Patent application number | Description | Published |
20090050575 | Control of development of biofilms in industrial process water - There is provided a method of inhibiting the development of a biofilm adjacent a surface, the method comprising intermittently applying a biofilm inhibiting substance to a collection of microorganisms having biofilm developing potential. Other embodiments are also described. | 02-26-2009 |
20100096340 | CONTROL OF DEVELOPMENT OF BIOFILMS IN INDUSTRIAL PROCESS WATER - There is provided a method of inhibiting the development of a biofilm adjacent a surface, the method comprising intermittently applying a biofilm inhibiting substance to a collection of microorganisms having biofilm developing potential. Other embodiments are also described. | 04-22-2010 |
20100183746 | BIOCIDES AND APPARATUS - A biocide is formed by mixing at least one of ammonium sulfamate and ammonium carbamate with an aqueous solution of a hypochlorite oxidant at a molar ratio of ammonium to hypochlorite of at least 1:1. The biocide is useful in treating microbial or biofilm growth, pulp and paper process water, cooling tower water, waste water, reclaimed waste water, sludge, colloidal suspensions, irrigation water or a medium having a reducing capacity. | 07-22-2010 |
20100310676 | BIOCIDES AND APPARATUS - A biocide is formed by mixing at least one of ammonium sulfamate and ammonium carbamate with an aqueous solution of a hypochlorite oxidant at a molar ratio of ammonium to hypochlorite of at least 1:1. The biocide is useful in treating microbial or biofilm growth, pulp and paper process water, cooling tower water, waste water, reclaimed waste water, sludge, colloidal suspensions, irrigation water or a medium having a reducing capacity. | 12-09-2010 |
20110229586 | CONTROL OF DEVELOPMENT OF BIOFILMS IN INDUSTRIAL PROCESS WATER - There is provided a method of inhibiting the development of a biofilm adjacent a surface, the method comprising intermittently applying a biofilm inhibiting substance to a collection of microorganisms having biofilm developing potential. Other embodiments are also described. | 09-22-2011 |
20120160779 | CONTROL OF DEVELOPMENT OF BIOFILMS IN INDUSTRIAL PROCESS WATER - There is provided a method of inhibiting the development of a biofilm adjacent a surface, the method comprising intermittently applying a biofilm inhibiting substance to a collection of microorganisms having biofilm developing potential. Other embodiments are also described. | 06-28-2012 |
20140120183 | BIOCIDES AND APPARATUS - A biocide is formed by mixing at least one of ammonium sulfamate and ammonium carbamate with an aqueous solution of a hypochlorite oxidant at a molar ratio of ammonium to hypochlorite of at least 1:1. The biocide is useful in treating microbial or biofilm growth, pulp and paper process water, cooling tower water, waste water, reclaimed waste water, sludge, colloidal suspensions, irrigation water or a medium having a reducing capacity. | 05-01-2014 |
20140178501 | BIOCIDES AND APPARATUS - A method for controlling microbial or biofilm growth in a medium includes mixing ammonium carbamate or ammonium sulfamate with an aqueous solution of a hypochlorite oxidant to form a biocide having a pH between 9.0 and 11.5, the molar ratio of the ammonium carbamate or ammonium sulfamate to the hypochlorite being at least 1:1; and then applying the biocide to the medium. | 06-26-2014 |
20150367315 | Method for Controlling the Production of a Biocide - A method and apparatus for producing a biocide from a hypochlorite oxidant and an ammonium salt are provided. The method includes monitoring a control parameter to optimize the ratio between the hypochlorite oxidant and the ammonium salt. The control parameter may be oxidation-reduction potential, conductivity, induction or oxygen saturation. | 12-24-2015 |
20160100581 | BIOCIDES AND APPARATUS - A biocide is formed by mixing at least one of ammonium sulfamate and ammonium carbamate with an aqueous solution of a hypochlorite oxidant at a molar ratio of ammonium to hypochlorite of at least 1:1. The biocide is useful in treating microbial or biofilm growth, pulp and paper process water, cooling tower water, waste water, reclaimed waste water, sludge, colloidal suspensions, irrigation water or a medium having a reducing capacity. | 04-14-2016 |
Patent application number | Description | Published |
20130308131 | OPTICAL SYSTEM AND METHOD FOR MEASURING IN THREE-DIMENSIONAL STRUCTURES - An optical system is presented for use in measuring in patterned structures having vias. The system is configured and operable to enable measurement of a via profile parameters. The system comprises an illumination channel for propagating illuminated light onto the structure being measured, a detection channel for collecting light returned from the illuminated structure to a detection unit, and a modulating assembly configured and operable for implementing a dark-field detection mode by carrying out at least one of the following: affecting at least one parameter of light propagating along at least one of the illumination and detection channels, and affecting propagation of light along at least the detection channel. | 11-21-2013 |
20140168646 | OPTICAL SYSTEM AND METHOD FOR MEASURING IN PATTERNED STRUCTURES - An optical system is presented for use in measuring in patterned structures having vias. The optical system comprises an illumination channel for propagating illuminated light onto the structure being measured; a detection channel for collecting light returned from the illuminated structure to a detection unit; and an attenuation assembly accommodated in the illumination and detection channels and being configured and operable for selectively attenuating light propagating along the detection channel, the attenuation creating a predetermined condition for the selectively attenuated light, said predetermined condition being defined by a predetermined ratio between a first light portion corresponding to a dark field condition and a second light portion corresponding to a bright field condition in said selectively attenuated light, detected selectively attenuated light being therefore indicative of at least one parameter of the via being illuminated. | 06-19-2014 |
20150192527 | OPTICAL METHOD AND SYSTEM FOR DETECTING DEFECTS IN THREE-DIMENSIONAL STRUCTURES - A method and system are presented for use in inspection of via containing structures. According to this technique, measured data indicative of a spectral response of a via-containing region of a structure under measurements is processed, and, upon identifying a change in at least one parameter of the spectral response with respect to a spectral signature of the via-containing region, output data is generated indicative of a possible defect at an inner surface of the via. | 07-09-2015 |
20150212012 | OPTICAL METHOD AND SYSTEM FOR MEASURING ISOLATED FEATURES OF A STRUCTURE - An optical method and system are presented for use in measurement of isolated features of a structure. According to this technique, Back Focal Plane Microscopy (BFM) measurements are applied to a structure and measured data indicative thereof is obtained, wherein the BFM measurements utilize dark-field detection mode while applying pinhole masking to incident light propagating through an illumination channel towards the structure, the measured data being thereby indicative of a scattering matrix characterizing scattering properties of the structure, enabling identification of one or more isolated features of the structure. | 07-30-2015 |
20150316468 | METHOD AND SYSTEM FOR OPTICAL CHARACTERIZATION OF PATTERNED SAMPLES - A method and system are presented for use in measuring on patterned samples, aimed at determining asymmetry in the pattern. A set of at least first and second measurements on a patterned region of a sample is performed, where each of the measurements comprises: directing illuminating light onto the patterned region along an illumination channel and collecting light reflected from the illuminated region propagating along a collection channel to be detected, such that detected light from the same patterned region has different polarization states which are different from polarization of the illuminating light, and generating a measured data piece indicative of the light detected in the measurement. Thus, at least first and second measured data pieces are generated for the at least first and second measurements on the same patterned region. The at least first and second measured data pieces are analyzed and output data is generated being indicative of a condition of asymmetry in the patterned region. | 11-05-2015 |
20150345934 | OPTICAL METHOD AND SYSTEM FOR CRITICAL DIMENSIONS AND THICKNESS CHARACTERIZATION - Method and system for measuring one or more parameters of a patterned structure, using light source producing an input beam of at least partially coherent light in spatial and temporal domains, a detection system comprising a position sensitive detector for receiving light and generating measured data indicative thereof, an optical system configured for focusing the input light beam onto a diffraction limited spot on a sample's surface, collecting an output light returned from the illuminated spot, and imaging the collected output light onto a light sensitive surface of the position sensitive detector, where an image being indicative of coherent summation of output light portions propagating from the structure in different directions. | 12-03-2015 |
20150377799 | OPTICAL PHASE MEASUREMENT METHOD AND SYSTEM - A method and system are presented for use in optical measurements on patterned structures. The method comprises performing a number of optical measurements on a structure with a measurement spot configured to provide detection of light reflected from an illuminating spot at least partially covering at least two different regions of the structure. The measurements include detection of light reflected from said at least part of the at least two different regions comprising interference of at least two complex electric fields reflected from said at least part of the at least two different regions, and being therefore indicative of a phase response of the structure, carrying information about properties of the structure. | 12-31-2015 |
20160139065 | METHOD AND SYSTEM FOR DETERMINING STRAIN DISTRIBUTION IN A SAMPLE - A control system is presented for use in measuring one or more parameters of a sample. The control system comprises an input utility and a processor utility. The input utility is configured for receiving input data including first data comprising X-ray Diffraction or High-Resolution X-ray Diffraction (XRD) response data of the sample indicative of a material distribution in the sample, and second data comprising optical response data of the sample to incident light indicative of at least a geometry of the sample. The processor utility is configured and operable for processing and analyzing one of the first and second data for optimizing the other one of the first and second data, and utilizing the optimized data for determining said one or more parameters of the sample including a strain distribution in the sample. | 05-19-2016 |
Patent application number | Description | Published |
20100042811 | METHOD FOR MANAGING BRANCH INSTRUCTIONS AND A DEVICE HAVING BRANCH INSTRUCTION MANAGEMENT CAPABILITIES - A method for managing branch instructions, the method includes: providing, to pipeline stages of a processor, multiple variable length groups of instructions; wherein each pipeline stage executes a group of instruction during a single execution cycle; receiving, at a certain execution cycle, multiple instruction fetch requests from multiple pipeline stages, each pipeline stage that generates an instruction fetch request stores a variable length group of instructions that comprises a branch instruction; sending to the fetch unit an instruction fetch command that is responsive to a first in order branch instruction in the pipeline stages; wherein if the first in order fetch command is a conditional fetch command then the instruction fetch command comprises a resolved target address; wherein the sending of the instruction fetch command is restricted to a single instruction fetch command per a single execution cycle. | 02-18-2010 |
20100049954 | METHOD FOR SPECULATIVE EXECUTION OF INSTRUCTIONS AND A DEVICE HAVING SPECULATIVE EXECUTION CAPABILITIES - A method for speculative execution of instructions, the method includes: decoding a compare instruction; speculatively executing, in a continuous manner, conditional instructions that are conditioned by a condition that is related to a resolution of the compare instruction and are decoded during a speculation window that starts at the decoding of the compare instruction and ends when the compare instruction is resolved; and stalling an execution of a non-conditional instruction that is dependent upon an outcome of at least one of the conditional instructions, until the speculation window ends. | 02-25-2010 |
20100049958 | METHOD FOR EXECUTING AN INSTRUCTION LOOPS AND A DEVICE HAVING INSTRUCTION LOOP EXECUTION CAPABILITIES - A method for managing a hardware instruction loop, the method includes: (i) detecting, by a branch prediction unit, an instruction loop; wherein a size of the instruction loop exceeds a size of a storage space allocated in a fetch unit for storing fetched instructions; (ii) requesting from the fetch unit to fetch instructions of the instruction loop that follow the first instructions of the instruction loop; and (iii) selecting, during iterations of the instruction loop, whether to provide to a dispatch unit one of the first instructions of the instruction loop or another instruction that is fetched by the fetch unit; wherein the first instructions of the instruction loop are stored at the dispatch unit. | 02-25-2010 |
20130290686 | INTEGRATED CIRCUIT DEVICE AND METHOD FOR CALCULATING A PREDICATE VALUE - An integrated circuit device comprises at least one instruction processing module arranged to perform branch predication. The at least one instruction processing module comprises at least one predicate calculation module arranged to receive as an input at least one result vector for a predicate function and at least one conditional parameter value therefor and output a predicate result value from the at least one result vector based at least partly on the at least one received conditional parameter value. | 10-31-2013 |
20130297578 | INTEGRATED CIRCUIT DEVICE AND METHOD FOR DETERMINING AN INDEX OF AN EXTREME VALUE WITHIN AN ARRAY OF VALUES - An integrated circuit device comprises at least one digital signal processor, DSP, module, the at least one DSP module comprising a plurality of data registers and at least one data execution unit, DEU, module arranged to execute operations on data stored within the data registers. The at least one DEU module is arranged to, in response to receiving an extreme value index instruction, compare a previous extreme value located within a first data register set of the DSP module with at least one input vector data value located within a second data register set of the DSP module, and determine an extreme value thereof. The at least one DEU module is further arranged to, if the determined extreme value comprises an input vector data value located within the second data register set, store the determined extreme value in the first data register set, determine an index value for the determined extreme value, and store the determined index value in the first data register set. | 11-07-2013 |
20130326200 | INTEGRATED CIRCUIT DEVICES AND METHODS FOR SCHEDULING AND EXECUTING A RESTRICTED LOAD OPERATION - An integrated circuit device comprising at least one instruction processing module arranged to compare validation data with data stored within a target register upon receipt of a load validation instruction. Wherein, the instruction processing module is further arranged to proceed with execution of a next sequential instruction if the validation data matches the stored data within the target register, and to load the validation data into the target register if the validation data does not match the stored data within the target register. | 12-05-2013 |
20140013087 | PROCESSOR SYSTEM WITH PREDICATE REGISTER, COMPUTER SYSTEM, METHOD FOR MANAGING PREDICATES AND COMPUTER PROGRAM PRODUCT - A processor system is adapted to carry out a predicate swap instruction of an instruction set to swap, via a data pathway, predicate data in a first predicate data location of a predicate register with data in a corresponding additional predicate data location of a first additional predicate data container and to swap, via a data pathway, predicate data in a second predicate storage location of the predicate register with data in a corresponding additional predicate data location in a second additional predicate data container. | 01-09-2014 |
20140013088 | INTEGRATED CIRCUIT DEVICE AND METHODS OF PERFORMING BIT MANIPULATION THEREFOR - An integrated circuit device comprising at least one instruction processing module arranged to receive a bit-manipulation instruction, and in response to receiving the bit-manipulation instruction to select at least one bit from at least one source data register in accordance with a value of at least one control bit, select from candidate values a manipulation value for the at least one selected bit in accordance with a value of at least one further control bit, and store the selected manipulation value for the at least one selected bit in at least one output data register. | 01-09-2014 |
20140019990 | INTEGRATED CIRCUIT DEVICE AND METHOD FOR ENABLING CROSS-CONTEXT ACCESS - An integrated circuit device comprising an instruction processing module for performing operations on data in accordance with received instructions. The instruction processing module comprises a context selector unit arranged to selectively provide access to at least one process attribute(s) within a plurality of process contexts in accordance with at least one context selector value received thereby. The instruction processing module is arranged to receive an instruction comprising a context indication for a process attribute with which an operation is to be performed, provide the context selector value based at least partly on the context indication to the context selector unit, and execute the operation to be performed with the process attribute for at least one process context to which the context selector unit provides access in accordance with the context selector value. | 01-16-2014 |
20150082005 | PROCESSING SYSTEM AND METHOD OF INSTRUCTION SET ENCODING SPACE UTILIZATION - A processing system comprises a processing device; a first instruction set encoded in a first encoding space and comprising one or more first instructions; a second instruction set encoded in a second encoding space different from the first encoding space and comprising two or more orthogonal second instructions; and an instruction encoder arranged to encode and encapsulate subsets of the second instructions in instruction containers, each instruction container sized to comprise a plurality of the second instructions. | 03-19-2015 |
20150356054 | DATA PROCESSOR AND METHOD FOR DATA PROCESSING - A integrated circuit device has at least one instruction processing module arranged for executing vector data processing upon receipt of a respective one of a set of data processing instructions. The data processing instructions include at least one matrix processing instruction for processing elements of a matrix. The elements of rows of the matrix are stored in a set of register, and the instruction processing module comprising an accessing unit for accessing selected elements of the matrix, which selected elements are non-sequentially located according to a predetermined pattern across multiple registers of the set of registers, the accessing enabling respective processing lanes to write or read different registers. Advantageously elements in columns of a matrix can efficiently be processed. | 12-10-2015 |
Patent application number | Description | Published |
20110078598 | DYNAMIC CONTENT LAYOUT FOR A USER INTERFACE DISPLAY - According to some embodiments, an ordered set of display elements may be determined for a user interface display, each display element being associated with a display value. A dynamic display table may be created for the display page, with each cell in the dynamic display table representing a sub-set of the display elements and containing a total of the display values of the display elements in that sub-set. An overall display value may be determined for the user interface page, and a plurality of cells in the dynamic display table may be evaluated to select an appropriate sub-set of display elements based on the overall display value. It may then be arranged for the selected sub-set of display elements to be presented on the user interface display. | 03-31-2011 |
20130212497 | ANALYTICS DRIVEN ENGAGEMENT - Various embodiments relate to an engagement server and a related method of initiating an engagement between an agent device and a user device based on formed and modified engagement rules. In one embodiment, the engagement server can receive one or more third-party analytic reports and use them to form engagement rules that determine when the engagement server initiates an engagement between the agent device and user device. In some embodiments, the engagement server can also receive user interaction data from the user device to modify engagement rules to fit a particular user. In some embodiments, the engagement server can use the third-party analytic reports and/or user interaction data from a plurality of users to form a statistical model. The engagement server may then use the statistical model to form and/or modify the engagement rules. | 08-15-2013 |
20130238714 | Occasionally-Connected Computing Interface - Described are computer-based methods and apparatuses, including computer program products, for allowing a user to switch between interfacing with a service through a network or through short message service (SMS). A chat service is executed through which a first user at a first computer can communicate directly with a second user at a second computer. A request is received from the first computer to enable the first user to interface with the chat service through a mobile device of the first user using SMS instead of through the network using the first computer. The chat service is configured to interface with the mobile device through SMS, including communicating chat information through SMS to the first user's mobile device, and communicating control information through SMS to the first user's mobile device such that the first user can control a full functionality of the chat service using SMS. | 09-12-2013 |
20130290533 | Authentication of Service Requests - Described are computer-based methods and apparatuses, including computer program products, for authentication of service requests. Data is transmitted that causes transmission of a service request to the server when actuated. Data representing the service request and data representing a sender of the service request is received. The (a) data representing the service request, data representing the sender of the service request, or both, is compared against (b) pre-defined criteria associated with the data that causes transmission of the service request. The service request from the sender is processed if the comparison authenticates the service request. | 10-31-2013 |
20130326375 | Method and System for Engaging Real-Time-Human Interaction into Media Presented Online - This disclosure presents methods, systems, computer-readable media, for directing a communications campaign so as to exploit capabilities and information sources provided by social-networking. The techniques generally involve displaying a, tracking user interactions with the fan page, predicting user responsiveness to various types of communications, and selecting and targeting communications to users in a manner predicted to be most beneficial for the campaign. Users may be provided with an interactive application download which enables user web-browsing activities to be tracked in greater detail, and enables users to be selectively chosen to receive communications from an agent. User behavior is modeled and strategies for communicating with users are continuously evaluated for potential use based on the models. | 12-05-2013 |
20150019525 | Systems and Methods for Facilitating Participation - Described are computer-based methods and apparatuses, including computer program products, comprising the steps of, or structure for, storing a plurality of expert profiles in a database, each of the plurality of expert profiles comprising information associated with a person having knowledge in a particular category, subject or topic; receiving search criteria over a network from a query source; selecting at least one of the plurality of expert profiles comprising information that satisfy the search criteria; and transmitting expert profile data for each of the selected expert profiles to the remote search engine, the expert profile data comprising data that defines a displayable representation of a corresponding expert profile, the expert profile data further comprising data that facilitates a client-initiated, real-time communication session over the network with a person associated with the corresponding expert profile. | 01-15-2015 |
20150019527 | System and Methods for Searching and Communication - Described are computer-based methods and apparatuses, including computer program products, comprising the steps of, or structure for, storing a plurality of expert profiles in a database, each of the plurality of expert profiles comprising information associated with a person having knowledge in a particular category, subject or topic; receiving search criteria over a network from a query source; selecting at least one of the plurality of expert profiles comprising information that satisfy the search criteria; and transmitting expert profile data for each of the selected expert profiles to the remote search engine, the expert profile data comprising data that defines a displayable representation of a corresponding expert profile, the expert profile data further comprising data that facilitates a client-initiated, real-time communication session over the network with a person associated with the corresponding expert profile. | 01-15-2015 |
20150149571 | AUTHENTICATION OF SERVICE REQUESTS INITIATED FROM A SOCIAL NETWORKING SITE - Described are computer-based methods and apparatuses, including computer program products, for authenticating user service requests from a social networking site. Data representing a selected message and an originator of the selected message is stored. Data representing a reply to the originator of the selected message is transmitted for posting at the social networking server, the reply including data that causes transmission of a service request to the server when actuated. Data representing the service request and a sender of the service request is received. Data representing a user profile of the sender of the service request is retrieved from the social networking server. One or more attributes of the user profile of the sender are compared against one or more attributes of the stored data representing the originator of the selected message in order to verify the one or more attributes of the user profile. | 05-28-2015 |
20150200822 | ANALYTICS DRIVEN ENGAGEMENT - Various embodiments relate to an engagement server and a related method of initiating an engagement between an agent device and a user device based on formed and modified engagement rules. In one embodiment, the engagement server can receive one or more third-party analytic reports and use them to form engagement rules that determine when the engagement server initiates an engagement between the agent device and user device. In some embodiments, the engagement server can also receive user interaction data from the user device to modify engagement rules to fit a particular user. In some embodiments, the engagement server can use the third-party analytic reports and/or user interaction data from a plurality of users to form a statistical model. The engagement server may then use the statistical model to form and/or modify the engagement rules. | 07-16-2015 |
20150248486 | SYSTEM AND METHODS FOR SEARCHING AND COMMUNICATION - Described are computer-based methods and apparatuses, including computer program products, comprising the steps of, or structure for, storing a plurality of expert profiles in a database, each of the plurality of expert profiles comprising information associated with a person having knowledge in a particular category, subject or topic; receiving search criteria over a network from a query source; selecting at least one of the plurality of expert profiles comprising information that satisfy the search criteria; and transmitting expert profile data for each of the selected expert profiles to the remote search engine, the expert profile data comprising data that defines a displayable representation of a corresponding expert profile, the expert profile data further comprising data that facilitates a client-initiated, real-time communication session over the network with a person associated with the corresponding expert profile. | 09-03-2015 |
Patent application number | Description | Published |
20130127920 | Focusing on Contextually-Relevant Content - Implementations of the present disclosure include a method, system, apparatus, and storage media for matching data associated with a user with one or more respective attributes of a plurality of sub-portions of web content, each of the plurality of sub-portions of web content including at least one attribute; ranking the plurality of sub-portions of web content based on matching the data associated with the user with the one or more respective attributes of the plurality of sub-portions of web content; and focusing the graphical user interface of the mobile communication device on a highest-ranked sub-portion of web content in the ranked plurality of sub-portions. | 05-23-2013 |
20130159824 | Managing Web Content on a Mobile Communication Device - Techniques for managing content on a mobile communication device include generating a first navigation structure of web content including a plurality of linked web content portions; identifying a web content navigation history of a user including one or more web content portions accessed by the user in the plurality of linked web content portions; and generating a second navigation structure of the web content, the second navigation structure including links associated with only the one or more web content portions accessed by the user, the second navigation structure displayable on a mobile communication device. | 06-20-2013 |
20130166577 | Providing Contextually-Relevant Content - Techniques for providing contextually-relevant content include identifying content items accessed through a portal by a plurality of users, each user associated with one or more roles of a plurality of roles within the portal; updating a trace log to include information associated with the identified content, the information including associations between each identified content item and the role accessing each identified content item; receiving, from a user associated with a particular role of the plurality of roles, a search query through the portal for one or more content items; determining a plurality of search results responsive to the search query, the search results relating to the content items; for the particular role, filtering the plurality of search results based on the trace log; and generating a plurality of filtered search results for presentation through the portal. | 06-27-2013 |
20130166678 | Smart Suggestions Engine for Mobile Devices - The disclosure generally describes computer-implemented methods, software, and systems for providing relevant content to a requesting mobile device that include receiving, using at least one computer, a request for enterprise portal application content; identifying a requesting device from the received request; identifying enterprise portal application content from at least one enterprise portal application associated with the received request; determining capabilities of the requesting device; and comparing the determined capabilities of the requesting device with the capabilities required by a particular enterprise portal application. | 06-27-2013 |
20130227112 | SMART CACHE LEARNING MECHANISM IN ENTERPRISE PORTAL NAVIGATION - The disclosure generally describes computer-implemented methods, software, and systems for optimizing portal navigation node caching. A computer-implemented method includes starting a learning process to analyze at least one navigation request to at least one navigation node, wherein the navigation request requests at least one property of the at least one navigation node, examining properties of the at least one navigation node, recording to a property list at least one requested navigation node property of the at least one navigation node, calculating, using at least one computer, a variance between the at least one navigation node property recorded to the property list, and determining whether the calculated variance is above a threshold. | 08-29-2013 |
20130227422 | ENTERPRISE PORTAL SMART WORKLIST - The disclosure generally describes computer-implemented methods, software, and systems optimizing enterprise portal smart worklists. A computer-implemented method includes receiving a navigation request by a user for an enterprise portal page associated with a navigation node view of a navigation node, receiving at least one user action associated with the enterprise portal page, determining, using at least one computer, whether the at least one user action is substantive, determining whether multiple navigation requests for the enterprise portal page have been made by the user, and determining whether the navigation request is associated with a collaborative group. | 08-29-2013 |
20130238583 | ENTERPRISE PORTAL CONTEXTUAL SEARCH - The disclosure generally describes computer-implemented methods, software, and systems for optimizing enterprise portal searching. A computer-implemented method includes receiving, using at least one computer, a search request associated with a navigation node, ranking available search engines, receiving a selection of a search engine of the ranked available search engines and at least one search term, recording context data associated with the received search engine selection and the at least one search term, performing a search using the selected search engine and the at least one search term, receiving search results, and determining relevance of the returned search results. | 09-12-2013 |
20130239012 | COMMON DENOMINATOR FILTER FOR ENTERPRISE PORTAL PAGES - The disclosure generally describes computer-implemented methods, software, and systems for creating enterprise portal dashboards. One computer-implemented method includes receiving a conversion indication associated with an enterprise portal page, determining, using at least one computer, at least one content part associated with the enterprise portal page, collecting exposed metadata associated with each content part of the at least one content part, determining common metadata associated with the at least one content part, and rendering a filter user interface associated with the at least one content part. | 09-12-2013 |
20130262475 | Prioritizing Tasks - Techniques for providing a prioritized task list to a mobile device including identifying a user profile in a portal that includes one or more associations between the user profile, associated with a user, and one or more content sources; comparing, for each task of one or more tasks, the content source associated with the task and the associations stored by the user profile, the content sources providing the tasks; ranking, based on the comparison, the tasks to define a ranked list of tasks; and preparing a subset of the ranked list of tasks for display on the mobile device. | 10-03-2013 |
20130262476 | Prioritizing Feed Content - Techniques for providing prioritized content to a mobile device include detecting, for each feed of a number of feeds delivered to the mobile device through a portal, one or more associated tags, each tag comprising a keyword; comparing the one or more tags associated with the feeds to one or more properties associated with a user profile of a user in the portal; ranking, based on the comparison, the feeds to define a ranked list of feeds; and preparing a subset of the ranked list of feeds for display on the mobile device. | 10-03-2013 |
20130268836 | RUNTIME CONNECTION SUGGESTION ENGINE FOR PORTAL CONTENT - The present disclosure involves systems, software, and computer implemented methods for identifying suggested connections between content within a portal webpage. One example process includes operations for identifying a portal page associated with two or more individual content components to be presented to a user, and determining at least one possible connection between at least one pair of the two or more individual content components based, at least in part, on related content component metadata associated with each determined pair of individual content components. The at least one determined possible connection is prioritized based, at least in part, on a combined set of at least one of the related content component metadata and a set of user-specific data. At least a portion of the prioritized possible connections are then presented as suggested connections within the portal page. | 10-10-2013 |
20130268889 | Suggesting Contextually-Relevant Content Objects - Techniques for providing contextually-relevant content include monitoring interaction with content objects accessed through a portal by a user, at least a portion of the content objects presented to the user in a list through a graphical user interface (GUI); determining that the interaction with a particular content object of the content objects by the user exceeds a threshold interaction criteria; and updating the list of content objects presented to the user through the GUI with the particular content object based, at least in part, on the interaction with the particular content object exceeding the threshold interaction criteria. | 10-10-2013 |
20130282894 | VALIDATING CONTENT FOR A WEB PORTAL - Techniques for validating web content include identifying web content including web content portions, wherein a particular web content portion includes a content and a format; comparing the format of the particular web content portion against a specified format; and based on the comparison including a difference between the format of the particular web content portion and the specified format, displaying a message indicating the difference between the format of the particular web content portion and the specified format. | 10-24-2013 |
20130283146 | Managing Web Content Creation in a Web Portal - Techniques for managing web content creation include identifying a portal meta-model comprising one or more rules defining relationships between portal objects, and characteristics of the portal objects; receiving a portal model through a graphical user interface (GUI), the portal model comprising one or more customizable constraints on the relationships between the portal objects and the characteristics of the portal objects; identifying one or more portal objects comprising portal content; and applying the one or more rules and the one or more customizable constraints to the identified one or more portal objects. | 10-24-2013 |
20140046910 | SMART CONTENT OPTIMIZATIONS BASED UPON ENTERPRISE PORTAL CONTENT META-MODEL - The disclosure generally describes computer-implemented methods, software, and systems for optimizing enterprise portal content. One computer-implemented method includes receiving a content analysis request associated with a content repository, analyzing, using at least one computer, content objects associated with the content repository for inconsistencies with a meta-model, receiving content optimization suggestion data, modifying, by operation of at least one computer, the content repository content objects using the content optimization suggestion data, and receiving optimization status data. | 02-13-2014 |
20140059144 | ACTION NOTIFICATION FOR BUSINESS APPLICATIONS - The present disclosure describes methods, systems, and computer program products for generating action notifications for business applications. One computer-implemented method includes receiving notification data from a plurality of data sources; determining, based upon the received notification data, at least one action item to perform with an application on a client device; generating, by a notification engine, an application notification event, wherein the application notification event includes a unified list of at least one determined action item applicable to a user and a particular client device associated with the user; and transmitting the generated application notification event to the client device. | 02-27-2014 |
20140068509 | Managing a Selection Mode for Presented Content - Content and a selection activation element are presented on a touchscreen. First input generated by a user holding the selection activation element on the touchscreen is received. While the user is holding the selection activation element, a selection mode is activated. While the user is holding the selection activation element, second input is received generated by the user selecting at least part of the content according to the selection mode. The user releases the selection activation element. The selection mode is deactivated and a contextual menu with one or more user-selectable operation identifiers for the selected part of the content is presented. Third input is received generated by the user selecting at least one of the user-selectable operation identifiers. An operation corresponding to the at least one selected operation identifier is performed. | 03-06-2014 |
20140068545 | Managing Social Process of Developing Application - A computer-implemented method for managing a social process of developing an application includes: making an integrated development environment accessible to a user; exposing a work product of the user in the integrated development environment to a selected group of users; receiving, in the integrated development environment, a first input regarding the work product from at least one of the selected group of users; and presenting the first input to the user in the integrated development environment. | 03-06-2014 |
20140068589 | Integrating Native Application into Web Portal - The present disclosure describes methods, systems, and computer program products for integrating native applications into web portals. One computer-implemented method includes connecting a business enterprise portal (BEP) with a mobile device, wherein the BEP provides web-based and native-application-based content; analyzing the mobile device with the BEP to identify a native application applicable to the BEP, the native application associated with the web-based and native-application-based content and locally operational in the mobile device; generating metadata associated with at least the native application; generating a data object representing the native application and the associated metadata; and launching, from the BEP, the native application using the generated metadata. | 03-06-2014 |
20140071091 | Camera Based Hover Detection for Touch-Based Mobile Devices - The disclosure generally describes computer-implemented methods, software, and systems for providing camera-based hover detection for touch-based mobile devices. One computer-implemented method includes receiving image data from at least one image capture device associated with a particular client device, comparing, by operation of a computer, the received image data to existing image data, wherein the existing image data partially includes extrapolated imaged data, determining that the received image data does not compare with existing image data and transmitting the received image data to a server for post-processing, processing, by operation of a computer, post-processed image data received from the server, wherein the processing includes updating a user configuration with the post-processed image data, and generating a hover event based upon the received image data. | 03-13-2014 |
20140081683 | BUSINESS PROCESS MANAGEMENT FOR MOBILE PORTAL CLIENTS - The disclosure generally describes computer-implemented methods, software, and systems for integrating mobile portal client native application support into business processes. One computer-implemented method includes launching a business process, wherein the business process comprises a plurality of business process steps, monitoring, by operation of a computer, a back-end data environment for changes to data associated with the business process, transmitting, as part of a first business process step, business process data associated with the first business process step to a first application on a mobile client device, wherein the first application is a native application, and recording, by operation of a computer, indication data in the back-end data environment indicating, as part of a second business process step, that additional data associated with the transmitted business process data is to be displayed in a second application on the mobile client device. | 03-20-2014 |
20140101528 | AUTOMATIC GENERATION OF PORTAL THEMES AND COMPONENTS - The present disclosure involves systems, software, and computer implemented methods for generating code and/or style elements for a web page based on analyzed differences between a UI design and a default UI template. One example method includes identifying a user interface design created for at least one web page, where the UI design comprises a modified version of a default UI template. At least one difference between the identified UI design and the default UI template is analyzed. At least a subset of code and at least one style element are generated for the at least one web page in response to identifying the UI design, the subset of generated code and the at least one generated style element based on the at least one analyzed difference between the identified UI design and the default UI template. | 04-10-2014 |
20140164893 | ASSISTED PORTAL NAVIGATION AND CROWD-BASED FEEDBACK - The present disclosure describes methods, systems, and computer program products for assisted portal navigation and crowd-based feedback. One computer-implemented method includes processing, by operation of a computer, a hierarchy of container documents including a base-level container document and at least one active base-level content hyperlink and additional container documents associated with the at least one active base-level content hyperlink to: generate a site map specifying the hierarchy of container documents, and associate at least one generated graphical user interface (GUI) element with each container document in the hierarchy of container documents specified by the site map, receiving a hover detection event associated with the at least one active base-level content hyperlink, displaying a first-level pop-up container document including at least one first-level GUI element representing a particular additional container document associated with the one active base-level content hyperlink, and displaying a first-level detailed pop-up container document responsive to a detected hover event associated with one of the at least one first-level GUI element. | 06-12-2014 |
20140189804 | LOCATION-BASED APPLICATION SECURITY MECHANISM - The present disclosure describes methods, systems, and computer program products for providing a location-based application content security mechanism to a web portal. One computer-implemented method includes receiving a request for portal content from a client device, determining that the requested portal content has an established geo-location permission, requesting a client geo-location from the requesting client device, receiving the client geo-location from the requesting client device, determining, by operation of a computer, that the received client geo-location is within a required geo-location threshold associated with at least one geo-location data point associated with the established geo-location permission, and serving the portal content to the requesting client device. | 07-03-2014 |
20140359735 | MAINTAINING APPLICATION SESSION CONTINUITY ACROSS DEVICES - The present disclosure describes methods, systems, and computer program products for maintaining application session continuity across different devices. One computer-implemented method includes identifying a first application session of an application executing within a portal environment. The first application session of the application is associated with a first user who is operating at a first device. A representation of an application state for the first application session of the application is stored. A request is received to execute a second application session of the application within the portal environment from the first user operating at a second device different form the first device. The second application session of the application can be instantiated for execution within the portal environment. The second application session is instantiated to a state corresponding to the stored representation of the application state of the first application session. | 12-04-2014 |
20140372427 | REAL-TIME ANALYTIC REPORT ANALYSIS AND RETRIEVAL FRAMEWORK - The present disclosure describes methods, systems, and computer program products providing real-time analytic report analysis and data retrieval. One computer-implemented method includes receiving extracted metadata associated with a first analytic report, identifying the first analytic report using the received metadata, retrieving updated data used to generate the first analytic report, generating a second analytic report, where the second analytic report is an updated version of the first analytic report and uses the updated data, and transmitting the second analytic report. | 12-18-2014 |
Patent application number | Description | Published |
20130152194 | SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES - A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit of consoles and capture the defined limit of consoles. An image console control is configured to receive a request to check-out one or more of the captured consoles in one of an exclusive mode and a shared mode and determine whether the check-out request was made by the owner. The console access controller is further configured to open the one or more captured consoles in the exclusive mode to the owner if the check-out request is made by the owner and recapturing the one ore more consoles in response to a check-in request from the owner. | 06-13-2013 |
20130227550 | SYSTEM AND METHOD FOR ISOLATED VIRTUAL IMAGE AND APPLIANCE COMMUNICATION WITHIN A CLOUD ENVIRONMENT - Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource. | 08-29-2013 |
20130227699 | SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT - Provided herein are systems and method enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity. | 08-29-2013 |
20130227710 | SYSTEM AND METHOD FOR SECURING LEASED IMAGES IN A CLOUD ENVIRONMENT - Provided is a system, method, and computer-readable storage medium having one or more computer-readable instructions thereon for providing leased images in cloud computing environments. The method includes monitoring a usage of a leased image provided by a cloud vendor, by a client computing device. A threshold period of time associated with the usage is determined. Whether an access to the leased image should be terminated based upon an expiry of the threshold period of time or based upon a request received from the client computing device is determined. The image is locked based upon whether the access to the leased image should be terminated. An access request received for the locked image is monitored; and access to the locked image is enabled when it is determined that the access request is valid. | 08-29-2013 |
20130291052 | TRUSTED PUBLIC INFRASTRUCTURE GRID CLOUD - Systems and methods of implementing a secured cloud environment allow for design and instantiation of a security policy at the infrastructure level. An example system may comprise a first module to facilitate selecting at least two cloud computing component templates from a cloud computing component catalog. The system may comprise a second module to facilitate defining a connection between the at least two selected cloud computing component templates. The system may comprise a third module to facilitate assigning a security level and a policy to at least one of the at least two selected cloud computing component templates. The system may comprise a fourth module to facilitate building a cloud computing component blueprint. | 10-31-2013 |
20130307970 | AGENTLESS RECORDING FOR VIRTUAL MACHINE CONSOLES - A virtual machine console is recorded. A method for monitoring a virtual machine may comprise monitoring a virtualization environment, detecting a new virtual machine and associated console, creating an additional instantiation of the console by generating a reflection of the console on a video capture device and recording a real time video of an image of the additional instantiation of the console on the video capture device. Prior to recording, the image may be analyzed to determine a change and the recording of the image can be triggered based upon the analysis. | 11-21-2013 |
20130318599 | PROTECTING VIRTUAL MACHINE CONSOLE FROM MISUSE, HIJACKING OR EAVESDROPPING IN CLOUD ENVIRONMENTS - Access to virtual machine inputs and outputs are controlled. Controlling access to virtual machine inputs and outputs may comprise locking inputs and outputs of a virtual machine from within the virtual machine, other than a predefined limited access input, detecting a request to unlock the inputs and outputs of the virtual machine; determining if a requester is authorized to unlock the inputs and outputs of the virtual machine and unlocking, temporarily, the inputs and outputs of the virtual machine if the requester is authorized. The predefined limited access input is configured to receive an input device with a private secret for unlocking the inputs and outputs of the virtual machine. The inputs and outputs are unlocked when an input device having a shared password is attached. | 11-28-2013 |
20140089916 | CENTRALIZED, POLICY-DRIVEN MAINTENANCE OF STORAGE FOR VIRTUAL MACHINE DISKS (VMDKS) AND/OR PHYSICAL DISKS - In a method of operating a computing system, a disk image corresponding to a production managed machine is mounted on a service managed machine that performs operations distinct from those performed by the production managed machine in providing a computing service. The disk image is scanned at the service managed machine to determine a corrective action to be performed with respect to the disk image, and performance of the corrective action for the disk image of the production managed machine is initiated at the service managed machine. Related systems and computer program products are also discussed. | 03-27-2014 |
20140095868 | SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT - Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection. | 04-03-2014 |
20140096134 | SYSTEM AND METHOD FOR ENFORCEMENT OF SECURITY CONTROLS ON VIRTUAL MACHINES THROUGHOUT LIFE CYCLE STATE CHANGES - Systems and methods associated with virtual machine security are described herein. One example method includes instantiating a guest virtual machine in a virtual computing environment. The method also includes installing a life cycle agent on the guest virtual machine, assigning an identifying certificate, a set of policies, and an encryption key to the guest virtual machine, and providing the certificate, policies, and encryption key to the guest virtual machine. The certificate, policies, and encryption key may then be used by the guest virtual machine to authenticate itself within the virtual computing environment and to protect data stored on the guest virtual machine. | 04-03-2014 |
20140201525 | SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT - Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection. | 07-17-2014 |
20140373180 | SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT - Systems and methods enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity. | 12-18-2014 |
20150154043 | SYSTEM AND METHOD FOR ISOLATED VIRTUAL IMAGE AND APPLIANCE COMMUNICATION WITHIN A CLOUD ENVIRONMENT - Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource. | 06-04-2015 |
20150248544 | PRIVILEGED SHARED ACCOUNT PASSWORD SANITATION - Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area. | 09-03-2015 |