Patent application number | Description | Published |
20100219192 | DIVIDABLE STEP GARBAGE CAN - A garbage can including a can portion having a bottom wall, a tubular wall extending upwardly from the bottom wall and including an upper rim, an inner chamber defined by the bottom wall and the tubular wall, and an open top, a bar adapted to be removably secured simultaneously to a first location and a second location on the upper rim, a ring having a recessed under surface adapted to receive the upper rim therein, the ring being pivotally coupled to the container and arranged to pivot onto and off of the upper rim, and a lid pivotally coupled to the container and arranged to pivot onto and off of the ring when the ring is arranged on the upper rim, wherein the ring is adapted to secure a flexible material between the recessed under surface and the upper rim. | 09-02-2010 |
20130105488 | STEP GARBAGE CAN WITH DAMPER | 05-02-2013 |
20130168396 | TRASH CAN WITH BAG COLLAR - A container assembly is presented that includes a container and a collar supported by the container. The container possesses a bottom surface, at least one wall with at least one top edge extending from the bottom surface. The collar includes at least one inner wall and at least one outer wall, with at least one curved edge joining the at least one outer wall and the at least one inner wall. The inner and outer walls form a channel. In one embodiment, a flexible liner is held in place by the collar. | 07-04-2013 |
Patent application number | Description | Published |
20090055441 | Method, System and Computer Program Product for Maintaining Synchronization of Files - A method for synchronizing data files, the method comprising: within a messaging utility, associating a Web Service Definition Language (WSDL) definition with a data file, the association made by a passive reference between the WSDL definition to the data file; creating a reference table identifying WSDL files and referenced data files; determining if the WSDL file has changed, if the WSDL file has changed then: determining if a reference to a data file exists in the changed WSDL file; adding an entry in the reference table associating the WSDL file and the data file; launching a component of a builder application to build the data file; and determining if any additional references to data files exist in the changed WSDL file; determining if the data file has changed, if the data file has changed then: determining if the changed data file is referenced by a WSDL file by examining the reference table; if the changed data file exists in the reference table, then launching a component of the builder application to build the WSDL file referencing the changed data file. | 02-26-2009 |
20090171935 | METHOD FOR SOLVING APPLICATION FAILURES USING SOCIAL COLLABORATION - A computer-implemented method, system and computer usable program code for solving an application failure using social collaboration are provided. A search request to search a central repository of knowledge is received. The search request comprises a user identity and an application failure problem to be solved. The central repository of knowledge comprises data regarding attempts to solve an application failure problem compiled from registered users of the central repository of knowledge. A determination is made as to whether the application failure problem to be solved exists in the central repository. If the application failure problem to be solved exists within the central repository, search results for previous attempts at solving the application failure problem are collected. The search results are ranked based on a frequency of access and feedback from users and are grouped according to social groupings defined by the requester. The results are displayed to a requester. | 07-02-2009 |
20110107301 | SELECTIVE DELTA VALIDATION OF A SHARED ARTIFACT - An illustrative embodiment of a computer-implemented process for selective delta validation of a shared artifact receives a notification associated with a shared artifact, determines whether a unique key exists for the shared artifact in a symbol data structure, and responsive to a determination that the unique key exists, determines whether an update from an external source occurred. Responsive to a determination that the update occurred from an external source, receives a timestamp associated with the unique key from the symbol data structure to form a received timestamp, determines whether the received timestamp is prior to a last modification time, and responsive to a determination that the received timestamp is prior to the last modification time, performs a delta validation of the shared artifact. | 05-05-2011 |
20120016908 | OPTIMIZING THE STORAGE OF ONE-TO-MANY EXTERNAL REFERENCES TO CONTIGUOUS REGIONS OF HIERARCHICAL DATA STRUCTURES - A volatile memory manager of a data handling system can be configured to convert the one-to-many external reference into an external reference that references the common ancestor node of the contiguous region. Specific pathing and/or termination conditions can be contained in a Relationship_Path parameter of the external reference. The hierarchical data structure can also be loaded into volatile memory by the volatile memory manager as data structure references. The volatile memory manager can be further configured to perform various functions utilizing the external and data structure references. | 01-19-2012 |
20140096213 | METHOD AND SYSTEM FOR DISTRIBUTED CREDENTIAL USAGE FOR ANDROID BASED AND OTHER RESTRICTED ENVIRONMENT DEVICES - A method, system and computer program product configured for providing distributed credential usage for an electronic handheld device or computing device configured with an operating system comprising an iOS based, Android or other operating system with sandboxed or restricted environments. The system comprises one or more applications running an operating system and configured with one or more sandboxed environments, and a credential provider application configured in a sandboxed environment. The credential provider application is configured to transfer data between the applications, for example, utilizing an inter-process communication channel. The credential provider application is configured to perform an operation on a request from one of the applications and utilizes credentials associated with the application. The credential provider application is configured to maintain the integrity of the credentials within the confines of the credential provider application so that the application is not given access to any private or secret credentials. | 04-03-2014 |
Patent application number | Description | Published |
20090041207 | Secure call recording system for IP telephony - A system for recording voice calls, comprising a plurality of endpoints, a call controller for establishing call connections between the endpoints, a storage element, and a middlebox for storing and forwarding call control packets and voice packets between the endpoints and call controller, and intercepting and forwarding predetermined voice packets to the storage element for archiving. | 02-12-2009 |
20100174560 | Method, system and apparatus for assembling data associated with an emergency call event - A method and apparatus for assembling data associated with an emergency call event is provided. A location of a communication device is determined based on a device identifier conveyed via an emergency call, responsive to determining that the emergency call has occurred in a communication network, originating from the communication device. A database is accessed to determine first contextual data associated with the communication device using the device identifier. The location of the communication device and the first contextual data is provided in a format processable by a computing device associated with an emergency response team. | 07-08-2010 |
20140223427 | System, Method and Apparatus for Determining Virtual Machine Performance - A method for a computing apparatus for evaluating a virtualized application is provided. Accordingly, performance characteristics for a virtual machine as well as predetermined criteria based on resource requirements for a proposed virtualized application can be received through the network interface of the computing apparatus. The method also allows for determining, at the computing apparatus, whether the predetermined criteria are satisfied based on the performance characteristics and transmitting instructions to cause the proposed virtualized application to be set up within the virtual machine if the predetermined criteria are satisfied. Once the virtualized application is set up, it can be monitored and if the performance characteristics do not satisfy the virtualized application's performance requirements, the virtualized application can be caused to be moved to a different virtual machine. Performance characteristics of a virtual machine can also be determined on the basis of a parking database. | 08-07-2014 |