44th week of 2014 patent applcation highlights part 75 |
Patent application number | Title | Published |
20140325233 | DIGITAL WATERMARKING FOR SECURE TRANSMISSION BETWEEN A SOURCE COMPONENT AND A NODE DEVICE - A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The system includes a particular node, a source component, a node identifier request, a query, a watermark, a permutation key, an encrypted data file, and a node decryption key. The node identifier request is communicated from the source component to the particular node. The watermark is then embedded into the data file by the source component. The permutation key is configured to permute the watermark and the permutation key is changed so the location of the watermark changes. The encrypted data is decrypted at the particular node with the node decryption key that corresponds to the particular node. The particular node recovers the watermark from the data file with the permutation key. | 2014-10-30 |
20140325234 | System and Method for Controlling User Access to Encrypted Data - Disclosed are systems, methods and computer program products for providing user access to encrypted data. In one example, a system is configured to receive a security policy for the user device, wherein the security policy includes data access conditions and data encryption conditions for one or more users of the user device; identify one or more user accounts in the OS of the user device as specified in the data access conditions; create a pre-boot authentication account (PBA) for the identified user accounts based on the data access conditions, for storing pre-boot authentication credentials for authenticating a user before booting of the OS on the user device; and encrypt at least a portion of data stored on the user device based on the data encryption conditions, wherein access to the encrypted portion of data is granted to the user upon entry of the correct pre-boot authentication credentials. | 2014-10-30 |
20140325235 | DECRYPT AND ENCRYPT DATA OF STORAGE DEVICE - Data read from a volume is decrypted using a first key. The decrypted data is encrypted using a second key. The encrypted data is written back to the volume. An access request to a location of the volume is received from a host. Data is encrypted to or decrypted from the location using the first or second key, in response to the access request. The first key is used for the access request if the location has not been decrypted using the first key and encrypted using the second key. The second key is used for the access request if the location has been decrypted using the first key and encrypted using the second key. | 2014-10-30 |
20140325236 | VEHICULAR IMAGE PROCESSING APPARATUS AND DATA PROCESSING METHOD USING THE SAME - Provided is a vehicular image processing apparatus for applying a different encryption scheme and access authority for each of a channel and a type of data with respect to an image recorded in a black box mounted in a vehicle, and a data processing method using the same. | 2014-10-30 |
20140325237 | PHYSICALLY UNCLONABLE FUNCTION (PUF) WITH IMPROVED ERROR CORRECTION - A cryptographic system for reproducibly establishing a reliable data string, such as a cryptographic key, from a noisy physically unclonable function (PUF, | 2014-10-30 |
20140325238 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME - A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction commencing processing before a digital signature of the cache line that contained the instruction is verified against a reference signature of the cache line, the verification being done at the point of decoding, dispatching, or committing execution of the instruction, the reference signature being stored in an encrypted form in the processor's memory, and the key for decrypting the said reference signature being stored in a secure storage location. The instruction processing proceeds when the two signatures exactly match and, where further instruction processing is suspended or processing modified on a mismatch of the two said signatures. | 2014-10-30 |
20140325239 | SYSTEM AND METHOD FOR VALIDATING PROGRAM EXECUTION AT RUN-TIME USING CONTROL FLOW SIGNATURES - A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow control instruction which terminates the sequence; a hash generator, configured to generate a hash associated with execution of the sequence of instructions; a memory configured to securely receive a reference signature corresponding to a hash of a verified corresponding sequence of instructions; verification logic configured to determine a correspondence between the hash and the reference signature; and authorization logic configured to selectively produce a signal, in dependence on a degree of correspondence of the hash with the reference signature. | 2014-10-30 |
20140325240 | PROGRAMMING ON-CHIP NON-VOLATILE MEMORY IN A SECURE PROCESSOR USING A SEQUENCE NUMBER - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 2014-10-30 |
20140325241 | DEVICE SPECIFIC INFORMATION GENERATION DEVICE AND DEVICE SPECIFIC GENERATION METHOD - A device generating specific information of a semiconductor device includes a bit generation unit including a glitch generation circuit and a bit conversion circuit for converting a shape of the glitch into an information bit. The glitch generation circuit includes a plurality of combinational circuits mounted thereon to output a plurality of different glitches. The bit generation unit further includes a selector for selecting one glitch from among the plurality of different glitches in response to a selection signal to output the selected one glitch to the bit conversion circuit. The device further includes a performance evaluation/control unit for outputting the selection signal to obtain a piece of bit information corresponding to each of the plurality of different glitches and specifying a glitch satisfying a desired performance based on the respective pieces of bit information. | 2014-10-30 |
20140325242 | ENCRYPT DATA OF STORAGE DEVICE - A request from a host is received requesting data from a storage device. Data of the storage device is written into a buffer of the host. The data at the buffer is to be encrypted and written back to the storage device. The requested data of the request is written to the buffer after the encrypted data is written back to the storage device. | 2014-10-30 |
20140325243 | APPARATUS, METHOD, AND SYSTEM FOR PREDICITVE POWER DELIVERY NOISE REDUCTION - An apparatus and method is described herein for reducing noise in a power distribution network for an interface. The power distribution network is characterized. And based on that characterization, worst case patterns for the interface are predicted and avoided. As one example, characterization includes providing a stimulus, such as a step function stimulus, and determining a mathematical function response, such as a step function response. Then, based on the step function response, a resonant frequency for the power distribution network is determined; from which patterns that cause the resonant frequency are identified/predicted. And when identified patterns are detected, they are scrambled or manipulated to avoid causing a worst-case noise scenario in an interface's power distribution network. | 2014-10-30 |
20140325244 | ELECTRONIC DEVICE AND POWER CONTROL MODULE - An electronic device includes a power supply, a power consuming module, and a power control module. The power control module includes a capacitor, a detecting unit, and a control unit. A first end of the capacitor is connected to the power supply. Another end of the capacitor is grounded. The control unit includes a switching element. When the electronic device is powered on, the detecting unit controls the switching element to turn off, and the power supply supplies power to the power consuming module to charge the capacitor. When the electronic device is powered off, the capacitor discharges to supply power to the power consuming module. The detecting unit detects whether data storage of the electronic device is completed. When the data storage is completed, the detecting unit controls the switching element to turn on, causing the capacitor to discharge to ground. A power control module is also provided. | 2014-10-30 |
20140325245 | USB Power Distribution Management System - A system providing an optimized power delivery and management of USB power in a closed network, such as found on commercial aircraft. The system enables utilization of a limited number of AC-DC step down and isolation converters to support a multitude of USB power outlets. It provides a means of accounting for, and overcoming wire distribution losses, while also providing for voltages and power levels compatible with the USB Power Delivery Specification. | 2014-10-30 |
20140325246 | HIGH VOLTAGE DEDICATED CHARGING PORT - Circuitry in an adapter, such as a power supply, can provide power at a desired voltage level to a portable device. The circuitry may assert one of several electrical configurations on the cabling that electrically connects the portable device to the external device to indicate to the external device a desired voltage level. | 2014-10-30 |
20140325247 | CONTROLLING POWER AND PERFORMANCE IN A SYSTEM AGENT OF A PROCESSOR - In an embodiment, a processor includes a core to execute instructions, an agent to perform an operation independently of the core, a fabric to couple the core and agent and including a plurality of domains and a logic to receive isochronous parameter information from the agent and environmental information of a platform and to generate first and second values, and a power controller to control a frequency of the domains based at least in part on the first and second values. Other embodiments are described and claimed. | 2014-10-30 |
20140325248 | APPARATUS AND METHOD FOR ADJUSTING BANDWIDTH - A method for adjusting bandwidth, a bandwidth scaler and an apparatus are provided. The method for adjusting bandwidth involves determining a dynamic context of a processor, and based on the determined dynamic context, scaling bandwidth between the processor and a memory. | 2014-10-30 |
20140325249 | SEMICONDUCTOR DEVICE - To reduce power consumption of a processing device including a processor and a main memory in the processor. The main memory includes not only a volatile memory such as a DRAM but also a nonvolatile memory. The processor monitors access requirements to the main memory. The processor determines on the basis of the monitoring results whether the volatile memory or the nonvolatile memory operates mainly. In the case where the main memory changes from the volatile memory to the nonvolatile memory, part or all of data stored in the volatile memory is backed up to the nonvolatile memory. While the nonvolatile memory operates mainly, supply of power supply voltage to the volatile memory is stopped or power supply voltage to be supplied is lowered. | 2014-10-30 |
20140325250 | DISTRIBUTED SYNCHRONIZATION AND TIMING SYSTEM - A method and apparatus for controlling the phase and frequency of the local clock of a USB device, the apparatus comprising circuitry for observing USB traffic and decoding from the USB traffic a periodic data structure containing information about the frequency and phase of a distributed clock frequency, and phase and circuitry for receiving the periodic data structure and generating from at least the periodic data structure a local clock signal locked in both frequency and phase to the periodic data structure. The circuitry for receiving the periodic data structure and generating the local clock signal can generate the local clock signal with a frequency that is a non-integral multiple of a frequency of the periodic data structure. | 2014-10-30 |
20140325251 | SYNTHETIC TIME SERIES DATA GENERATION - According to an example, synthetic time series data generation may include receiving time series data for a plurality of users, and applying dimensionality reduction to transform the time series data from a high dimensional space n of the time series data to a low dimensional space m, where m2014-10-30 | |
20140325252 | Generating Interface Adjustment Signals in a Device-To-Device Interconnection System - Described are a system and method to control interface timing and/or voltage operations of signals transmitted between devices. A processor may be coupled through one or more bus interfaces of a bus to one or more corresponding interface timing and/or voltage comparison circuits and corresponding interface timing and/or voltage adjustment circuits. | 2014-10-30 |
20140325253 | TIMING CONTROL CIRCUIT - A timing control circuit includes: a first variable delay circuit configured to receive first data having a first communication speed, and to give a variable delay to the first data; a first multiplexer configured to receive output of the first variable delay circuit, and to convert into second data having a second communication speed different from the first communication speed in accordance with first control signal; a second variable delay circuit configured to receive third data having the first communication speed, and to give a delay corresponding to the delay of the first variable delay circuit to the third data; a decision circuit configured to compare timings of output of the second variable delay circuit and the first control signal; and a control circuit configured to control the delays of the first variable delay circuit and the second variable delay circuit in accordance with output of the decision circuit. | 2014-10-30 |
20140325254 | AUTOMATIC GENERATION OF ACTIONABLE RECOMMENDATIONS FROM PROBLEM REPORTS - Methods and arrangements for handling information technology tickets. A plurality of information technology tickets are received. The tickets are clustered into categories, and a problem area is identified with respect to at least one of the categories. At least one recommendation is automatically generated for addressing the problem area. Other variants and embodiments are broadly contemplated herein. | 2014-10-30 |
20140325255 | FIELD CONTROL DEVICES HAVING PRE-DEFINED ERROR-STATES AND RELATED METHODS - Control apparatus having pre-defined error-states and related methods are described. An example non-transitory computer-readable medium disclosed herein comprises instructions that, when executed, cause a machine to analyze, via a controller coupled to a field device, a communication from a control system remotely located from the controller, the control system to operate the field control device during a non-error condition; detect an error condition while the field control device is communicatively coupled to and receives the communication from the control system; and override the communication between the control system and the controller to operate the field control device based on a pre-defined error-state instruction stored in the controller when the error condition is detected to cause the field control device to move to a first position for a first amount of time and subsequently move the field control device to a second position for a second amount of time, the first position being different than the second position. | 2014-10-30 |
20140325256 | SYSTEMS AND METHODS FOR MANAGING DISASTER RECOVERY IN A STORAGE SYSTEM - Systems and methods for providing for efficient switchover for a client in a storage network between the use of one or more a primary storage resources to one or more disaster recovery (DR) resources are provided herein. Embodiments may implement synchronization between such resources on a data plane and a control plane to allow for a transition between resources to be implemented in a manner that is minimally disruptive to a client. Moreover, embodiments may provide for processing resources which allow for switching a client between a primary storage resource to a secondary storage resource with minimal administrative interaction. | 2014-10-30 |
20140325257 | WSAN SIMULTANEOUS FAILURES RECOVERY METHOD - The WSAN simultaneous failures recovery method ranks each node based on the number of hops to a pre-designated root node in the network. The method identifies some nodes as cluster heads based on the number of their children in the recovery tree. The method assigns a recovery weight and a nearby cluster node to each node. Nearby cluster nodes serve as gateways to other nodes that belong to that cluster. The recovery weight is used to decide which node is better to move in order to achieve lower recovery cost. The recovery method uses the same on-going set of actors to restore connectivity. Simulation results have demonstrated that the recovery method can achieve low recovery cost per failed node in small and large networks. The results have also shown that clustering leads to lower recovery cost if the sub-network needs to re-establish links with the rest of the network. | 2014-10-30 |
20140325258 | COMMUNICATION FAILOVER IN A DISTRIBUTED NETWORK - An initial request is received to establish a communication session. The initial request contains a communication address of a first communication device. A communication server detects that the communication session cannot be established across a primary network. In response, the initial request is repurposed by changing the first communication address to a second communication address. The changed request is sent to a communication system, which adds a field to the changed request that indicates that the changed request is to be sent via a secondary network. The changed request is sent with the field to the communication server. The changed request with the second communication address is sent to a gateway to establish the communication session across a secondary network. A portion of the communication session is established using the second communication address. The first communication address is sent in the portion of the communication session using Dual-Tone-Multi-Frequency (DTMF). | 2014-10-30 |
20140325259 | IDENTIFYING A STORAGE ERROR OF A DATA SLICE - A method begins by a processing module obtaining common storage name information regarding data that is stored in storage units of a distributed storage network (DSN) as a set of data slices. Each data slice of the set of data slices has a unique storage name, where each of the unique storage names for the set of data slices has common naming information regarding the data. The method continues where the processing module interprets the common storage name information to determine whether a difference exists between the common naming information of a data slice of the set of data slices and the common naming information of other data slices of the set of data slices. When the difference exists, the method continues where the processing module indicates a potential storage error of the data slice and implements a storage error process regarding the potential storage error of the data slice. | 2014-10-30 |
20140325260 | SLICE MIGRATION IN A DISPERSED STORAGE NETWORK - A dispersed storage unit includes a physical memory and a storage unit control module. The physical memory is transferred to a receiving dispersed storage unit from a transferring dispersed storage unit, which used the transferred physical memory to store encoded data slices prior to the at least one physical memory being transferred. The encoded data slices stored on the transferred physical memory have addresses falling within a first address range. The storage control unit is configured to detect installation of the transferred physical memory, and to notify a dispersed storage network that data slices within the first address range are to be received by and retrieved from the receiving dispersed storage unit. | 2014-10-30 |
20140325261 | METHOD AND SYSTEM OF USING A PARTITION TO OFFLOAD PIN CACHE FROM A RAID CONTROLLER DRAM - Disclosed is a system and method for providing data integrity for pinned cache even if a RAID controller card fails while it has pinned cache or a memory module goes bad. A controller is enabled to use complete cache lines even if pinned cache is present, thereby enabling other virtual disks to run in write-back mode when pinned cache is present. | 2014-10-30 |
20140325262 | CONTROLLING DATA STORAGE IN AN ARRAY OF STORAGE DEVICES - Methods, apparatus and computer programs have been provided for mitigating a problem of non-optimal recovery from storage device failures. A method involves determining a required write performance for rebuilding data of a failed device, based at least partly on the potential read performance of storage devices in a data rebuild; and allocating a virtual storage area within available storage, which allocation of virtual storage is based at least partly on the required write performance. Data is rebuilt by writing to the allocated virtual storage area, and data recovery is completed by migrating this rebuilt data to at least one data storage device such as a spare physical storage device within the array. | 2014-10-30 |
20140325263 | STORAGE SYSTEM, CONTROL APPARATUS, COMPUTER PRODUCT, AND CONTROL METHOD - A storage system includes a first control apparatus; at least one second control apparatus managed by the first control apparatus; and a storage unit accessed by the second control apparatus. The second control apparatus determines based on detection of an error of an input/output process for storage in the storage unit whether the storage is in a blocking state, executes a resumption process of the input/output process when the storage is in the blocking state, judges whether an error occurrence frequency of the input/output process is at least a predetermined value, when the storage is not in the blocking state, and transmits to the first control apparatus, a blocking process request for the storage, when the error occurrence frequency is at least the predetermined value. The first control apparatus executes a blocking process and an error process of the storage, based on reception of the blocking process request. | 2014-10-30 |
20140325264 | STORING AN ENCODED DATA SLICE AS A SET OF SUB-SLICES - A method begins by storage units of a dispersed storage network (DSN) receiving a set of encoded data slices for storage. The method continues with a first storage unit determining whether to store a first encoded data slice as a first set of encoded data sub-slices. The method continues with the first storage unit encoding the first encoded data slice in accordance with a first dispersed storage error encoding function to produce the first set of encoded data sub-slices. The method continues by a second storage unit of the storage units determining whether to store a second encoded data slice as a second set of encoded data sub-slices. The method continues with the second storage unit encoding the second encoded data slice in accordance with a second dispersed storage error encoding function to produce the second set of encoded data sub-slices. | 2014-10-30 |
20140325265 | BACKGROUND INITIALIZATION FOR PROTECTION INFORMATION ENABLED STORAGE VOLUMES - Technology is disclosed for performing background initialization on protection information enabled storage volumes or drives. In some embodiments, a storage controller generates multiple I/O requests for stripe segments of each drive (e.g., disk) of multiple drives of a RAID-based system (e.g., RAID-based disk array). The I/O requests are then sorted for each of the drives according to a pre-determined arrangement and initiated in parallel to the disks while enforcing the pre-determined arrangement. Sorting and issuing the I/O requests in the manner described herein can, for example, reduce drive head movement resulting in faster storage subsystem initialization. | 2014-10-30 |
20140325266 | LIKELIHOOD BASED REBUILDING OF MISSING ENCODED DATA SLICES - A method begins by a processing module of a dispersed storage network (DSN) detecting a likelihood of having a missing encoded data slice based on local physical to DSN address mapping information. When the likelihood of having the missing encoded data slice exists, the method continues with the processing module sending a query regarding the missing encoded data slice to another storage unit of the DSN and receiving a response to the query from the other storage unit. When the response includes identity of a related encoded data slice of a set of encoded data slices, the method continues with the processing module commencing execution of a rebuilding function to generate a new encoded data slice to replace the missing encoded data slice. | 2014-10-30 |
20140325267 | SYSTEM AND METHOD FOR HIGH PERFORMANCE ENTERPRISE DATA PROTECTION - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 2014-10-30 |
20140325268 | METHOD AND SYSTEM OF INTELLIGENT ERROR CORRECTION FOR HARDWARE DATA STORAGES - Methods and systems for correction of errors on a hardware data storage are provided. An example method for correction of errors on a hardware data storage can include receiving input data. The input data may include at least error statistics data and reliability data. The method can further include creating a set of matrices with predefined properties. The set of matrices can be created based on the input data. The set of matrices may include at least a generating matrix, a parity check matrix, and a decoding matrix. The method can continue with detecting the errors using the set of matrices. Upon detection of the errors, the method may further include correcting the errors using the set of matrices. | 2014-10-30 |
20140325269 | REMEDYING IDENTIFIED FRUSTRATION EVENTS IN A COMPUTER SYSTEM - A data processing system comprising: a constantly updating database of a plurality of processes having a plurality of operation times, relating to a plurality of applications, relating to at least one user activity, and using a plurality of computing resources; a monitor arranged to identify a plurality of clashes between the processes, a plurality of frustration events and to correlate between the frustration events and the clashes between the processes; a cause identifier arranged to identify, for each frustration event, a cause for the correlated clash of processes; a remedy generator arranged to generate, for each cause, a remedy arranged to solve the frustration event; a communication module arranged to provide the remedies to users in relation to respective user activities in view of their frustration events; and an analyzer arranged to monitor an efficacy of the remedies in respect to their corresponding frustration events. | 2014-10-30 |
20140325270 | METHOD AND A DEVICE FOR MANAGING AN APPLICATION REFERENCED BY A DEVICE - This method of managing at least one application referenced by a device (TRM) comprises a step of deleting execution data of said application, said execution data including at least some of the execution context of said application and said execution data that have been stored on remote equipment (SRV), and a step of downloading execution data of said application from said remote equipment. | 2014-10-30 |
20140325271 | TERMINAL DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a terminal device includes a memory unit, a managing unit, a manipulation recording unit, and at least one of first and second detecting units. The managing unit generates and deletes a processing unit which executes a transaction for individually manipulating data with respect to data elements and data containers stored in the memory unit. The manipulation recording unit records manipulation information while a transaction is being executed by the processing unit. The first and second detecting units detect the presence or absence of competition. The first detecting unit detects competition during an execution state of a transaction as set by the processing unit. The second detecting unit detects competition during a commit preparation state of a transaction as set by the processing unit. When at least either the first detecting unit or the second detecting unit detects competition, the processing unit aborts the transaction. | 2014-10-30 |
20140325272 | DATA TRANSFER AND RECOVERY PROCESS - A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and a remote storage server. In the event of a failure of the primary server, the failure can be diagnosed to develop a recovery strategy. Based on the diagnosis, at least one delta image may be applied to a copy of the primary image to generate an updated primary image at either the network attached storage or the remote storage server. The updated primary image may be converted to a virtual server in a physical to virtual conversion at either the network attached storage device or remote storage server and users may be redirected to the virtual server. The updated primary image may also be restored to the primary server in a virtual to physical conversion. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure. | 2014-10-30 |
20140325273 | Method and Apparatus for Creating a Self Booting Operating System Image Backup on an External USB Hard Disk Drive That is Capable of Performing a Complete Restore to an Internal Sytem Disk - Backup applications that use externally connected hard disk drives for storing full image backups of a windows system disk or compressed image or file by file backups of a windows system disk. A system incrementally updates the images, including the system registry, and puts information on the external drive that makes it bootable. | 2014-10-30 |
20140325274 | GRAPHICS PROCESSING WATCHDOG ACTIVE RESET - An advantageous watchdog function deduces faulty operation of a graphics processing unit from historical-indicating parameters while also accommodating more active testing performed by an application. When a GPU fault is detected, the example non-limiting technology rapidly resets the GPU during an interframe time so the GPU is ready to process new frame instructions or display lists and avoids missing or skipping further frames. | 2014-10-30 |
20140325275 | USING CUSTOMER COMPUTING SYSTEM TO TEST OTHER CUSTOMER COMPUTING SYSTEMS - A factory computing system tests customer computing systems that one or more customers have ordered, prior to shipment of the customer computing systems to the one or more customers. In response to the factory computing system determining that a number of the customer computing systems being tested exceeds a threshold, the factory computing system uses a selected customer computing system of the customer computing systems to temporarily assist in testing other of the customer computing systems. | 2014-10-30 |
20140325276 | APPARATUS, METHOD AND STORAGE MEDIUM FOR FAULT CAUSE EXTRACTION UTILIZING PERFORMANCE VALUES - A fault cause extraction apparatus including a storage unit which stores a model including one or more correlation functions between pieces of performance information acquired from a plurality of elements and a correlation-destruction-propagation detecting unit which calculates a degree of influence for each of the elements based on correlation destruction information. The correlation destruction information is calculated based on whether pieces of performance information newly acquired from the elements satisfy a relationship represented by the correlation functions. | 2014-10-30 |
20140325277 | INFORMATION PROCESSING TECHNIQUE FOR MANAGING COMPUTER SYSTEM - A present method includes: identifying a component item that satisfies a predetermined condition concerning an indicator value for an influenced range within a system, from among plural component items included in the system, by using data regarding the plural component items and relationships among the plural component items; extracting component items included in a predetermined range from the identified component item, based on the data; and generating one or plural failure patterns, each of which includes one or plural sets of one component item of the extracted component items and a failure type corresponding to the one component item, by using data including, for each component item type, one or plural failure types. | 2014-10-30 |
20140325278 | METHOD AND SYSTEM FOR INTERACTIVE AND AUTOMATED TESTING BETWEEN DEPLOYED AND TEST ENVIRONMENTS - An approach for interactive automated testing and deployment/field troubleshooting includes extracting one or more field parameters associated with a deployed network resource management environment; determining and/or updating one or more test parameters associated with a test network resource management environment based on the one or more field parameters; inputting the determined and/or updated test parameters within the test network resource management environment to evaluate the one or more test parameters; and modifying a configuration of at least one of the deployed network resource management environment and the test network resource management environment based on the one or more evaluated test parameters. | 2014-10-30 |
20140325279 | TARGET FAILURE BASED ROOT CAUSE ANALYSIS OF NETWORK PROBE FAILURES - Provided is a method of performing a target failure based root cause analysis of network probe failures in a computer network. A determination is made whether all network probes have failed between a specific source network node and a destination network node. Based on said determination, a problem is identified in the computer network. | 2014-10-30 |
20140325280 | FAULT-TOLERANT SYSTEM, FAULT-TOLERANT METHOD AND PROGRAM - The present invention is a fault-tolerant system comprising: system failure logic means for editing system failure logic; and irrelevant component coverage means for identifying irrelevant components not having an effect on the system failure logic and isolating the irrelevant components based on the system failure logic provided by the system failure logic means. | 2014-10-30 |
20140325281 | TESTING APPARATUS AND TESTING METHOD - A testing apparatus for evaluating operations by software installed in a mobile terminal includes a scenario setting unit for setting a scenario including operation information for executing functions that are performed by the mobile terminal, an operation determining unit for determining whether an operation indicated by the operation information included in the scenario is influenced by a device installed in the mobile terminal, an operation target converting unit for converting the operation determined to be influenced by the device installed in the mobile terminal according to the device installed in the mobile terminal, a scenario executing unit for executing the scenario set by the scenario setting unit according to the operation converted by the operation target converting unit, and a scenario execution result determining unit for determining whether an execution result of the scenario executed by the scenario execution unit is the same as a result assumed in advance. | 2014-10-30 |
20140325282 | ANDROID AUTOMATED CROSS-APPLICATION TESTING DEVICE AND METHOD - The present disclosure provides an Android automated cross-application testing device and method. The device comprises a primary application testing unit, a trigger monitoring unit, a secondary application testing control unit, a secondary application testing unit, a secondary application test result recording unit, a library file storage unit, a primary application test checking unit, a test result processing unit, and a test result output unit. The method comprises monitoring the starting of a secondary application in the primary application testing process; testing the secondary application and collecting and processing the test result of the secondary application; and continuing the test of the primary application. If the test of the secondary application is successful, the above steps are repeated until the test of the primary application is completed. The method further comprises terminating the test of the primary application if the test of the secondary application times out or fails. | 2014-10-30 |
20140325283 | SYSTEMS AND METHODS PROVIDING MOUNT CATALOGS FOR RAPID VOLUME MOUNT - Systems and methods which provide mount catalogs to facilitate rapid volume mount are shown. A mount catalog of embodiments may be provided for each aggregate containing volumes to be mounted by a takeover node of a storage system. The mount catalog may comprise a direct storage level, such as a DBN level, based mount catalog. Such mount catalogs may be maintained in a reserved portion of the storage devices containing a corresponding aggregate and volumes, wherein the storage device reserved portion is known to a takeover node. In operation according to embodiments, a HA pair takeover node uses a mount catalog to access the blocks used to mount volumes of a HA pair partner node prior to a final determination that the partner node is in fact a failed node and prior to onlining the aggregate containing the volumes. | 2014-10-30 |
20140325284 | METHOD AND SYSTEM FOR NON-INTRUSIVE MONITORING OF LIBRARY COMPONENTS - Embodiments of the present invention provide a method for monitoring components in a library by tracking the movement of library components. By tracking the movement of library components, the degradation of library components can be monitored and the reliability of library components determined, allowing unreliable components to be bypassed or replaced, enhancing the reliability of the library and preventing data loss. | 2014-10-30 |
20140325285 | SERIAL ATTACHED SCSI EXPANDER AND METHOD FOR DEBUGGING FAULTS THEREOF - Serial Attached SCSI (SAS) expander includes an exposed SAS interface connector, a microcontroller unit (MCU), a smart port, and an SAS expander chip. The SAS interface connector is coupled to a host personal computer (PC) to receive commands sent from the host PC. When a fault occurs in the SAS expander or a connected storage device, the MCU enables the smart port in response to a first control command sent from the host PC, reads status information from the SAS expander chip through the smart port in response to a status reading command sent from the host PC, and sends read status information back to the host PC for analyzing. MCU obtains detailed fault information from the SAS expander chip through the smart port in response to a detailed fault information obtaining command sent from the host PC and sends the obtained detailed fault information back to the host PC. | 2014-10-30 |
20140325286 | TROUBLESHOOTING SYSTEM USING DEVICE SNAPSHOTS - An information handling system (IHS) troubleshooting system includes a customer IHS including a plurality of components. A customer management system in the customer IHS detects a failure in a managed system and, in response, immediately triggers a device snapshot of the customer IHS. At least one managed system in the customer IHS includes a device snapshot engine that, in response to the customer management system triggering the device snapshot of the customer IHS, immediately create the device snapshot of the customer IHS. A device snapshot storage in the customer IHS stores the device snapshot of the customer IHS. A snapshot communication engine in the customer IHS sends the device snapshot of the customer IHS over the network to a support IHS. The support IHS may load the device snapshot into a virtual IHS and manage the virtual IHS to replicate the failure detected in the managed system for troubleshooting. | 2014-10-30 |
20140325287 | SYSTEM MONITOR FOR MONITORING FUNCTIONAL MODULES OF A SYSTEM - A method includes detecting a counter event at a system monitor of a system. The method also includes, in response to detecting the counter event, checking a state of each flag of a first set of flags. Each of the first set of flags is associated with a monitored module of the system, and the state of each of the first set of flags is indicated by a value at a memory location that is enabled. The method also includes, in response to determining that at least one flag of the first set of flags has a value indicating an error associated with a particular monitored module, causing an action to be performed at the system. | 2014-10-30 |
20140325288 | Method and Device for Monitoring an Adaptive Network - An adaptive network has respective network nodes and network connections between the network nodes, the network nodes each having a transceiver which is coupled with a respective network connection. The respective transceiver is designed for providing a mean error value (MSE_i) which is representative of deviations of a received signal from predefined reference signal values. In a reference operating state of the adaptive network, a respective reference error value (MSE_REF) is determined as a function of the mean error value (MSE_i) provided by the respective transceiver. In at least one predefined operating state of the adaptive network, a respective actual error value (MSE_AV) is determined as a function of the mean error value (MSE_i) provided by the respective transceiver. As a function of the respective reference error value (MSE_REF) and the assigned actual error value (MSE_AV), it is determined whether a fault is present in the respective network connection which is coupled with the respective transceiver. | 2014-10-30 |
20140325289 | SYSTEM, METHOD AND PROGRAM FOR ESTIMATING RISK OF DISASTER IN INFRASTRUCTURE - Method, system and computer program for estimating risk of a future disaster of an infrastructure. Times of previous, respective disasters of the infrastructure are identified. Respective severities of the previous disasters are determined. Risk of a future disaster of the infrastructure is estimated by determining a relationship between the previous disasters, their respective severities and their respective times of occurrence. The risk can be estimated by generating a polynomial linking severity and time of occurrence of each of the previous disasters. The polynomial can be generated by approximating a Tchebychev polynomial. | 2014-10-30 |
20140325290 | HOTSPOT IDENTIFICATION - Hotspot identification can include receiving data indicating a plurality of reported events each associated with a respective number of configuration items (CIs) of a plurality of CIs and receiving data indicating a topological dependency of each of the plurality of CIs. Hotspot identification can include assigning a weight to each of the respective number of CIs, assigning a weight to CIs of the plurality of CIs having a topological dependency from the respective number of CIs, and identifying the hotspot having a weight assigned thereto that satisfies a hotspot weight threshold. | 2014-10-30 |
20140325291 | APPARATUS AND METHOD FOR SELECTION OF FAULT DETECTION ALGORITHMS FOR A BUILDING MANAGEMENT SYSTEM - An apparatus for detecting component faults monitored by a building management system (BMS), including an automatic fault detection (AFD) element, coupled to the BMS, that monitors samples generated by the BMS indicating operative states of the components, and that employs the data samples to determine if one or more of the components are faulty. The AFD element includes a run time modeling element and a fault detection algorithm element. The modeling element employs the samples as inputs to execute one or more fault algorithms retrieved from a system model, and generates outputs that indicate if the one or more of the components are faulty. The algorithm element is coupled to the system model, and employs normalized/standardized datapoints representing the samples to select the one or more fault algorithms for storage in the system model, where the one or more fault algorithms are selected from a standard fault algorithm data base. | 2014-10-30 |
20140325292 | VIRTUAL DATA POINT CREATION MECHANISM FOR A BUILDING MANAGEMENT FAULT DETECTION SYSTEM - An apparatus for detecting faults of components monitored by a building management system (BMS), including an automatic fault detection (AFD) element that monitors, in real time, data samples generated by the BMS indicating operative states of the components, and that employs the data samples to determine if one or more of the components are faulty. The AFD element includes a run time modeling element and a virtual datapoint creating element. The run time modeling element employs the data samples as inputs to execute one or more fault algorithms retrieved from a system configuration model, and generates outputs to the one or more fault algorithms that indicate if the one or more of the components are faulty. The virtual datapoint creating element estimates one or more synthesized datapoints that may be required by the one or more fault algorithms during execution by the run time modeling element. | 2014-10-30 |
20140325293 | ELECTRONIC DEVICE AND LOG RECORDING METHOD - An electronic device includes a plurality of buffers and a log recording portion. In the plurality of buffers, a plurality of kinds of logs are to be recorded. The log recording portion records each log in a buffer, among the plurality of buffers, that is assigned in accordance with a recording interval of the log. | 2014-10-30 |
20140325294 | SYSTEM AND METHOD OF ENHANCING DATA RELIABILITY - In a system and method of enhancing data reliability, a reference value associated with error count is obtained, and an error count of data stored in a buffer is obtained whenever an event is triggered. An accumulated value associated with error counts is acquired when the recorded error count is greater than an error threshold value. System slowdown is performed when the accumulated value is greater than a predetermined value. | 2014-10-30 |
20140325295 | COMMUNICATION CIRCUIT, PHYSICAL QUANTITY MEASUREMENT DEVICE, ELECTRONIC APPARATUS, MOVING OBJECT, AND COMMUNICATION METHOD - A communication circuit (an interface section) includes an input section (a input shift register) to which a data signal is input, an output section (and output shift register) adapted to output a reply signal in a case in which the data signal is input, and a command determination section adapted to perform propriety determination of a command signal included in the data signal, and the output section outputs a negative acknowledgement signal as the reply signal in a case in which it is determined in the propriety determination that the command signal is improper. | 2014-10-30 |
20140325296 | READ-DETECTION IN MULTI-LEVEL CELL MEMORY - A method and apparatus for detecting N-symbol codewords. The method including: reading q-level memory cells to obtain a read signal having N signal components; detecting the memory cell level corresponding to each component using a first correspondence criterion dependent on reference signal levels; identifying unreliable components; detecting, for each unreliable component, the next-most-closely corresponding memory cell level according to the first correspondence criterion; defining a set of ordered codeword vectors having N symbols corresponding to respective components of the read signal ordered according to a signal level, wherein the symbol values in each ordered codeword vector correspond to one combination of detected memory cell levels; defining, for each read signal, candidate initial vectors having intersected the ordered codeword vectors and plurality of initial vectors; and detecting, if the candidate initial vectors contains a vector, the codeword corresponding to that read signal that depends on the candidate initial vectors. | 2014-10-30 |
20140325297 | CODE COVERAGE CIRCUITRY - A method with a circuit that includes a memory ( | 2014-10-30 |
20140325298 | TEST COVERAGE OF INTEGRATED CIRCUITS WITH MASKING PATTERN SELECTION - A method of locating faulty logic on a semiconductor chip is disclosed. The method may include determining failure rates for the semiconductor chip, which contain one or more logic elements. The method also may include determining a masking pattern using failure rates. The masking pattern may mask less than all of the logic elements using a determination method. The method may also include applying a test vector to a selected logic element, wherein the result from a test vector is compared to a reference. | 2014-10-30 |
20140325299 | TESTING SYSTEM AND TESTING METHOD FOR MOTHERBOARD - A testing system includes a computer, a testing circuit board, and a motherboard. The testing circuit board includes a programmable logic device connected to the computer. The programmable logic device includes a predetermined signal. The programmable logic device is used to output an excitation signal to the motherboard. The motherboard is used to generate a back signal according to the excitation signal. The programmable logic device is used to analyze whether the back signal is consistent with the predetermined signal. The computer is used to display a testing result output by the programmable logic device. The disclosure further offers a testing method. | 2014-10-30 |
20140325300 | SEMICONDUCTOR DEVICE - Provided is a semiconductor device including a test mode circuit capable of changing the semiconductor device into a test mode with fewer malfunctions and without providing a test terminal. The semiconductor device includes a test circuit configured to compare data of a data input terminal and a data output terminal in synchronization with clock, and control whether or not to change the semiconductor device into a test mode in accordance with a result of the comparison. | 2014-10-30 |
20140325301 | METHOD AND DEVICE FOR DATA EXCHANGING - Disclosed are a method and device for data exchanging, and relates to communication technology. The embodiments of the present application includes: pre-allocating virtual resource to user terminals, and activating the virtual resource in case of need, so user terminals can use the pre-allocated resource to exchange data with network side. When inactive, the virtual resource can allocated to other users. For small data, irregular service, pre-allocation of virtual resource and activating it in case of need, can improve efficiency of use of resource. Meanwhile, dividing users into groups and scheduling by groups can reduce control overhead. | 2014-10-30 |
20140325302 | Reliable Multicast Broadcast in Wireless Networks - A mechanism is provided for transmitting a multicast session to a plurality of receivers over a wireless network. A forward error correction (FEC) overhead and a transmission rate are determined for transmission of a next data block of the multicast session based on received channel conditions. The next data block is multicast using the determined FEC overhead and transmission rate. Responsive to an indication of common missing packets from the next data block from more than one receiver in the plurality of receivers, the common missing packets are multicast to the plurality of receivers using the determined FEC overhead and transmission rate. Responsive to an indication of uncommon missing packets from the data block from one or more receivers, for each receiver in the one or more receivers, the uncommon missing packets identified by the receiver are unicast using the determined FEC overhead and transmission rate. | 2014-10-30 |
20140325303 | Systems and Methods for Protected Data Encoding - The present inventions are related to systems and methods for data processing, and more particularly to systems and methods for encoding data sets. | 2014-10-30 |
20140325304 | ENCODING METHOD, ENCODER, AND DECODER - A low-density parity check convolution code (LDPC-CC) is made, and a signal sequence is sent after being subjected to an error-correcting encodement using the low-density parity check convolution code. In this case, a low-density parity check code of a time-variant period (3g) is created by linear operations of first to 3g-th (letter g designates a positive integer) parity check polynomials and input data. | 2014-10-30 |
20140325305 | CACHE FOR FILE-BASED DISPERSED STORAGE - A method obtains at least part of a file from a dispersed storage network (DSN) memory, and stores it in a data object cache. When the file is changed, a determination is made about where to store the changed file portions: in the data object cache or in the DSN. The changed file portions, for example a new copy of the part of the file obtained from the DSN, are encoded utilizing an error coding dispersal storage function, and stored in either the data object cache, or in the DSN memory. | 2014-10-30 |
20140325306 | REED-SOLOMON ERASURE DECODING WITH ERROR DETECTION FOR RETRANSMISSION - By utilizing Reed-Solomon erasure decoding algorithms and techniques, the system is able to perform error detection for the case where the number of bytes received in error exceeds a correcting capability of a decoder. The error detection can be used, for example, to determine whether a codeword is decodable, and whether the retransmission of data is necessary. The retransmission can be accomplished by assembling a message that is sent to another modem requesting retransmission of one or more portions of data, such as one or more codewords. | 2014-10-30 |
20140325307 | DETECTING A UTILIZATION IMBALANCE BETWEEN DISPERSED STORAGE NETWORK STORAGE UNITS - A method begins by a processing module of a dispersed storage network (DSN) obtaining utilization information regarding a plurality of storage units of the DSN, where first and second sets of storage units support a first logical storage vault. The method continues with the processing module detecting a utilization imbalance between a first storage unit of the first set of storage units and a second storage unit of the second set of storage units based on the utilization information, where the first and second storage units are not a common storage unit. The method continues with the processing module executing a data storage function regarding the first logical storage vault based on the utilization imbalance. | 2014-10-30 |
20140325308 | Efficient Re-read Operations in Analog Memory Cell Arrays - A method for data storage includes storing data, which is encoded with an Error Correction Code (ECC), in a group of analog memory cells by writing respective first storage values to the memory cells in the group. After storing the data, respective second storage values are read from the memory cells in the group, and the read second storage values are processed so as to decode the ECC. Responsively to a failure in decoding the ECC, one or more of the second storage values that potentially caused the failure are identified as suspect storage values. Respective third storage values are re-read from a subset of the memory cells that includes the memory cells holding the suspect storage values. The ECC is re-decoded using the third storage values so as to reconstruct the stored data. | 2014-10-30 |
20140325309 | UPDATING DATA STORED IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module receiving a modified data object, wherein the modified data object is a modified version of a data object and the data object is divided into a plurality of data segments and stored in the DSN. The method continues with the DS processing module mapping portions of the modified data object to the plurality of data segments that includes creating a middle data segment of a second plurality of data segments based on a corresponding middle data segment of the plurality of data segments when the a portion of the portions corresponds to middle data of the modified data object. The method continues with the DS processing module encoding the middle data segment using a dispersed storage error coding function to produce an encoded data segment and overwriting the corresponding middle data segment with the encoded data segment in the DSN. | 2014-10-30 |
20140325310 | THRESHOLD ADJUSTMENT USING DATA VALUE BALANCING IN ANALOG MEMORY DEVICE - A method, in a memory including multiple analog memory cells, includes segmenting a group of the memory cells into a common section and at least first and second dedicated sections. Each dedicated section corresponds to a read threshold that is used for reading a data page to be stored in the group. Data to be stored in the group is jointly balanced over a union of the common section and the first dedicated section, and over the union of the common section and the second dedicated section, to create a balanced page such that for each respective read threshold an equal number of memory cells will be programmed to assume programming levels that are separated by the read threshold. The balanced page is stored to the common and dedicated sections, and the read thresholds are adjusted based on detecting imbalance between data values in readout results of the balanced page. | 2014-10-30 |
20140325311 | HYBRID ERROR CORRECTION METHOD AND MEMORY REPAIR APPARATUS THEREOF - A hybrid error correction method and a memory repair apparatus thereof are provided for a dynamic random access memory (DRAM). The memory repair apparatus includes a mode register and a hybrid error correction code and redundancy (HEAR) module. When the DRAM enters a standby mode, the mode register switches the DRAM to be controlled by the HEAR module. The HEAR module generates parity data of the error correction code within a default refresh period. The HEAR module extends the refresh period of the DRAM and uses the parity data for error detection to locate a data retention error in the DRAM until the maximum allowable refresh period supported by the HEAR module is reached. Before the DRAM returns to a working mode from a standby mode, the HEAR module performs an error correction process according to fail bit data and writes corrected data into the DRAM. | 2014-10-30 |
20140325312 | METHOD AND SYSTEM FOR SCRUBBING DATA WITHIN A DATA STORAGE SUBSYSTEM - A method and system for scrubbing data within a data storage subsystem is disclosed. According to one embodiment, a method is provided for scrubbing data of a storage element within a data storage subsystem. In the described method embodiment, a request to access the storage element is processed utilizing a first processing module and access permission metadata associated with the storage element. A data scrub process is concurrently performed utilizing a second processing module by modifying the access permission metadata and validating data of the storage element substantially simultaneously with the processing. | 2014-10-30 |
20140325313 | MEMORY PROTECTION CACHE - Accessing data at a memory is described. A request associated with a read or write operation is received, wherein the request includes a logical address associated with the memory. A physical address is generated based at least in part on the logical address. A block of data at the memory that includes data associated with the physical address is determined. Data at the determined block of data and a corresponding set of ECC from the memory are accessed. Whether the accessed data can be decoded based at least in part on the corresponding set of ECC is determined. | 2014-10-30 |
20140325314 | READ BIAS MANAGEMENT TO REDUCE READ ERRORS FOR PHASE CHANGE MEMORY - Subject matter disclosed herein relates to a memory device, and more particularly to read performance of phase change memory. During a reading process, a bias condition can be applied to a memory cell to determine the memory cell's state. The determined state of the memory cell can depend on a threshold voltage of the memory cell. The threshold voltage of the memory cell may shift over time. The shift in threshold voltage may result in read errors. The applied bias condition may be modified based on the resulting read errors. | 2014-10-30 |
20140325315 | MEMORY MODULE BUFFER DATA STORAGE - A memory module ( | 2014-10-30 |
20140325316 | DATA PROTECTION ACROSS MULTIPLE MEMORY BLOCKS - Data protection across multiple memory blocks can include writing a first portion of a codeword in a first location of a first memory block and writing a second portion of the codeword in a second location of a second memory block. The second location can be different than the first location with respect to the second and the first memory blocks. | 2014-10-30 |
20140325317 | ERROR RECOVERY STORAGE ALONG A MEMORY STRING - Apparatus and methods store error recovery data in different dimensions of a memory array. For example, in one dimension, block error correction codes (ECC) are used, and in another dimension, supplemental error correction codes, such as convolutional codes, are used. By using separate dimensions, the likelihood that a defect affects both error recovery techniques is lessened, thereby increasing the probability that error recovery can be performed successfully. In one example, block error correction codes are used for data stored along rows, and this data is stored in one level of multiple-level cells of the array. Supplemental error correction codes are used for data stored along columns, such as along the cells of a string, and the supplemental error correction codes are stored in a different level than the error correction codes. | 2014-10-30 |
20140325318 | SOLID STATE DEVICE CODING ARCHITECTURE FOR CHIPKILL AND ENDURANCE IMPROVEMENT - A first decoder performs decoding on each data set in a first plurality of data sets using a first code; each data set in the first plurality is stored on a different chip. It is determined if the first decoding is successful; if not, a second decoder performs a second decoding on each data set in a second plurality of data sets using a second code; each data set in the second plurality includes at least some data, after the first decoding using the first code, from each data set in the first plurality. The first decoder performs a third decoding on each data set in the first plurality using the first code, where each data set in the first plurality includes at least some data, after the second decoding using the second code, from each data set in the second plurality. | 2014-10-30 |
20140325319 | STATISTICS ADAPTIVE SOFT DECISION FORWARD ERROR CORRECTION IN DIGITAL COMMUNICATION - A digital communication receiver uses a maximum likelihood sequence estimation stage to recover symbols from digitized sample values of a received signal. A probability density function is calculated and used to improve a soft decision forward error correction calculation. The results of error decoding, which represent error corrected data bits, are further used to improve the probability density function calculation. | 2014-10-30 |
20140325320 | SYNDROME TABLES FOR DECODING TURBO-PRODUCT CODES - A set of one or more component syndromes associated with a turbo product code (TPC) codeword is obtained from a component syndrome buffer. Component decoding is performed on the set of one or more component syndromes. | 2014-10-30 |
20140325321 | PUNCTURING SCHEME BASED DECODER OPTIMIZATIONS - Systems and methods for decoding bitstreams are described. The bitstreams may be encoded using a punctured convolution code and received from a wireless network. A puncture pattern associated with a modulation and coding scheme used to encode the bitstream is determined, and punctured log-likelihood ratios (LLRs) generated from the bitstream are ignored while decoding the bitstream. The puncture pattern may be characterized by one or more algorithms that identify punctured LLRs in a repetitive sequence of LLRs. A decoder may exclude punctured LLRs from calculations related to bitstream decoding. The decoder may comprise a Viterbi decoder or an algebraic decoder. Other aspects, embodiments, and features are also claimed and described. | 2014-10-30 |
20140325322 | SEMICONDUCTOR INTEGRATED CIRCUIT AND DRIVE APPARATUS INCLUDING THE SAME - A semiconductor integrated circuit includes a first transmission circuit generating and outputting a first transmission signal reflecting a first data signal supplied from outside, a first reception circuit reproducing the first data signal based on a first reception signal, a first isolation element isolating the first transmission circuit from the first reception circuit and transmitting the first transmission signal as the first reception signal, a second transmission circuit generating and outputting a second transmission signal reflecting a second data signal supplied from outside, a second reception circuit reproducing the second data signal based on a second reception signal, a second isolation element isolating the second transmission circuit from the second reception circuit and transmitting the second transmission signal as the second reception signal, and a third transmission circuit generating and outputting a third transmission signal reflecting the second data signal. | 2014-10-30 |
20140325323 | ONLINE VIDEO PLAYING METHOD AND APPARATUS AND COMPUTER READABLE MEDIUM - The disclosure relates to mobile terminal technology field, and in particular, to an online video playing method, apparatus and computer-readable medium, the method comprising in response to detecting an access instruction to a video link on a webpage, scanning codes of the webpage; determining whether the codes of the webpage include a browser playing function, which is configured to generate a playing window with a predefined size in a browser to play the video; in response to the codes of the webpage include the browser playing function, acquiring a video content corresponding to the video link from a server indicated by the video link; invoking the browser playing function, generating the playing window with the predefined size in the browser, and playing the video content in the playing window with the predefined size. | 2014-10-30 |
20140325324 | ELECTRONIC DOCUMENT - An electronic document includes header, view, data, and signature sections. The data section provides data typically processed in transactions involving the electronic document. The view section includes presentation formatting for displays corresponding to the data. Linking elements identify corresponding main data values and view data values respectively used to populate the data section and display presentation formatting, and are accessible for determining whether the data in the display and data section, providing assurances that processed data matches that found in documents used by parties to a transaction. A digital signature section allows a digital signature to be provided, and used to wrap that data and view sections, to ensure authenticity. The header section provides document type, state and other information that is readily accessed without otherwise scanning the electronic document. | 2014-10-30 |
20140325325 | SYSTEM AND METHOD FOR LINKING AN ADDRESS - A method and a mobile device comprising an address linking module assess a segment of text as comprising an address and create a link. The method comprises: searching a text for a segment of text having at least two character strings satisfying a proximity constraint, each character string being of a different predefined address indicator type; assessing whether or not the segment comprises an address; displaying at least a portion of the text comprising the segment on a display of a mobile device; and if the segment is assessed as comprising an address, including a link for display, the link pointing to at least one application. | 2014-10-30 |
20140325326 | System and Method for Managing Content on a Network Interface - The disclosed invention is a system and method (collectively the “system”) for the automated management of content on a network interface. The network interface can be a web site on the World Wide Web, an Internet location, an intranet location, an extranet location, or some other form of network interface (collectively “web site”). The system can automatically create applications and links to those applications without human intervention. Examples of automated applications include newsroom applications, calendar of events, employment opportunities, project portfolio, biographies, frequently asked questions, document library, category management, product catalogs, e-mail broadcasts, surveys, and newsletters. Fully normalized hierarchies of business rules and user profiles can be supported by the system to facilitate automation and configurability. Multiple content providers can manage a single web site in a simultaneous or substantially simultaneous manner. In ASP embodiments, multiple organizations can use the system to manage multiple web sites in a substantially simultaneous manner. | 2014-10-30 |
20140325327 | REPLACING PROBLEM WEB LINKS USING CONTEXT INFORMATION - Problem links (for example, links to web pages) are replaced by replacement resources (for example, web pages). A process for determining a replacement resource includes a collecting step and an identifying step. In the collecting step, in response to a determination that a problem link condition exists within the source document, context information is collected for the source document. In the identifying step, at least a first replacement resource is identified based, at least in part, upon the context information. The identity of problem links, along with associated replacement resource(s), may be stored in a network accessible cache or repository. | 2014-10-30 |
20140325328 | MEMORY TAG HYBRID MULTIDIMENSIONAL BAR-TEXT CODE WITH SOCIAL MEDIA PLATFORM - An apparatus and method for cloud-based storage, retrieval and sharing of files tagged with scannable tags and alphanumeric coding is provided. This application and method includes: either scanning a scannable tag by mobile device or inputting a code into a computer; decoding of the scannable tag or text provided, by installed application; accessing, by a cloud based storage system which hosts the associated or tagged file; and retrieving the file associated with the scannable tag or alphanumeric code. This method also includes a process by which: either by smart phone or personal computer; uploading or storing of files onto a cloud-based storage system; tagging of those stored files with a unique scannable tag and alphanumeric code; generating a scannable tag and alphanumeric code to associate with those tag files; and a method of tracking scanning of the multi-layer scannable tag and performance metrics of the tagged video, audio or other file. | 2014-10-30 |
20140325329 | Visual Analytics of Multivariate Data Using a Cell Based Calendar Matrix having a Visual Folding Mechanism - Visual analytics of multivariate data using a cell based calendar matrix having a visual folding mechanism can include forming a time based layout that is divided into cells where the cells represent measurement intervals and a color of the cells represents a measurement value, folding the time based layout into a cell based calendar matrix with other time based layouts that include other cells that represent corresponding measurement intervals in different calendar units of the cell based calendar matrix, and displaying the cell based calendar matrix in a display such that the cells of the time based layout align by time with the other cells of the other time based layouts. | 2014-10-30 |
20140325330 | Pedagogical System and Method - A pedagogical system and method enables improved writing skills by assisting in the generation of a document. The system includes a server having a data interface for receiving a question to be answered in the document. A data store associated with the server includes a plurality of directive words and descriptive text associated with each of the directive words. The server also includes a processor and associated memory, including program code for identifying directive words in the question and retrieving, from the data store, descriptive text associated with the directive words. An output interface then displays the descriptive text for each of the directive words. | 2014-10-30 |
20140325331 | Form-based user-configurable process information system and method - A machine-implemented system and method for defining process information is disclosed. In one embodiment, the system or method allows a user to list processes, define processes using an input form, list process parameters, list sampling points, define sampling points using an input form, and list sampling point parameters for a chemical process or processes. Enhancements can include functionality that allows a user to list process streams, define process streams using an input form, list process stream parameters, list process stream chemicals, and list process chemicals. Other enhancements can include functionality that allows a user to list reports, render reports using an input form, and list sampling point logs. The objective is to allow users to log, report, and chart process data using electronic input forms that do not require the writing of programming code by the person defining the process or processes. | 2014-10-30 |
20140325332 | Managing Annotation-Based Item Descriptions - Example systems and methods that provide annotations of item descriptions are described. In one implementation, a method receives a request to display an item attribute associated with an item. The method accesses an annotated description associated with the item and identifies a rule associated with the item. The rule is applied to the annotated description to determine whether to display the requested item attribute. | 2014-10-30 |