Patent application number | Description | Published |
20090288008 | Building macro elements for production automation control - A macro element template is replicated to build a macro element library. A macro element is associated with executable instructions for controlling a plurality of production devices to produce a special effect or segment of a media production. One or more automation control objects are positioned onto a control interface to build a macro element template. Build information is associated with each automation control object to assign a variable name, device type, property page field(s), and variable naming table. A replicator control interface allows a range of sources to be assigned to the macro element template, and is associated with executable instructions for building the macro element library. The macro element library includes user-defined filenames that enables a director to quickly search and select a desired macro element. Changes in production values ripple throughout the macro element library to dynamically update the macro elements. | 11-19-2009 |
20090292991 | Building macro elements for production automation control - A macro element template is replicated to build a macro element library. A macro element is associated with executable instructions for controlling a plurality of production devices to produce a special effect or segment of a media production. One or more automation control objects are positioned onto a control interface to build a macro element template. Build information is associated with each automation control object to assign a variable name, device type, property page field(s), and variable naming table. A replicator control interface allows a range of sources to be assigned to the macro element template, and is associated with executable instructions for building the macro element library. The macro element library includes user-defined filenames that enables a director to quickly search and select a desired macro element. Changes in production values ripple throughout the macro element library to dynamically update the macro elements. | 11-26-2009 |
20110007158 | TECHNIQUE FOR AUTOMATICALLY TRACKING AN OBJECT - Automatic tracking by a camera ( | 01-13-2011 |
20110023059 | METHOD AND APPARATUS FOR CONTENT REPLACEMENT IN LIVE PRODUCTION - The insertion of an advertisement or other new content into a time slot between content segments advantageously occurs by selecting the new segment to fill its associated slot as closely as possible. Play out of a successive content segment occurs for distribution over at least one of a first set of channels and at least one second channel until the occurrence of the time slot whereupon the new content segment undergoes play out for distribution over the at least one second channel. If the new content segment has a duration longer than the time slot, the length of at least one content segment gets reduced to provide substantially seamless play out. | 01-27-2011 |
20110038597 | METHOD AND APPARATUS FOR ASSOCIATING METADATA WITH CONTENT FOR LIVE PRODUCTION - A system for line production of a television show can include a newsroom computer system (NRCS | 02-17-2011 |
20150063787 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR AUTOMATED REAL-TIME EXECUTION OF LIVE INSERTS OF REPURPOSED STORED CONTENT DISTRIBUTION - A system, method, and computer program product for producing a show. In an embodiment, the invention is directed to a production system having a first production path, a second production path, and a control system that causes the first production path to generate a show in a first aspect ratio (4:3), and that causes the second production path to generate the same show in a second aspect ratio (16:9). In another embodiment, the invention is directed to producing a show from live material and from archived material. This aspect of the invention operates by producing a first show comprising a plurality of stories, segmenting the first show, and storing the show segments in an archive. Then, the invention produces a second show using live portions as well as show segments retrieved from the archive. The invention is also directed to a media manager that interacts with a server. In some cases, the server is integrated with the production system. The media manager automatically assigns channels/ports of the server when accessing material stored in the server. | 03-05-2015 |
Patent application number | Description | Published |
20090288142 | AUTHENTICATION DETECTION - A device, system, and method are directed towards facilitating a registration of a user for a network service. In one embodiment, a server receives, from a user at a client device, user information including at least one text block. The server analyzes the text block to determine an authenticity value of the user information. The analysis may be based on the length of a lexicon of the text block, the size of a word such as the longest word in the text block, or the number of clauses in the text block. The analysis may be further based on expected values determined by such values in authentic text blocks of a similar nature. Based on the authenticity value, the system may allow the user to access the network service, disallow access to the network, allow conditional access, queue the registration application for further review, or take other actions. | 11-19-2009 |
20160044020 | FACILITATING USERS TO OBFUSCATE USER CREDENTIALS IN CREDENTIAL RESPONSES FOR USER AUTHENTICATION - A system and method for facilitating users to obfuscate user credentials in credential responses for user authentication are disclosed. A string sequence may be presented to a user for prompting the user to input credential characters sequentially but not continuously. The string sequence may comprise a set of prompt strings containing a prompt character sequence associated with the user and a set of noise strings that do not contain the prompt character sequence. The individual prompt strings in the set of prompt strings may be composed by obfuscating the prompt sequence among noise characters. A user credential response may be received and a user provided credential may be extracted from the received user credential for user authentication. | 02-11-2016 |
Patent application number | Description | Published |
20080215527 | APPARATUS AND SYSTEM FOR DEFINING A METADATA SCHEMA TO FACILITATE PASSING DATA BETWEEN AN EXTENSIBLE MARKUP LANGUAGE DOCUMENT AND A HIERARCHICAL DATABASE - The apparatus and system are provided for defining a metadata schema to facilitate passing data between an XML document and a hierarchical database. The invention includes a database accessor, a document accessor, and an association module. The database accessor accesses a database schema indicative of database field names and a hierarchical structure for a hierarchical database. The document accessor accesses a document schema that defines the hierarchical structure, content data syntax, and semantics of valid, well-formed, XML documents that can be passed into and out of the hierarchical database. The document schema also includes at least one XML element name that maps to a corresponding database field name in the database schema. The association module associates the database schema and the document schema to provide a metadata schema that enables data to be passed between an XML document and the hierarchical database. | 09-04-2008 |
20090171997 | METHOD AND SYSTEM FOR OBTAINING USER DATA HAVING USER-DEFINED DATA TYPES - The present invention relates generally to data retrieval, and more particularly but not exclusively to obtaining referentially converted user data having user-defined data types. In one implementation, the present invention is a method for retrieving user data in a data system using one or more application programs for defining a layout for each user data type, defining one or more conversion routines for non-standard data types, calling a coordination call to map standard and non-standard data types, and retrieve the user data from the data storage device. | 07-02-2009 |
20130179474 | Rich Database Metadata Model that Captures Application Relationships, Mappings, Constraints, and Complex Data Structures - The capturing of rich database metadata includes: capturing partitioned column metadata of a database as mappings defined by a plurality of constraint statements; defining non-standard user-defined types of the database according to a schema; defining physical representations of columns of the database according to the schema; and storing the defined mappings, the defined user-defined types, and the defined physical representations of columns to a catalog of the database. Application enumerated data values in the database may also be defined according to the XML schema and stored to the catalog of the database. In this manner, the database management system may manage application constraints, user-defined types, and physical representations of data for applications referencing the same database using the metadata information stored in the catalog of the database. | 07-11-2013 |
20130246394 | STRUCTURED LARGE OBJECT (LOB) DATA - Provided are techniques for processing structured content within Large Object (LOB) data that is stored in a column of a database table. Structural metadata describing structures that each define a different format of the structured content is stored. A request for data in the database table is received. The structural metadata is used to create an empty result set with columns defined by at least two of the structures. For each row of data in the database table that includes LOB data, control data is used to identify one of the structures to be applied to the structured content within the LOB data stored in that row of data, and the structured content within the LOB data in that row of data is mapped to the columns in the result set based on the identified one of the structures. The result set is returned. | 09-19-2013 |
20130246395 | STRUCTURED LARGE OBJECT (LOB) DATA - Provided are techniques for processing structured content within Large Object (LOB) data that is stored in a column of a database table. Structural metadata describing structures that each define a different format of the structured content is stored. A request for data in the database table is received. The structural metadata is used to create an empty result set with columns defined by at least two of the structures. For each row of data in the database table that includes LOB data, control data is used to identify one of the structures to be applied to the structured content within the LOB data stored in that row of data, and the structured content within the LOB data in that row of data is mapped to the columns in the result set based on the identified one of the structures. The result set is returned. | 09-19-2013 |
Patent application number | Description | Published |
20120330821 | METHODS OF MONITORING BEHAVIOR/ACTIVITY OF AN INDIVIDUAL ASSOCIATED WITH AN ORGANIZATION - A cooperative arrangement and method to monitor behaviors and other activities by an individual in an organization. Personal financial information associated with an individual who is associated with, or to be associated with, the organization are obtained. Information is extracted from the personal financial information and input into a risk assessment algorithm. The risk assessment algorithm operates on the input information and generates risk assessment data. The risk assessment data is evaluated to make a determination of certification with respect to the individual. A decision to certify means that the risk associated with the individual, with respect to committing fraud or some other improper act with respect to the organization, is acceptable. Risk assessment data on a plurality of key individuals within the organization may be generated and evaluated to make a determination of certification with respect to the organization as a whole. | 12-27-2012 |
20140122312 | METHODS OF MONITORING BEHAVIOR/ACTIVITY OF AN INDIVIDUAL ASSOCIATED WITH AN ORGANIZATION - A cooperative arrangement and method to monitor behaviors and other activities by an individual in an organization. Personal financial information associated with an individual who is associated with, or to be associated with, the organization are obtained. Information is extracted from the personal financial information and input into a risk assessment algorithm. The risk assessment algorithm operates on the input information and generates risk assessment data. The risk assessment data is evaluated to make a determination of certification with respect to the individual. A decision to certify means that the risk associated with the individual, with respect to committing fraud or some other improper act with respect to the organization, is acceptable. Risk assessment data on a plurality of key individuals within the organization may be generated and evaluated to make a determination of certification with respect to the organization as a whole. | 05-01-2014 |
20150317577 | METHODS OF MONITORING BEHAVIOR/ACTIVITY OF AN INDIVIDUAL ASSOCIATED WITH AN ORGANIZATION - A cooperative arrangement and method to monitor behaviors and other activities by an individual in an organization. Personal financial information associated with an individual who is associated with, or to be associated with, the organization are obtained. Information is extracted from the personal financial information and input into a risk assessment algorithm. The risk assessment algorithm operates on the input information and generates risk assessment data. The risk assessment data is evaluated to make a determination of certification with respect to the individual. A decision to certify means that the risk associated with the individual, with respect to committing fraud or some other improper act with respect to the organization, is acceptable. Risk assessment data on a plurality of key individuals within the organization may be generated and evaluated to make a determination of certification with respect to the organization as a whole. | 11-05-2015 |
Patent application number | Description | Published |
20100049031 | Non-Thermal Ablation System for Treating BPH and Other Growths - Systems and methods for non-thermal ablation of tissue are provided. A non-implantable minimally invasive system for treatment of tissue in a body via direct current ablation is provided including a catheter, a plurality of electrodes for deployment through the catheter, a power source for applying power to the electrodes, and a fixation element for maintaining the catheter in a treatment position during treatment of the tissue. A minimally invasive method for treating tissue in a body via direct current ablation is provided including inserting a catheter into the body such that a portion of the catheter remains outside of the body, deploying a fixation element to fix the catheter in a treatment position, deploying a plurality of electrodes through the catheter, applying power to the plurality of electrodes, using the electrodes to apply a current to the tissue, and removing the catheter from the body. | 02-25-2010 |
20100049188 | Non-Thermal Ablation System for Treating Tissue - Systems and methods for non-thermal ablation of tissue are provided. A non-implantable minimally invasive system for treatment of tissue in a body via direct current ablation is provided including a catheter, a plurality of electrodes for deployment through the catheter, a power source for applying power to the electrodes, and a fixation element for maintaining the catheter in a treatment position during treatment of the tissue. A minimally invasive method for treating tissue in a body via direct current ablation is provided including inserting a catheter into the body such that a portion of the catheter remains outside of the body, deploying a fixation element to fix the catheter in a treatment position, deploying a plurality of electrodes through the catheter, applying power to the plurality of electrodes, using the electrodes to apply a current to the tissue, and removing the catheter from the body. | 02-25-2010 |
20100049192 | Catheter for Treating Tissue with Non-Thermal Ablation - Systems and methods for non-thermal ablation of tissue are provided. A non-implantable minimally invasive system for treatment of tissue in a body via direct current ablation is provided. A catheter for use in such system is further provided. The catheter includes a tubular body having a proximal end, a distal end, and a tip positioned at the distal end. The tubular body is semi-flexible, bi-directionally torqueable, and chemically resistant. The tubular body includes a plurality of routing holes provided between the proximal end and the distal end for facilitating deployment of electrodes from the tubular body. The tubular body further comprises an inner sheath generally at an interior portion and an outer sheath generally at an exterior portion and being chemically resistant. | 02-25-2010 |
20110106072 | Low-Corrosion Electrode for Treating Tissue - A non-implantable minimally invasive system for treatment of tissue in a body via direct current ablation is provided. A low-corrosion electrode for use with such system is further provided. In one embodiment the electrode includes a catheter end configured for coupling to a catheter, a tip configured for puncturing the tissue, and a length extending between the catheter and the tip. The length includes an active portion and an insulated portion. The active potion is electrically conductive and is between approximately 3 mm and approximately 12 mm long at an inserted portion of the electrode. The length further comprises an inner core formed of a material having a high resistance to deformation and an outer shell formed of a material having a high resistance to material decomposition. | 05-05-2011 |
Patent application number | Description | Published |
20110053486 | MODULAR, SELF-CONTAINED, MOBILE CLEAN ROOM - Biosafety units, methods of making, and sealing the same are disclosed herein. The units comprise at least one controlled air, sealable, sterilizable cleanroom; and a mechanical system room adjacent to the cleanroom comprising: at least two air handling units in a support room adjacent the cleanroom that provide redundant air to the cleanroom with at least Class 100,000 air purity, the air handling units connected to a one or more supply ducts to the cleanroom, and an exhaust duct in communication with the cleanroom and the air handling unit exhaust, wherein a pressure gradient is formed between the cleanroom and the exterior of the structure; and at least two power supplies that provide redundant power to electrical outlets in the cleanroom, wherein the at least two power supplies are connectable to one or more external power sources and the structure is pre-validatable or validated for pharmaceutical manufacturing. | 03-03-2011 |
20120192486 | LIGHT-EMITTING DIODE (LED) LIGHT BAR - A light weight and modular light emitting diode (LED) light bar comprising an extruded aluminum LED fixture frame with integral cooling fins is disclosed herein. The light bar of the present invention is used for high density multi-layer hydroponic grow facilities to greatly improve the uniformity and intensity of light distribution over the plants and at a much reduced energy cost and less heat-to-space compared to conventional lighting used in grow rooms. | 08-02-2012 |
20130109291 | MODULAR, SELF-CONTAINED, MOBILE CLEAN ROOM | 05-02-2013 |
Patent application number | Description | Published |
20150312337 | MIRRORING LOG DATA - One or more techniques and/or systems are provided for mirroring a caching log data structure from a primary storage controller to a secondary storage controller over multiple interconnect paths. The secondary storage controller may be configured as a backup or failover storage controller for the primary storage controller in the event the primary storage controller fails. Data and/or metadata describing the data may be mirrored from the primary storage controller to the secondary storage controller over one or more interconnect paths. The caching log data structure may be parsed into a plurality of streams. The streams may be assigned to interconnect paths between the primary storage controller and the secondary storage controller. A data ordering rule is enforced during mirroring of storage information of the streams across the interconnect paths (e.g., the secondary storage controller is to receive data in the order it was sent by respective streams). | 10-29-2015 |
20150331607 | SYSTEM AND METHOD FOR SIMULATING A PERSISTENT BYTE ADDRESSABLE STORAGE DEVICE ON A PERSISTENT BLOCK ADDRESSABLE STORAGE DEVICE - A persistent random-access, byte-addressable storage device may be simulated on a persistent random-access, block-addressable storage device of a storage system configured to enable asynchronous buffered access to information persistently stored on the block-addressable device. Buffered access to the information is provided, in part, by a portion of kernel memory within the storage system allocated as a staging area for the simulated byte-addressable storage device to temporarily store the information destined for persistent storage. One or more asynchronous interfaces may be employed by a user of the simulated byte-addressable device to pass metadata describing the information to a driver of the device, which may process the metadata to copy the information to the staging area. The driver may organize the staging area as one or more regions to facilitate buffering of the information (data) prior to persistent storage on the block-addressable storage device. Each asynchronous access interface is configured to ensure that an order of changes to the data in the persistent storage is consistent with the order of arrival of the changes at the driver. | 11-19-2015 |
20150355985 | RECOVERY CONSUMER FRAMEWORK - A recovery consumer framework provides for execution of recovery actions by one or more recovery consumers to enable efficient recovery of information (e.g., data and metadata) in a storage system after a failure event (e.g., a power failure). The recovery consumer framework permits concurrent execution of recovery actions so as to reduce recovery time (i.e., duration) for the storage system. The recovery consumer framework may coordinate (e.g., notify) the recovery consumers to serialize execution of the recovery actions by those recovery consumers having a dependency while allowing concurrent execution between recovery consumers having no dependency relationship. Each recovery consumer may register with the framework to associate a dependency on one or more of the other recovery consumers. The dependency association may be represented as a directed graph where each vertex of the graph represents a recovery consumer and each directed edge of the graph represents a dependency. The framework may traverse (i.e., walk) the framework graph and for each vertex encountered, notify the associated recovery consumer to initiate its respective recovery actions. | 12-10-2015 |
20160110263 | FAULT POLICY IMPLEMENTATION - One or more techniques and/or systems are provided for multicast transport configuration, for multicast transport, and/or for fault policy implementation. In an example, a multicast component may receive a data copy request from an application to copy data to multiple destinations. A scheduler component may create a transport schedule specifying an order with which to facilitate data copy operations across transports, such as heterogeneous transports, to the destinations. A dispatcher component may apply application specified transport modifiers to the data copy operations (e.g., a modification to a quality of service for a transport). The dispatcher component may facilitate the data copy operations and provide operation result information to a policy agent. The policy agent may provide notifications of data copy operation statuses from the operation result information and/or may implement a fault policy (e.g., a retry on a different transport) for a data copy operation that experienced a fault. | 04-21-2016 |
20160110272 | MULTICAST TRANSPORT CONFIGURATION - One or more techniques and/or systems are provided for multicast transport configuration, for multicast transport, and/or for fault policy implementation. In an example, a multicast component may receive a data copy request from an application to copy data to multiple destinations. A scheduler component may create a transport schedule specifying an order with which to facilitate data copy operations across transports, such as heterogeneous transports, to the destinations. A dispatcher component may apply application specified transport modifiers to the data copy operations (e.g., a modification to a quality of service for a transport). The dispatcher component may facilitate the data copy operations and provide operation result information to a policy agent. The policy agent may provide notifications of data copy operation statuses from the operation result information and/or may implement a fault policy (e.g., a retry on a different transport) for a data copy operation that experienced a fault. | 04-21-2016 |
20160112509 | MULTICAST TRANSPORT - One or more techniques and/or systems are provided for multicast transport configuration, for multicast transport, and/or for fault policy implementation. In an example, a multicast component may receive a data copy request from an application to copy data to multiple destinations. A scheduler component may create a transport schedule specifying an order with which to facilitate data copy operations across transports, such as heterogeneous transports, to the destinations. A dispatcher component may apply application specified transport modifiers to the data copy operations (e.g., a modification to a quality of service for a transport). The dispatcher component may facilitate the data copy operations and provide operation result information to a policy agent. The policy agent may provide notifications of data copy operation statuses from the operation result information and/or may implement a fault policy (e.g., a retry on a different transport) for a data copy operation that experienced a fault. | 04-21-2016 |