Patent application number | Description | Published |
20110191217 | APPROVAL WORKFLOW ENGINE FOR SERVICES PROCUREMENT TIMESHEETS, PROGRESS LOGS, AND EXPENSES - This disclosure describes, generally, methods and systems for implementing an approval workflow engine and approval framework for timesheets, progress logs, and expenses. The method includes receiving, at an approval engine of an application server, information representing a timesheet, progress log, or expense. The approval engine may apply one or more rules to determine whether the rules are satisfied by corresponding attribute values of attributes for the timesheet, progress log, or expense. Notification may be generated and transmitted to one or more approvers and/or reviewers based on applications of the rules. An indication of approval and/or disapproval may be received from each of the approvers and/or reviewers. Rules may be defined for automatic assignment of multi level approvers, based on specific attributes. An approver may have the option to approve, deny, or push back a transaction. Approvers and submitters can have visibility of the full approval path and current approval status throughout an approval process. In addition, post approval adjustments can be routed for approval based on adjustment approval rules. | 08-04-2011 |
20110276443 | MULTI-RESOURCE SERVICES - Embodiments of the invention provide systems and methods for managing multi-resource services. According to one embodiment, a method of managing multi-resource services can comprise creating a requisition for services. The multi-resource requisition can relate to and define an overall project. A multi-resource work order to a selected supplier for the overall project can be generated based on an acceptance and sourcing of the multi-resource requisition. Sourcing of one or more individual services can be performed based on the multi-resource work order. Sourcing can comprise creating a provider work order. The provider work order can relate to and define one instance of the one or more individual services to be provided within the overall project Total costs for the one or more individual services defined by the multi-resource work order can also be subject to a limit on total costs for the overall project defined by the multi-resource work order. | 11-10-2011 |
Patent application number | Description | Published |
20100293225 | CONTAINMENT OF NETWORK COMMUNICATION - Invention selectively enables usage of services and communication conduits in a computer network, wherein the enablement is contingent on usage conditions, resulting in containment of the spread of unauthorized activity within a networked computer system and limiting the scope of results when an element becomes part of a hostile execution environment. Instead of protecting individual networked elements from a potentially hostile execution environment, the elements' usage of the networked environment is restricted to the extent of selectively allowing usage of needed resources explicitly authorized for use by such elements. | 11-18-2010 |
20110077948 | METHOD AND SYSTEM FOR CONTAINMENT OF USAGE OF LANGUAGE INTERFACES - Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface. | 03-31-2011 |
20130246044 | METHOD AND SYSTEM FOR CONTAINMENT OF USAGE OF LANGUAGE INTERFACES - Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface. | 09-19-2013 |
20130246517 | METHOD AND SYSTEM FOR CONTAINMENT OF NETWORKED APPLICATION CLIENT SOFTWARE BY EXPLICIT HUMAN INPUT - Method and system for containing networked application client software in order to perform specified transactions only given explicit consent of a legitimate user. In one embodiment, a confirmation interceptor intercepts a service request message, queries the user of the request for a confirmation, and then either passes the service request message onto server application software or drops the request, depending on the user's confirmation response. In soliciting and processing the confirmation response, query is formulated so that the required response cannot be automatically generated by software that attempts to automate and simulate the user's actions. | 09-19-2013 |
20130247016 | METHOD AND SYSTEM FOR CONTAINMENT OF USAGE OF LANGUAGE INTERFACES - Client software is modified by a translator to use unique variant of linguistic interface of a service. An interceptor pre-processes subsequent client service requests from translated unique linguistic interface to standard linguistic interface implemented by service. Usage of linguistic interfaces of service is contained, rendering service incapable of executing arbitrary input, even if such input is crafted specifically for the service interface. | 09-19-2013 |
20130247027 | Distribution and installation of solidified software on a computer - Techniques relating to the distribution and installation of solidified (or “frozen”) software on a computer are disclosed. Any additional software installed on the computer after the solidification process will not execute, regardless of whether the installation is initiated or otherwise performed by a person with administrative privilege. The installation of the solidified software can be carried out by installing pre-solidified software, by solidifying the software at the source code level and by solidifying the software by the compiler. The solidification can also be performed when software distributions are manufactured, for example on CDs, or as part of an installation procedure that can run and/or install differently each time. A business process for billing customers for the transfer or usage of solidified software is also disclosed. | 09-19-2013 |
Patent application number | Description | Published |
20100205097 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods and apparatus for funding transactions are presented herein. In one embodiment, the apparatus includes an account information unit to store information about an account, the account being associated with a first financial institution. The apparatus can also include a transaction processor to receive a request for a debit amount, to determine that the account is associated with one or more funding sources, and to determine if the one or more funding sources authorize the request for the debit amount. The one or more funding sources are associated with one or more financial institutions other than the first financial institution. | 08-12-2010 |
20120317031 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods, apparatus, and systems for funding transactions disclosed herein may operate to: receive, for a transaction, a request to debit a first amount from a primary funding source; determine that a second amount of funds available from the primary funding source is less than the first amount requested for the transaction; compare a maximum backup funding amount with a total amount debited from a backup funding source to fund previous transactions associated with the primary funding source, with the maximum backup funding amount being previously set as an amount available from the backup funding source; and to provide an indication that at least part of a difference between the first amount and the second amount can be drawn from the backup funding source based on determining that the total amount has not reached the maximum backup funding amount. | 12-13-2012 |
20130185199 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods, apparatus, and systems for funding transactions disclosed herein may operate to configure a plurality of backup funding sources for a primary funding source, and enable a consumer associated with the primary funding source to select at least one backup funding source among the plurality of backup funding sources. A request to fund a transaction associated with the primary funding source may be received, and the transaction may be funded using funds from at least one of the primary funding source and the at least one selected backup funding source. | 07-18-2013 |
20140149284 | METHODS AND APPARATUS FOR FUNDING TRANSACTIONS USING DEBIT CARDS ISSUED BY ONE INSTITUTION AND FUNDS FROM ACCOUNTS AT OTHER INSTITUTIONS - Methods, apparatus, and systems for funding transactions disclosed herein may operate to configure a plurality of backup funding sources for a primary funding source, and enable a consumer associated with the primary funding source to select at least one backup funding source among the plurality of backup funding sources. A request to fund a transaction associated with the primary funding source may be received, and the transaction may be funded using funds from at least one of the primary funding source and the at least one selected backup funding source. | 05-29-2014 |
Patent application number | Description | Published |
20080209478 | Single-wire multiswitch and channelized RF cable test meter - Multiple embodiments of systems for testing the delivery of satellite and cable television signals are described. | 08-28-2008 |
20100319035 | MULTIPLE DWELLING UNIT SATELLITE TELEVISION DELIVERY SYSTEM - Systems for delivering satellite signals to multiple dwelling units (MDUs). A system in accordance with the present invention comprises an antenna for receiving the satellite signals, a conversion unit, coupled to the antenna, for stacking the satellite signals onto a single cable, a distribution unit, coupled to the conversion unit, wherein the distribution unit distributes the stacked satellite signal to a plurality of outputs, and at least one customer device, coupled to an output of the plurality of outputs, wherein each unit in the MDU uses the customer device to destack the stacked satellite signals for delivery to a receiver. | 12-16-2010 |
20110202952 | NETWORK FRAUD PREVENTION VIA REGISTRATION AND VERIFICATION - An apparatus for controlling fraud in a satellite signal delivery system. An apparatus in accordance with the present invention comprises a receive antenna for receiving at least one satellite signal, and a module, coupled to the receive antenna, for selectively delivering the at least one satellite signal to at least one receiver via an output of the module, wherein the module creates an association between the module and the at least one receiver upon installation of the at least one receiver to the output, such that the module delivers the at least one satellite signal to the at least one receiver only when the association is present. | 08-18-2011 |
20110307916 | BACKWARDS-COMPATIBLE FREQUENCY TRANSLATION MODULE FOR SATELLITE VIDEO DELIVERY - A frequency translation module for delivering satellite signals to Integrated Receiver Decoders (IRDs). The module comprises at least one input for receiving polarized satellite signals, wherein at least one input is coupled to at least one low noise block amplifier (LNB), at least one legacy output, the legacy output coupled to the input through a multiswitch, wherein each legacy output selects a polarization of a satellite signal based on a Legacy IRD command directly to the multiswitch, and at least one combined output, the combined output coupled to the multiswitch through an interface, wherein at least one new IRD selectively commands the frequency translation module such that each new IRD receives a portion of a satellite signal based on commands received from each IRD. | 12-15-2011 |
20130288593 | ROTATION POINTED ANTENNA FOR FIXED WIRELESS WIDE AREA NETWORKS - An apparatus and method for combining signals received from a direct broadcast satellite system with signals received from a wireless network, includes a satellite antenna for receiving the signals from the direct broadcast satellite system; and a wireless network antenna, co-located with the satellite antenna, for receiving the signals from the wireless network. The wireless network antenna includes an antenna assembly that is rotated by a controller based on characteristics of the signals received from the wireless network. The controller energizes and de-energizes a motor to mechanically rotate the antenna assembly to properly align the wireless network antenna to communicate with the wireless network. The wireless network antenna comprises a closed cylinder, wherein the antenna assembly is rotatably mounted within the closed cylinder, such that, upon command from the controller, the motor engages the antenna assembly to mechanically rotate the antenna about a central axis of the closed cylinder. | 10-31-2013 |
Patent application number | Description | Published |
20110110153 | DATA STATE-DEPENDENT CHANNEL BOOSTING TO REDUCE CHANNEL-TO-FLOATING GATE COUPLING IN MEMORY - In a programming operation, selected storage elements on a selected word line are programmed while unselected storage elements on the selected word line are inhibited from programming by channel boosting. To provide a sufficient but not excessive level of boosting, the amount of boosting can be set based on a data state of the unselected storage element. A greater amount of boosting can be provided for a lower data state which represents a lower threshold voltage and hence is more vulnerable to program disturb. A common boosting scheme can be used for groups of multiple data states. The amount of boosting can be set by adjusting the timing and magnitude of voltages used for a channel pre-charge operation and for pass voltages which are applied to word lines. In one approach, stepped pass voltages on unselected word lines can be used to adjust boosting for channels with selected data states. | 05-12-2011 |
20120167100 | MANUAL SUSPEND AND RESUME FOR NON-VOLATILE MEMORY - An external controller has greater control over control circuitry on a memory die in a non-volatile storage system. The external controller can issue a manual suspend command on a communication path which is constantly monitored by the control circuitry. In response, the control circuitry suspends a task immediately, with essentially no delay, or at a next acceptable point in the task. The external controller similarly has the ability to issue a manual resume command, which can be provided on the communication path when that path has a ready status. The control circuitry can also automatically suspend and resume a task. The external controller can cause a task to be suspended by issuing an illegal read command. The external controller can cause a suspended program task to be aborted by issuing a new program command. | 06-28-2012 |
20120182809 | Data State-Dependent Channel Boosting To Reduce Channel-To-Floating Gate Coupling In Memory - In a programming operation, selected storage elements on a selected word line are programmed while unselected storage elements on the selected word line are inhibited from programming by channel boosting. To provide a sufficient but not excessive level of boosting, the amount of boosting can be set based on a data state of the unselected storage element. A greater amount of boosting can be provided for a lower data state which represents a lower threshold voltage and hence is more vulnerable to program disturb. A common boosting scheme can be used for groups of multiple data states. The amount of boosting can be set by adjusting the timing and magnitude of voltages used for a channel pre-charge operation and for pass voltages which are applied to word lines. In one approach, stepped pass voltages on unselected word lines can be used to adjust boosting for channels with selected data states. | 07-19-2012 |
20140254264 | Defect Or Program Disturb Detection With Full Data Recovery Capability - A programming operation for a set of non-volatile storage elements determines whether the storage elements have been programmed properly after a program-verify test is passed and a program status=pass is issued. Write data is reconstructed from sets of latches associated with the storage elements using logical operations optionally one or more reconstruction read operations. Normal read operations are also performed to obtain read data. A number of mismatches between the read data and the reconstructed write data is determined, and determination is made as to whether re-writing of the write data is required based on the number of the mismatches. | 09-11-2014 |
Patent application number | Description | Published |
20110040960 | Method and System for Securely Updating Field Upgradeable Units - Devices and methods for securely upgrading devices, such as field upgradeable units, are disclosed. In response to receiving an update object, a device may determine whether a predefined location of memory includes a predetermined value. Based on the value in the predefined location, the device may store the received update object in a verification portion of the memory. After verifying the authenticity of the update object, the device may copy the update object from the verification portion of the memory to an inactive portion. The inactive portion of the memory can be swapped with an active portion of the memory, such that the inactive portion becomes active. | 02-17-2011 |
20120036250 | System, Method and Program for Detecting Anomalous Events in a Utility Network - A utility network communication device is provided to detect whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of the nodes in the utility network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the utility network during a predetermined time period, based on a condition and/or event occurring during the predetermined time period. The communication device receives operation data from nodes in the network, and determines whether the received operation data from a node in the network constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 02-09-2012 |
20130024306 | SYSTEMS AND METHODS FOR CHARGING ELECTRIC VEHICLES - Systems and methods for controlling for distributing power to electric vehicles. The system includes a vehicle charging key (“VCK”) that is operable to communicate with both a vehicle and a utility communications network. The VCK includes a processor, a memory, and one or more radios for communicating with the vehicle and the utility communications network. The VCK receives information from the vehicle, such as location information and vehicle battery state-of-charge (“SOC”) information, and transmits the information to a back office system (“BOS”), such as a utility provider or a credit card company. The BOS generates utility pricing or charging information based on, for example, time of day, and transmits the utility pricing information back to the VCK. A transaction module of the VCK receives payment information from a user that includes a payment selection. The payment selection includes a payment type (e.g., credit card, prepaid account, utility account, etc.). The VCK transmits the payment information to the BOS, and the BOS responds with a charge authorization signal. | 01-24-2013 |
20130128894 | Registration and Data Exchange Using Proxy Gateway - A system and method is presented for broadcasting from a utility node a request for network routing information, receiving at the utility node routing information from neighboring utility nodes in response to the broadcast request, and registering the utility node with an access point that provides ingress and egress to and from the network. A node is selected to function as a proxy gateway for one or more other nodes in the network. A new utility node becomes connected to one or more utility networks by registering with the proxy gateway. The proxy gateway transmits registration requests and registration information from each node to a back office server and/or a Domain Name Server via an access point for which the proxy gateway functions as its proxy. | 05-23-2013 |
20130229947 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 09-05-2013 |
Patent application number | Description | Published |
20110158113 | DRIVEN MULTICAST TRAFFIC DISTRIBUTION ON LINK-AGGREGATE-GROUP - A method and apparatus of dynamically distributing multicast stream to different hosts on a link-aggregation-group is described. A network element receives, on a link-aggregation-group, multicast requests and determines the bandwidth for that request by the information stored in the request. The network element further allocates bandwidth requirement on the least utilized link in link-aggregation-group. The network element additionally updates a forwarding table to indicate that the multicast stream in that request is to be forward out the allocated link. | 06-30-2011 |
20110191813 | USE OF PICTURE-IN-PICTURE STREAM FOR INTERNET PROTOCOL TELEVISION FAST CHANNEL CHANGE - A method and apparatus of controlling an Internet Protocol television (IPTV) channel change to a first multimedia stream of an IPTV channel, where the channel change is initiated by a set top box coupled to the network device is described. A network device receives a request from a set top box for a high-resolution multimedia stream from a device downstream and transmits a low-resolution multimedia stream upstream in place of the high-resolution multimedia stream request. The network device receives the low-resolution multimedia stream and forwards the low-resolution stream to the requesting set top box. The set top receives the low-resolution stream and displays this stream. Furthermore, the network device transmits the high-resolution multimedia stream request and receives the high-resolution multimedia stream. The set top box receives the high-resolution multimedia stream and displays this stream. | 08-04-2011 |
20120102188 | MECHANISM FOR TRACKING HOST PARTICIPATION IN MULTICAST GROUPS - A method performed in a network element coupled between a subscriber end station and a multicast source for tracking a history of IGMP report messages. The network element receives and IGMP report message from the subscriber end station and determines a multicast group address and multicast source IP address corresponding to a multicast group to which the network element is a member. The network element builds an IGMP report history record indicating the subscriber end station's identity and comprises the multicast group address, the multicast source IP address, and a time stamp corresponding to the date and time at which the network element received the IGMP report message. This record is then stored in an IGMP report history database along with a plurality of other IGMP report history records so that the network element can maintain a history of IGMP report messages received from the subscriber end station. | 04-26-2012 |
20120218997 | EFFICIENT WAY TO MANAGE HOST SUBSCRIPTION STATE ON A PROXY DEVICE - In a proxy for an upstream multicast router using IGMP or MLD, a process efficiently and scalably manages an interface between the upstream multicast router and the proxy by tracking a subset of multicast sources from the plurality of multicast sources required by an aggregate state of the plurality of multicast subscriber nodes. The tracking uses an interface tracking table for determining the aggregate state for the interface instead of a forwarding information base (FIB) and membership database that tracks more specific data detailing each multicast source required by each multicast subscriber node. The process receives an IGMP or MLD membership report with at least one change in the set of multicast sources to be received on the interface, updates the interface tracking table to reflect the at least one change in the subset of multicast sources and notifies the upstream multicast router of the at least one change. | 08-30-2012 |
Patent application number | Description | Published |
20110131324 | MANAGING NETWORK SECURITY - Technology for network security is disclosed. In one embodiment, a method of managing network security includes receiving sampled packets. The sampled packets represent packets being sampled from network packet traffic in at least one location in a network. The sampled packets are converted into an appropriate format for analysis to form converted packets. Moreover, the converted packets are sent to a first group including at least one security device for analysis. If an event message is generated by the at least one security device as a result of analysis of the converted packets, the event message is received from the at least one security device. Network security is evaluated based on the event message and security policies and is adjusted based on that evaluation. The method may be implemented with a network manager. | 06-02-2011 |
20110131398 | GENERATING DEVICE-SPECIFIC CONFIGURATIONS - An approach to generating device-specific configurations is described. In one approach, a method of generating a device-specific configuration for a target device is described. The method involves receiving a configuration parameter, and receiving command syntax information. A state description is generated from the configuration parameter, with reference to a configuration library. Device information is retrieved from the target device, and the device-specific configuration is generated with reference to the command syntax information, the device information, the state description, and a command library. | 06-02-2011 |
20130318617 | MANAGING NETWORK SECURITY - Technology for network security is disclosed. In one embodiment, a method of managing network security includes receiving sampled packets. The sampled packets represent packets being sampled from network packet traffic in at least one location in a network. The sampled packets are converted into an appropriate format for analysis to form converted packets. Moreover, the converted packets are sent to a first group including at least one security device for analysis. If an event message is generated by the at least one security device as a result of analysis of the converted packets, the event message is received from the at least one security device. Network security is evaluated based on the event message and security policies and is adjusted based on that evaluation. The method may be implemented with a network manager. | 11-28-2013 |
Patent application number | Description | Published |
20110189979 | METHOD AND SYSTEM FOR CREATING A WEB LISTING USING A MOBILE PHONE - A method and system for creating a web listing using a mobile phone whereby a user, typically a business owner or a representative of the business, provides information/data associated with the business to a mobile application including an on-line directory service using a merchant mobile phone, or other mobile computing system, associated with the user and/or the business and/or a mobile application, and/or an SMS and/or another mobile communications network. The information associated with the business provided via the merchant mobile phone, or other mobile computing system, is then used by the on-line directory service to create an on-line presence for the business such as, but not limited to, an on-line web-listing for the business in the on-line directory that includes at least part of the information associated with the business provided via the merchant mobile phone, or other mobile computing system. | 08-04-2011 |
20110196734 | TECHNIQUE FOR RECOMMENDING ADVERTISING MESSAGES - A technique for identifying a recommended type of advertising message is described. In this technique, information about advertising messages directed from businesses to consumers and associated acceptance rates of the advertising messages by the consumers is received or accessed. Note that the advertising messages include different types of advertising messages for different types of businesses. Then, the recommended type of advertising message for a given business is identified based on an associated type of business and the received information. By leveraging the results obtained by other similar businesses, this technique may allow the given business to improve the effectiveness of a subsequent advertising campaign. | 08-11-2011 |
20110230213 | METHOD AND SYSTEM FOR MAINTAINING TEXTSITES ON A GLOBAL TEXTSITE PLATFORM - A method for accessing content using a global textsite platform including registering a unique keyword received from a publisher, receiving content from the publisher for creating a textsite associated with the unique keyword, creating the textsite on behalf of the publisher, receiving, from a user, a request to access the textsite, processing the request from the user, and providing access to the textsite by sending the content of the textsite, via a text messaging service (TMS), to a user mobile device. | 09-22-2011 |
20110230214 | ACCESSING TEXTSITES USING TEXT MESSAGING SERVICE - A method for providing access to content using a global textsite platform (GTP) including receiving a user message identifying a registered unique keyword maintained by the GTP, wherein the registered unique keyword is registered with the GTP by a publisher for accessing a textsite comprising a plurality of text pages published by the publisher and indexed based on a plurality of navigating keywords defined by the publisher, retrieving authored content associated with the textsite based on the registered unique keyword, accessing the textsite based on the authored content to retrieve a navigating keyword indexing a text page, and sending a GTP message comprising the navigating keyword for the user to access the text page, wherein the user message and the GTP message comprise a text message transmitted using a text messaging service (TMS). | 09-22-2011 |
20110246277 | MULTI-FACTOR PROMOTIONAL OFFER SUGGESTION - The invention relates to a method to send a promotional offer from a business entity. The method steps include obtaining a profile of the business entity from a financial management application (FMA) executing on a central processing unit (CPU) and configured to manage operations of the business entity, analyzing a plurality of messages from a message source based on a pre-determined criterion to identify a keyword, qualifying the keyword to generate a qualified keyword with a keyword rating, wherein the keyword rating represents how relevant the keyword is to the business entity based on the profile of the business entity, searching for the qualified keyword in the promotional offer among a plurality of promotional offers in a library to generate a match between the qualified keyword and the promotional offer, adjusting a score of the promotional offer, in response to generating the match, based on the keyword rating, and sending the promotional offer to a consumer based on the score. | 10-06-2011 |
20110294479 | SYSTEM AND METHOD FOR ASSIGNING A SENDERID - A method for sending Short Message Service (SMS) messages includes receiving a request to generate a senderID, determining senderIDs based on a business name, and receiving a selected senderID from the senderIDs. The method further includes receiving a request to send an SMS message using the selected senderID, and sending a request to an SMS server to send the SMS message using the senderID. | 12-01-2011 |
20120042021 | METHOD AND SYSTEM FOR PROVIDING A STATEFUL EXPERIENCE WHILE ACCESSING CONTENT USING A GLOBAL TEXTSITE PLATFORM - A method for providing access to content using a global textsite platform (GTP), including receiving, from a user device associated with a device identifier, a first user message including a first navigation state identifier of a sequential plurality of navigation state identifiers, identifying a first text page of the textsite associated with the first navigation state identifier, and identifying a second text page associated with a first navigating keyword, where the second text page is navigable from the first text page. The method also includes determining a second navigation state identifier sequentially after the first navigation state identifier, associating the second text page with the second navigation state identifier, and storing the association. The method also includes generating a GTP message of the first text page, including the first navigating keyword modified by the second navigation state identifier, and sending the GTP message for display on the user device. | 02-16-2012 |
20130346527 | METHOD AND SYSTEM FOR MAINTAINING TEXTSITES ON A GLOBAL TEXTSITE PLATFORM - A method for accessing content using a global textsite platform including registering a unique keyword received from a publisher, receiving content from the publisher for creating a textsite associated with the unique keyword, creating the textsite on behalf of the publisher, receiving, from a user, a request to access the textsite, processing the request from the user, and providing access to the textsite by sending the content of the textsite, via a text messaging service (TMS), to a user mobile device. | 12-26-2013 |
Patent application number | Description | Published |
20100080391 | Auditing Data Integrity - Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt. | 04-01-2010 |
20100083001 | Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor - Various approaches for extracting client's data from a storage provider are presented. In one approach, an auditor is initialized with a verification data set that confirms that an initial version of a data set stored by the storage provider is intact. The auditor extracts a second version of the data set from the storage provider; the second version hides information specified by the data set from the auditor. The auditor determines whether the second version matches the initial version. The second version is returned to the client if the initial version matches the second version. The auditor is prevented from recovering the information specified by the data set using the state information, and the client need not store any state information related to the initial and second versions needed to recover the information specified by the data set. If the initial version does not match the second version, the auditor outputs data indicative of data corruption. | 04-01-2010 |
20100175111 | Computer-Implemented Method for Obtaining a Minimum Biclique Cover in a Bipartite Dataset - A method includes providing a bipartite graph having vertices of a first type, vertices of a second type, and a plurality of edges, wherein each edge joins a vertex of the first type with a vertex of the second type. A unipartite edge dual graph is generated from the bipartite graph, and a minimum clique partition of the edge dual graph is recursively determined. A biclique is then created in the bipartite graph corresponding to each clique in the minimum clique partition of the edge dual graph. | 07-08-2010 |
20100192018 | Methods of Measuring Consistability of a Distributed Storage System - A method for measuring consistability of a distributed storage system is disclosed. The method includes determining at least one consistency level that the distributed storage system can provide. A plurality of failure classes can be determined for the distributed storage system. A probability of the distributed storage system to be in each of the plurality of failure classes can be measured. Each failure class can be mapped to the at least one consistency level. The probability of each failure class for each consistency level can be summed to determine an expected portion of time that the distributed storage system provides each consistency level. | 07-29-2010 |
20100205351 | DATABASE JOIN OPTIMIZED FOR FLASH STORAGE - Computer-implemented systems and associated operating methods implement a fast join for databases which is adapted for usage with flash storage. A system comprises a processor that performs a join of two tables stored in a storage in pages processed in a column orientation wherein column values for all rows on a page are co-located in mini-pages within the page. The processor reduces input/output operations of the join by accessing only join columns and mini-pages containing join results. | 08-12-2010 |
20100306212 | Fetching Optimization in Multi-way Pipelined Database Joins - A method of performing a multi-way join of a plurality of database relations includes executing a plurality of pipelined two-way joins with the database relations. Each two-way join has two sequential phases. In the first phase, missing attributes of the input relations that are required to evaluate a joining criterion specific to said two-way join are fetched from a non-volatile memory device, and the input relations are joined according to the criterion. In the second phase, any additional missing attributes of the input relations are fetched from the non-volatile memory device as assigned by an optimization process executed prior to commencing the multi-way join. | 12-02-2010 |
20110066790 | MAIN MEMORY WITH NON-VOLATILE MEMORY AND DRAM - One embodiment is main memory that includes a combination of non-volatile memory (NVM) and dynamic random access memory (DRAM). An operating system migrates data between the NVM and the DRAM. | 03-17-2011 |
20110173162 | SCRUBBING PROCEDURE FOR A DATA STORAGE SYSTEM - A method is provided for scrubbing information stored in a data storage system where the information is stored as a plurality of encoded fragments across multiple storage devices. The method includes maintaining on a first storage device a list of metadata entries corresponding to values that are stored in the data storage system at an At Maximum Redundancy (AMR) state, verifying that encoded fragments associated with each of the metadata entries are stored on a second storage, verifying that a corresponding metadata entry is stored on the first storage device for each encoded fragment that is stored on the second storage device, and scheduling for recovery any missing encoded fragments and/or any missing metadata entry. | 07-14-2011 |
20120159091 | DIRECTED GRAPHS PERTAINING TO READ/WRITE OPERATIONS - A system comprises a processor and storage containing software executable by the processor. The storage also contains a trace log that contains information pertaining to read and write operations and, for each read and write operation, the information is indicative of a start time, a completion time, and a value targeted by the read or write operation, Based on the trace log, the software causes the processor to construct a directed graph comprising nodes as well as edges interconnecting at least some of the nodes, each node representing a read or write operation and determine whether the constructed directed graph has a cycle. At least one edge is at least one of a data edge representing a data precedence between operations and a time edge representing a time precedence between operations, and at least one edge is a hybrid edge representing both time and data precedence between operations. | 06-21-2012 |
20120290541 | RECOVERY PROCEDURE FOR A DATA STORAGE SYSTEM - A method of recovering a value in a data storage system includes maintaining a list of entries corresponding to values that have been inserted into the data storage system, determining whether the values are at an At Maximum Redundancy (AMR) state, and if not, the converging the values to the AMR state. | 11-15-2012 |
20130110774 | TRANSACTION COMMITMENT AND REPLICATION IN A STORAGE SYSTEM | 05-02-2013 |
20130110781 | SERVER REPLICATION AND TRANSACTION COMMITMENT | 05-02-2013 |
20130111147 | METHODS AND APPARATUS TO ACCESS MEMORY | 05-02-2013 |
20130111249 | ACCESSING A LOCAL STORAGE DEVICE USING AN AUXILIARY PROCESSOR | 05-02-2013 |
20130166568 | SCALABLE ANALYSIS PLATFORM FOR SEMI-STRUCTURED DATA - A method of operating a query system includes retrieving objects from a data source, wherein each of the retrieved objects includes (i) data and (ii) metadata describing the data. The method includes dynamically creating a cumulative schema by inferring a schema from each of the retrieved objects and merging the inferred schema with the cumulative schema. The method includes storing the data of each of the retrieved objects in a storage service. The method includes receiving, from a user, a query, and responding to the query based on data stored by the storage service. | 06-27-2013 |
20130238576 | VALIDATION OF DISTRIBUTED BALANCED TREES - A distributed balanced tree having a plurality of nodes distributed across a plurality of servers is accessed. Version information associated with a node of the distributed balanced tree is retrieved. Validity of a lookup transaction performed on the balanced tree is determined by verifying a version value of only the leaf node accessed during the lookup operation against the retrieved version information. | 09-12-2013 |
20140006712 | SYSTEMS AND METHODS FOR FINE GRANULARITY MEMORY SPARING | 01-02-2014 |
20140025415 | DISTRIBUTED CONTINUOUS ANALYTICS - A continuing analytics method includes distributing continuous analytics tasks among a number of workers. The workers execute the tasks on data elements stored in a distributed data storage system. Executing a task changes the data elements. In response to the change, a worker that executed a task invokes an update to the data storage system. The worker then increments a version number related to the changed data element, updates the data elements, and notifies other workers of the updated data element. | 01-23-2014 |
20140033214 | MANAGING ARRAY COMPUTATIONS DURING PROGRAMMATIC RUN-TIME IN A DISTRIBUTED COMPUTING ENVIRONMENT - A plurality of array partitions are defined for use by a set of tasks of the program run-time. The array partitions can be determined from one or more arrays that are utilized by the program at run-time. Each of the plurality of computing devices are assigned to perform one or more tasks in the set of tasks. By assigning each of the plurality of computing devices to perform one or more tasks, an objective to reduce data transfer amongst the plurality of computing devices can be implemented. | 01-30-2014 |
20140237172 | IMPARTING DURABILITY TO A TRANSACTIONAL MEMORY SYSTEM - A transactional memory system uses a volatile memory as primary storage for transactions. Data is selectively stored in a non-volatile memory to impart durability to the transactional memory system to allow the transactional memory system to be restored to a consistent state in the event of data loss to the volatile memory. | 08-21-2014 |
20140279834 | Scalable Analysis Platform For Semi-Structured Data - A method of operating a data analysis system includes retrieving objects from a data source. Each of the retrieved objects includes (i) data and (ii) metadata describing the data. The method further includes dynamically creating a cumulative schema by, for each object of the retrieved objects: (i) inferring a schema from the object based on the metadata of the object and inferred data types of elements of the data of the object, (ii) creating a unified schema, wherein the unified schema describes both (a) the object described by the inferred schema and (b) a cumulative set of objects described by the cumulative schema, and (iii) storing the unified schema as the cumulative schema. The method further includes exporting the data of each of the retrieved objects to a data warehouse. | 09-18-2014 |
20140279838 | Scalable Analysis Platform For Semi-Structured Data - A data transformation system includes a schema inference module and an export module. The schema inference module is configured to dynamically create a cumulative schema for objects retrieved from a first data source. Each of the retrieved objects includes (i) data and (ii) metadata describing the data. Dynamically creating the cumulative schema includes, for each object of the retrieved objects, (i) inferring a schema from the object and (ii) selectively updating the cumulative schema to describe the object according to the inferred schema. The export module is configured to output the data of the retrieved objects to a data destination system according to the cumulative schema. | 09-18-2014 |
Patent application number | Description | Published |
20110180926 | Microelectromechanical Systems Embedded in a Substrate - An integrated circuit package includes a microelectromechanical systems (MEMS) device embedded in a packaging substrate. The MEMS device is located on a die embedded in the packaging substrate and covered by a hermetic seal. Low-stress material in the packaging substrate surrounds the MEMS device. Additionally, interconnects may be used as standoffs to reduce stress on the MEMS device. The MEMS device is embedded a distance into the packaging substrate leaving for example, 30-80 microns, between the hermetic seal of the MEMS device and the support surface of the packaging substrate. Embedding the MEMS device results in lower stress on the MEMS device. | 07-28-2011 |
20110210438 | Thermal Vias In An Integrated Circuit Package With An Embedded Die - In a multi-module integrated circuit package having a package substrate and package contacts, a die is embedded in the package substrate with thermal vias that couple hotspots on the embedded die to some of the package contacts. | 09-01-2011 |
20110234357 | Three Dimensional Inductor and Transformer Design Methodology of Glass Technology - An inductor or transformer for use in integrated circuit devices that includes a high-resistivity substrate. The inductor includes a plurality of conductive traces around the substrate forming a continuous conductive path from a first to a second port. The conductive path can be solenoid-shaped. Some of the conductive traces can be formed during back-end-of-line processing or backside plating of an integrated circuit die. The transformer includes a first inductor with input and output ports, and a first continuous conductive path therebetween; and a second inductor with input and output ports, and a second continuous conductive path therebetween. The second inductor is independent of and electromagnetically coupled to the first inductor. The first and second conductive paths can be solenoid-shaped. The first conductive path can be interleaved with the second conductive path. | 09-29-2011 |
20110285026 | Process For Improving Package Warpage and Connection Reliability Through Use Of A Backside Mold Configuration (BSMC) - A backside mold configuration (BSMC) process for manufacturing packaged integrated circuits includes applying a mold compound to a side of a packaging substrate opposite an attached die. The mold compound is deposited on a dielectric (such as photo resist). The mold compound and dielectric are patterned after coupling a die to the packaging substrate to expose a contact pad of the packaging substrate. After patterning the mold compound and dielectric, a packaging connection is coupled to contact pads through the mold compound and dielectric. The mold compound surrounding the packaging connection reduces warpage of the packaging substrate during processing. Additionally, patterning the dielectric after attaching the die improves reliability of the packaging connection. | 11-24-2011 |
20120080787 | Electronic Package and Method of Making an Electronic Package - An electrical package and a method of forming the electrical package, where the electrical package has a substrate with a frontside, an intergrated circuit coupled to the frontside of the substrate, and at least one non-collapsible metal connector created on the frontside of the first substrate. | 04-05-2012 |
20120090883 | Method and Apparatus for Improving Substrate Warpage - A package substrate includes conductive layers and a dielectric interposed between the conductive layers. The dielectric includes a stiffening material component and a neat resin doped with a negative coefficient of thermal expansion (CTE) fiber. | 04-19-2012 |
20120139112 | Selective Seed Layer Treatment for Feature Plating - Conventional metallization processes fail at high density or small feature size patterns. For example, during patterning dry films may collapse or lift-off resulting in short circuits or open circuits in the metallization pattern. An exemplary method for metallization of integrated circuits includes forming features such as trenches, pads, and planes in a dielectric layer and depositing and selectively treating a seed layer in desired features of the dielectric layer. The treated regions of the seed layer may be used as a seed for electroless deposition of conductive material, such as copper, into the features. When the seed layer is a catalytic ink, the seed layer may be treated by curing the catalytic ink with a laser. | 06-07-2012 |
20130122833 | RADIO FREQUENCY PACKAGE ON PACKAGE CIRCUIT - A radio frequency package on package (PoP) circuit is described. The radio frequency package on package (PoP) circuit includes a first radio frequency package. The first radio frequency package includes radio frequency components. The radio frequency package on package (PoP) circuit also includes a second radio frequency package. The second radio frequency package includes radio frequency components. The first radio frequency package and the second radio frequency package are in a vertical configuration. The radio frequency components on the first radio frequency package are designed to reduce the effects of ground inductance. | 05-16-2013 |
20140131857 | BARRIER LAYER ON BUMP AND NON-WETTABLE COATING ON TRACE - Some implementations provide a semiconductor device that includes a die, an under bump metallization (UBM) structure coupled to the die, and a barrier layer. The UBM structure has a first oxide property. The barrier layer has a second oxide property that is more resistant to oxide removal from a flux material than the first oxide property of the UBM structure. The barrier layer includes a top portion, a bottom portion and a side portion. The top portion is coupled to the UBM structure, and the side portion is substantially oxidized. | 05-15-2014 |
20140138831 | SURFACE FINISH ON TRACE FOR A THERMAL COMPRESSION FLIP CHIP (TCFC) - Some implementations provide a semiconductor device that includes a substrate coupled to a die through a thermal compression bonding process. The semiconductor device also includes a trace coupled to the substrate. The trace includes a first conductive material having a first oxidation property. The trace also includes a first surface layer including a second conductive material having a second oxidation property. The second oxidation property is less susceptible to oxidation than the first oxidation property. The first and second conductive materials are configured to provide an electrical path between the die and the substrate. The first surface layer has a thickness that is | 05-22-2014 |
20140159238 | PACKAGE HAVING THERMAL COMPRESSION FLIP CHIP (TCFC) AND CHIP WITH REFLOW BONDING ON LEAD - Some exemplary implementations of this disclosure pertain to an integrated circuit package that includes a substrate, a first die and a second die. The substrate includes a first set of traces and a second set of traces. The first set of traces has a first pitch. The second set of traces has a second pitch. The first pitch is less than the second pitch. In some implementations, a pitch of a set of traces defines a center to center distance between two neighboring traces, or bonding pads on a substrate. The first die is coupled to the substrate by a thermal compression bonding process. In some implementations, the first die is coupled to the first set of traces of the substrate. The second die is coupled to the substrate by a reflow bonding process. In some implementations, the second die is coupled to the second set of traces of the substrate. | 06-12-2014 |
20140175658 | ANCHORING A TRACE ON A SUBSTRATE TO REDUCE PEELING OF THE TRACE - Sonic implementations pertain to a semiconductor device that includes a packaging substrate, a trace coupled to the packaging substrate, and a solder resist layer that covers part of the trace. The trace includes a first portion having a first width, and a second portion having a second width that is wider than the first width. In some implementations, the second portion having the second width increases the area of the trace coupled to the packaging substrate to reduce the likelihood of the trace peeling from the packaging substrate. In some implementations, the solder resist layer further includes an opening such that the second portion of the trace is exposed. In some implementations, the trace further includes a third portion located between the first portion and second portion of the trace and wherein the third portion of the trace is exposed through an opening in the solder resist layer. | 06-26-2014 |
Patent application number | Description | Published |
20090196510 | SYSTEM AND METHOD FOR ENABLING THE USE OF CAPTURED IMAGES THROUGH RECOGNITION - An embodiment provides for enabling retrieval of a collection of captured images that form at least a portion of a library of images. For each image in the collection, a captured image may be analyzed to recognize information from image data contained in the captured image, and an index may be generated, where the index data is based on the recognized information. Using the index, functionality such as search and retrieval is enabled. Various recognition techniques, including those that use the face, clothing, apparel, and combinations of characteristics may be utilized. Recognition may be performed on, among other things, persons and text carried on objects. | 08-06-2009 |
20090208116 | SYSTEM AND METHOD FOR USE OF IMAGES WITH RECOGNITION ANALYSIS - An index is provided that holds information about each image content item in a collection of items, For each image content item, a first information item identifying the image content item and its location on a network, and at least one of (i) a second information item identifying a signature value of an object in the image content, or (ii) identification of a recognized object in the image content. | 08-20-2009 |
20110026853 | SYSTEM AND METHOD FOR PROVIDING OBJECTIFIED IMAGE RENDERINGS USING RECOGNITION INFORMATION FROM IMAGES - An embodiment provides for enabling retrieval of a collection of captured images that form at least a portion of a library of images. For each image in the collection, a captured image may be analyzed to recognize information from image data contained in the captured image, and an index may be generated, where the index data is based on the recognized information. Using the index, functionality such as search and retrieval is enabled. Various recognition techniques, including those that use the face, clothing, apparel, and combinations of characteristics may be utilized. Recognition may be performed on, among other things, persons and text carried on objects. | 02-03-2011 |
20110194777 | SYSTEM AND METHOD FOR USE OF IMAGES WITH RECOGNITION ANALYSIS - An index is provided that holds information about each image content item in a collection of items, For each image content item, a first information item identifying the image content item and its location on a network, and at least one of (i) a second information item identifying a signature value of an object in the image content, or (ii) identification of a recognized object in the image content. | 08-11-2011 |
20120304125 | SYSTEM AND METHOD FOR PROVIDING OBJECTIFIED IMAGE RENDERINGS USING RECOGNITION INFORMATION FROM IMAGES - An embodiment provides for enabling retrieval of a collection of captured images that form at least a portion of a library of images. For each image in the collection, a captured image may be analyzed to recognize information from image data contained in the captured image, and an index may be generated, where the index data is based on the recognized information. Using the index, functionality such as search and retrieval is enabled. Various recognition techniques, including those that use the face, clothing, apparel, and combinations of characteristics may be utilized. Recognition may be performed on, among other things, persons and text carried on objects. | 11-29-2012 |
20130121589 | SYSTEM AND METHOD FOR ENABLING THE USE OF CAPTURED IMAGES THROUGH RECOGNITION - An embodiment provides for enabling retrieval of a collection of captured images that form at least a portion of a library of images. For each image in the collection, a captured image may be analyzed to recognize information from image data contained in the captured image, and an index may be generated, where the index data is based on the recognized information. Using the index, functionality such as search and retrieval is enabled. Various recognition techniques, including those that use the face, clothing, apparel, and combinations of characteristics may be utilized. Recognition may be performed on, among other things, persons and text carried on objects. | 05-16-2013 |
20130129228 | SYSTEM AND METHOD FOR USE OF IMAGES WITH RECOGNITION ANALYSIS - An index is provided that holds information about each image content item in a collection of items, For each image content item, a first information item identifying the image content item and its location on a network, and at least one of (i) a second information item identifying a signature value of an object in the image content, or (ii) identification of a recognized object in the image content. | 05-23-2013 |
20140369626 | SYSTEM AND METHOD FOR PROVIDING OBJECTIFIED IMAGE RENDERINGS USING RECOGNITION INFORMATION FROM IMAGES - An embodiment provides for enabling retrieval of a collection of captured images that form at least a portion of a library of images. For each image in the collection, a captured image may be analyzed to recognize information from image data contained in the captured image, and an index may be generated, where the index data is based on the recognized information. Using the index, functionality such as search and retrieval is enabled. Various recognition techniques, including those that use the face, clothing, apparel, and combinations of characteristics may be utilized. Recognition may be performed on, among other things, persons and text carried on objects. | 12-18-2014 |
Patent application number | Description | Published |
20090155787 | Mutations in the BCR-ABL tyrosine kinase associated with resistance to STI-571 - The invention described herein relates to novel genes and their encoded proteins, termed Mutants Associated with Resistance to STI-571 (e.g., T315I Bcr-Abl), and to diagnostic and therapeutic methods and compositions useful in the management of various cancers that express MARS. The invention further provides methods for identifying molecules that bind to and/or modulate the functional activity of MARS. | 06-18-2009 |
20100055687 | Mutations in the BCR-ABL tyrosine kinase associated with resistance to ST1-571 - The invention described herein relates to novel genes and their encoded proteins, termed Mutants Associated with Resistance to STI-571 (e.g., T315I Bcr-Abl), and to diagnostic and therapeutic methods and compositions useful in the management of various cancers that express MARS. The invention further provides methods for identifying molecules that bind to and/or modulate the functional activity of MARS. | 03-04-2010 |
20100248241 | MUTATIONS IN THE BCR-ABL TYROSINE KINASE ASSOCIATED WITH RESISTANCE TO STI-571 - The invention described herein relates to novel genes and their encoded proteins, termed Mutants Associated with Resistance to STI-571 (e.g., T315I Bcr-Abl), and to diagnostic and therapeutic methods and compositions useful in the management of various cancers that express MARS. The invention further provides methods for identifying molecules that bind to and/or modulate the functional activity of MARS. | 09-30-2010 |
20120021425 | MUTATIONS IN THE BCR-ABL TYROSINE KINASE ASSOCIATED WITH RESISTANCE TO STI-571 - The invention described herein relates to novel genes and their encoded proteins, termed Mutants Associated with Resistance to STI-571 (e.g., T315I Bcr-Abl), and to diagnostic and therapeutic methods and compositions useful in the management of various cancers that express MARS. The invention further provides methods for identifying molecules that bind to and/or modulate the functional activity of MARS. | 01-26-2012 |
20120282622 | MUTATIONS IN THE BCR-ABL TYROSINE KINASE ASSOCIATED WITH RESISTANCE TO STI-571 - The invention described herein relates to novel genes and their encoded proteins, termed Mutants Associated with Resistance to STI-571 (e.g., T315I Bcr-Abl), and to diagnostic and therapeutic methods and compositions useful in the management of various cancers that express MARS. The invention further provides methods for identifying molecules that bind to and/or modulate the functional activity of MARS. | 11-08-2012 |
Patent application number | Description | Published |
20090172434 | Latency based platform coordination - In some embodiments, an electronic apparatus comprises at least one processor, a plurality of components, and a policy engine comprising logic to receive latency data from one or more components in the electronic device, compute a minimum latency tolerance value from the latency data, and determine a power management policy from the minimum latency tolerance value. | 07-02-2009 |
20110078473 | LATENCY BASED PLATFORM COORDINATION - In some embodiments, an electronic apparatus comprises at least one processor, a plurality of components, and a policy engine comprising logic to receive latency data from one or more components in the electronic device, compute a minimum latency tolerance value from the latency data, and determine a power management policy from the minimum latency tolerance value. | 03-31-2011 |
20110302626 | LATENCY BASED PLATFORM COORDINATION - In some embodiments, an electronic apparatus comprises at least one processor, a plurality of components, and a policy engine comprising logic to receive latency data from one or more components in the electronic device, compute a minimum latency tolerance value from the latency data, and determine a power management policy from the minimum latency tolerance value. | 12-08-2011 |
Patent application number | Description | Published |
20110258918 | SYSTEMS, METHODS, AND COMPOSITIONS RELATING TO COMBUSTIBLE BIOMATERIALS - A method for making a combustible material is described. The method includes: (i) receiving one or more types of biomass, each of which includes an inorganic material; (ii) rupturing lignocellulose in one or more types of the biomass to produce ruptured biomass including the inorganic material; (iii) washing the ruptured biomass with solvent to drive the inorganic material from the ruptured biomass into the solvent to produce an inorganic-material-enriched solvent and an inorganic-material-depleted ruptured biomass; (iv) pyrolyzing the inorganic-material-depleted ruptured biomass to produce a combustible biomaterial. | 10-27-2011 |
20110258919 | SYSTEMS, METHODS AND COMPOSITIONS RELATING TO COMBUSTIBLE BIOMATERIALS - A composition of biomass material is disclosed. The composition includes: (i) a lignocellulosic material; and (ii) at least one member selected from a group consisting of potassium, sodium and chlorides, wherein said at least one member comprising not more than about 0.01% (by weight) of said composition. The composition may not include more than 10% of water. | 10-27-2011 |
20110259372 | SYSTEMS, METHODS AND COMPOSITIONS RELATING TO COMBUSTIBLE BIOMATERIALS - A method for washing biomass is described. The method includes: (i) receiving a first discrete amount of biomass; (ii) receiving a second discrete amount of biomass; (iii) washing the first discrete amount of biomass with solvent to produce a first effluent stream enriched with inorganic material; and (iv) washing the second discrete amount of biomass with the first effluent stream to produce a second effluent solvent stream. | 10-27-2011 |
20110259727 | SYSTEMS, METHODS AND COMPOSITIONS RELATING TO COMBUSTIBLE BIOMATERIALS - A system for producing combustible biomaterial is described. The system includes: (i) a lignocellulose rupturing device for rupturing lignocellulose in biomass to produce a ruptured biomass material, the ruptured biomass material having an inorganic material; (ii) a washing subassembly designed to wash the ruptured biomass material having said inorganic material with a solvent and produce an inorganic-material-enriched solvent and an inorganic-material-depleted ruptured biomass; and (iii) a pyrolyzing subassembly for pyrolyzing the inorganic-material-depleted ruptured biomass to produce a combustible biomaterial. | 10-27-2011 |
20130104451 | NOVEL SYSTEMS AND METHODS FOR PRODUCING FUEL FROM DIVERSE BIOMASS | 05-02-2013 |
20130110291 | NOVEL SYSTEMS AND METHODS FOR PRODUCING BIOFUEL FROM ONE OR MORE VALUES OF PROCESS PARAMETERS | 05-02-2013 |
20130219780 | SYSTEMS, METHODS AND COMPOSITIONS RELATING TO COMBUSTIBLE BIOMATERIALS - A composition of biomass material is disclosed. The composition includes: (i) a lignocellulosic material; and (ii) at least one member selected from a group comprising of potassium, sodium and chlorides, wherein said at least one member comprising not more than about 0.01% (by weight) of said composition. The composition may not include more than 10% of water. | 08-29-2013 |
20130304546 | NOVEL SYSTEMS AND METHODS FOR OPTIMIZING PROFIT OR GROSS MARGIN BASED ON ONE OF MORE VALUES OF PROCESS PARAMETERS FOR PRODUCING BIOFUEL - A process for optimizing values of profit or gross margin based on process parameters used to process fuel having a desired fuel property is described. The process includes: (i) receiving a predetermined value of a first property of a fuel derived from biomass; (ii) retrieving a first different sets of values of one or more process parameters associated with a process that converts biomass to fuel, and the first different sets of values of the one or more process parameters are based on the predetermined value of the first fuel property; (iii) generating estimated values for cost or revenue associated with the first different sets of values of the one or more process parameters; and (iv) identifying, from the first different sets of values, a first set of values of one or more process parameters that approaches an optimum profit or gross margin for the process. | 11-14-2013 |
Patent application number | Description | Published |
20110296057 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 12-01-2011 |
20120162118 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 06-28-2012 |
20130009986 | Event Handling In An Integrated Execution Environment - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for handling input received from a common interface of a program and a runtime environment when both the program and the runtime environment are configured to consume the received input. Given that both a browser program and a media player program hosted by the browser program are configured to detect an event of a certain type, there may be a contention of whether the browser program or the media player program may act first on the detected event. The disclosed systems and techniques enable interpretation of a user's intent when the user interacts with a webpage hosting media content and when the user's input occurs over media content rendered by the media player program. Similar advantages may also be realized within the context of another execution environment, or other program, different than a browser program. | 01-10-2013 |
20130061234 | Media Player Instance Managed Resource Reduction - Techniques and systems are disclosed for managing computer resources available to multiple running instances of a media player program. The methods include monitoring consumption of computing resources of multiple running instances of a media player program to render respective media content in a graphical user interface of a computing device. The graphical user interface associated with an additional program configured to render additional content, different from the media content, to the graphical user interface. The additional program can be a browser. The methods further include instructing the multiple instances to reduce respective portions of the computing resources consumption upon determining that a requested increase in computer resources consumption of the media player program would cause the computer resources consumption of the media player program to exceed a first predetermined level. | 03-07-2013 |
20130232572 | AUTHORIZING LOCAL APPLICATION ACTIVITY USING REMOTELY DEFINED SECURITY DATA - Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted. | 09-05-2013 |
Patent application number | Description | Published |
20110275617 | OPHTHALMIC COMPOSITION - The present invention provides an ophthalmic composition comprising a hyperbranched polymer. The ophthalmic compositions may also comprise carbonic anhydrase inhibitors, wherein the hyperbranched polymer increases the aqueous solubility of the carbonic anhydrase inhibitor, and increases corneal permeation of the active agent. The ophthalmic compositions may also comprise non-ionic surfactants, such as polysorbate, hydroxypropyl methyl cellulose or hydroxyethyl cellulose, and beta-blockers, such as carteolol, levobunolol, betaxolol, metipranolol, timolol or propranolol. | 11-10-2011 |
20130053374 | OPHTHALMIC COMPOSITION - The present invention provides an ophthalmic composition comprising a hyperbranched polyester. The ophthalmic compositions may also comprise carbonic anhydrase inhibitors, wherein the hyperbranched polyester increases the aqueous solubility of the carbonic anhydrase inhibitor, and increases corneal permeation of the active agent. The ophthalmic compositions may also comprise non-ionic surfactants, such as PEG, Polysorbate, HPMC or HEC, and beta-blockers, such as Carteolol, Levobunolol, Betaxolol, Metipranolol, Timolol or Propranolol. The concentration of the hyperbranched polyester in the ophthalmic formulation should be less than or equal to 4% (w/v) in order to avoid any cytotoxic effects on human corneal cells and thus the eye irritation. | 02-28-2013 |