Patent application number | Description | Published |
20150180894 | DETECTING ANOMALOUS ACTIVITY FROM ACCOUNTS OF AN ONLINE SERVICE - Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity. | 06-25-2015 |
20150200824 | OVERALL SYSTEM HEALTH MONITORING OF AN ONLINE SERVICE - The overall health of an online service is determined using health information that is obtained from the individual components of the online service. For example, an overall health score for the online service may be determined by computing an average score using health scores that are received from the different components. The amount an individual component's health score affects the overall health score of the online service is configurable. In some cases, a health alert may be sent to the component(s) experiencing the problem as well as sending the health alert to the system level. In other cases, the alerts to the component level may be suppressed and the system level administrator receives the alert. A health alert may show information such as the overall health score, the health score for each individual component, a description of any detected problems, a graphical health map of the system, and the like. | 07-16-2015 |
20150227595 | END TO END VALIDATION OF DATA TRANSFORMATION ACCURACY - Data is validated as it travels through the different nodes of a data pipeline. Instead of having to wait to validate the data when the data reaches an end of the data pipeline, each node in the pipeline may validate the data. Different methods may be used to validate the data. For example, each node may determine metadata about the received data and/or the transformed data. This metadata may be used to determine if the node is receiving the same amount of data as it usually receives, whether the data is in a same format, and the like. A timing of the data through one or more of the nodes may also be used in determining when the data is valid. When a problem is detected at any of the nodes in the pipeline, a report may be sent to one or more users. | 08-13-2015 |
Patent application number | Description | Published |
20090158295 | DEVICE SETTINGS RESTORE POINT - A method and a device may be provided for saving and restoring one or more settings associated with the device. The one or more settings may be saved and changed before performing a task. After completion of the task, or after a determined failure of the task to complete, the one or more settings may be restored. Communications may be exchanged between a host and the device to create a restore point for saving the one or more settings, to change any of the one or more settings before performing the task, and to restore the one or more settings after completion of the task, or after determining the failure of the task to complete. The device may create and store the one or more settings in a restore point in the device, or may send the one or more settings to the host for storing. | 06-18-2009 |
20090292372 | ELECTRONIC DEVICE PROPERTIES CONTROL - A device with controllable mechanical characteristics makes available a list of controllable characteristics for use by a controller or host computer. The list may include not only controllable characteristics but also the available range for each control, the impact of each adjustment, or both. The host computer can evaluate an operating state of the computer or electronic device and determine how best to set the device for compatible operation with the operating state. When controllable characteristics have multiple effects and/or interact with other controllable characteristics, macros may be developed to perform multiple settings as a group to achieve the desired outcome. The list may also be downloaded from a web service. | 11-26-2009 |
20090327295 | MAINTENANCE OF EXO-FILE SYSTEM METADATA ON REMOVABLE STORAGE DEVICE - An interface between a host computing device and a transient storage device (TSD) eliminates the need for a full directory crawl of the storage volume on the TSD to maintain a metadata database. The metadata database is incrementally updated instead of being completely regenerated on every connection between the TSD and a highly capable host. This function helps the host device more efficiently track and maintain exo-file system metadata. Host devices discover and use this new TSD function to efficiently update the metadata database. Host devices provide parameters governing the operation of the TSD to the TSD. Cooperatively, the TSD logs addresses corresponding to storage locations of changes made to the data on the storage volume and, upon discovering a capability of the host device to update the metadata database, the TSD provides discovery to the host device regarding an availability of the metadata database and the log of addresses. | 12-31-2009 |
Patent application number | Description | Published |
20100167801 | KIDS PERSONAL HEALTH RECORDS FED INTO VIDEO GAMES - The claimed matter provides systems and/or techniques that regulate and/or prescribe an individual's behavior while playing electronic games. The system includes mechanisms and/or modalities that identify physical and/or mental activities similar to those undertaken by a game character and that are appropriate to the fitness or mental capabilities of the individual. It requests the individual to perform the activities selected during the execution of the electronic game, monitors the individual's performance of the activity, and reproduces and associates the individual's actions in performing the selected task to the game character during execution of the electronic game. Further, it enhances or diminishes attributes of the game character based on the intensity of the individual's performance of the selected activity. | 07-01-2010 |
20120096110 | Registering, Transferring, and Acting on Event Metadata - A technique and associated mechanism is described for registering event metadata at a first site, transferring the event metadata to a second site using a portable module, and processing the event metadata at the second site. A user can register the event metadata at the first site in the course of consuming broadcast content. Namely, when the user encounters an interesting portion of the broadcast content, the user activates an input mechanism, resulting in the storage of event metadata associated with the interesting portion on the portable module. The second site can upload the event metadata from the portable module and, in response, provide content associated with the event metadata, including recommended content associated with the event metadata. | 04-19-2012 |
20130124811 | DYNAMIC STORAGE HIERARCHY MANAGEMENT - A data block may be moved between a first medium and a second medium. The movement of the data block involves measuring the access characteristic of the data block as the data block is stored on the first medium. The performance characteristics of the first medium and the second medium are then determined, in which each performance characteristic has a static performance characteristic component and a dynamic performance characteristic component. Alternatively or concurrently, the static performance characteristic components of the first medium and the second medium may be compared, and the dynamic performance characteristic components of the first medium and the second medium are compared. Accordingly, the data block is moved from the first medium to the second medium when at least one of these comparisons indicate that the second medium is more suitable for storing the data block having the access characteristic than the first medium. | 05-16-2013 |
20130173872 | Abstracting Programmatic Representation of Data Storage Systems - Providing for a paradigm shift in block-level abstraction for storage devices is described herein. At a block-level, storage is characterized as a variable size data record, rather than a fixed size sector. In some aspects, the variable size data record can comprise a variable binary key-data pair, for addressing and identifying a variable size block of data, and for dynamically specifying the size of such block in terms of data storage. By changing the key or data values, the location, identity or size of block-level storage can be modified. Data records can be passed to and from the storage device to facilitate operational commands over ranges of such records. Block-level data compression, space management and transactional operations are provided, mitigating a need of higher level systems to characterize underlying data storage for implementation of such operations. | 07-04-2013 |
20140310451 | BLOCK STORAGE USING A HYBRID MEMORY DEVICE - Techniques for block storage using a hybrid memory device are described. In at least some embodiments, a hybrid memory device includes a volatile memory portion, such as dynamic random access memory (DRAM). The hybrid memory device further includes non-volatile memory portion, such as flash memory. In at least some embodiments, the hybrid memory device can be embodied as a non-volatile dual in-line memory module, or NVDIMM. Techniques discussed herein employ various functionalities to enable the hybrid memory device to be exposed to various entities as an available block storage device. | 10-16-2014 |