a predetermined condition among the plurality of the first tables. | 2015-08-27 |
20150242454 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR PROVIDING A UNIFIED NAMESPACE - A system and computer-based method for performing a data transaction in a network storage system is provided. In an embodiment, the method includes receiving, from a client, a first data transaction request including a first data identifier associated with a first namespace protocol; determining a storage system associated with the first data identifier and associated with a second namespace protocol; determining a second data identifier associated with the first data identifier, wherein the second data identifier conforms to the second namespace protocol; and forwarding a second data transaction request including the second data identifier to the storage system based on determining an association between the second data identifier and the first data identifier, wherein the first namespace protocol and the second namespace protocol are different. | 2015-08-27 |
20150242455 | SYSTEMS AND METHODS FOR SECURITY PANEL CONTENT MANAGEMENT - A system for security panel content management is disclosed. A security panel can request and receive text files with content information from a content management server. The security panel can parse the text files and use the content information to populate a content store. The content store can display the content information for a security panel user, and the security panel can retrieve content from a remote file server based on a user request via the content store. | 2015-08-27 |
20150242456 | SYSTEM AND METHOD FOR ELECTRONIC DATA RECONCILIATION AND CLEARING - Electronic source information is reconciled by normalizing at least some electronic source information, transport information and destination information by applying a plurality of rules to extract the information into at least one schema. At least some of the normalized information is identified to contain at least one discrepancy or missing data record, and reconciliation information is provided in a graphical user interface. Electronic information is received that reconciles the discrepancy or the missing record, and the reconciled and normalized electronic source, transport and destination information is processed to provide data analytics. A report is generated that represents the data analytics and that is output to at least one user. This can occur in one or more implementations of the present application. | 2015-08-27 |
20150242457 | FLEXIBLE CONTENT DISPLAY - Methods, computer systems, and computer-storage media are provided for flexibly displaying content. Rather than associating content with templates without any account for the content itself, templates are associated with content items based on one or more of the content itself, a template class, and a screen size to display the content item. | 2015-08-27 |
20150242458 | METHODS AND SYSTEMS FOR COMPRESSING AND COMPARING GENOMIC DATA - Systems and methods are disclosed for compressing and comparing data such as genomic data. The disclosed systems and methods may include selecting a segment, creating a delta representation of the segment, the delta representation comprising a script, and storing the script. Furthermore, the disclosed systems and methods may include receiving a first script comprising a compressed version of a first segment and receiving a second script comprising a compressed version of a second segment. The disclosed systems and methods may further include comparing the first script to the second script and determining if the first segment matches the second segment based upon the comparison of the first script to the second script. | 2015-08-27 |
20150242459 | GROUPING CONTENT BASED UPON USER ACTIVITY - A method includes identifying a meeting to be attended by a participant in the future. A context of the meeting is determined based upon meeting information included in an electronic calendar of the participant. Multiple document repositories associated with the participant are queried to identify potentially relevant documents, based upon the context. The potentially relevant documents may be compiled in a content group and the user may be provided with access to the content group. | 2015-08-27 |
20150242460 | RECOMMENDING COLLABORATORS BASED ON USERS' CONTENT COLLECTIONS - A method may include receiving a selected document, or a set of documents, from a user, analyzing a content of the selected document, or documents, and determining a category of skill based on the content of the selected document. The method may also include locating a plurality of collaborators by matching the category of skill with a corresponding category of skill of a potential collaborator selected from a plurality of potential collaborators, and ranking the plurality of collaborators based on a predetermined score for the corresponding category of skill. Further, the method may include presenting the user with a ranked list of the plurality of collaborators based on the ranking of the plurality of collaborators. | 2015-08-27 |
20150242461 | Systems, Apparatuses, and Methods for Feature Searching - Detailed herein are embodiments of systems, methods, and apparatuses to be used for feature searching using an entry-based searching structure. | 2015-08-27 |
20150242462 | Searching And Accessing Software Application Functionality Using Concepts - A method includes selecting function records by a computing device. Each function record includes an application access mechanism, application state information, and a concept name. The method also includes aggregating the application state information included in the selected function records and generating a new function record that includes new application state information comprising the aggregated application state information. The method also includes generating a new application access mechanism for the new function record that is different than the application access mechanisms included in the selected function records, receiving a search query from a user device, and identifying the new function record using the search query. The method also includes selecting the new application access mechanism from the new function record and transmitting the new application access mechanism to the user device. | 2015-08-27 |
20150242463 | SYSTEMS, APPARATUSES, AND METHODS FOR DEEP LEARNING OF FEATURE DETECTORS WITH SPARSE CODING - Detailed herein are embodiments of systems, methods, and apparatuses to be used for feature searching using an entry-based searching structure. | 2015-08-27 |
20150242464 | SOURCE QUERY CACHING AS FAULT PREVENTION FOR FEDERATED QUERIES - An example system for processing a federated query includes a query proxy that receives a federated query including a plurality of source queries and receives an indication that a failed set of one or more source queries failed to execute successfully. Each source query is specific to an autonomous data source belonging to a federation. The system also includes a data federation engine that identifies a plurality of autonomous data sources to which to send the plurality of source queries. The plurality of autonomous data sources belong to the federation. The system further includes a query fail analyzer that updates a data structure to reflect the unsuccessful execution of one or more source queries of the failed set. | 2015-08-27 |
20150242465 | METHODS, APPARATUS, AND SYSTEMS FOR GENERATING, UPDATING AND EXECUTING AN INVASIVE SPECIES CONTROL PLAN - Invasive species control plans may be automatically generated using vegetation control information received from a variety of sources. Such invasive species control plans may aid vegetation control personnel and professionals when determining an invasive species control strategy, including treatment and restoration, and then guide the implementation of that strategy. Invasive species control plans may include a variety of recommended vegetation control practices and projected outcomes for the implementation of recommended vegetation control management practices. | 2015-08-27 |
20150242466 | Meta Tag Ownership and Control - Personalized metadata may be selected from a group of tags, where the tags include annotations, synopsis, references, etc. and owner controlled rules for visibility and control options such as removal, combining, weighting, adding, sharing, privatizing, assigning etc. are provided. | 2015-08-27 |
20150242467 | PARAMETER BASED MEDIA CATEGORIZATION - Systems, device and techniques are disclosed for providing a media item using a media recommendation model. The media recommendation model can be configured to identify a media item based on a received parameter from a mobile device by comparing the received parameter with a parameter associated with the media item. A parameter may correspond to a mobile device movement, time, location or the like and may be provided from a sensor such as a position sensor, an accelerometer, a clock, a barometer, or the like. | 2015-08-27 |
20150242468 | Nutritional Assessment Tool - The nutritional assessment tool allows a user to select from a recipe database, or enter a recipe of his own; the tool then parses the ingredients, searches other databases for nutrition profile information of each ingredient, and applies the profile to the amount of that ingredient called for in the recipe. It repeats for each ingredient and then provides a nutritional profile of the food item on a per serving basis. This may be applied to entire meals, as well. The tool can provide suggested replacement ingredients to allow the user to tailor his nutritional intake, will allow the user to store meal information and then generate reports related to nutritional profile of a food item, a meal, or a time frame. | 2015-08-27 |
20150242469 | SYSTEM AND METHODS FOR ANALYSIS OF DATA - Data processing including a universal metric to quantify and estimate the similarity and dissimilarity between data sets. Data streams are perfectly annihilated by a correct realization of their anti-streams. Any deviation of the collision product from a baseline, for example flat white noise, quantifies statistical dissimilarity. The invention relates generally to data mining. More specifically, the invention relates to the analysis of data using a universal metric to quantify and estimate the similarity and dissimilarity between sets of data. | 2015-08-27 |
20150242470 | SYSTEMS AND METHODS FOR RECOMMENDING SOFTWARE APPLICATIONS - A potentially beneficial software product is recommended to a user based, in part, on an analysis of parameters associated with the user's usage of software applications already installed on the user's computer. | 2015-08-27 |
20150242471 | DNA MATCHING - A method of searching a computer database containing a plurality of stored DNA profiles is provided. The method involves generating a search profile formed of two or more allele identities for each of one or more loci, at least one of the allele identities having a limited range of values, with the search profile being compared against the one or more stored DNA profiles from a database to establish matches between the search and stored profile. | 2015-08-27 |
20150242472 | Remote Data Delivery System - A method and apparatus for delivering engineering data to a portable device for use in performing an operation. Engineering data for each part in a set of parts is stored in a file system on the portable device. A set of entries, each entry including a part identifier and a target locator for a part, is created for the set of parts to form a table. An initial locator constructed by a visualization tool is matched to a target locator in the table for a selected part. The target locator identifies a physical location in the file system of requested engineering data for the selected part. A local server on the portable device retrieves the requested engineering data based on the target locator. The local server serves the requested engineering data to a browser, which displays the requested engineering data for use in performing the operation on the selected part. | 2015-08-27 |
20150242473 | UTILIZING INTERACTIVITY SIGNALS TO GENERATE RELATIONSHIPS AND PROMOTE CONTENT - An analysis application utilizes interactivity signals to generate relationships and promote content. One or more interactivity applications, such as a social networking application, are queried to retrieve interactivity signals. Interactivity signals include an interaction pattern that indicates a relationship between a user and relations of the user. A relationship graph is constructed based on the interactivity signals. Content associated with a user is promoted based on the relationship graph. A weight of the interactivity signals is adjusted to improve a ranking of the relationship graph and a ranking of the content. | 2015-08-27 |
20150242474 | INLINE AND CONTEXT AWARE QUERY BOX - A query box application provides an inline and context aware query box. An interaction with a content displayed in a client application is detected, in which the interaction is interpreted to activate a query box. The query box is configured based on a context in response to a determination of the context associated with the content. A text of a part of the content may be used to search local and external sources to find resulting data associated with the text. The query box may be rendered with the resulting data in proximity to a location associated with the interaction. | 2015-08-27 |
20150242475 | METHOD AND SYSTEM FOR MANAGING CHANGES TO A CONTACT DATABASE - Described is a system and method for updating a contact and adding a new contact from a call log in a communications device. The system includes a contact manager that is directed towards creating and updating call contact cards in a contact database with information retrieved from call logs of phone calls made to or from the communications device. In one embodiment, information is pre-populated into a predetermined data field of the contact card, thereby reducing workload to a user. The method includes determining if a request is for updating an existing contact card or for adding a new contact card to the contact database. The update or addition is made with information retrieved from call logs. Call information is pre-populated into a predetermined data field of the contact card, when it is determined that the request is to add a new contact card to the contact database. | 2015-08-27 |
20150242476 | UPDATING DATABASE STATISTICS WITH DYNAMIC PROFILES - Embodiments of the present invention disclose a method, computer program product, and system for updating database statistics using profiles. A computer determines whether an application credential has authority to update a database statistic of a target database, based, at least in part, on a profile. Responsive to determining that the application credential has authority to update the database statistic, the computer loads the transformed data into the target database. The computer determines whether an update to the statistic is to be performed. Responsive to a determination that the update to the statistic is to be performed, the computer generates a profile name. The computer determines whether the generated profile name exists within a system catalog of the target database. Responsive to a determination that the generated profile name exists, the computer transmits a command to update the database statistic of the target database using the generated profile name. | 2015-08-27 |
20150242477 | ETL JOB CREATION USING BUSINESS TERM STAGE - A computer determines a business glossary, wherein the business glossary includes one or more business terms that correspond to one or more assets. The computer receives a request to create an ETL job associated with a business term. The computer creates an ETL job for the business term, wherein the ETL job includes a business glossary stage. | 2015-08-27 |
20150242478 | DATA SYNCING IN A DISTRIBUTED SYSTEM - Disclosed are systems, computer-readable mediums, and methods for receiving a start replication message to replicate a source volume to a replicated volume. A source system forwards I/O requests to the replica server. A data structure associated with the replicated volume is initialized. A write request is received from the source system. The write data is written to the replicated volume and the data structure is updated. Source metadata associated with the source volume is received. The source metadata is compared with prior metadata associated with a prior point-in-time image of the source volume to determine blocks of data that have changed since the prior point-in-time image of the source volume. A first block is determined to not be retrieved based upon the data structure. A second block is determined to be retrieved based upon the data structure. The second block is received and written to the replicated volume. | 2015-08-27 |
20150242479 | METHODS AND SYSTEMS FOR BULK UPLOADING OF DATA IN AN ON-DEMAND SERVICE ENVIRONMENT - Methods and systems for bulk uploading of data in an on-demand service environment are described. In one embodiment, such a method includes retrieving a bulk transaction request from a transaction queue within a host organization, where the bulk transaction request specifies a plurality of database transactions to be processed against a multi-tenant database system of the host organization. Such a method further includes determining a current computational load of the multi-tenant database system, processing a subset of the plurality of database transactions specified by the bulk transaction request against the multi-tenant database system when the current computational load is below a threshold, and updating a bulk transaction results log based on the subset of the plurality of database transactions processed. Remaining database transactions specified by the bulk transaction request may then be re-queued for later processing. | 2015-08-27 |
20150242480 | Method and system for data synchronization between foreground and background in ENUM-DNS - A method and system for data synchronization between a foreground and a background in an ENUM-DNS are provided. The method includes: when an account opening/cancellation instruction from an external network element is successfully executed by the background, same notifies account opening/cancellation record information to a service foreground; the service foreground stores the account opening/cancellation record information to a pre-established temporary data storage point; when a regular activation data time is reached, the background issues a changed data file to the service foreground; and, the service foreground loads the changed data file and clears all of the data in the temporary data storage point. | 2015-08-27 |
20150242481 | COMPUTER SYSTEM, COMPUTER SYSTEM MANAGEMENT METHOD, AND PROGRAM - A computer system, comprising a plurality of computers coupled to one another via a network, the computer system being configured to execute a task using a database constructed from the plurality of computers, the plurality of computers including a first computer and a second computer, the second computer being configured to execute: data replication for receiving the recovery request, for reading data, and for transmitting the read data to the first computer as first replicated data; and update processing for determining, in a case where a command to update the data is received in a recovery state, the sequence number of the update command, for updating predetermined data, and for transmitting the updated predetermined data as second replicated data, the first computer or the second computer being configured to control a write order of the first replicated data and the second replicated data by the first computer. | 2015-08-27 |
20150242482 | EFFICIENTLY STORING AND RETRIEVING DATA AND METADATA - For efficiently storing and retrieving data and metadata in phases, in a first phase, metadata tokens, which are assigned to metadata-emitting entities, are used for storing the data and the metadata together in a single input/output operation while piggybacking the metadata of least active metadata-emitting entities onto one of the metadata-emitting entities having one of the metadata tokens. In a second phase, the metadata is re-written to a metadata delta journal for reclaiming the metadata tokens. In a third phase, the metadata journal is applied to a metadata structure containing the metadata of the storage system, the metadata delta journal is then cleared after successfully updating the main metadata structure with the metadata of the metadata journal. The metadata journal is swapped with an empty metadata journal for concurrently adding metadata while retaining the metadata journal until applying the metadata delta journal to the metadata structure. | 2015-08-27 |
20150242483 | ELASTIC EXECUTION OF CONTINUOUS MAPREDUCE JOBS OVER DATA STREAMS - There is provided a set of methods describing how to elastically change the resources used by a MapReduce job on streaming data while executing. | 2015-08-27 |
20150242484 | Sparse Matrix Storage in a Database - Methods, processes and computer-program products are disclosed for use in a parallelized computing system in which representations of large sparse matrices are efficiently encoded and communicated between grid-computing devices. A sparse matrix can be encoded and stored as a collection of character strings wherein each character string is a Base64 encoded string representing the non-zero elements of a single row of the sparse matrix. On a per-row basis, non-zero elements can be identified by column indices and error correction metadata can be included. The resultant row data can be converted to IEEE 754 8-byte representations and then encoded into Base64 characters for storage as strings. These character strings of even very large-dimensional sparse matrices can be efficiently stored in databases or communicated to grid-computing devices. | 2015-08-27 |
20150242485 | Comparison of Multi-Dimensional Datasets - Methods, systems, and apparatuses for comparing multi-dimensional datasets are provided. A multi-dimensional dataset comparison includes receiving a plurality of datasets, each including a plurality of coordinates, wherein a subset of coordinates defines a geo-fence. For a coordinate within a geo-fence of one of the plurality of datasets, determining analogous coordinates in each of the other datasets, the analogous coordinates defining a coordinate input set, and performing in parallel an operation on the coordinate input set to determine whether an entry is present at a coordinate of the coordinate input set. | 2015-08-27 |
20150242486 | DISCOVERING COMMUNITIES AND EXPERTISE OF USERS USING SEMANTIC ANALYSIS OF RESOURCE ACCESS LOGS - Generating communities of users and discovering the expertise of those users are provided. Identifications of a plurality of users that accessed resources via a network, types of actions performed by the plurality of users on the resources, and names of the resources accessed by the plurality of users are extracted from retrieved resource access logs. The plurality of users are grouped into a plurality of different sets of users based on which resources were accessed and which type of actions were performed by each particular user within the plurality of users. The communities of users are generated based on each different set of users having a similarity with regard to the resources that were accessed and the types of actions that were performed by a particular set of users. | 2015-08-27 |
20150242487 | SYSTEM AND A METHOD FOR EXECUTING SQL-LIKE QUERIES WITH ADD-ON ACCELERATORS - According to some embodiments is disclosed a method for controlling and scheduling operation of at least one SQL operator on data chunk. The method comprising the step of: receiving SQL query, accessing data chunk blocks, receive meta data statistics and SQL query, analyzing the query selectivity, result size and Frequency moments calculation during the query execution run-time and choosing the right device to execute the each operator of the query according to analysis and predict results size. | 2015-08-27 |
20150242488 | DATA DISPLAY SYSTEM AND METHOD - A method, computer program product, and computing system for receiving a selected product category from a user. The selected product category is associated with a plurality of products available for sale within an online catalog. A master set of attributes is rendered for the plurality of products, wherein the master set of attributes includes a plurality of discrete attributes that are grouped in accordance with attribute type. | 2015-08-27 |
20150242489 | SYSTEM AND METHOD FOR THE CLASSIFICATION OF STORAGE - A classification system executing on one or more computer systems includes a processor and a memory coupled to the processor. The memory includes a discovery engine configured to navigate through non-volatile memory storage to discover an identity and location of one or more files in one or more computer storage systems by tracing the one or more files from file system mount points through file system objects and to disk objects. A classifier is configured to classify the one or more the files into a classification category. The one or more files are associated with the classification category and stored in at least one data structure. The one or more files are classified using an installed storage driver method. Methods are also provided. | 2015-08-27 |
20150242490 | CONTACT BUILDER - A web-based contact builder, management system and a computer-implemented method to assist a user in efficiently managing and communicating with their designated contacts. The system enables a user to manage existing contacts; to identify via automated means new contacts and determine if they are registered users, or to invite them to join the system; to invite and respond to requests from new contacts in an efficient “one step” method; and to set the level of access that each contact will have to the user's personal identifying information. | 2015-08-27 |
20150242491 | REPRESENTING A MACHINE-TO-MACHINE DEVICE MODEL BASED ON ONTOLOGICAL RELATIONSHIPS - In an approach for creating a machine-to-machine device model based on ontological relationship, one or more computer processors determine a plurality of characteristics of one or more machine-to-machine devices within a machine-to-machine communication environment. The one or more computer processors determine one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. The one or more computer processors create a semantic device model, based, at least in part, on the one or more ontological relationships between the one or more machine-to-machine devices and the plurality of characteristics of the one or more machine-to-machine devices. | 2015-08-27 |
20150242492 | CHARACTER BASED MEDIA ANALYTICS - Techniques for analyzing media content are described. One technique generally comprises performing a regression analysis for characters in a plurality of media content based on user demographics, content outcome measure, and character models. The technique determines an attribute of significance. In some embodiments, the technique selects media content for display that depicts a character having at least a threshold value of the attribute of significance. In some embodiments, the technique displays media analytics for the attribute of significance determined based on a value of the attribute of significance exceeding a threshold significance value. | 2015-08-27 |
20150242493 | USER-GUIDED SEARCH QUERY EXPANSION - A device may receive information that identifies a search query to be used to search a text. The device may provide information that identifies multiple search query expansion techniques for expanding the search query. The device may receive a selection of one or more search query expansion techniques, of the multiple search query expansion techniques, to be performed to expand the search query. The device may perform the one or more search query expansion techniques to generate a set of expanded search queries based on the search query and the text. The device may search the text, using the set of expanded search queries, to identify multiple sections of the text that include an expanded search query included in the set of expanded search queries. The device may provide search results that identify the multiple sections of the text based on searching the text. | 2015-08-27 |
20150242494 | SYSTEM AND METHOD FOR RECEPTION, ANALYSIS AND DISSEMINATION OF USER FEEDBACK - A method of collection, dissemination, storage, and analysis of user feedback is disclosed. A plurality of user touchpoints are defined where user feedback is desired. A unique code is associated with each of the defined user touchpoints. Upon determining that a user is at one of the defined user touchpoints, the method includes sending a user feedback request to the user. If the user provides feedback, the user feedback is transmitted to the terminals of responsible entities within the organization. The responsible entities may take any corrective action needed in response to the user feedback at the user touchpoint. The user feedback and any action taken in response to the user feedback are also stored in a remote database for further analysis. | 2015-08-27 |