37th week of 2011 patent applcation highlights part 60 |
Patent application number | Title | Published |
20110225414 | MONITOR WITH CIRCUIT FOR CLEARING CMOS DATA AND COMPUTER MOTHERBOARD - A monitor for clearing CMOS data of a motherboard includes a jumper block including a first pin and a second pin. A power circuit connects to a display circuit to provide power to the display circuit. The power circuit is connected to ground via a resistor and a capacitor connected in series. An idle pin of the monitor video interface jumper block to a node between the first resistor and the first capacitor, and connects to the second pin of the jumper block. The first pin of the jumper block goes to ground. A positive terminal of a battery connects to the power circuit, and a negative terminal of the battery connects to ground. | 2011-09-15 |
20110225415 | DATA PROCESSING APPARATUS - A data processing apparatus includes a reconfigurable circuit capable of reconfigurating partially a circuit configuration: and a reconfiguration controlling unit that controls a reconfiguration of the circuit configuration of the reconfigurable circuit. The reconfiguration controlling unit reconfigurates a plurality of partial circuits, which constitute one pipeline and are reconfigurated simultaneously on the reconfigurable circuit, on the reconfigurable circuit in sequence from a head partial circuit of the pipeline, and starts sequentially the reconfigurated partial circuits from a head. | 2011-09-15 |
20110225416 | SYSTEM AND METHOD FOR CONFIGURING SOFTWARE APPLICATIONS IN A MOTOR VEHICLE - A system and method for allowing a user to select and manage software applications in their vehicle from any Internet enabled device and allows the user to remotely configure the content of each specific application from any Internet enabled device. Once the application has been configured via the internet enabled device, the user launches the application from the vehicle. Upon launching, the application dynamically retrieves the user's settings from the server and downloads any information or content necessary. In this manner, the application is personalized to the user's settings, without the user ever having to take any actions from within the vehicle, or to personalie the user's settings while the vehicle is in Park. | 2011-09-15 |
20110225417 | DIGITAL RIGHTS MANAGEMENT IN A MOBILE ENVIRONMENT - Embodiments provide a method that causes a plurality of virtual machine instructions to be interpreted for indications of a mobile device's hardware identification information, thus forming a plurality of hardware instruction interpretations. The embodiment also combines each of the plurality of hardware instruction interpretations and hashes the combination to form a quasi-hardware device identifier. An encryption process is based on the quasi-hardware encryption device identifier and the media is then encrypted using the encryption process. The encrypted media is transferred to the mobile device wherein the mobile device decrypts the media based at least in part on the mobile device's internal knowledge of the quasi-hardware device identification. | 2011-09-15 |
20110225418 | SECURE STORAGE OF PROTECTED DATA IN A WIRELESS COMMUNICATION DEVICE - A wireless communication device comprises first processing circuitry configured to execute an RF operating system and second processing circuitry configured to execute an open operating system, wherein the first processing circuitry is linked to a secure memory device inaccessible to the second processing circuitry. The RF operating system is configured to receive protected data and store the protected data in the secure memory device. The open operating system is configured to receive a request for the protected data from one of a plurality of user applications and transfer the request to the RF operating system. In response to the request for the protected data, the RF operating system is configured to retrieve the protected data from the secure memory device, encrypt the protected data, and transfer the encrypted protected data to the open operating system for delivery to the one of the user applications associated with the request. | 2011-09-15 |
20110225419 | AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS WITH ASSURED SYSTEM AVAILABILITY - A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities. | 2011-09-15 |
20110225420 | MODULE SIGNING FOR UNPRIVILEGED USERS TO CREATE AND LOAD TRUSTWORTHY KERNEL MODULES - A module building system, hosted by a server, receives a user script to be run to monitor software on a client using an introspection tool. The server adds safety constraints to the user script and generates a client kernel module using the user script which includes the safety constraints. The server signs the client kernel module and sends the signed client kernel module to the client. The signed client kernel module allows a user to use the introspection tool to load and execute the client module on the client for monitoring the software on the client. | 2011-09-15 |
20110225421 | METHOD OF OBTAINING CONTENT FOR MOBILE TERMINAL, MOBILE TERMINAL USING THE METHOD, AND NEAR FIELD COMMUNICATION SYSTEM HAVING THE MOBILE TERMINAL - A method of operating a near field communication system includes receiving an electronic tag having information signed by using a private key, verifying the signed information of the electronic tag by using a public key corresponding to the private key, and connecting the mobile terminal to a content server using a result of the verification. The near-field communication system transfers the signed information of the smart poster by using the public key, and connects to the content server after verifying the signed information of the smart poster, thereby preventing malicious phishing using the smart poster. | 2011-09-15 |
20110225422 | METHOD AND APPARATUS FOR REPORTING AUDIENCE MEASUREMENT IN CONTENT TRANSMISSION SYSTEM - A method and apparatus for reporting a consumption time of a service or content in Audience Measurement (AM), which measures a user consumption pattern of the service or the content is provided. A method for reporting a consumption time of the service or the content in a terminal of a content transmission system includes receiving an encryption key for encrypting the service or the content from a broadcasting server and transmitting a message requesting interpretation of the encryption key to a smart card. The message includes consumption time information of the service or the content. | 2011-09-15 |
20110225423 | SYSTEMS AND METHODS FOR IDENTITY ENCAPSULATED CRYPTOGRAHY - A method and a system to provide identity encapsulated cryptography are provided. A method may comprise receiving a user key to access a service. The service may be provided by an enterprise and hosted within a public cloud. A request for a country key assigned to a country of a user is transmitted and the country key is received. Session data resulting from the use of the service hosted within the public cloud is encrypted using the user key and the user key is encrypted using the country key. The encrypted session data and the encrypted user key are stored in the public cloud. The country key may be provided to a legal agency of the country of the user to decrypt session data of the user and to not decrypt session data of other users of another country. | 2011-09-15 |
20110225424 | Inter Base Station Interface Establishment - A method of establishing a peer-to-peer IPSec security association between a pair of base stations located within the same or different radio access networks. The base stations communicate with a core network via the same or different security gateways of the core network using respective pre-established IPSec security associations. The method comprises exchanging peer-to-peer IKE security association initiation request and initiation response messages between the base stations using said pre-established security associations. | 2011-09-15 |
20110225425 | PREVENTING CAUSALITY VIOLATIONS IN DECENTRALIZED DISTRIBUTED SYSTEMS - A trusted read and write platform provides write-indisputability and read-undeniability for a distributed application. The platform is implemented at each node of the distributed application using a trusted platform module. To provide write-indisputability, the read and write platform of a node may generate a proof that is signed by the platform module and sent with a purportedly written result. The proof is decrypted using a public key associated with the platform module and includes indicators of the process taken by the read and write platform to write the result. To provide read-undeniability, the read and write platform may bind a key to a state of the platform module. A result to be read at the read and write platform is encrypted using the key and can only be decrypted when the read and write platform updates its state to the bound state. | 2011-09-15 |
20110225426 | TRUSTED GROUP OF A PLURALITY OF DEVICES WITH SINGLE SIGN ON, SECURE AUTHENTICATION - A system creates a trusted group of devices for single sign on. The trusted group is a set of two or more devices which can communicate securely to exchange information about the states of the devices. The two or more devices can arrange or establish the trusted group through the exchange of credentials or authentication information. After the establishment of the trusted group, the two or more devices may communicate through a secure connection established between the members of the trusted group. Each device may then execute normally and may encounter events that change the status of the device. Information about the locking or unlocking of the computer can be exchanged with the other members of the trusted group and the other members may also lock or unlock in concert. | 2011-09-15 |
20110225427 | USE OF CERTIFICATE AUTHORITY TO CONTROL A DEVICE'S ACCESS TO SERVICES - A mobile communications device having a digital certificate authenticating the device itself is proposed. A server for authenticating the device and a method of authenticating the device are also disclosed. The device comprises a transmitter, a processor, a memory and a computer readable medium. The memory includes a certificate certifying the authenticity of the mobile communications device, the certificate comprising device-specific data and a digital signature signed by an authority having control of the authenticity of the mobile communications device. The computer readable medium has computer readable instructions stored thereon that when executed configure the processor to instruct the transmitter to transmit a copy of the certificate to a service provider in response to a request to authenticate the mobile communications device with the service provider. | 2011-09-15 |
20110225428 | System and Method for Encryption and Decryption of Data - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. A method for encryption and decryption of data, may include encrypting or decrypting data associated with an input/output operation based on at least one of an encryption key and a cryptographic function, wherein at least one of the encryption key and the cryptographic function are selected based on one or more characteristics associated with the data to be encrypted or decrypted. Another method may include encrypting an item of data based on at least one of a first-layer encryption key and a first-layer cryptographic function to produce first-layer encrypted data and encrypting the first-layer encrypted data based on at least one of a second-layer encryption key and a second-layer cryptographic function to produce second-layer encrypted data. | 2011-09-15 |
20110225429 | CRYPTOGRAPHIC ACCUMULATORS FOR AUTHENTICATED HASH TABLES - In one exemplary embodiment, an apparatus includes a memory storing data and a processor performing operations. The apparatus generates or maintains an accumulation tree for the stored data—an ordered tree structure with a root node, leaf nodes and internal nodes. Each leaf node corresponds to a portion of the data. A depth of the tree remains constant. A bound on a degree of each internal node is a function of a number of leaf nodes of a subtree rooted at the internal node. Each node of the tree has an accumulation value. Accumulation values of the root and internal nodes are determined by hierarchically employing an accumulator over the accumulation values of the nodes lying one level below the node in question. The accumulation value of the root node is a digest for the tree. | 2011-09-15 |
20110225430 | Secured database system with built-in antivirus protection - A secured database system with built-in antivirus protection is described. In one embodiment, for example, a method of the present invention is described for securing a database system, the method comprises steps of: provisioning storage from a storage device, for storing database information; generating an encryption key so that the database information is stored on the storage device in an encrypted manner; generating a decryption key for decrypting the database information stored on the storage device, wherein access to the decryption key is controlled by the database system based on user privileges; receiving a request from a user for access to the database information; determining whether the user has been granted sufficient privileges to access the database information; if the user has been granted sufficient privileges, automatically decrypting the database information to provide the access; and otherwise denying the request if the user has not been granted sufficient privileges. | 2011-09-15 |
20110225431 | System and Method for General Purpose Encryption of Data - Systems and methods for reducing problems and disadvantages associated with traditional approaches to encryption and decryption of data are provided. An information handling system may include a processor, a memory communicatively coupled to the processor, and an encryption accelerator communicatively coupled to the processor. The encryption accelerator may be configured to encrypt and decrypt information in accordance with a plurality of cryptographic functions, receive a command from the processor to perform an encryption or decryption task upon data associated with an input/output operation, and in response to receiving the command, encrypt or decrypt the data associated with the input/output operation based on a particular one of the plurality of cryptographic functions. | 2011-09-15 |
20110225432 | METHOD AND CIRCUITRY FOR DETECTING A FAULT ATTACK - A method of detecting a fault attack during a cryptographic operation using at least one look-up table including a plurality of sub-tables each having a same number of values of a fixed bit length, a fixed relation existing between values at same locations in each sub-table, the method including: performing a load operation to retrieve from the look-up table data values from a same location in each sub-table; verifying that the fixed relation exists between at least two of the data values; and generating an output signal based on the verification. | 2011-09-15 |
20110225433 | ELECTRIC LOCKING AND SEALING DEVICE, CASE COMPRISING THE SAME, AND CONTROL SYSTEM THEREFOR - An electronic locking and sealing device, including: a housing, a lock tongue, an operating unit, a main control unit, and a connecting part, the operating unit is disposed in the housing and fixedly connected to the lock tongue, and operates to push out or to take back the locking tongue from or in the housing, the main control unit is connected to the operating unit, and operates to receive an external control instruction whereby automatically controlling the operating unit, and the connecting part has a hole disposed at the center thereof and corresponding to the lock tongue. | 2011-09-15 |
20110225434 | MICROCOMPUTER CONTROLLER - A microcomputer controller includes a power operating means for controlling switching on and off of a switch for switching on and off power supply for a microcomputer operation unit, and a startup and shutdown means for, in response to a signal from a microcomputer operation judging unit, starting up or shutting down a microcomputer and also furnishing a power off signal to the power operating means, for writing a SUM value of used data of a RAM in an empty space of this RAM at a time of shutdown of supply of electric power to the microcomputer, and for comparing a SUM value of the RAM with the written SUM value at a time of supply of the electric supply to the microcomputer, and performing a resume operation when they are equal to each other whereas performing a reset operation when they are different from each other. | 2011-09-15 |
20110225435 | POWER CIRCUIT - A power circuit includes a memory power circuit and a central processing unit (CPU) power circuit. The memory power circuit includes a first operational amplifier and a first switch. The CPU power circuit includes a second operational amplifier and a second switch. The memory power circuit supplies power to a memory slot. The CPU power circuit supplies power to a CPU. | 2011-09-15 |
20110225436 | BATTERY POWERED DEVICE WITH DYNAMIC AND PERFORMANCE MANAGEMENT - A computing device operates over a range of voltages and frequencies and over a range of processor usage levels. The computing device includes at least a variable frequency generator, a variable voltage power supply and voltage supply level and clocking frequency management circuitry. The variable frequency generator is coupled to the processor and delivers a clock signal to the processor. The variable voltage power supply is coupled to the processor and delivers voltage to the processor. The voltage supply level and clocking frequency management circuitry adjust both the voltage provided by the variable voltage power supply and the frequency of the signal provided by the variable frequency generator. The computing device includes a temperature sensor that provides signals indicative of the temperature of the processor and the voltage supply level and clocking frequency management circuitry adjusts the voltage and/or the clocking frequency provided by the variable voltage power supply. The computing device may also include a fan controlled by the voltage supply level and clocking frequency management circuitry, the fan adjusting the temperature of the processor when activated. In cold weather applications, the computing device may further include a heater controlled by the voltage supply level and clocking frequency management circuitry that raises the temperature of the processor when activated. | 2011-09-15 |
20110225437 | METHOD AND APPARATUS FOR MANAGING POWER IN COMPUTER SYSTEMS - The invention is directed towards minimizing power consumption in computer systems. One embodiment of the invention is a power management system that is used for a computer system that has at least one device and one power domain. This embodiment uses two different power managers to manage the power consumption of the device and the power domain. Specifically, this embodiment has (1) a first power manager that determines when to change power state of the device, and (2) a second power manager that determines when to change power state of the power domain. Each of these power managers decides to change the power state of its corresponding device or domain based on information from several different sources. These sources can include power-management clients and power managers of related domains or devices. | 2011-09-15 |
20110225438 | COMPUTER PROGRAM PRODUCT FOR CONTROLLING A STORAGE DEVICE HAVING PER-ELEMENT SELECTABLE POWER SUPPLY VOLTAGES - A computer program product for controlling a storage device using per-element selectable power supply voltages provides energy conservation in storage devices while maintaining a particular performance level. The storage device is partitioned into multiple elements, which may be sub-arrays, rows, columns or individual storage cells. Each element has a corresponding virtual power supply rail that is provided with a selectable power supply voltage. The power supply voltage provided to the virtual power supply rail for an element is set to the minimum power supply voltage unless a higher power supply voltage is required for the element to meet performance requirements. A control cell may be provided within each element that provides a control signal that selects the power supply voltage supplied to the corresponding virtual power supply rail. The state of the cell may be set via a fuse or mask, or values may be loaded into the control cells at initialization of the storage device. | 2011-09-15 |
20110225439 | SIGNAL CORRECTION APPARATUS - A signal correction apparatus receives an input audio signal (serving as a first sound reception means). The signal correction apparatus computes, at every frequency, first power that indicates magnitude of sound represented by the input audio signal (serving as a first power computation means). The signal correction apparatus estimates a correction function that is a continuous function defining a relation between each frequency and a correction coefficient used to approximate the first power computed at that frequency to the reference power predetermined for that frequency (serving as a correction function estimation means). The signal correction apparatus multiplies the computed first power by the correction coefficient acquired in accordance with the relation defined by the estimated correction function so as to correct the first power at every frequency (serving as a power correcting means). | 2011-09-15 |
20110225440 | COMMUNICATION METHOD OF A TERMINAL AND AN ACCESS POINT FOR POWER SAVING - Provided is a communication technology of an access point and a terminal that may decrease power consumption by changing an operation state of the terminal from an awake state to a sleep state when a data stream to be transmitted to the terminal is absent or has completed in a transmission opportunity (TXOP) duration. | 2011-09-15 |
20110225441 | Method for Managing an Alternating Current Adaptor System - A method for managing an alternating current adaptor system is disclosed. A direct current voltage is received at a high impedance power delivery network from a primary side of an alternating current adaptor system. An isolated voltage is output from the high impedance power delivery network to components of a secondary side of the alternating current adaptor system. A transition in a power state identification of an information handling system associated with the alternating current adaptor system is detected. An output voltage level of the alternating current adaptor system is alternated in response to the transition in the power state identification of the information handling system. | 2011-09-15 |
20110225442 | METHOD FOR THE OPERATION OF SYNCHRONOUS MOTORS, AND ASSOCIATED DEVICE - Synchronous motors are controlled using a three-phase AC power controller. According to at least one embodiment of the invention, a fundamental wave having the desired frequency is defined for the first phase, and corresponding fundamental waves which have the same frequency as the frequency in the first phase but are out of phase by specific values are defined in the other phases. The triggering times during which the generated current pulse concurrently has the same polarity as the respective fundamental wave in two of the phases are determined for each phase and are used. Two of the three fundamental waves are generated in phase opposition when the desired frequency amounts to half the system frequency. | 2011-09-15 |
20110225443 | IMAGE FORMING APPARATUS AND CONTROL APPARATUS - The present image forming apparatus includes a first control unit and a second control unit driven by built-in clock oscillators to realize the distributed control. The first control unit generates, using a first timer driven by the built-in clock oscillator of the first control unit, a pulse signal corresponding to a predetermined clock rate and outputs the pulse signal to the second control unit. The second control unit measures, using a second timer driven by the built-in clock oscillator of the second control unit, a pulse width of the pulse signal outputted from the first control unit, and calculates a correction coefficient using reference pulse width corresponding to the predetermined clock rate and the measured pulse width. The processing unit processes using the calculated correction coefficient. | 2011-09-15 |
20110225444 | MEMORY INTERFACE HAVING EXTENDED STROBE BURST FOR WRITE TIMING CALIBRATION - Methods and systems for calibrating parameters for communication between a controller and a memory device. A memory controller may be configured to calibrate one or more of the write latency and/or the latency window of a memory device such that a data signal and a data strobe signal are received by the memory device within the latency window of the memory device. | 2011-09-15 |
20110225445 | MEMORY INTERFACE HAVING EXTENDED STROBE BURST FOR READ TIMING CALIBRATION - Methods and systems for calibrating parameters for communication between a controller and a memory device. A memory controller may be configured to calibrate one or more of the read latency and/or the latency window of a memory controller such that a data signal and a data strobe signal are received by the memory controller within the latency window of the memory controller. | 2011-09-15 |
20110225446 | IDENTIFYING A DEFECTIVE ADAPTER - A method, system, and computer usable program product for identifying a defective adapter are provided in the illustrative embodiments. A configuration process of the adapter is initiated, the adapter being coupled with a slot in a data processing system. An indication of the configuration process is activated. A determination is made whether the configuration has completed successfully. The indication is allowed to remain activated responsive to the configuration not completing successfully. The activated indication identifies the defective adapter. | 2011-09-15 |
20110225447 | PREFERRED RESOURCE SELECTOR - A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context of a client computer with an intranet access criterion to form a comparison result. The computer selects at least one preferred uniform resource identifier based on the comparison result, indicating the intranet is accessible. The computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network. | 2011-09-15 |
20110225448 | FAILOVER SYSTEM AND METHOD - One aspect of the present invention provides a system for failover comprising at least one client selectively connectable to one of at least two interconnected servers via a network connection. In a normal state, one of the servers is designated a primary server when connected to the client and a remainder of the servers are designated as backup servers when not connected to the client. The at least one client is configured to send messages to the primary server. The servers are configured to process the messages using at least one service that is identical in each of the servers. The services are unaware of whether a server respective to the service is operating as the primary server or the backup server. The servers are further configured to maintain a library, or the like, that indicates whether a server is the primary server or a server is the backup server. The services within each server are to make external calls via its respective library. The library in the primary server is configured to complete the external calls and return results of the external calls to the service in the primary server and to forward results of the external calls to the service in the backup server. The library in the secondary server does not make external calls but simply forwards the results of the external calls, as received from the primary server, to the service in the secondary server when requested to do so by the service in the secondary server. | 2011-09-15 |
20110225449 | Method of Achieving High Reliability of Network Boot Computer System - In a network computer system, recovery may be impossible from a fault when the fault occurs in a network switch in a network or a device such as an external disk device. Provided is a computer system that includes a plurality of servers, a plurality of network, a plurality of external disk devices, and a management computer, in which the management computer detects a fault which is occurred, retrieves an application stop server inaccessible to the used disk due to the fault, retrieves the disk for storing the same contents as contents stored in the disk used by the retrieved application stop server and the external disk device including the disk, retrieves an application resuming server capable of accessing the retrieved external disk device, and transmits an instruction to boot by using the retrieved disk to the retrieved application resuming server. | 2011-09-15 |
20110225450 | FAILSAFE DIRECTORY FILE SYSTEM IN A DISPERSED STORAGE NETWORK - A file directory system comprises a directory file, a directory address for the directory file, and a directory address failsafe mechanism. The directory file includes one or more directory entries and one or more corresponding addresses for the one or more directory entries. The directory address failsafe mechanism functions to dispersed storage error encode the directory address to produce a plurality of encoded components of the directory address and transmit the plurality of encoded components of the directory address to a plurality of agent modules. | 2011-09-15 |
20110225451 | REQUESTING CLOUD DATA STORAGE - A method begins by a processing module determining that a data storage request is a cloud data storage request. The method continues with the processing module determining at least one of a cloud storage access reliability indication and a cloud storage data reliability indication for the data storage request. The method continues with the processing module sending the data storage request and the at least one of cloud storage access reliability indication and cloud storage data reliability indication to a cloud storage system. | 2011-09-15 |
20110225452 | APPARATUS TO MAINTAIN REDUNDANCY IN FOUR LINE SYSTEM - Exemplary embodiments adapted to distribute power from four input lines to a plurality of power supply units (PSUs) configured in an N+1 architecture are provided. In one such embodiment, a plurality of rectifier devices have first and second ends, each of the plurality of rectifier devices connected at the first end to one of the four input lines, and adapted to be bypassed by a first relay in a first operating mode and provide rectified input current in a second operating mode. A plurality of second relays is connected between each of the second ends of the plurality of rectifier devices. The plurality of second relays are adapted to be closed in the second operating mode to sum the rectified input current from each of the plurality of rectifier devices in a single node connecting each of the plurality of PSUs. | 2011-09-15 |
20110225453 | SYSTEM AND METHOD FOR OPTIMIZING REDUNDANCY RESTORATION IN DISTRIBUTED DATA LAYOUT ENVIRONMENTS - The present disclosure is directed to a system and a method for optimizing redundancy restoration in distributed data layout environments. The system may include a plurality of storage devices configured for providing data storage. The system may include a prioritization module communicatively coupled to the plurality of storage devices. The prioritization module may be configured for determining a restoration order of at least a first data portion and a second data portion when a critical data failure occurs. The system may include a restoration module communicatively coupled to the plurality of storage devices and the prioritization module, the restoration module configured for restoring at least the first data portion and the second data portion based upon the restoration order. | 2011-09-15 |
20110225454 | METHOD, RECORDING TERMINAL, SERVER, AND SYSTEM FOR REPAIRING MEDIA FILE RECORDING ERRORS - A method, a recording terminal, a server, and a system for repairing media file recording errors are disclosed in embodiments of the present invention. The method includes: generating description information about a recording error when a recording terminal identifies the recording error in live recording of a media file; sending a recording error repair request that carries the description information to a network device; and repairing the media file recorded by the recording terminal according to repair information when receiving the repair information sent by the network device according to the description information. With the present invention, the recording errors are repaired through a bidirectional network between the recording terminal and the network device, and reliability of repairing the recording errors is ensured. | 2011-09-15 |
20110225455 | DATA RESTORING METHOD AND AN APPARATUS USING JOURNAL DATA AND AN IDENTIFICATION INFORMATION - The storage system is coupled to a computer and includes a plurality of physical storages being used to configure a first logical storage and a second logical storage, a control unit receiving a read request and a write request from the computer; and a cache memory storing data which is sent to the computer. The control unit determines whether a request from the computer is a write request or a read request. If it is a read request, the control unit reads data from the cache memory or at least one of the plurality of physical storages based on the read request. If it is a write request, the control unit determines whether destination of the write request is the first logical storage. | 2011-09-15 |
20110225456 | COMMANDED JTAG TEST ACCESS PORT OPERATIONS - The disclosure describes a novel method and apparatus for improving the operation of a TAP architecture in a device through the use of Command signal inputs to the TAP architecture. In response to a Command signal input, the TAP architecture can perform streamlined and uninterrupted Update, Capture and Shift operation cycles to a target circuit in the device or streamlined and uninterrupted capture and shift operation cycles to a target circuit in the device. The Command signals can be input to the TAP architecture via the devices dedicated TMS or TDI inputs or via a separate CMD input to the device. | 2011-09-15 |
20110225457 | System for Testing a Multitasking Computation Architecture Based on Communication Data between Processors and Corresponding Test Method - System for testing a multitasking computation architecture, comprising a set of processors linked by data communication channels, comprising a generating stage for generating sequences of test instructions based on characteristics of said processors comprising programming rules for the computation processors, characterized in that it comprises a control stage for the stage for generating sequences based on data representative of the data communication channels. | 2011-09-15 |
20110225458 | GENERATING A DEBUGGABLE DUMP FILE FOR AN OPERATING SYSTEM KERNEL AND HYPERVISOR - Cloud computing platforms having computer-readable media that perform methods to generate debuggable dump files are provided. The cloud computing platform includes server devices running operating system kernels. Optionally, the server may include a hypervisor. The operating system kernel receives a command to generate a debuggable dump file. In response, the operating system estimates memory requires to store the requested memory pages, allocates an appropriately sized buffer, and freezes computation. A hypervisor is present and if its memory pages are requested, the hypervisor freezes its computation. The hypervisor stores its memory pages in the buffer and resumes computation. The operating system kernel stores its pages to the buffer in priority order and resumes its computation. The contents of the buffer are written out as a debuggable dump file. | 2011-09-15 |
20110225459 | GENERATING A DEBUGGABLE DUMP FILE FOR A VIRTUAL MACHINE - Cloud computing platforms having computer-readable media that perform methods to generate debuggable dump files are provided. The cloud computing platform includes at least one server having a host virtual machine, guest virtual machine, and hypervisor. The host virtual machine receives a command to generate the debuggable dump file. In response, it suspends all virtual processors executing on the guest virtual machine. The memory pages of the suspended virtual machine are written into a debuggable dump file, and the suspended processors are resumed at an appropriate time. | 2011-09-15 |
20110225460 | CLIENT SESSION BASED DEBUGGING - Debugging operations on individual client sessions for a remotely executed shared application are enabled to be performed as the client requests are processed on the executing server without disrupting execution of other client sessions. A remote debugging client may connect to a debugging engine executed on the server allowing the debugging client to view source code, set breakpoints, view client connections, and receive callbacks or notifications when a breakpoint is hit by the client session being debugged. The debugging client may also control execution by stepping through client code enabling debugging of multiple clients simultaneously. | 2011-09-15 |
20110225461 | APPARATUS AND METHOD TO DETECT AND TRACK SOFTWARE INSTALLATION ERRORS - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 2011-09-15 |
20110225462 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT SYSTEM, DATA PROCESSING METHOD, AND OPERATIONS MANAGEMENT PROGRAM - An operations management apparatus which acquires performance information for each of a plurality of performance items from a plurality of controlled units and manages operation of the controlled units includes a correlation model generation unit which derives a correlation function between a first series of performance information that indicates time series variation about a first element and a second series of performance information that indicates time series variation about a second element, generates a correlation model between the first element and the second element based on the correlation function, and obtains the correlation model for each element pair of the performance information, and a correlation change analysis unit which analyzes a change in the correlation model based on the performance information acquired newly which has not been used for generation of the correlation model. | 2011-09-15 |
20110225463 | DETECTING AND RECOVERING FROM PROCESS FAILURES - A service is used to process files. The processing of the files is performed by worker services that are assigned to process a portion of the files. Each worker service that is processing a portion of the files is assigned a unique identifier. Using the identifier information, the set of worker services currently active are monitored along with the work assigned to each process. When a worker server determines that a worker service has failed, the work assigned to the failed worker service can be automatically determined and a new worker service can be started to process that work. Any new worker service that is started is assigned a unique identifier, so the work assigned to it can be similarly tracked. | 2011-09-15 |
20110225464 | RESILIENT CONNECTIVITY HEALTH MANAGEMENT FRAMEWORK - A framework is provided for diagnosing and resolving wireless connectivity-related issues. For example, some embodiments of the invention provide a “health monitor” which monitors and logs wireless connectivity-related events occurring on the device, the network, and the one or more resources to which the device is connected. The health monitor may analyze these events and/or other information to determine when a connectivity problem may have arisen, and if a problem is determined to be imminent or to have occurred, may initiate recovery procedures. In some embodiments, the monitoring of events, analysis to determine whether a connectivity problem has arisen, and the recovery from the problem occur transparently to the user. | 2011-09-15 |
20110225465 | Managing Memory Refreshes - Systems and methods to manage memory refreshes at a memory controller are disclosed. A method includes determining, at a memory controller device, that a number of transmission errors between a memory controller port and a memory redrive device exceeds an error threshold. The method may include initiating a first link retraining process between the memory controller port and the memory redrive device. The method may further include placing one or more dynamic random access memory modules associated with the memory redrive device in a self-refresh mode. The method may also include removing the one or more dynamic random access memory modules from the self-refresh mode after the link retraining process has completed. The method may further include enabling overlapping refreshes of the one or more dynamic random access memory modules. | 2011-09-15 |
20110225466 | DISPERSED STORAGE UNIT SELECTION - A dispersed storage device for use within a dispersed storage network operates to select a set of dispersed storage units for storage of a data object by slicing an encoded data segment of a data object into error coded data slices, determining slice metadata for the error coded data slices, determining memory characteristics of dispersed storage units capable of storing the error coded data slices and selecting the set of dispersed storage units for storing the error coded data slices based on the slice metadata and the memory characteristics. | 2011-09-15 |
20110225467 | STARTING VIRTUAL INSTANCES WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a system that leverages the Operational Support System(s) (OSS) and Business Support system(s) (BSS) of a (e.g., public) computing Cloud with a service to automate virtual instance restarts. For example, under embodiments of the present invention, a failed virtual instance is detected within the Cloud computing environment, and a request for a new virtual instance is received in response thereto. Upon receiving the request, an entitlement of a user associated with the failed virtual instance will be tested. Specifically, a set of authentication calls and checks are deployed in accordance herewith to ensure the integrity of the requests, as well as the authorization of the requester for the resource use. Assuming testing is passed, a countdown timer associated with the failed virtual instance will be decreased. When the countdown timer reaches a predetermined threshold (e.g., zero), the new virtual instance will be started, the failed virtual instance will be terminated, and the countdown timer will be reset/restarted by instance. Integration with BSS further allows for monitoring and charging of service usage as well as opening the option for pay-as-you-go charges for the restart service itself. | 2011-09-15 |
20110225468 | STORAGE APPARATUS AND METHOD OF CONTROLLING THE SAME - A storage apparatus in which at least a first storage medium and a second storage medium are installable and only the first storage medium is initially installed, the storage apparatus including a redundancy unit for executing a redundancy operation in which the same data is stored in both of the installed first storage medium and the second storage medium, and a controller for controlling the redundancy unit so that the redundancy unit can execute a restricted operation in which data is stored only in the first storage medium, until the second storage medium has been installed. The controller controls the redundancy unit so that the redundancy unit can return from the restricted operation to the redundancy operation after the second storage medium has been installed. | 2011-09-15 |
20110225469 | PERIPHERAL INTERFACE ALERT MESSAGE FOR DOWNSTREAM DEVICE - According to some embodiments, a message generated by a downstream device is received at upstream device. The message may, for example, be received via a peripheral interface and may not require a response. It may then be determined that an error is associated with the message, and an alert message may be sent from the upstream device to the downstream device via the peripheral interface. | 2011-09-15 |
20110225470 | Serial Interface Device Built-In Self Test - A built-in self test circuit includes a pattern generator, an elastic buffer, a symbol detector, and a comparison unit. A pattern generator generates a first test pattern to test a port under test and then a result pattern is gotten and stored in the elastic buffer. The symbol detector detects if a starting symbol exists in the test result pattern. If it exists, a second test pattern is generated to be compared with the test result pattern. As a result, a reliability of data transmission of the port under test is determined. | 2011-09-15 |
20110225471 | MEMORY DEVICES, TESTING SYSTEMS AND METHODS - Testing systems and methods, as well as memory devices using such testing systems and methods, may facilitate testing of memory devices using a read-modify-write test procedure. One such testing system receives a signal indicative of at least some of a plurality of bits of data read from an address differing from each other, and then masks subsequent write operations at the same address. Therefore, any address at which the bits of read data do not all have the same value may be considered to be faulty. Failure data from the test can therefore be stored in the same array of memory cells that is being tested. | 2011-09-15 |
20110225472 | READING MEMORY CELLS USING MULTIPLE THRESHOLDS - A method for operating a memory ( | 2011-09-15 |
20110225473 | READ OPERATION FOR NON-VOLATILE STORAGE WITH COMPENSATION FOR COUPLING - Shifts in the apparent charge stored on a floating gate (or other charge storing element) of a non-volatile memory cell can occur because of the coupling of an electric field based on the charge stored in adjacent floating gates (or other adjacent charge storing elements). The problem occurs most pronouncedly between sets of adjacent memory cells that have been programmed at different times. To account for this coupling, the read process for a particular memory cell will provide compensation to an adjacent memory cell in order to reduce the coupling effect that the adjacent memory cell has on the particular memory cell. | 2011-09-15 |
20110225474 | METHOD AND APARATUS FOR ERASURE DECODING AN ECC CODED BITSTREAM - The error correction capability of block codes can be doubled if error locations are known. Prior art approaches for error location detection always involve adding dedicated redundant data which then are evaluated to yield error location information. The present invention proposes and describes how error location information in the form of clues is derived from given DC control bits that are anyway present in a data stream. | 2011-09-15 |
20110225475 | LOW OVERHEAD AND TIMING IMPROVED ARCHITECTURE FOR PERFORMING ERROR CHECKING AND CORRECTION FOR MEMORIES AND BUSES IN SYSTEM-ON-CHIPS, AND OTHER CIRCUITS, SYSTEMS AND PROCESSES - An electronic circuit ( | 2011-09-15 |
20110225476 | System And Method For Enabling A Buffer Less Or Substantially Buffer Less Core Network - The present invention relates to a system and method for enabling a buffer-less or substantially buffer-less core network using a packet-level forward error correction (FEC) coding scheme. The system includes an ingress edge router configured to receive data packets destined to at least one egress edge router via an access link from an end-host. The ingress edge router is connected to the at least one egress edge router via a core network, where the core network is buffer-less or substantially buffer-less. Also, the ingress edge router is configured to apply a forward error correction (FEC) encoding scheme to the data packets at a packet level and transmit the encoded data packets to the core network. | 2011-09-15 |
20110225477 | SYSTEMS AND METHODS FOR ACHIEVING HIGHER CODING RATE USING PARITY INTERLEAVING - The disclosed technology provides systems and methods for encoding data based on a run-length-limited code and an error correction code to provide codewords. The codewords include RLL-encoded data that are produced based on the RLL code, and parity information that are produced based on the error correction code. The parity information is interleaved among the RLL-encoded data. In one embodiment, the codeword is produced by separately producing the RLL-encoded data and the parity information, and interleaving the parity information among the RLL-encoded data. In one embodiment, the codeword is produced by producing the RLL-encoded data, and using erasure decoding to compute the parity information. | 2011-09-15 |
20110225478 | COMMUNICATION APPARATUS - A communicating unit used in an X-ray image pickup apparatus in this invention has an error detecting function to detect communication errors, and an FIFO for temporarily storing data received from a control and image processing apparatus, which is an external apparatus, by a receiving function of a communication control unit. Only when no error is detected within a predetermined period before and after receipt of data, by the receiving function of the communication control unit, from the control and image processing apparatus, a transmitting function of the communication control unit performs controls to transmit and write the data received and temporarily stored in the FIFO to an external portion. Thus, when a cable is plugged or unplugged or the control and image processing apparatus which is an external apparatus is rebooted, the error detecting function detects this as a communication error. In such cases also, an inadvertent writing of the data can be prevented. Therefore, a writing operation can be carried out also when there is no communication error. As a result, even if a communication error occurs, an inadvertent writing of data is prevented, and working efficiency is improved. | 2011-09-15 |
20110225479 | FAST AND RELIABLE WIRELESS COMMUNICATION - A communication system that provides fast and reliable communications. The system is suitable for use in connection with wireless computing devices in which transmission errors may occur because of channel conditions, such as interference. Channel conditions causing transmission errors may be bursty and transient such that the errors temporarily overwhelm an error control code. By combining data received for multiple transmission attempts of a packet that fail error checking or that pass error checking with low reliability, a reliable representation of the packet may be quickly constructed. Though, combining may be omitted when a transmission attempt is received that passes error checking with high reliability. | 2011-09-15 |
20110225480 | URL PROXY METHOD AND APPARATUS - Embodiments of the present invention relate to a method and system in which a repository of rules is applied to HTML code to modify the HTML code as it is served to correct/replace elements in the HTML code. For example, the links can be changed to retain a cobranded site, accommodate a resource constrained device, and accommodate a user's subscription or the like. | 2011-09-15 |
20110225481 | Tagging Digital Media - A method for tagging digital media is described. The method includes selecting a digital media and selecting region within the digital media. The method may further include associating a person or entity with the selected region and sending a notification of the association the person or entity or a different person or entity. The method may further include sending advertising with the notification. | 2011-09-15 |
20110225482 | MANAGING AND GENERATING CITATIONS IN SCHOLARLY WORK - A method of managing and generating citations in word processing software using hyperlinks to represent in-text citations and bibliographic citations in which the hyperlinks provide the means to locate the corresponding bibliographic data for generating in-text citations and bibliographic citations in accordance with a desired citation style. | 2011-09-15 |
20110225483 | CONTENT ADMINISTRATION SYSTEM - A content administration system receives user identification information from a terminal device via the Internet. The content administration system then specifies content administration information storage means corresponding to the received user identification information. The content administration system acquires object path information correlated to sharing permission information from a content administration information storage means of another unspecified user. The content administration system then acquires an icon image from the icon image storage means. The content administration system then makes display control information for the content administration screen containing the icon leading to the object based on the acquired icon image and the acquired object path information. The content administration system transmits the made display control information to the terminal device via the Internet. As a result, an administrator of a web site does not have to add a content path corresponding to an HTML file when adding content to a web site administered by themselves or when sharing content with another web site. | 2011-09-15 |
20110225484 | Cloud based modeling for enhancing spreadsheets - A method and development tool for developing an application over a spreadsheet, the development tool comprising design components for designing a user interface element, a logic-related element that consumes a service from the spreadsheets. and a connector connecting the user interface element and the logic-related element; a communication component; code generation components for generating code associated with the user interface element, code associated with the logic-related element, code associated with the connector, and code associated with communication; and a deployment component for deploying an application based on the code. The method and development tool enable the creation of applications over a spreadsheet, the applications comprising both user interface and business logic. The application can be executed as a web service, and also in a cloud computing environment. | 2011-09-15 |
20110225485 | UNIFIED ELECTRONIC FORMS MANAGEMENT SYSTEM - A unified electronic forms management system that comprises a network-based software implemented process that is designed to provide its users with access to a unified system and process of managing form data and the creation, storage, update and distribution of electronic forms. The unified electronic forms management system may include a centralized and unified electronic forms management system remote server, which communicates over a network with a remote form designer used by a user to create a form, a remote form viewer used by a form user, a database that stores the form data associated with the remote server, and external database(s) that optionally receive data transmitted by the unified system. Form recipient(s) have the option of receiving over the network the form for approval and/or to provide additional information. | 2011-09-15 |
20110225486 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR NAVIGATING CONTENT ON A SINGLE PAGE - In accordance with embodiments, there are provided mechanisms and methods for navigating content on a single page. These mechanisms and methods for navigating content on a single page can enable optimized navigation of displayed content, more efficient content processing and resource use, increased content display speed, etc. | 2011-09-15 |
20110225487 | Independent Visual Element Configuration - A system and a method are disclosed for a configuration in which any user interface feature that would otherwise have been hidden while the user is interacting with the rest of the web page are made available at the top of the web page. If the user scrolls up to the top of the page the bar will disappear again to make the entire browser window available for page content and not conflict with the top user interface elements. | 2011-09-15 |
20110225488 | X/HTML SUPPORT FOR SILVERLIGHT APPLICATIONS - A method for creating a web application adapted to run in a Silverlight® run time environment from an X/HTML source file utilizing an X/HMTL specification and comprising the following steps: | 2011-09-15 |
20110225489 | DOMAIN TRANSFORMATION LANGUAGES - A method and system for transforming documents from different domains into a common representation for viewing and editing is provided. The system prepares the domain-specific document for visual representation by performing a series of transformations in a pipeline that convert the document from its domain-specific input state to a series of intermediate languages. The intermediate languages share the same syntax regardless of the domain of the document being transformed. | 2011-09-15 |
20110225490 | DOCUMENT ORGANIZING BASED ON PAGE NUMBERS - A digital processing device is configured to perform a method comprising: identifying logical page numbers of a document, the identifying constrained to identify either zero or one logical page number per page of the document, the logical page numbers and an ordering of the pages of the document defining an ordered sequence of logical page numbers; identifying a sequence of logical page number references in the document, each logical page number reference matching one of the logical page numbers of the document; and selecting a sub-sequence of the sequence of logical page number references for which corresponding logical page numbers are in a nondecreasing order in the ordered sequence of logical page numbers. The sub-sequence is used in organizing the document, for example by generating hyperlinks linking the logical page number references of the selected sub-sequence with corresponding pages indicated by the logical page numbers. | 2011-09-15 |
20110225491 | HAND-HELD ELECTRONIC DEVICE - A hand-held electronic device with a keyboard, thumbwheel, display and associated software is optimized for use of the device with the thumbs. The associated software has a plurality of features to optimize efficient use of the limited keyboard space and encourage the use of the device by thumb-based data entry through the thumbwheel and/or through a combination of minimal number of keystrokes. Software features include international character scrolling, and auto-capitalization. The keys on the device keyboard are optimally shaped and configured for thumb-based input. In addition, the thumbwheel is inclined between the front and a side edge of the device so as to be reachable by either the thumb or index finger of the user's hand at the side edge of the device. | 2011-09-15 |
20110225492 | Device, Method, and Graphical User Interface for Marquee Scrolling within a Display Area - A method, performed at a portable electronic device with a display and a touch-sensitive surface, includes displaying a list of items on the display. The method also includes displaying an item in the list with just a portion of the item visible on the display. The method further includes detecting a first gesture on the touch-sensitive surface at a location that corresponds to the item. The method further includes, in response to detecting the first gesture, marquee scrolling the item in a predefined marquee scrolling direction. | 2011-09-15 |
20110225493 | Document Management User Interface With User Customized Application Functionalities - Apparatuses, systems and methods are provided for accessing a document management application through a network, wherein for each application user, application functionalities in the application user interface are customized for that application user. | 2011-09-15 |
20110225494 | WHITEBOARD PRESENTATION OF INTERACTIVE AND EXPANDABLE MODULAR CONTENT - In one aspect, described herein is a method for creating an interactive expandable multimedia tutorial. The method includes receiving a plurality of tutorial elements, generating a first user interface including a plurality of regions that correspond to each of the plurality of tutorial elements, presenting the first user interface on a display device, receiving a request to access the one or more additional tutorial elements, accessing the one or more additional tutorial elements, generating a second user interface comprising one or more regions that correspond to each of the accessed one or more additional tutorial elements, and presenting the second user interface on the display device, wherein the second user interface is displayed simultaneously with the first user interface, and wherein at least a portion of the first user interface remains visible to the user to enable navigation between the second user interface and the first user interface. | 2011-09-15 |
20110225495 | Service Cloud Console - Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for processing a call via a user interface in a web browser. An incoming call directed to a client machine may be identified. The call may comprise a communication from an individual associated with an account. Object record information associated with the account may be stored in a communicably accessible database. A user interface component may be opened, responsive to the incoming call, at the client machine for display in the user interface in the web browser. The opened user interface component may display object record information associated with the account. Edited object record information comprising a modification to the object record information associated with the opened user interface component may be received at the client machine. The edited object record information may be displayed in the opened user interface component. | 2011-09-15 |
20110225496 | SUGGESTED PLAYLIST - Disclosed herein are method and systems for creating suggested playlists for users. In some embodiments, such playlists may be automatically created for users where the suggested playlists are created for a user based on one or more selection criteria or preferences of the user, including local and/or remote pieces of media. | 2011-09-15 |
20110225497 | DISPLAY CONTROL PROCESSING APPARTUS, DISPLAY CONTROL PROCESSING METHOD AND DISPLAY CONTROL PROCESSING PROGRAM - Disclosed herein is a display control processing apparatus including: display control means configured to display pieces of metadata for a predetermined group of music each serving as a favorite with a user on a metadata display portion for displaying the pieces of metadata in a format allowing the user to specify a desired piece of the metadata; specification means configured to specify a piece of the metadata displayed on the metadata display portion by the display control means; determination means configured to select a music with its metadata corresponding to metadata specified by the specification means from the pieces of metadata displayed by the display control means on the metadata display portion as metadata for the predetermined group of music and to determine the selected music as music to be recommended to the user; and reproduction means configured to reproduce music determined by the determination means. | 2011-09-15 |
20110225498 | PERSONALIZED AVATARS IN A VIRTUAL SOCIAL VENUE - A method is provided for creating a personalized social setting for sharing streaming media content. A virtual social venue comprising a virtual three-dimensional setting for sharing streaming media content is created. Users from one or more social networks are invited to participate in the virtual social venue. Avatars are provided to each user who enters the virtual social venue. The users' profile images are extracted from the social network(s) from which they were invited, and mapped onto the avatars of the corresponding users. Alternatively, users designate video feeds that are mapped onto their corresponding avatars. Streaming media content is then presented to the users in the three dimensional setting of the virtual social venue. In this setting, users are able to see avatar representations of other users, along with their mapped profile images or video feeds, while viewing and/or listening to the streaming media content. | 2011-09-15 |
20110225499 | NETWORK DEVICE - A network device includes a Universal Serial Bus (USB) port adapted for connecting to a USB connector of a wireless network module, and a Linux-based embedded system that includes a user interface unit, a data converting unit, and a driver unit. The user interface is for providing a user interface to a user terminal and for user input of configuration data for the wireless network module through the user terminal. The user interface unit receives the inputted configuration data from the user terminal. The data converting unit is coupled to the user interface unit for receiving the configuration data therefrom and for converting the configuration data into at least one command. The driver unit is coupled between the data converting unit and the USB port for transferring the at least one command from the data converting unit to the wireless network module. | 2011-09-15 |
20110225500 | Service Cloud Console - Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for processing information entered via a user interface provided in a web browser on a display device of a client machine in communication with a server. The user interface may be capable of displaying a plurality of components, including a first component that may display object record information associated with an object record stored in a database. Edited object record information may be received at the client machine and displayed in the first user interface component. The first user interface component may be designated as unsaved. An interrupt event associated with possible loss of the edited information may be detected. A warning message indicating the detection of the interrupt event may be displayed in the web browser, and one or more selections for responding to the warning message may be provided. | 2011-09-15 |
20110225501 | Document Management Systems, Apparatuses And Methods Configured To Provide Document Notification - Apparatuses, systems and methods are provided for providing document management services to a terminal, wherein a document notification is provided to one or more notification destinations. | 2011-09-15 |
20110225502 | Accessing web services and presenting web content according to user specifications - A way for enabling a user to discover, present, save and share Web content is disclosed. A user is provided a means of executing searches across Web services, as well as for saving those searches for later use. An embodiment of the method and system employs the use of a Transmuter to display Web media in a format deemed optimal by the user. Users are also provided a means of saving references to Web content on their device, as well as posting those references along with certain annotations using Web services. | 2011-09-15 |
20110225503 | Method and System for Remote Control of a Local System - A computer implemented system comprises a remote industrial factory automation control system tool stored in a non-transitory computer readable media that, when executed by a processor, configures the processor to modify a web browser to include a control object; request industrial factory automation control system data from a local control system; receive the industrial factory automation control system data; display, by the web browser, the industrial factory automation control system data; and send control instructions to the local control system. | 2011-09-15 |
20110225504 | Document Management Systems, Apparatuses And Methods Configured To Provide User Interface Customized For Specific User - Apparatuses, systems and methods are provided for accessing a document management application through a network, wherein a user interface that is customized for the specific user is provided. | 2011-09-15 |
20110225505 | User Specific Focus Parameters - Apparatuses, systems and methods are provided for accessing a document management application through a network, wherein one or more key terms and focus terms (selected from user-specific focus parameters) for selected search parameters are transmitted to the document management application for limiting a search to be performed by a search function of the document management application. | 2011-09-15 |
20110225506 | Service Cloud Console - Various embodiments described or referenced herein are directed to different devices, methods, systems, and computer program products for displaying object record information via a user interface provided in a web browser. A request to display a user interface component may be received. The user interface component may include first stored object record information associated with a first object record in a database stored on a server. Whether the requested user interface component including the first stored object record information is open in the user interface may be determined. When it is determined that the requested user interface component is not open in the user interface, the first stored object record information may be retrieved from the server. The requested user interface component at the client machine may be generated without reloading the user interface. | 2011-09-15 |
20110225507 | METHOD AND DEVICES FOR GENERATING TWO-DIMENSIONAL VISUAL OBJECTS - For generating one or more two-dimensional visual objects, an initial visual representation is determined and shown in a display area of a communication terminal. A data representation of the visual objects is transmitted from the communication terminal to a remote processing center. The communication terminal receives from the processing center an enhanced visual representation of the visual objects, and replaces in the display area the initial representation with the enhanced representation. Retrieving an enhanced representation from the processing center, makes it possible to display visual objects in the communication terminal in representations which are not supported by the communication terminal, e.g. graphical objects can be rendered according to enhanced algorithms and/or characters can be rendered in enhanced fonts not supported in the communication terminal. | 2011-09-15 |
20110225508 | Apparatus, System and Method for a Media Enhancement Widget - The present invention is and includes a device, system and method for providing an image enhancement widget. The device, system and method include a javascript component that, upon execution, obtains at least one subject of primary content on a networked page, and at least one permission for enhancement of the primary content, ones of a plurality of content produced remotely from the javascript component and according to the javascript component, and an enhancement widget. The enhancement widget may be a flash widget. | 2011-09-15 |
20110225509 | Display, view, and operate multi-layers item list in web-browser with supporting of concurrent multi-users - Support end-user to view and operate computer system resources through logically organized graphically displayed multi-layered item lists (MLIL) has been fully realized on native window UI in user click based computer user work environment, which run on top of modern computer operating system such as Microsoft Windows system. To support such functionality on web browser based user interface (“UI”), the console support modules of a control management system (a web server) must provide mirrored image of the MLIL in memory for being graphically displayed in the user's web UI, where the MLIL is a logical organized structure for representing actual one or more computer resources information. The console support modules are required to provide immediate response to each user's actions of either viewing or operating the resources represented by the MLIL. The accomplishment of supporting end-user to view and operate computer system resources through logically organized graphically represented multi-layered item lists on web based UI is a giant step towards realization of the next generation of web based computer user work environment. | 2011-09-15 |
20110225510 | System and method for social networking - A system of the present invention provides social networking between users subscribed to the system. A controller of the system includes a database of questions to be answered by users to create personality profile of the user. A program of the controller is adaptable to store predetermined identifiers with each of the identifiers representing a type of the personality of the user. A global positioning system is operably communicated with the controller to determine location of the user and present current location of the user through a computing device of the user. | 2011-09-15 |
20110225511 | RESOURCE BASED VIRTUAL COMMUNITIES - This invention disclosed a system and method for resource based virtual communities. Any resources that can be shared or used by multiple people, including Internet resources, software or other resources can be the basis for the community, whose members are users of the resource. Web resources include web sites, web pages news groups or discussion forums. Other types of resources include software products, bulletin boards, games or other products. The community composes of the current resource users such as web page readers, bulletin board posters, game players, software users. Whenever a person accesses or uses the resource, the user is automatically joined as part of the community. At the same time they are using the resource, they can access all services provided by the community, such as talking with other members, collaborating with others, publishing comments, or even adding new community services. A universal virtual community server is disclosed to support all virtual communities based on all resources in the world and all users in the Internet. There are 6 methods disclosed for individual users to connect to this resource based communities. | 2011-09-15 |
20110225512 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - System for providing interactive two-way video in desktop virtualization environment, desktop virtualization environment comprising a desktop virtualization server computer and a desktop virtualization client endpoint device with associated video camera. The system includes server software for running on a desktop virtualization server and providing at least interactive user interface functions to the desktop virtualization client endpoint device and endpoint software for running on the desktop virtualization endpoint device comprising a network port, the at least one instance of endpoint software receiving an incoming real-time video stream from the network port and providing at least real-time and display functions on the desktop virtualization client endpoint device. The desktop virtualization client endpoint is configured to: accept real-time video input from a video camera associated with the desktop virtualization client endpoint and provide outgoing real-time compressed video stream to the network port responsive to the real-time video input from the video camera. | 2011-09-15 |
20110225513 | SCALABLE HIGH-PERFORMANCE INTERACTIVE REAL-TIME MEDIA ARCHITECTURES FOR VIRTUAL DESKTOP ENVIRONMENTS - A system for providing interactive two-way real-time media in desktop virtualization environment, the desktop virtualization environment comprising at least one desktop virtualization server computer and at least one desktop virtualization client endpoint device with an associated video camera. The system incorporates: at least one instance of server software executing on the desktop virtualization server for providing at least interactive user interface functions to an associated desktop virtualization client endpoint device, the instance of software configured to access a network; at least one instance of endpoint software executing on a desktop virtualization client endpoint device, the instance of software further comprising access to the network; and a terminal-server/terminal-client network connection between the instance of server software and instance of endpoint software, the network connection implemented using the access to the network comprised by the instance of server software and the access to network comprised by the instance of endpoint software. | 2011-09-15 |