Patent application number | Description | Published |
20090237400 | EFFICIENT GEOMETRIC TESSELLATION AND DISPLACEMENT - Methods and computer-storage media are provided for rendering three-dimensional (3D) graphics by tessellating objects using novel structures and algorithms. Rendering utilizing “patches,” configurable functions that include a specified number of control points, allows for computation on a per-patch or per-control-point basis, in addition to traditional per-vertex, per-primitive, and per-pixel methods. This produces a number of advantages over previous tessellation methods, including the reuse of computations across existing vertices and the ability to process at a lower frequency. The operations to compute points are simplified in order to optimize system resources used in the process. Transitions from un-tessellated to tessellated objects are smoother utilizing the present invention, while developers have more flexibility in the level of detail present at different edges of the same patch. Detail within a displacement map also can be increased without negative effects associated with previous systems and methods. | 09-24-2009 |
20110148877 | EFFICIENT GEOMETRIC TESSELLATION AND DISPLACEMENT - Methods and computer-storage media are provided for rendering three-dimensional (3D) graphics by tessellating objects using novel structures and algorithms. Rendering utilizing “patches,” configurable functions that include a specified number of control points, allows for computation on a per-patch or per-control-point basis, in addition to traditional per-vertex, per-primitive, and per-pixel methods. This produces a number of advantages over previous tessellation methods, including the reuse of computations across existing vertices and the ability to process at a lower frequency. The operations to compute points are simplified in order to optimize system resources used in the process. Transitions from un-tessellated to tessellated objects are smoother utilizing the present invention, while developers have more flexibility in the level of detail present at different edges of the same patch. Detail within a displacement map also can be increased without negative effects associated with previous systems and methods. | 06-23-2011 |
20120086715 | TARGET INDEPENDENT RASTERIZATION - Methods, systems, and computer-storage media for target independent rasterization of an image. The target is the memory allocated for a rendered image within a graphics pipeline. Embodiments of the present invention allow the rasterization process's sampling rate to be specified independently from the memory allocated for the rendered image. Embodiments of the present invention also allow the rasterization process to be executed at a rate that does not correspond to the memory allocated for the rendered target. | 04-12-2012 |
20130063473 | SYSTEM AND METHOD FOR LAYERING USING TILE-BASED RENDERERS - A method for tile-based rendering of content. Content may be rendered in a memory region organized as multiple tiles. In scenarios in which content is generated in layers, for operations that involve compositing image layers, an order in which portions of the image are processed may be selected to reduce the aggregate number of memory accesses times, which in turn may improve the performance of a computer that uses tile-based rendering. An image may be processed such that operations relating to rendering portions of different layers corresponding to the same tile are performed sequentially. Such processing may be used in a computer with a graphics processing unit that supports tile-based rendering, and may be particularly well suited for computers with a slate form factor. An interface to a graphics processing utility within the computer may provide a flag to allow an application to specify whether operations may be reordered. | 03-14-2013 |
20140368523 | HARDWARE-ACCELERATED RESOURCE TILING - In one embodiment, a graphics processing unit | 12-18-2014 |
20150091931 | Procedurally Defined Texture Maps - A procedural texture relates texel coordinates to color values through an arbitrary function, herein called a texel shader. The procedural texture is defined by a dimension, size, texel format and the texel shader. Texel coordinates are an input to the texel shader, which generates a color value for those texel coordinates. A renderer can be implemented either in hardware, such as part of a graphics processor, or in software as a computer program executed by a processor. The renderer samples from the procedural texture in response to texel coordinates, and evaluates the texel shader on demand. Filtering also can be applied automatically to results. The results of the texel shader invocations are stored in a texture cache to take advantage of spatial and temporal locality. Results are shared among threads, processes and the like through the texture cache. | 04-02-2015 |
20150269767 | CONFIGURING RESOURCES USED BY A GRAPHICS PROCESSING UNIT - A resource used by a shader executed by a graphics processing unit is referenced using a “descriptor”. Descriptors are grouped together in memory called a descriptor heap. Applications allocate and store descriptors in descriptor heaps. Applications also create one or more descriptor tables specifying a subrange of a descriptor heap. To bind resources to a shader, descriptors are first loaded into a descriptor heap. When the resources are to be used by a set of executing shaders, descriptor tables are defined on the GPU identifying ranges within the descriptor heap. Shaders, when executing, refer to the currently defined descriptor tables to access the resources made available to them. If the shader is to be executed again with different resources, and if those resources are already in memory and specified in the descriptor heap, then the descriptor tables are changed to specify different ranges of the descriptor heap. | 09-24-2015 |
20160071230 | CONFIGURING RESOURCES USED BY A GRAPHICS PROCESSING UNIT - The application programming interface permits an application to specify resources to be used by shaders, executed by the GPU, through a data structure called the “root arguments.” A root signature is a data structure in an application that defines the layout of the root arguments used by an application. The root arguments are a data structure resulting from the application populating locations in memory according to the root signature. The root arguments can include one or more constant values or other state information, and/or one or more pointers to memory locations which can contain descriptors, and/or one or more descriptor tables. Thus, the root arguments can support multiple levels of indirection through which a GPU can identify resources that are available for shaders to access. | 03-10-2016 |
20160071315 | Convex Polygon Clipping During Rendering - In one example, a graphic computing device may apply a clipping technique to accurately and efficiently render a graphic data set. A central processing unit may generate a convex polygonal clip from a two-dimensional polygon. The central processing unit may calculate a clipping plane for a convex polygonal clip based on an edge of the convex polygonal clip. A graphics processor may apply the convex polygonal clip in a pixel shader. | 03-10-2016 |
Patent application number | Description | Published |
20120278712 | MULTI-INPUT GESTURES IN HIERARCHICAL REGIONS - This document describes techniques and apparatuses for multi-input gestures in hierarchical regions. These techniques enable applications to appropriately respond to a multi-input gesture made to one or more hierarchically related regions of an application interface. | 11-01-2012 |
20130063494 | ASSISTIVE READING INTERFACE - A screen reader for a computing device with a touch sensitive user interface. The screen reader operates in an investigatory mode in which touch inputs detected through the user interface are interpreted as inputs designating content on the display to verbally render. Each selection may be interpreted as designating a unit of content at the designated location. The size of the unit may be determined based on a direction of motion of pointing device arriving at the location on the display where the unit of content is designated. In this way, a user may, through simple and intuitively learned commands, designate content in units of different sizes such as characters, words, lines or paragraphs, when the content is text, and/or individual user interface elements when the displayed content being selected includes graphical elements. | 03-14-2013 |
20130067373 | EXPLICIT TOUCH SELECTION AND CURSOR PLACEMENT - A system and method for implementing an efficient and easy to user interface for a touch screen device. A cursor may be placed by a user using simple inputs. The device operates places the cursor coarsely and refines the cursor placement upon further input from the user. Text may be selected using a gripper associated with the cursor. The user interface allows text selection without occluding the text being selected with the user's finger or the gripper. For selecting text in a multi-line block of text, a dynamic safety zone is implemented to simplify text selection for the user. | 03-14-2013 |
20130080979 | EXPLICIT TOUCH SELECTION AND CURSOR PLACEMENT - A system and method for implementing an efficient and easy to user interface for a touch screen device. A cursor may be placed by a user using simple inputs. The device operates places the cursor coarsely and refines the cursor placement upon further input from the user. Text may be selected using a gripper associated with the cursor. The user interface allows text selection without occluding the text being selected with the user's finger or the gripper. For selecting text in a multi-line block of text, a dynamic safety zone is implemented to simplify text selection for the user. | 03-28-2013 |
20130113716 | INTERACTION MODELS FOR INDIRECT INTERACTION DEVICES - One or more techniques and/or systems are provided for utilizing input data received from an indirect interaction device (e.g., mouse, touchpad, etc.) as if the data was received from a direct interaction device (e.g., touchscreen). Interaction models are described for handling input data received from an indirect interaction device. For example, the interaction models may provide for the presentation of two or more targets (e.g., cursors) on a display when two or more contacts (e.g., fingers) are detected by indirect interaction device. Moreover, based upon a number of contacts detected and/or a pressured applied by respective contacts, the presented target(s) may be respectively transitioned between a hover visualization and an engage visualization. Targets in an engage visualization may manipulate a size of an object presented in a user interface, pan the object, drag the object, rotate the object, and/or otherwise engage the object, for example. | 05-09-2013 |
20150342525 | WEARABLE ELECTRONIC DEVICE - A wearable electronic device includes a composite band, a touch-sensor display, a skin sensor, and a course of electrical conductors. The composite band forms a loop having two or more rigid segments and a flexible segment coupled between the rigid segments. The touch-sensor display is arranged in a first of the rigid segments, and a skin sensor is arranged in a second of the rigid segments. The course of electrical conductors runs between the first and second rigid segments, inside the flexible segment. | 12-03-2015 |
20160070441 | DISPLAY-EFFICIENT TEXT ENTRY AND EDITING - Embodiments are disclosed for a method of providing a user interface on a computing device. The method includes presenting a virtual keyboard on a display of the computing device, detecting input to the virtual keyboard. The method further includes, for each detected input, determining whether the input selects any of one or more delimiter keys, displaying a placeholder for the input responsive to the input not selecting any of the one or more delimiter keys, and receiving suggested candidate text from a word-level recognizer and replacing all currently displayed placeholders with the suggested candidate text responsive to the input selecting any of the one or more delimiter keys. | 03-10-2016 |
Patent application number | Description | Published |
20100082804 | MEASURED CLIENT EXPERIENCE FOR COMPUTER NETWORK - Routing network traffic on a computer network is described. In one embodiment, a method is presented which includes transmitting instructions to a client, the instructions executable by the client to request content from two or more content servers, measure two or more network performance characteristics associated with the two or more different content servers, and issue a report to an administrative server. The report may include a first network performance characteristic and a second network performance characteristic. The method may further include selecting a target content server from one of two or more content servers based on comparison of the two or more network performance characteristics; and transmitting routing instructions to an intermediate routing system, the routing instructions executable by the intermediate routing system to direct subsequent content requests transmitted by the client to the target content server. | 04-01-2010 |
20100302940 | LOAD BALANCING ACROSS LAYER-2 DOMAINS - The present application relates to network configurations and specifically to scalable load balancing network configurations. One implementation includes an external client coupled to a scalable load balancing system. The scalable load balancing system includes a load balancing layer that is configured to encapsulate individual incoming packets of a packet flow from the external client. The load balancing layer is further configured to route the incoming packets to target devices on the system. The target devices can span multiple IP subnets. The incoming packets can pass through one or more load balancers of the load balancing layer before reaching individual target devices. Individual target devices can be configured to route at least some outgoing packets of the packet flow to the external client without passing through any of the one or more load balancers. | 12-02-2010 |
20110270908 | TRANSPARENT MIGRATION OF ENDPOINT - Architecture that facilitates the capture of connection state of a connection established between a client and an intermediate server and forwards the state to one or more target servers. A software component at the target server (as well as the intermediate server) uses this connection state to reply back to the client directly, thereby bypassing the intermediate server. All packets from the client related to the request are received at the intermediate server and then forwarded to the target server. The migration can be accomplished without any change in the client operating system and client applications, without assistance from a gateway device such as a load balancer or the network, without duplication of all packets between the multiple servers, and without changes to the transport layer stack of the intermediate and target servers. | 11-03-2011 |
20110283017 | Interconnecting Members of a Virtual Network - Computerized methods, systems, and computer-readable media are provided for establishing and managing a virtual network (V-net) and virtual machine (VM) switches that enable protected and isolated interconnections between members of the V-net. The V-net members include an originating network adapter that generates data packets addressed to a destination network adapter. Upon detecting data-packet generation, a source-side VM switch accesses a forwarding table associated with the V-net, ascertains a destination-side, VM-switch locator that corresponds to an identifier of the destination network adapter, and modifies the data packets to include the identifier. The forwarding table represents a mapping between the members of the V-net and VM switches located on respective nodes within the data center. In operation, the mapping enforces communication policies that govern data-packet traffic. Upon receiving the data packets, the destination-side VM switch restores the data packets and forwards them to the destination network adapter. | 11-17-2011 |
20120082160 | ROUTING USING GLOBAL ADDRESS PAIRS - The present invention extends to methods, systems, and computer program products for routing using global address pairs. Embodiments of the invention use publicly routable Internet Protocol (“IP”) addresses to represent sites rather than individual hosts. Hosts can be represented by a global address pair, including site public IP address and a node private IP address. Nodes route packets to address processing modules using IP-in-IP encapsulation. An outer header contains a site public IP address and is destined to a site on inter-site links. An inner header contains a node private IP address and is destined to a private endpoint in intra-site links. In some embodiments, a site public IPv4 address and a node private IPv4 address are encoded into an IPv6 address. Use of an IPv6 address makes encoding of the two IPv4 address transparent to IPv6 applications. | 04-05-2012 |
20120155266 | SYNCHRONIZING STATE AMONG LOAD BALANCER COMPONENTS - The present invention extends to methods, systems, and computer program products for synchronizing state among load balancer components. Embodiments of the invention include load balancers using a consistent hashing algorithm to decide how new connections should be load balanced. Use of consistent hashing algorithm permits load balancers to work in a stateless manner in steady state. Load balancers start keeping flow state information (destination address for a given flow) about incoming packets when it is needed, i.e. such as, for example, when a change in destination host configuration is detected. State information is shared across load balancers in a deterministic way, which allows knowing which load balancer is authoritative (e.g., is the owner) for a given flow. Each load balancer can reach the authoritative load balancer to learn about a flow that cannot be determined locally. | 06-21-2012 |
20120303809 | OFFLOADING LOAD BALANCING PACKET MODIFICATION - The present invention extends to methods, systems, and computer program products for off loading load balancing packet modification. Embodiments of the invention can be used to offload the load of forwarding packets back to packet senders. Load balancers and/or the NAT devices can handle the first few packets of a connection to formulate connection mappings and then are removed from further communication for the connections. For example, a load balancer or NAT device makes the corresponding load balancing or the NAT decision based on a first packet and then informs the sender of the data of the decision. From then on, the sender can directly send the data to the receiver without having to go through the load balancer or NAT. | 11-29-2012 |
20130100956 | ROUTING USING GLOBAL ADDRESS PAIRS - The present invention extends to methods, systems, and computer program products for routing using global address pairs. Embodiments of the invention use publicly routable Internet Protocol (“IP”) addresses to represent sites rather than individual hosts. Hosts can be represented by a global address pair, including site public IP address and a node private IP address. Nodes route packets to address processing modules using IP-in-IP encapsulation. An outer header contains a site public IP address and is destined to a site on inter-site links. An inner header contains a node private IP address and is destined to a private endpoint in intra-site links. In some embodiments, a site public IPv4 address and a node private IPv4 address are encoded into an IPv6 address. Use of an IPv6 address makes encoding of the two IPv4 address transparent to IPv6 applications. | 04-25-2013 |
20130254375 | ACHIEVING ENDPOINT ISOLATION BY FAIRLY SHARING BANDWIDTH - Computerized methods, systems, and computer-storage media for fairly sharing available bandwidth among endpoints (including physical or virtual machines) of a multitenant environment are provided. Initially, a load balancer of the network is programmed to monitor bandwidth used by the endpoints, respectively, and to compare an aggregation of the usage against a network threshold. Also, the load balancer is equipped to dynamically classify the endpoints using the respective monitored bandwidth. Classifying generally involves designating some endpoints as small entities, which individually consume an amount of bandwidth less than an endpoint threshold, and designating other endpoints as large entities, which individually consume an amount of bandwidth greater than the endpoint threshold. Upon the aggregate bandwidth usage overcoming the network threshold, data packets being sent to or transmitted from the large entities are randomly dropped, while data packets being sent to or transmitted from the small entities are unrestrained. | 09-26-2013 |
20130339505 | MULTI-TENANT MIDDLEWARE CLOUD SERVICE TECHNOLOGY - A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services. The services include a middleware management service that is configured to maintain per-tenant middleware policy for each of multiple tenants. The middleware management service causes the middleware policy to be applied to network traffic by directing network traffic to a middleware enforcement mechanism. This middleware policy is per-tenant in that it depends on an identity of a tenant. | 12-19-2013 |
20130346465 | APPLICATION ENHANCEMENT USING EDGE DATA CENTER - A management service that receives requests for the cloud computing environment to host applications, and improves performance of the application using an edge server. In response to the original request, the management service allocates the application to run on an origin data center, evaluates the application by evaluating at least one of the application properties designated by an application code author or provider, or the application performance, and uses an edge server to improve performance of the application in response to evaluating the application. For instance, a portion of application code may be offloaded to run on the edge data center, a portion of application data may be cached at the edge data center, or the edge server may add functionality to the application. | 12-26-2013 |
20130346558 | DELIVERY CONTROLLER BETWEEN CLOUD AND ENTERPRISE - A delivery controller for use in an enterprise environment that communicates with a cloud computing environment that is providing a service for the enterprise. As the cloud service processing progresses, some cloud service data is transferred from the cloud computing environment to the enterprise environment, and vice versa. The cloud service data may be exchanged over any one of a number of different types of communication channels. The delivery controller selects which communication channel to use to transfer specific data, depending on enterprise policy. Such policy might consider any business goals of the enterprise, and may be applied at the application level. | 12-26-2013 |
20140098814 | VIRTUAL MACHINE MULTICAST/BROADCAST IN VIRTUAL NETWORK - The performance of multicast and/or broadcasting between virtual machines over a virtual network. A source hypervisor accesses a network message originated from a source virtual machine, and uses the network message to determine a virtual network address associated with destination virtual machines (after potentially resolving group virtual network addresses). Using each virtual network address, the hypervisor determines a physical network address of the corresponding hypervisor that supports the destination virtual machine, and also determines a unique identifier for the destination virtual machine. The source hypervisor may then dispatch the network message along with the unique identifier to the destination hypervisor over the physical network using the physical network address of the hypervisor. The destination hypervisor passes the network message to the destination virtual machine identified by the unique identifier. | 04-10-2014 |
20140185446 | SYNCHRONIZING STATE AMONG LOAD BALANCER COMPONENTS - The present invention extends to methods, systems, and computer program products for synchronizing state among load balancer components. Embodiments of the invention include load balancers using a consistent hashing algorithm to decide how new connections should be load balanced. Use of consistent hashing algorithm permits load balancers to work in a stateless manner in steady state. Load balancers start keeping flow state information (destination address for a given flow) about incoming packets when it is needed, i.e. such as, for example, when a change in destination host configuration is detected. State information is shared across load balancers in a deterministic way, which allows knowing which load balancer is authoritative (e.g., is the owner) for a given flow. Each load balancer can reach the authoritative load balancer to learn about a flow that cannot be determined locally. | 07-03-2014 |
20140304387 | MULTI-TENANT MIDDLEWARE CLOUD SERVICE TECHNOLOGY - A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services. The services include a middleware management service that is configured to maintain per-tenant middleware policy for each of multiple tenants. The middleware management service causes the middleware policy to be applied to network traffic by directing network traffic to a middleware enforcement mechanism. This middleware policy is per-tenant in that it depends on an identity of a tenant. | 10-09-2014 |
20150063115 | SYNCHRONIZING STATE AMONG LOAD BALANCER COMPONENTS - The present invention extends to methods, systems, and computer program products for synchronizing state among load balancer components. Embodiments of the invention include load balancers using a consistent hashing algorithm to decide how new connections should be load balanced. Use of consistent hashing algorithm permits load balancers to work in a stateless manner in steady state. Load balancers start keeping flow state information (destination address for a given flow) about incoming packets when it is needed, i.e. such as, for example, when a change in destination host configuration is detected. State information is shared across load balancers in a deterministic way, which allows knowing which load balancer is authoritative (e.g., is the owner) for a given flow. Each load balancer can reach the authoritative load balancer to learn about a flow that cannot be determined locally. | 03-05-2015 |
20150193255 | VIRTUAL MACHINE MULTICAST/BROADCAST IN VIRTUAL NETWORK - The performance of multicast and/or broadcasting between virtual machines over a virtual network. A source hypervisor accesses a network message originated from a source virtual machine, and uses the network message to determine a virtual network address associated with destination virtual machines (after potentially resolving group virtual network addresses). Using each virtual network address, the hypervisor determines a physical network address of the corresponding hypervisor that supports the destination virtual machine, and also determines a unique identifier for the destination virtual machine. The source hypervisor may then dispatch the network message along with the unique identifier to the destination hypervisor over the physical network using the physical network address of the hypervisor. The destination hypervisor passes the network message to the destination virtual machine identified by the unique identifier. | 07-09-2015 |
Patent application number | Description | Published |
20100299349 | Reducing Latency in Returning Online Search Results - An embodiment of the invention is directed to reducing search-response latency. The closest intermediate server can be located between a client computing device and a search engine. A search query is sent to the intermediate server in a first packet of a transport protocol handshake. A plurality of packets are received from the intermediate server. The plurality of packets are used to open a window associated with a transport protocol. A response related to the search query is received by the client. | 11-25-2010 |
20130138813 | ROLE INSTANCE REACHABILITY IN DATA CENTER - Individual role instance reachability and load balancing are simultaneously provided for role instances of an application running in a hosting environment. Instance endpoints may be assigned to each role instance. Each instance endpoint may comprise a combination of an IP address, a transport protocol, and a unique port number. Additionally, a load balanced endpoint may be assigned to the group of role instances. The load balanced endpoint may comprise a combination of an IP address, transport protocol, and another unique port number. When application messages are issued to the data center, the messages are routed in accordance with endpoints used by the messages. For an instance endpoint, the message is routed to a role instance corresponding with the instance endpoint without load balancing. For the load balanced endpoint, the message is routed to any one of the role instances using load balancing. | 05-30-2013 |
20130159487 | Migration of Virtual IP Addresses in a Failover Cluster - The movement of a Virtual IP (VIP) address from cluster node to cluster node is coordinated via a load balancer. All or a subset of the nodes in a load balancer cluster may be configured as possible hosts for the VIP. The load balancer directs VIP traffic to the Dedicated IP (DIP) address for the cluster node that responds affirmatively to periodic health probe messages. In this way, a VIP failover is executed when a first node stops responding to probe messages, and a second node starts to respond to the periodic health probe messages. In response to an affirmative probe response from a new node, the load balancer immediately directs the VIP traffic to the new node's DIP. The probe messages may be configured to identify which nodes are currently responding affirmatively to probes to assist the nodes in determining when to execute a failover. | 06-20-2013 |
20140019602 | LOAD BALANCING FOR SINGLE-ADDRESS TENANTS - Load balancing for single-address tenants. When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address. | 01-16-2014 |
20140082048 | NETWORK SERVICES PROVIDED IN CLOUD COMPUTING ENVIRONMENT - A cloud computing environment providing a network service for a client computing entity. The network service is not an application level service, but rather a service that operates at or below the network layer in the protocol stack. For instance, the network service might be a network endpoint service such as a network address service (such as DNS) or a dynamic network service (such as DHCP), or a network traffic service such as a firewall service or a secure tunneling service (such as VPN). The service might also provide a pipeline of network services for network level traffic to and from the client computing entity. The cloud environment uses policy to determine which of a plurality of communication channels to use when exchanging cloud service data for the network service. | 03-20-2014 |
20140108655 | LOAD BALANCER BYPASS - Bypassing a load balancer that initially appeared in a multi-message flow from a source machine served by a source intermediary and a target machine served on a target intermediary. One or more original network messages (and perhaps just the first) of the flow arrive from the source intermediary at the load balancer, which selects which machine is to be a destination machine, and it turns out selects the destination machine serviced by the destination intermediary. In response to receiving this message, the destination intermediary instructs the source intermediary to transmit subsequent messages in the flow in a manner that bypasses the load balancer. To facilitate this, the source intermediary may modify addressing of subsequent flow messages from the source machine such that they are rerouted to the destination machine without addressing the load balancer. | 04-17-2014 |
20140351395 | LOAD BALANCING FOR SINGLE-ADDRESS TENANTS - When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address. | 11-27-2014 |
20160026505 | LOAD BALANCING FOR SINGLE-ADDRESS TENANTS - When a load balancer detects that a virtual address is associated with a single destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a plurality of destination addresses. The load balancer instructs the router to bypass the load balancer for network packets that are addressed to the virtual address, and refrains from storing subsequent flow state for the virtual address. When the virtual address is to be scaled up with an additional destination address, the load balancer sets a flag to distinguish the virtual address from virtual addresses that are associated with a single destination addresses. The load balancer instructs the router to route network packets that are addressed to the virtual address through the load balancer, instead of bypassing the load balancer, and starts storing flow state for the virtual address. | 01-28-2016 |
20160050116 | NETWORK DEVICE CONFIGURATION FRAMEWORK - Various embodiments of methods and systems for network infrastructure configuration based on network device configuration templates are provided. A network device configuration template is received where the network device configuration template corresponds to network device configuration data based on template elements. Template elements include variable placeholders, versions, Stock Keeping Units (SKUs), firmware, and target devices identified in the network device configuration template. Values for the template elements are referenced from a dataset storage component. The network device configuration data are classified into different classification units. The network device configuration data are merged with the network device configuration template that programmatically defines configuration of network devices. A network device configuration instance is generated based on evaluating the template elements and replacing template elements with values from the dataset storage. The network device can be associated with a configuration scope, where the configuration scope indicates intended configuration features of the network devices. | 02-18-2016 |
20160105499 | LOAD BALANCER BYPASS - Redirecting message flows to bypass load balancers. A destination intermediary receives a source-side message that includes a virtual address of a load balancer as a destination, and that is augmented to include a network address of a destination machine as a destination. The destination intermediary determines that a source intermediary should address subsequent network messages that originate from a source machine and that are associated with the same multi-message flow to the destination machine while bypassing the load balancer. The destination intermediary modifies the source-side message so the destination for the source-side message addresses the source machine, and passes the modified source-side message to the destination machine. The destination intermediary receives a response from the destination machine identifying the source machine as its destination, and modifies the response so a source address identifies the virtual address of the load balancer, and dispatches the modified response to the source machine. | 04-14-2016 |
Patent application number | Description | Published |
20090287874 | Flash Recovery Employing Transaction Log - A transaction log for flash recovery includes a chained sequence of blocks specifying the operations that have been performed, such as a write to a sector or an erase to a block. Checkpoints are performed writing the entire flash state to flash. Once a checkpoint is performed, all of the log entries prior to the checkpoint are deleted and the log processing on recovery begins with the latest checkpoint. If the system is able to safely shutdown, then a checkpoint may be performed before the driver unloads, and on initialization, the entire persisted flash state may be loaded into the flash memory with a minimal amount of flash scanning. If a power failure occurs during system operation, then on the next boot-up, only the sectors or blocks specified in the log entries after the latest checkpoint have to be scanned, rather than all the sectors on the part. | 11-19-2009 |
20100049776 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 02-25-2010 |
20100217788 | STORAGE SYSTEM FORMAT FOR TRANSACTION SAFE FILE SYSTEM - A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode. | 08-26-2010 |
20110302142 | STORAGE SYSTEM FORMAT FOR TRANSACTION SAFE FILE SYSTEM - A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode. | 12-08-2011 |
20120011177 | TRANSACTION-SAFE FAT FILE SYSTEM IMPROVEMENTS - Concepts for enhancing operation of transaction-safe file allocation table systems are described. The concepts include writing a file to non-volatile memory media and rendering an update of file size to the TFAT storage medium; and receiving a request to locate data in a non-volatile memory having a TFAT file management system, selecting a sector of the memory to parse to locate the data, determining when the selected sector is a first sector of a directory or subdirectory of the memory and when determining reveals that the selected sector is a first sector, skipping reading data from the selected sector. The concepts also include flushing a cache and synchronizing FATs. | 01-12-2012 |
20120011179 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE SYSTEM - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 01-12-2012 |
20130318136 | FAT DIRECTORY STRUCTURE FOR USE IN TRANSACTION SAFE FILE SYSTEM - Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second. | 11-28-2013 |
20140279877 | Transaction-Safe Fat File System Improvements - Concepts for enhancing operation of transaction-safe file allocation table systems are described. The concepts include writing a file to non-volatile memory media and rendering an update of file size to the TFAT storage medium; and receiving a request to locate data in a non-volatile memory having a TFAT file management system, selecting a sector of the memory to parse to locate the data, determining when the selected sector is a first sector of a directory or subdirectory of the memory and when determining reveals that the selected sector is a first sector, skipping reading data from the selected sector. The concepts also include flushing a cache and synchronizing FATs. | 09-18-2014 |
20150227753 | CONTENT ITEM ENCRYPTION ON MOBILE DEVICES - Applications are stored on removable storage of a mobile device in an encrypted form to provide isolation and piracy protection. In one implementation, each application is encrypted using its own associated encryption key that is generated based on an identifier of the application and a master key that is associated with a trusted platform module of the mobile device. In another implementation, each application is encrypted using two associated encryption keys. One key is used to encrypt binary data associated with the application such as source code, and the other key is used to encrypt application data such as graphics and configuration files. The encryption keys are each generated using the identifier of the application, the master key, and identifiers of the folders where the corresponding data types are stored on the mobile device. The removable storage includes SD cards formatted using the FAT or exFAT file systems. | 08-13-2015 |
Patent application number | Description | Published |
20100288468 | Motion Detecting Device, Method of Providing the Same, and Method of Detecting Movement - In some embodiments, a motion detecting device is configured to detect whether one or more movement events have occurred. The motion detecting device can include: (a) a processing module configured to run on a computational unit; and (b) a sensing device having: (1) one or more pressure sensors configured to provide two or more pressure measurements; and (2) a transmitter electrically coupled to the one or more pressure sensors and configured to transmit the two or more pressure measurements to the computational unit. The processing module is configured to use the two or more pressure measurements to determine whether the one or more movement events have occurred. The sensing device can be configured to be placed in at least one of ductwork of a heating, ventilation, and air conditioning system or an air handler of the heating, ventilation, and air conditioning system. Other embodiments are disclosed. | 11-18-2010 |
20100313958 | SENSING EVENTS AFFECTING LIQUID FLOW IN A LIQUID DISTRIBUTION SYSTEM - By monitoring pressure transients in a liquid within a liquid distribution system using only a single sensor, events such as the opening and closing of valves at specific fixtures are readily detected. The sensor, which can readily be coupled to a faucet bib, transmits an output signal to a computing device. Each such event can be identified by the device based by comparing characteristic features of the pressure transient waveform with previously observed characteristic features for events in the system. These characteristic features, which can include the varying pressure, derivative, and real Cepstrum of the pressure transient waveform, can be used to select a specific fixture where a valve open or close event has occurred. Flow to each fixture and leaks in the system can also be determined from the pressure transient signal. A second sensor disposed at a point disparate from the first sensor provides further event information. | 12-16-2010 |
20110028093 | Bluetooth Proximity Detection System and Method of Interacting With One or More Bluetooth Devices - Some embodiments teach an apparatus for determining a proximity of one or more first Bluetooth devices. The apparatus can include: (a) at least one Bluetooth base station with (1) a Bluetooth transmitter configured to transmit one or more service discovery requests to the one or more first Bluetooth devices; and (2) a Bluetooth receiver configured to receive one or more responses from the one or more first Bluetooth devices to the one or more service discovery requests; and (b) a computational module configured to run on one or more processors and further configured to determine one or more approximate distances between the at least one Bluetooth base station and the one or more first Bluetooth devices based on the one or more responses from the one or more first Bluetooth devices. Other embodiments are disclosed. | 02-03-2011 |
20110282596 | Apparatus Configured to Detect Gas Usage, Method of Providing Same, and Method of Detecting Gas Usage - In some embodiments, an apparatus can be configured to detect gas usage. The apparatus can include: (a) a processing module configured to run on a computational unit; and (b) a sensing unit configured to be coupled to a gas regulator, the sensing unit having: (1) at least one acoustic sensor configured to detect two or more acoustic signals produced by the gas regulator and convert the two or more acoustic signals into one or more first data signals; and (2) a transmitter electrically coupled to the at least one acoustic sensor and configured to transmit the one or more first data signals to the computational unit. The processing module is configured to use the one or more first data signals to determine the gas usage. Other embodiments are disclosed. | 11-17-2011 |
20120068692 | Systems and Methods for Measuring Electrical Power Usage in a Structure and Systems and Methods of Calibrating the Same - Some embodiments can concern a method of using a power consumption measurement device. The power consumption measurement device can be mechanically coupled to a surface of a circuit breaker box overlying at least part of one or more main electrical supply conductors for an electrical power infrastructure of a structure. The method can include: determining one or more first magnetic field readings from the one or more main electrical supply conductors using one or more sensors in the power consumption measurement device; after determining the one or more first magnetic field readings, electrically coupling a first calibration load to the electrical power infrastructure; while the first calibration load remains electrically coupled to the electrical power infrastructure, determining one or more second magnetic field readings from the one or more main electrical supply conductors using the one or more sensors in the power consumption measurement device; calibrating the power consumption measurement device using at least in part the one or more first magnetic field readings and the one or more second magnetic field readings, after calibrating the power consumption measurement device, determining one or more third magnetic field readings from the one or more main electrical supply conductors using the one or more sensors in the power consumption measurement device; and determining an electrical power used by the electrical power infrastructure of the structure using at least the one or more third magnetic field readings and the one or more calibration coefficients. Calibrating the power consumption measurement device can include determining one or more first calibration coefficients for the power consumption measurement device using at least in part the one or more first magnetic field readings and the one or more second magnetic field readings. Other embodiments are disclosed. | 03-22-2012 |
20120072143 | System for Monitoring Electrical Power Usage of a Structure and Method of Same - Some embodiments can teach a system for monitoring usage of electrical power by a structure. The structure can have one or more main electrical power lines that supply the electrical power to a first load in the structure. A portion of the one or more main electrical power lines can run substantially parallel to a first axis. The structure can further have a panel that overlies the portion of the one or more main electrical power lines. The system can include: (a) a current sensor unit configured to be coupled to a portion of a surface of the panel, the current sensor unit having: (a) at least one magnetic field sensor having a length substantially parallel to a second axis, wherein the second axis is substantially perpendicular to the first axis, and the at least one magnetic field sensor is configured to detect a magnetic field generated by the one or more main electrical power lines; and (b) a processing unit configured to run on a processor. The current sensor unit can be configured to produce an output signal based on the magnetic field detected by the at least one magnetic field sensor. The processing unit further can be configured to receive the output signal from the current sensor unit and process the output signal to determine one or more parameters related to the usage of the electrical power by the first load in the structure. Other embodiments are disclosed. | 03-22-2012 |
20120092142 | Detecting Actuation of Electrical Devices Using Electrical Noise Over a Power Line - Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. Disclosed is an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. Machine learning techniques are used to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. The system has been tested to evaluate system performance over time and in different types of houses. Results indicate that various electrical events can be learned and classified with accuracies ranging from 85-90%. | 04-19-2012 |
20120162057 | SENSING USER INPUT USING THE BODY AS AN ANTENNA - A human input system is described herein that provides an interaction modality that utilizes the human body as an antenna to receive electromagnetic noise that exists in various environments. By observing the properties of the noise picked up by the body, the system can infer human input on and around existing surfaces and objects. Home power lines have been shown to be a relatively good transmitting antenna that creates a particularly noisy environment. The human input system leverages the body as a receiving antenna and electromagnetic noise modulation for gestural interaction. It is possible to robustly recognize touched locations on an uninstrumented home wall using no specialized sensors. The receiving device for which the human body is the antenna can be built into common, widely available electronics, such as mobile phones or other devices the user is likely to commonly carry. | 06-28-2012 |
20130124123 | Detecting Actuation of Electrical Devices Using Electrical Noise Over a Power Line - Activity sensing in the home has a variety of important applications, including healthcare, entertainment, home automation, energy monitoring and post-occupancy research studies. Many existing systems for detecting occupant activity require large numbers of sensors, invasive vision systems, or extensive installation procedures. Disclosed is an approach that uses a single plug-in sensor to detect a variety of electrical events throughout the home. This sensor detects the electrical noise on residential power lines created by the abrupt switching of electrical devices and the noise created by certain devices while in operation. Machine learning techniques are used to recognize electrically noisy events such as turning on or off a particular light switch, a television set, or an electric stove. The system has been tested to evaluate system performance over time and in different types of houses. Results indicate that various electrical events can be learned and classified with accuracies ranging from 85-90%. | 05-16-2013 |
20130179124 | ELECTRICAL EVENT DETECTION DEVICE AND METHOD OF DETECTING AND CLASSIFYING ELECTRICAL POWER USAGE - Some embodiments can concern an apparatus configured to detect an electrical state of one or more electrical devices. The one or more electrical devices are coupled to an electrical power infrastructure and generate one or more high-frequency electrical signals on the electrical power infrastructure. The apparatus can include: (a) a processing module configured to run on a processor of a computational unit; and (b) a sensing device configured to be coupled to an electrical outlet. The sensing device can have: (a) a data acquisition receiver configured to receive the one or more high-frequency electrical signals via the electrical outlet and convert the one or more high-frequency electrical signals into one or more first data signals when the sensing device is coupled to the electrical outlet. The electrical outlet can be electrically coupled to the electrical power infrastructure. The sensing device is in communication with the computational unit. The processing module is further configured to identify the electrical state of the one or more electrical devices at least in part using the one or more first data signals. The high-frequency electrical signals comprise electrical signals in the ten kilohertz to three megahertz range. Other embodiments are disclosed. | 07-11-2013 |
20130289930 | Motion Detecting Device, Method Of Providing The Same, And Method Of Detecting Movement - In some embodiments, a motion detecting device is configured to detect whether one or more movement events have occurred. The motion detecting device can include: (a) a processing module configured to run on a computational unit; and (b) a sensing device having: (1) one or more pressure sensors configured to provide two or more pressure measurements; and (2) a transmitter electrically coupled to the one or more pressure sensors and configured to transmit the two or more pressure measurements to the computational unit. The processing module is configured to use the two or more pressure measurements to determine whether the one or more movement events have occurred. The sensing device can be configured to be placed in at least one of ductwork of a heating, ventilation, and air conditioning system or an air handler of the heating, ventilation, and air conditioning system. Other embodiments are disclosed. | 10-31-2013 |
20140026644 | Sensing Events Affecting Liquid Flow in a Liquid Distribution System - By monitoring pressure transients in a liquid within a liquid distribution system using only a single sensor, events such as the opening and closing of valves at specific fixtures are readily detected. The sensor, which can readily be coupled to a faucet bib, transmits an output signal to a computing device. Each such event can be identified by the device based by comparing characteristic features of the pressure transient waveform with previously observed characteristic features for events in the system. These characteristic features, which can include the varying pressure, derivative, and real Cepstrum of the pressure transient waveform, can be used to select a specific fixture where a valve open or close event has occurred. Flow to each fixture and leaks in the system can also be determined from the pressure transient signal. A second sensor disposed at a point disparate from the first sensor provides further event information. | 01-30-2014 |
20140070940 | SENSOR NODES, APPARATUSES, AND METHODS FOR WIRELESSLY TRANSMITTING DATA TO A POWER INFRASTRUCTURE - Apparatuses, sensor nodes, systems and methods for modulating and transmitting sensor data wirelessly to an existing power line network are described. An apparatus may include a microcontroller having an oscillator and an input/output buffer. The microcontroller may process an electrical signal and the input/output buffer may drive a digital signal. The apparatus may include a transmitter utilizing the oscillator and the input/output buffer of the microcontroller. The transmitter may include a resonator coupled to the oscillator and modulation circuitry coupled to the oscillator and resonator. The resonator may modulate a frequency of the oscillator responsive to a modulation signal based on the processed electrical signal. The transmitter may further include an antenna coupled to the input/output buffer of the microcontroller for transmission of the data, and a resonant tank coupled to an output of the input/output buffer to provide an analog signal to the antenna. | 03-13-2014 |
20140072060 | RECEIVER, APPARATUS, AND METHODS FOR WIRELESSLY RECEIVING DATA FROM A POWER INFRASTRUCTURE - Apparatuses, receivers, systems and methods for receiving data via a power line infrastructure. An exemplary apparatus includes a base station configured to receive a signal from a power line of a structure by coupling to the power line through an electrical outlet. The base station may include an impedance matching circuit configured to match an impedance of the power line of the structure, and a receiver coupled to the impedance matching circuit. The receiver may be configured to demodulate the signal received from the power line of the structure, convert the demodulated signal into a digital signal, and provide the digital signal to a decoder. | 03-13-2014 |
20140336537 | COUGH DETECTING METHODS AND DEVICES FOR DETECTING COUGHS - Examples of the present invention utilize principal component analysis (PCA) to detect cough sounds in an audio stream. Comparison of all or portions of the audio stream with a cough model may be conducted. The cough model may include a number of basis vectors may be based on initial portions of known coughs. The initial portions may be non-user specific, and accordingly the cough model may be used to detect coughs across individuals. Moreover, examples of the present invention may reconstruct the cough sounds from stored features such that the cough sounds are reconstructed but the reconstruction techniques used may be insufficient to reconstruct speech sounds that may also have been recorded, which may increase user privacy. | 11-13-2014 |
20140347039 | SYSTEMS AND METHODS FOR MEASURING ELECTRICAL POWER USAGE IN A STRUCTURE AND SYSTEMS AND METHODS OF CALIBRATING THE SAME - A magnetic field sensing device can include two or more magnetic field sensors configured to detect a magnetic field in a current carrying conductor. The magnetic field sensing device also can include a phase detector electrically coupled to outputs of the two or more magnetic field sensors. The magnetic field sensing device further can include a phase indicator electrically coupled to the phase detector. The phase indictor can include a display that indicates when the two or more magnetic field sensors are in a position in relation to the current carrying conductor. Other embodiments are provided. | 11-27-2014 |
20140375352 | SYSTEMS AND METHODS FOR SENSING ENVIRONMENTAL CHANGES USING LIGHT SOURCES AS SENSORS - Systems and methods for sensing environmental changes using electromagnetic interference (EMI) signals are disclosed herein. An EMI monitoring system may be used to monitor an EMI signal of one or more light sources provided over a power line, e.g., in a home or building. The received EMI energy at the power line may be analyzed to detect variations in the EMI signature indicative of environmental changes occurring in the proximity of the light sources. Environmental changes that may be sensed include, but are not limited to, proximity, touch, motion, and temperature change. | 12-25-2014 |
20150013772 | AUTOMATIC VALVE SHUTOFF DEVICE AND METHODS - Examples of automatic valve shutoff systems are described which may include an actuation device including an actuator and a valve attachment portion. The valve attachment portion may be configured for attachment with an existing valve in a fluid or compressible gas supply line. The system may further include a controller coupled to the actuation device, wherein the controller is configured to initiate a valve shutoff process in response to a wireless signal. Wake-up circuitry may be coupled to the controller and configured to monitor the supply line for vibrations and activate the controller in response to the vibrations. | 01-15-2015 |
20150099463 | METHOD AND APPARATUS FOR USING IN-HOME POWER LINES TO SUPPORT LOW POWER WIRELESS SENSORS AND TO EXTEND THE RANGE OF LOW-POWER WIRELESS DEVICES - Disclosed is a system that uses existing power line infrastructure in a building as a distributed reception antenna capable of receiving signals from very low-power wireless sensors, thus allowing these sensors to be detected at ranges that are otherwise impractical with over-the-air reception. Also disclosed is a wireless sensor platform that is able to be sensed throughout a building with very low current draw. The disclosed technique may also be utilized to extend the range of mid-frequency consumer electronic devices by leveraging the power line as a reception antenna. | 04-09-2015 |
20150126888 | SOUND-BASED SPIROMETRIC DEVICES, SYSTEMS AND METHODS - Devices, system, and methods generate expiratory flow-based pulmonary function data by processing a digital audio file of sound of a subject's forced expiratory maneuver. A mobile device configured to generate expiratory flow-based pulmonary function data includes a microphone, a processor, and a data storage device. The microphone is operable to convert sound of the subject's forced expiratory maneuver into a digital data file. The processor is operatively coupled with the microphone. The data storage device is operatively coupled with the processor and stores instructions that, when executed by the processor, cause the processor to process the digital data file to generate expiratory flow-based pulmonary function data for assessing pulmonary function of the subject. The sound of the subject's forced expiratory maneuver can be converted into the digital data file without contact between the subject's mouth and the mobile device. | 05-07-2015 |
20150233998 | SYSTEMS AND METHODS FOR SENSING ENVIRONMENTAL CHANGES USING EMI SIGNAL SOURCES AS SENSORS - Systems and methods for sensing environmental changes using electromagnetic interference (EMI) signals are disclosed herein. An EMI monitoring system may be used to monitor an EMI signal of one or more EMI signal sources provided over a power line, e.g., in a home or building. The received EMI energy at the power line may be analyzed to detect variations in the EMI signature indicative of environmental changes occurring in the proximity of the signal sources. Examples include detection of gestures on or near liquid crystal displays using EMI signals generated by internal operation of the liquid crystal displays. | 08-20-2015 |
20150317076 | USE OF HAND POSTURE TO IMPROVE TEXT ENTRY - A system for classifying a user touch event by a user interacting with a device as an intended key is provided. For different hand postures (e.g., holding device with right hand and entering text with right thumb), the system provides a touch pattern model indicating how the user interacts using that hand posture. The system receives an indication of a user touch event and identifies the hand posture of the user. The system then determines the intended key based on the user touch event and a touch pattern model for the identified hand posture. A system is also provided for determining the amount a presser a user is applying to the device based on dampening of vibrations as measured by an inertial sensor. A system is provided that uses motion of the device as measured by an inertial sensor to improve the accuracy of text entry. | 11-05-2015 |
20150326280 | RECEIVER, APPARATUS, AND METHODS FOR WIRELESSLY RECEIVING DATA FROM A POWER INFRASTRUCTURE - Apparatuses, receivers, systems and methods for receiving data via a power line infrastructure. An exemplary apparatus includes a base station configured to receive a signal from a power line of a structure by coupling to the power line through an electrical outlet. The base station may include an impedance matching circuit configured to match an impedance of the power line of the structure, and a receiver coupled to the impedance matching circuit. The receiver may be configured to demodulate the signal received from the power line of the structure, convert the demodulated signal into a digital signal, and provide the digital signal to a decoder. | 11-12-2015 |
20150359459 | SYSTEMS, DEVICES, AND METHODS FOR ESTIMATING BILIRUBIN LEVELS - Systems, methods, and devices are provided for estimating bilirubin levels. In one aspect, a method for estimating the level of bilirubin in a patient includes receiving image data for at least one image including a region of the patient's skin and a color calibration target. Color-balanced image data for the skin region is generated based on a subset of the image data corresponding to the color calibration target and the skin region. The bilirubin level in the patient is estimated based on the color-balanced image data for the skin region. | 12-17-2015 |
20150376875 | AUTOMATIC VALVE SHUTOFF DEVICE AND METHODS - Examples of automatic valve shutoff systems are described which may include an actuation device including an actuator and a valve attachment portion. The valve attachment portion may be configured for attachment with an existing valve the in a fluid or compressible gas supply line. The system may further include a controller coupled to the actuation device, wherein the controller is configured to initiate a valve shutoff process in response to a wireless signal. Wake-up circuitry may be coupled to the controller and configured to monitor the supply line for vibrations and activate the controller in response to the vibrations. | 12-31-2015 |
20160054804 | DEVICES, SYSTEMS, AND METHODS FOR DETECTING GESTURES USING WIRELESS COMMUNICATION SIGNALS - Examples of systems, devices, and methods are described herein that may provide for gesture recognition. Wireless communication signals may be received from sources in an environment (e.g. cellular telephones, computers, etc.). Features of the wireless communication signals (e.g. Doppler shifts) may be extracted and utilized to identify gestures. The use of wireless communication signals may accordingly make possible gesture recognition in a whole-home environment that may identify gestures performed through walls or other obstacles. | 02-25-2016 |
20160109271 | APPARATUS CONFIGURED TO DETECT GAS USAGE, METHOD OF PROVIDING SAME, AND METHOD OF DETECTING GAS USAGE - An apparatus configured to detect gas usage by two or more gas appliances. The apparatus can include a processing module configured to run on a computational unit. The apparatus also can include a sensing unit configured to be coupled to a gas regulator. The sensing unit can include at least one acoustic sensor configured to detect two or more acoustic signals produced by the gas regulator and convert the two or more acoustic signals into one or more first digital acoustic data signals. The sensing unit also can include a transmitter electrically coupled to the at least one acoustic sensor and configured to transmit the one or more first digital acoustic data signals to the computational unit. The processing module can be configured to use the one or more first digital acoustic data signals to determine an individual gas usage by each of the two or more gas appliances coupled to the gas regulator based upon the two or more acoustic signals produced by the gas regulator. Other embodiments are disclosed. | 04-21-2016 |
20160123834 | WATER SENSORS WITH MULTI-VALUE OUTPUTS AND ASSOCIATED SYSTEMS AND METHODS - Embodiments of water sensors having multi-value outputs are disclosed. A water sensing circuit measures the impedance between two contacts of a water sensor and compares it with a reference signal. The impedance between two contacts varies depending on the wetness of the contacts, and so the sensing circuit may provide a measured wetness level. The water sensor may transmit measurements or other information wired or wirelessly. The water sensor may display indicia of measurements or other information via a display on a housing. | 05-05-2016 |
Patent application number | Description | Published |
20080215746 | System and method for providing random access to a multimedia object over a network - A system and method provide random access to a multimedia object over a network. One embodiment of the invention includes a streaming media server that is connected to a client computer over a network. The streaming media server includes at least one multimedia object that is adapted for transmission (“streaming”) across the network. A pre-roll calculation program determines a pre-roll for each segment of the multimedia object and generates a modified multimedia object which includes a pre-roll for each of its segments, a pre-roll identifying a portion of the multimedia object to be transmitted by the streaming media server and received by the client computer prior to playback of the multimedia object at a selected segment. The pre-roll allows the client computer to present, starting at a selected segment, the multimedia object in its entirety without interruption. The pre-roll calculation program further facilitates the design of the multimedia object to minimize delays associated with random accesses to segments of the multimedia object. | 09-04-2008 |
20080243773 | SYSTEMS AND METHODS FOR A DISTRIBUTED FILE SYSTEM WITH DATA RECOVERY - The intelligent distributed file system enables the storing of file data among a plurality of smart storage units which are accessed as a single file system. The intelligent distributed file system utilizes a metadata data structure to track and manage detailed information about each file, including, for example, the device and block locations of the file's data blocks, to permit different levels of replication and/or redundancy within a single file system, to facilitate the change of redundancy parameters, to provide high-level protection for metadata, to replicate and move data in real-time, and to permit the creation of virtual hot spares among the smart storage units without the need to idle any single smart storage unit in the intelligent distributed file system. | 10-02-2008 |
20090201929 | SYSTEM AND METHOD FOR SWITCHING FROM A UNICAST TO A MULTICAST DATA TRANSMISSION SESSION - A communications system and method provide a seamless switch from a first session to a plurality of multicast sessions. A server transmits data over both a first session and alternatingly between a plurality of synchronized multicast sessions. At predetermined time intervals, the server stops transmitting data over the currently active multicast session and starts transmitting over an idle multicast session. The server is further responsive to a request to stop transmitting the data over the first session at a time when the server alternates transmission between the multicast sessions. The time intervals are advantageously sufficient to allow a receiver to join an idle multicast channel and to send a request to stop the data transmission over the first session. | 08-13-2009 |
20100235413 | SYSTEMS AND METHODS FOR PROVIDING A DISTRIBUTED FILE SYSTEM UTILIZING METADATA TO TRACK INFORMATION ABOUT DATA STORED THROUGHOUT THE SYSTEM - The intelligent distributed file system enables the storing of file data among a plurality of smart storage units which are accessed as a single file system. The intelligent distributed file system utilizes a metadata data structure to track and manage detailed information about each file, including, for example, the device and block locations of the file's data blocks, to permit different levels of replication and/or redundancy within a single file system, to facilitate the change of redundancy parameters, to provide high-level protection for metadata, to replicate and move data in real-time, and so forth. | 09-16-2010 |
20110080840 | SYSTEM AND METHOD FOR DETERMINING NETWORK CONDITIONS - A system and a method determine network conditions. The system includes a server computer and a client computer. The server computer is configured to transmit data packets comprising a data object from the server computer to the client computer. The client computer includes a transmission latency detector and a transmission bandwidth detector. The transmission latency detector uses transmission time and receipt time values to determine the changes in time it takes selected portions of the data object to be transmitted from the server computer to the client computer. The transmission bandwidth detector uses identified back-to-back data packets to determine the transmission bandwidth between the server computer and the client computer. | 04-07-2011 |
20130117463 | SYSTEM AND METHOD FOR PROVIDING RANDOM ACCESS TO A MULTIMEDIA OBJECT OVER A NETWORK - A system and method provide random access to a multimedia object over a network. One embodiment of the invention includes a streaming media server that is connected to a client computer over a network. The streaming media server includes at least one multimedia object that is adapted for transmission (“streaming”) across the network. A pre-roll calculation program determines a pre-roll for each segment of the multimedia object and generates a modified multimedia object which includes a pre-roll for each of its segments, a pre-roll identifying a portion of the multimedia object to be transmitted by the streaming media server and received by the client computer prior to playback of the multimedia object at a selected segment. The pre-roll allows the client computer to present, starting at a selected segment, the multimedia object in its entirety without interruption. The pre-roll calculation program further facilitates the design of the multimedia object to minimize delays associated with random accesses to segments of the multimedia object. | 05-09-2013 |